Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
BEncode Editor.exe

Overview

General Information

Sample name:BEncode Editor.exe
Analysis ID:1582389
MD5:26576bc77abd3e6817162e5c94bfbb97
SHA1:bc994d975aafce10f5f6aef666d0505ce54054ea
SHA256:6e62b0c23d6dd9dc1e7de4c3d8040a989e5dc1d6a663608e2bc129048b446aa5
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to detect sleep reduction / modifications
Uses Windows timers to delay execution
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w11x64_office
  • BEncode Editor.exe (PID: 7420 cmdline: "C:\Users\user\Desktop\BEncode Editor.exe" MD5: 26576BC77ABD3E6817162E5C94BFBB97)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140041150 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_0000000140041150
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140052490 FindFirstFileW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_0000000140052490
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014005D710 FindFirstFileW,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_000000014005D710
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140043770 GetFileAttributesW,FindFirstFileW,FindClose,0_2_0000000140043770
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014008C880 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,0_2_000000014008C880
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014005D9A0 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,0_2_000000014005D9A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014006FC70 FindFirstFileW,FindClose,0_2_000000014006FC70
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140060DD0 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_0000000140060DD0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014006DE70 FindFirstFileW,FindNextFileW,FindClose,0_2_000000014006DE70
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140051E70 InternetQueryDataAvailable,InternetReadFile,0_2_0000000140051E70
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014007E010 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_000000014007E010
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014006A500 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_000000014006A500
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014007E010 OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_000000014007E010
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400550E0 GetParent,GetKeyboardState,PostMessageW,PostMessageW,PostMessageW,PostMessageW,PostMessageW,SetKeyboardState,keybd_event,keybd_event,keybd_event,keybd_event,keybd_event,0_2_00000001400550E0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400412F0: GetFullPathNameW,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,0_2_00000001400412F0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400474F0 GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,0_2_00000001400474F0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140043060 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0000000140043060
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001A1100_2_000000014001A110
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400032100_2_0000000140003210
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400864500_2_0000000140086450
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002F56C0_2_000000014002F56C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002664C0_2_000000014002664C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001A75C0_2_000000014001A75C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400448A00_2_00000001400448A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400029A00_2_00000001400029A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140094C300_2_0000000140094C30
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002ED6C0_2_000000014002ED6C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140052FF00_2_0000000140052FF0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400690000_2_0000000140069000
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400800200_2_0000000140080020
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002B0500_2_000000014002B050
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002E0500_2_000000014002E050
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001B0AC0_2_000000014001B0AC
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400840E00_2_00000001400840E0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400550E00_2_00000001400550E0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400891D00_2_00000001400891D0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002A2600_2_000000014002A260
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400222AC0_2_00000001400222AC
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400252D00_2_00000001400252D0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014008C2F00_2_000000014008C2F0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400953700_2_0000000140095370
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400673700_2_0000000140067370
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400233D00_2_00000001400233D0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400284040_2_0000000140028404
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400574200_2_0000000140057420
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002945C0_2_000000014002945C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400654700_2_0000000140065470
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001D46C0_2_000000014001D46C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400125200_2_0000000140012520
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400695B00_2_00000001400695B0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400316140_2_0000000140031614
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400916200_2_0000000140091620
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400796200_2_0000000140079620
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400276400_2_0000000140027640
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400596C00_2_00000001400596C0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400157200_2_0000000140015720
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400807600_2_0000000140080760
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400647700_2_0000000140064770
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400027A00_2_00000001400027A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400907C00_2_00000001400907C0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400787F00_2_00000001400787F0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001E8280_2_000000014001E828
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001B82C0_2_000000014001B82C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002A8BC0_2_000000014002A8BC
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001D8CC0_2_000000014001D8CC
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400027A00_2_00000001400027A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400679200_2_0000000140067920
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002E9280_2_000000014002E928
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014007C9300_2_000000014007C930
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001B9BC0_2_000000014001B9BC
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014008A9E00_2_000000014008A9E0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140070A000_2_0000000140070A00
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140029A240_2_0000000140029A24
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001AB080_2_000000014001AB08
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140085B100_2_0000000140085B10
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140091B300_2_0000000140091B30
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002EB480_2_000000014002EB48
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001EB580_2_000000014001EB58
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140063BB00_2_0000000140063BB0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001DBE80_2_000000014001DBE8
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140001C600_2_0000000140001C60
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002DCEC0_2_000000014002DCEC
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140030D180_2_0000000140030D18
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140072D300_2_0000000140072D30
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140068D700_2_0000000140068D70
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014008BE000_2_000000014008BE00
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140020E540_2_0000000140020E54
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140023E8C0_2_0000000140023E8C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140059E900_2_0000000140059E90
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014001EE900_2_000000014001EE90
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140093F000_2_0000000140093F00
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140027F000_2_0000000140027F00
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140095F200_2_0000000140095F20
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014007CF200_2_000000014007CF20
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140090FB00_2_0000000140090FB0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140089FB00_2_0000000140089FB0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140028FBC0_2_0000000140028FBC
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140029FD80_2_0000000140029FD8
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: String function: 0000000140056500 appears 66 times
Source: classification engineClassification label: mal48.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014005CBC0 GetLastError,FormatMessageW,0_2_000000014005CBC0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140043060 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0000000140043060
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140067920 OpenProcess,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_0000000140067920
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014006F0C0 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_000000014006F0C0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140089D60 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0000000140089D60
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014008C2F0 CoInitialize,CoCreateInstance,CoUninitialize,0_2_000000014008C2F0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140042CB0 FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0000000140042CB0
Source: BEncode Editor.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\BEncode Editor.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeFile read: C:\Users\user\Desktop\BEncode Editor.exeJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: cfgmgr32.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeWindow found: window name: SysTabControl32Jump to behavior
Source: BEncode Editor.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140001020 LoadLibraryA,GetProcAddress,0_2_0000000140001020
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140004EF1 push 340003CCh; iretd 0_2_0000000140004EFD
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400448A0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00000001400448A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014008DE00 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_000000014008DE00

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400032100_2_0000000140003210
Source: C:\Users\user\Desktop\BEncode Editor.exeUser Timer Set: Timeout: 750msJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeUser Timer Set: Timeout: 40msJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeUser Timer Set: Timeout: 750msJump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeWindow / User API: threadDelayed 7433Jump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeWindow / User API: foregroundWindowGot 1488Jump to behavior
Source: C:\Users\user\Desktop\BEncode Editor.exeAPI coverage: 7.4 %
Source: C:\Users\user\Desktop\BEncode Editor.exe TID: 7432Thread sleep time: -74330s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\BEncode Editor.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140041150 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_0000000140041150
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140052490 FindFirstFileW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_0000000140052490
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014005D710 FindFirstFileW,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_000000014005D710
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140043770 GetFileAttributesW,FindFirstFileW,FindClose,0_2_0000000140043770
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014008C880 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,0_2_000000014008C880
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014005D9A0 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,0_2_000000014005D9A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014006FC70 FindFirstFileW,FindClose,0_2_000000014006FC70
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140060DD0 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_0000000140060DD0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014006DE70 FindFirstFileW,FindNextFileW,FindClose,0_2_000000014006DE70
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140014330 GetVersionExW,GetCurrentProcess,GetSystemInfo,FreeLibrary,GetSystemInfo,0_2_0000000140014330
Source: C:\Users\user\Desktop\BEncode Editor.exeAPI call chain: ExitProcess graph end nodegraph_0-56044
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014006A7C0 BlockInput,0_2_000000014006A7C0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140012DD0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0000000140012DD0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140001020 LoadLibraryA,GetProcAddress,0_2_0000000140001020
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140047080 GetProcessHeap,HeapAlloc,0_2_0000000140047080
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400270B0 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00000001400270B0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002B81C SetUnhandledExceptionFilter,0_2_000000014002B81C
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140020A00 RtlCaptureContext,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140020A00
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014002CA58 RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014002CA58
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400472A0 LogonUserW,0_2_00000001400472A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140012DD0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0000000140012DD0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_00000001400448A0 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00000001400448A0
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014005D450 mouse_event,0_2_000000014005D450
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140056A40 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_0000000140056A40
Source: BEncode Editor.exeBinary or memory string: Shell_TrayWnd
Source: BEncode Editor.exeBinary or memory string: ASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALT0409000208090710050EASC 0%dupdownonoff0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: GetLocaleInfoA,0_2_000000014002FAC8
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140042440 GetLocalTime,0_2_0000000140042440
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140087430 GetUserNameW,0_2_0000000140087430
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140028FBC _lock,___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0000000140028FBC
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140014330 GetVersionExW,GetCurrentProcess,GetSystemInfo,FreeLibrary,GetSystemInfo,0_2_0000000140014330
Source: BEncode Editor.exeBinary or memory string: WIN_XP
Source: BEncode Editor.exeBinary or memory string: WIN_XPe
Source: BEncode Editor.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 2, 0USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:cdeclwinapistdcallnonewstrbooluintlongulongdwordshortushortwordbyteubytebooleanfloatdoublehwndhandlelresultlparamwparamint64uint64int_ptruint_ptrlong_ptrulong_ptrdword_ptridispatch64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARY+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINEGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@
Source: BEncode Editor.exeBinary or memory string: WIN_VISTA
Source: BEncode Editor.exeBinary or memory string: WIN_7
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_000000014008A800 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_000000014008A800
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140091B30 OleInitialize,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0000000140091B30
Source: C:\Users\user\Desktop\BEncode Editor.exeCode function: 0_2_0000000140075BC0 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_0000000140075BC0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
2
Valid Accounts
2
Valid Accounts
2
Valid Accounts
11
Input Capture
2
System Time Discovery
Remote Services11
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
LSASS Memory12
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
Access Token Manipulation
111
Virtualization/Sandbox Evasion
Security Account Manager111
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Process Injection
21
Access Token Manipulation
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Process Injection
LSA Secrets11
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain Credentials1
Account Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSync1
System Owner/User Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc Filesystem2
File and Directory Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow16
System Information Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
BEncode Editor.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
fp2e7a.wpc.phicdn.net
192.229.221.95
truefalse
    high
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1582389
    Start date and time:2024-12-30 14:19:47 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 29s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 11 23H2 with Office Professional Plus 2021, Chrome 131, Firefox 133, Adobe Reader DC 24, Java 8 Update 431, 7zip 24.09
    Number of analysed new started processes analysed:37
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:BEncode Editor.exe
    Detection:MAL
    Classification:mal48.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 98%
    • Number of executed functions: 82
    • Number of non-executed functions: 166
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, SIHClient.exe, backgroundTaskHost.exe, appidcertstorecheck.exe, conhost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 204.79.197.203, 184.28.90.27, 4.175.87.197, 20.223.35.26, 20.190.159.64
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, slscr.update.microsoft.com, fd.api.iris.microsoft.com, a-0003.a-msedge.net, oneocsp-microsoft-com.a-0003.a-msedge.net, ctldl.windowsupdate.com, oneocsp.microsoft.com, x1.c.lencr.org, ocsp.digicert.com, login.live.com, res.public.onecdn.static.microsoft, ocsp.edge.digicert.com, c.pki.goog
    • Not all processes where analyzed, report is missing behavior information
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • VT rate limit hit for: BEncode Editor.exe
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    fp2e7a.wpc.phicdn.netvalyzt.msiGet hashmaliciousXRedBrowse
    • 192.229.221.95
    docx.msiGet hashmaliciousXRedBrowse
    • 192.229.221.95
    SecuredOnedrive.ClientSetup.exeGet hashmaliciousScreenConnect ToolBrowse
    • 192.229.221.95
    dsoft.exeGet hashmaliciousPython Stealer, Creal StealerBrowse
    • 192.229.221.95
    KL-3.1.16.exeGet hashmaliciousNitol, ZegostBrowse
    • 192.229.221.95
    2GL073z1wL.exeGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    installer64v1.0.0.msiGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    test5.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
    • 192.229.221.95
    FIyDwZM4OR.exeGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    ZFttiy4Tt8.exeGet hashmaliciousUnknownBrowse
    • 192.229.221.95
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):6.497143669772378
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:BEncode Editor.exe
    File size:832'005 bytes
    MD5:26576bc77abd3e6817162e5c94bfbb97
    SHA1:bc994d975aafce10f5f6aef666d0505ce54054ea
    SHA256:6e62b0c23d6dd9dc1e7de4c3d8040a989e5dc1d6a663608e2bc129048b446aa5
    SHA512:7d98010738647e487d5c7b5c4ad55f132442c606b9dc767d5381812df6ba7f70cb472de47bb55b2a25c6bec25c1237431eb795336d5ae7bfe513b83060322fe5
    SSDEEP:12288:LhwtMZsuC4jt6aOHAEN88qOQ2mxSx9IGsSluITDGJme0/NlF0Qryj8C0V3Ef:LOtMZfHt6vvVGJP0/Nf0QWox3Ef
    TLSH:6F057C59B7E800E5D47BE5BACE42C21BE7F1B8084774A6DB07505E2B1F23BE1593A321
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......\.................k.......y.!.....~.......h.....?.......?.}.....?...9.............r._.....h.......i.......j.......l.....Rich...
    Icon Hash:67c9342c4933164d
    Entrypoint:0x14001f65c
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x4B2A6D96 [Thu Dec 17 17:42:46 2009 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:2
    File Version Major:5
    File Version Minor:2
    Subsystem Version Major:5
    Subsystem Version Minor:2
    Import Hash:7834b9da763b0d783827e9676412d9f9
    Instruction
    dec eax
    sub esp, 28h
    call 00007FE6048043C4h
    dec eax
    add esp, 28h
    jmp 00007FE6047F7B5Fh
    int3
    int3
    dec eax
    jmp dword ptr [00079FD9h]
    int3
    xor ecx, ecx
    dec eax
    jmp dword ptr [00079FCFh]
    int3
    int3
    int3
    dec eax
    jmp dword ptr [00079FCDh]
    int3
    dec eax
    jmp dword ptr [00079FCDh]
    int3
    mov eax, dword ptr [0008FDBAh]
    ret
    int3
    dec eax
    jmp dword ptr [00079FC5h]
    int3
    dec eax
    sub esp, 28h
    mov ecx, dword ptr [0008FDA6h]
    cmp ecx, FFFFFFFFh
    je 00007FE6047F7D4Fh
    call dword ptr [00079FB7h]
    or dword ptr [0008FD94h], FFFFFFFFh
    dec eax
    add esp, 28h
    jmp 00007FE6047F97C8h
    int3
    int3
    int3
    dec eax
    mov dword ptr [esp+08h], ebx
    push edi
    dec eax
    sub esp, 20h
    dec eax
    mov edi, edx
    dec eax
    mov ebx, ecx
    dec eax
    lea eax, dword ptr [0007C64Dh]
    dec eax
    mov dword ptr [ecx+000000A0h], eax
    mov dword ptr [ecx+1Ch], 00000001h
    mov dword ptr [ecx+000000C8h], 00000001h
    mov byte ptr [ecx+00000174h], 00000043h
    mov byte ptr [ecx+000001F7h], 00000043h
    dec eax
    lea eax, dword ptr [0008FD50h]
    dec eax
    mov dword ptr [ecx+000000B8h], eax
    mov ecx, 0000000Dh
    call 00007FE6047F98F4h
    nop
    dec eax
    Programming Language:
    • [C++] VS2008 SP1 build 30729
    • [ C ] VS2008 SP1 build 30729
    • [ASM] VS2008 SP1 build 30729
    • [ C ] VS2005 build 50727
    • [IMP] VS2005 build 50727
    • [ASM] VS2008 build 21022
    • [RES] VS2008 build 21022
    • [LNK] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0xaafe00x154.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0xd00000x4410.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0xc90000x6a50.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x990000x10a8.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x9787e0x97a0025bf208f067eb127bdc5003ccc11ea62False0.5203910758450123data6.39221719308833IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x990000x154dc0x156001c9e8ab86a379e059abb5816a3f7dbe2False0.385953490497076data5.141667992398577IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0xaf0000x19b080x4600d92095712ae66c57575ec783fa802170False0.2551339285714286data3.4070952778882098IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0xc90000x6a500x6c0055e148c16da85e6eac4e56c8e62a46d8False0.4930555555555556data5.757925689479366IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0xd00000x69110x6a00965cf8f45e031c01d0bb9bf52404b4d1False0.3655291863207547data4.605163714639206IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0xd06e80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
    RT_ICON0xd08100x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
    RT_ICON0xd09380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
    RT_ICON0xd0a600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.4530956848030019
    RT_ICON0xd1b080x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.6303191489361702
    RT_ICON0xd1f700x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.32358156028368795
    RT_ICON0xd23d80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.44680851063829785
    RT_ICON0xd28400x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.5859929078014184
    RT_ICON0xd2ca80x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6276595744680851
    RT_ICON0xd31100x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6312056737588653
    RT_ICON0xd35780x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.6117021276595744
    RT_ICON0xd39e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 00.18173758865248227
    RT_DIALOG0xd3e480xfcdataEnglishGreat Britain0.6507936507936508
    RT_STRING0xd3f440x530dataEnglishGreat Britain0.33960843373493976
    RT_STRING0xd44740x690dataEnglishGreat Britain0.26964285714285713
    RT_STRING0xd4b040x43adataEnglishGreat Britain0.3733826247689464
    RT_STRING0xd4f400x5fcdataEnglishGreat Britain0.3087467362924282
    RT_STRING0xd553c0x65cdataEnglishGreat Britain0.34336609336609336
    RT_STRING0xd5b980x388dataEnglishGreat Britain0.377212389380531
    RT_STRING0xd5f200x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
    RT_GROUP_ICON0xd60780x22dataEnglishGreat Britain1.0588235294117647
    RT_GROUP_ICON0xd609c0x14dataEnglishGreat Britain1.15
    RT_GROUP_ICON0xd60b00x14dataEnglishGreat Britain1.25
    RT_GROUP_ICON0xd60c40x14dataEnglishGreat Britain1.25
    RT_GROUP_ICON0xd60d80x14data1.25
    RT_GROUP_ICON0xd60ec0x14data1.25
    RT_GROUP_ICON0xd61000x14data1.25
    RT_GROUP_ICON0xd61140x14data1.25
    RT_GROUP_ICON0xd61280x14data1.25
    RT_GROUP_ICON0xd613c0x14data1.25
    RT_GROUP_ICON0xd61500x14data1.25
    RT_VERSION0xd61640x210dataEnglishGreat Britain0.4981060606060606
    RT_MANIFEST0xd63740x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
    RT_MANIFEST0xd65e00x331XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishGreat Britain0.4944920440636475
    DLLImport
    WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
    VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
    COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
    MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
    WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
    PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
    USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
    KERNEL32.dllWaitForSingleObject, HeapFree, GetProcessHeap, HeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, MultiByteToWideChar, WideCharToMultiByte, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, ReadFile, SetFilePointer, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, lstrcmpiW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, CreateThread, GetLocalTime, CompareStringW, CompareStringA, WriteFile, GetStdHandle, CreatePipe, EnterCriticalSection, TerminateThread, LeaveCriticalSection, DeleteCriticalSection, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetComputerNameW, GetWindowsDirectoryW, GetSystemDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, VirtualAlloc, LoadLibraryExW, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, LoadLibraryA, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, FreeLibrary, InitializeCriticalSection, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetStartupInfoW, EncodePointer, DecodePointer, FlsGetValue, FlsSetValue, FlsFree, GetProcAddress, LoadLibraryW, SetLastError, FlsAlloc, HeapSize, RtlUnwindEx, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, UnhandledExceptionFilter, SetUnhandledExceptionFilter, RtlVirtualUnwind, RtlLookupFunctionEntry, RtlCaptureContext, RtlPcToFileHeader, GetModuleFileNameA, InitializeCriticalSectionAndSpinCount, HeapSetInformation, HeapCreate, GetConsoleCP, GetConsoleMode, SetHandleCount, GetFileType, GetStartupInfoA, FlushFileBuffers, SetStdHandle, LCMapStringW, LCMapStringA, GetTimeZoneInformation, GetDateFormatA, GetTimeFormatA, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetTickCount, HeapReAlloc, GetStringTypeA, GetStringTypeW, GetLocaleInfoA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, CreateFileA, SetEndOfFile, OutputDebugStringW, SetEnvironmentVariableA
    USER32.dllIsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetWindowLongW, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongPtrW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, SetWindowLongPtrW, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, TranslateMessage, PeekMessageW, UnregisterHotKey, CharLowerBuffW, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, IsCharAlphaW, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, OpenClipboard, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, keybd_event, VkKeyScanA, GetKeyboardLayoutNameA, CharUpperW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongPtrW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, GetKeyboardLayoutNameW, ClientToScreen, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, TrackPopupMenuEx, IsClipboardFormatAvailable, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, BlockInput, GetMessageW, LockWindowUpdate, SystemParametersInfoW, DispatchMessageW, EnumWindows
    GDI32.dllDeleteObject, GetObjectW, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, LineTo, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, AngleArc, MoveToEx, Ellipse, PolyDraw, BeginPath, Rectangle, GetDeviceCaps, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, SetViewportOrgEx
    COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
    ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, RegEnumKeyExW, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, InitiateSystemShutdownExW, AdjustTokenPrivileges, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, SetSecurityDescriptorDacl, LogonUserW, GetTokenInformation, GetSecurityDescriptorDacl, GetAce, AddAce, GetAclInformation
    SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
    ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, StringFromCLSID, IIDFromString, StringFromIID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize
    OLEAUT32.dllSafeArrayAllocData, SafeArrayAllocDescriptorEx, SysAllocString, OleLoadPicture, SafeArrayGetVartype, SafeArrayDestroyData, VariantInit, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayDestroyDescriptor, LoadRegTypeLib, GetActiveObject, SafeArrayUnaccessData, SafeArrayAccessData
    Language of compilation systemCountry where language is spokenMap
    EnglishGreat Britain
    EnglishUnited States
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Dec 30, 2024 14:20:36.640564919 CET1.1.1.1192.168.2.240xa58aNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
    Dec 30, 2024 14:20:36.640564919 CET1.1.1.1192.168.2.240xa58aNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:08:20:41
    Start date:30/12/2024
    Path:C:\Users\user\Desktop\BEncode Editor.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\BEncode Editor.exe"
    Imagebase:0x140000000
    File size:832'005 bytes
    MD5 hash:26576BC77ABD3E6817162E5C94BFBB97
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:10.1%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:16%
      Total number of Nodes:1390
      Total number of Limit Nodes:65
      execution_graph 55296 140004d62 55301 1400022e0 55296->55301 55298 140004d6f 55312 140005a20 55298->55312 55302 1400022f6 55301->55302 55303 14000230c 55301->55303 55326 140005760 55302->55326 55305 140002312 55303->55305 55306 14000232d 55303->55306 55308 140005760 VariantClear 55305->55308 55330 140018908 55306->55330 55310 14000231b 55308->55310 55310->55298 55311 14000233c 55311->55298 55386 1400058d0 55312->55386 55314 140005a85 55315 140036930 55314->55315 55316 140036920 55314->55316 55318 140005ab3 55314->55318 55407 140006680 VariantClear _RunAllParam 55315->55407 55406 140052aa0 89 API calls _flush 55316->55406 55403 140005f50 55318->55403 55327 140005772 55326->55327 55329 1400022fe 55326->55329 55341 1400056b0 55327->55341 55329->55298 55332 140018913 realloc 55330->55332 55333 14001892c 55332->55333 55337 140018932 shared_ptr 55332->55337 55345 1400196d8 55332->55345 55333->55311 55334 140018979 55362 140020c9c 45 API calls 2 library calls 55334->55362 55336 14001898a 55363 140020dc0 RaiseException __initmbctable 55336->55363 55337->55334 55359 1400185dc 55337->55359 55340 1400189a0 55344 1400056cd 55341->55344 55342 14003494c VariantClear 55343 1400056d9 _RunAllParam std::exception_ptr::_Current_exception 55342->55343 55343->55329 55344->55342 55344->55343 55346 14001976c realloc 55345->55346 55352 1400196f0 realloc 55345->55352 55369 140020bf8 45 API calls __doserrno 55346->55369 55347 140019728 HeapAlloc 55349 140019761 55347->55349 55347->55352 55349->55332 55351 140019751 55367 140020bf8 45 API calls __doserrno 55351->55367 55352->55347 55352->55351 55355 140019756 55352->55355 55356 140019708 55352->55356 55368 140020bf8 45 API calls __doserrno 55355->55368 55356->55347 55364 14002107c 45 API calls _FF_MSGBANNER 55356->55364 55365 140020e54 45 API calls 3 library calls 55356->55365 55366 140018a10 GetModuleHandleW GetProcAddress ExitProcess malloc 55356->55366 55370 1400184d4 55359->55370 55362->55336 55363->55340 55364->55356 55365->55356 55367->55355 55368->55349 55369->55349 55385 140018a28 55370->55385 55387 1400058fb 55386->55387 55388 14003db20 55386->55388 55408 140006310 55387->55408 55450 140052aa0 89 API calls _flush 55388->55450 55391 14003db37 55391->55314 55392 14003db41 55451 140052aa0 89 API calls _flush 55392->55451 55393 1400059f3 55393->55314 55397 14003db65 55398 1400056b0 _RunAllParam VariantClear 55397->55398 55398->55393 55399 1400059f5 55400 1400056b0 _RunAllParam VariantClear 55399->55400 55400->55393 55401 140005921 55401->55392 55401->55393 55401->55397 55401->55399 55402 1400056b0 _RunAllParam VariantClear 55401->55402 55413 1400024e0 55401->55413 55419 140004620 55401->55419 55402->55401 55404 1400056b0 _RunAllParam VariantClear 55403->55404 55405 140005f78 55404->55405 55406->55315 55410 140006330 55408->55410 55409 14000635c 55409->55401 55410->55409 55452 140052aa0 89 API calls _flush 55410->55452 55412 14003479b 55414 140002536 55413->55414 55418 1400024fa __initmbctable 55413->55418 55416 140018908 shared_ptr 56 API calls 55414->55416 55415 140018908 shared_ptr 56 API calls 55417 140002504 55415->55417 55416->55418 55417->55401 55418->55415 55420 140004e72 55419->55420 55421 140004658 55419->55421 55423 1400185dc _cinit 55 API calls 55420->55423 55422 140018908 shared_ptr 56 API calls 55421->55422 55428 140004687 std::exception_ptr::_Current_exception 55422->55428 55424 140004e9e 55423->55424 55424->55401 55425 140005760 VariantClear 55425->55428 55426 140018908 56 API calls shared_ptr 55426->55428 55427 14000475a 55430 140004765 55427->55430 55431 14003daa7 55427->55431 55428->55424 55428->55425 55428->55426 55428->55427 55429 140004b37 55428->55429 55433 14003d4ea VariantClear 55428->55433 55435 14003d7f4 VariantClear 55428->55435 55436 14003d055 VariantClear 55428->55436 55438 140014620 VariantClear _RunAllParam 55428->55438 55439 14003d40d VariantClear 55428->55439 55441 1400056b0 _RunAllParam VariantClear 55428->55441 55444 14003d97f 55428->55444 55449 140013a70 VariantClear 55428->55449 55453 140067cf0 97 API calls 3 library calls 55428->55453 55454 1400876f0 97 API calls 3 library calls 55428->55454 55432 140005760 VariantClear 55429->55432 55437 1400056b0 _RunAllParam VariantClear 55430->55437 55440 140004773 55430->55440 55456 140052aa0 89 API calls _flush 55431->55456 55432->55430 55433->55428 55435->55428 55436->55428 55437->55430 55438->55428 55439->55428 55440->55401 55441->55428 55442 14003d99e 55442->55401 55455 140052aa0 89 API calls _flush 55444->55455 55447 14003d994 55448 1400056b0 _RunAllParam VariantClear 55447->55448 55448->55442 55449->55428 55450->55391 55451->55397 55452->55412 55453->55428 55454->55428 55455->55447 55456->55442 55457 14003cc68 55458 1400022e0 57 API calls 55457->55458 55459 14003cc75 55458->55459 55462 140003210 55459->55462 55461 14003cc9d 55463 140003246 shared_ptr 55462->55463 55464 14003a830 55463->55464 55465 140018908 shared_ptr 56 API calls 55463->55465 55750 140012200 56 API calls shared_ptr 55464->55750 55466 140003289 __initmbctable 55465->55466 55467 140018908 shared_ptr 56 API calls 55466->55467 55469 1400032b6 55467->55469 55469->55464 55471 1400032ef CharUpperBuffW 55469->55471 55473 14000448a std::exception_ptr::_Current_exception 55469->55473 55470 14003a851 shared_ptr 55472 140018908 shared_ptr 56 API calls 55470->55472 55476 140003312 __initmbctable 55471->55476 55472->55476 55813 140084510 139 API calls 2 library calls 55473->55813 55475 14003cb00 55476->55473 55477 140003382 std::exception_ptr::_Current_exception 55476->55477 55562 140003446 shared_ptr __initmbctable _RunAllParam std::exception_ptr::_Current_exception 55477->55562 55751 140052aa0 89 API calls _flush 55477->55751 55479 1400056b0 VariantClear _RunAllParam 55479->55562 55481 14000448f 55482 140018908 shared_ptr 56 API calls 55481->55482 55493 1400044c5 __initmbctable 55482->55493 55483 140052aa0 89 API calls 55483->55562 55485 140018908 56 API calls shared_ptr 55485->55562 55486 14003abf8 VariantClear 55486->55562 55487 140004fa0 VariantClear VariantClear 55487->55562 55488 140003cf3 55490 140003d4f 55488->55490 55556 14003b758 std::exception_ptr::_Current_exception 55488->55556 55489 14005d130 56 API calls 55489->55562 55495 140018908 shared_ptr 56 API calls 55490->55495 55497 140018908 shared_ptr 56 API calls 55493->55497 55500 140003d59 55495->55500 55590 140003def __initmbctable 55497->55590 55499 140061e10 56 API calls 55499->55562 55502 140003dca 55500->55502 55792 140052aa0 89 API calls _flush 55500->55792 55501 1400024e0 56 API calls 55501->55562 55502->55590 55793 140013600 272 API calls 2 library calls 55502->55793 55505 140004620 107 API calls 55505->55562 55508 140003e14 55517 140003e4a 55508->55517 55804 140014e30 7 API calls 55508->55804 55510 14003c440 55513 14003c455 55510->55513 55510->55517 55511 1400185dc 55 API calls _cinit 55511->55562 55512 140004327 PeekMessageW 55512->55590 55805 140007d90 272 API calls 3 library calls 55513->55805 55515 140006990 56 API calls 55515->55562 55531 140003e5b std::exception_ptr::_Current_exception 55517->55531 55806 140001640 VariantClear _RunAllParam std::exception_ptr::_Current_exception 55517->55806 55518 1400056b0 _RunAllParam VariantClear 55555 140003f1e std::exception_ptr::_Current_exception 55518->55555 55519 14003c45a LockWindowUpdate DestroyWindow GetMessageW 55521 14003c4c3 55519->55521 55522 14003c48d TranslateMessage DispatchMessageW GetMessageW 55519->55522 55520 14003c412 55803 140007ed0 VariantClear _RunAllParam 55520->55803 55521->55517 55522->55521 55522->55522 55523 14003b938 Sleep 55523->55590 55526 14003b956 timeGetTime 55526->55590 55528 140005760 VariantClear 55528->55562 55529 140004478 55529->55461 55530 140013530 57 API calls 55530->55590 55532 140003ecf 55531->55532 55535 14003c527 VariantClear 55531->55535 55540 140003f15 55531->55540 55531->55555 55546 140003ee1 std::exception_ptr::_Current_exception 55532->55546 55807 140014620 VariantClear _RunAllParam 55532->55807 55534 1400045ea PeekMessageW 55534->55590 55535->55546 55537 14005c030 56 API calls 55599 14003bafa std::exception_ptr::_Current_exception 55537->55599 55538 1400139f0 56 API calls 55538->55590 55539 1400045ce TranslateMessage DispatchMessageW 55539->55534 55540->55518 55540->55555 55543 14003bea0 WaitForSingleObject 55548 14003bec4 GetExitCodeProcess CloseHandle 55543->55548 55543->55590 55544 140095e10 243 API calls 55544->55590 55545 140018908 shared_ptr 56 API calls 55545->55540 55546->55540 55546->55545 55547 14003c2a9 Sleep 55549 14003c2c1 timeGetTime 55547->55549 55547->55599 55548->55590 55549->55599 55551 14003c0fb Sleep 55554 14003c113 timeGetTime 55551->55554 55551->55599 55554->55599 55557 14003c7f6 VariantClear 55555->55557 55558 140003fde 55555->55558 55566 140003ff0 std::exception_ptr::_Current_exception 55555->55566 55791 140088650 VariantClear 55556->55791 55557->55566 55558->55566 55808 140014620 VariantClear _RunAllParam 55558->55808 55559 14003c37c GetExitCodeProcess CloseHandle 55559->55599 55560 14007fbd0 106 API calls 55560->55599 55562->55479 55562->55481 55562->55483 55562->55485 55562->55486 55562->55487 55562->55488 55562->55489 55562->55493 55562->55499 55562->55501 55562->55505 55562->55511 55562->55515 55562->55528 55562->55556 55578 140003936 55562->55578 55562->55590 55752 140006680 VariantClear _RunAllParam 55562->55752 55753 140001a90 55562->55753 55762 140001830 107 API calls _RunAllParam 55562->55762 55763 140014620 VariantClear _RunAllParam 55562->55763 55764 1400139f0 55562->55764 55768 140014530 VariantClear _RunAllParam 55562->55768 55769 1400708c0 56 API calls 55562->55769 55770 140005de0 55562->55770 55787 1400852f0 55562->55787 55563 1400040d6 std::exception_ptr::_Current_exception 55579 1400040e3 55563->55579 55809 140004fa0 VariantClear VariantClear _RunAllParam std::exception_ptr::_Current_exception 55563->55809 55564 140013530 57 API calls 55564->55599 55566->55563 55591 140004142 std::exception_ptr::_Current_exception 55566->55591 55749 140004fa0 VariantClear VariantClear _RunAllParam std::exception_ptr::_Current_exception 55566->55749 55569 14003c3f3 Sleep 55569->55590 55570 14003c97e std::exception_ptr::_Current_exception 55577 14003c9a2 VariantClear 55570->55577 55596 1400041f6 std::exception_ptr::_Current_exception 55570->55596 55574 1400041e4 55574->55596 55811 140014620 VariantClear _RunAllParam 55574->55811 55575 1400056b0 VariantClear _RunAllParam 55575->55599 55576 140005a20 107 API calls 55576->55590 55577->55596 55578->55461 55586 14003c90a VariantClear 55579->55586 55587 140004130 55579->55587 55579->55591 55583 140003210 243 API calls 55583->55590 55584 1400056b0 VariantClear _RunAllParam 55584->55590 55585 1400852f0 57 API calls 55585->55599 55586->55591 55587->55591 55810 140014620 VariantClear _RunAllParam 55587->55810 55588 140052aa0 89 API calls 55588->55590 55589 1400042f2 55589->55461 55590->55508 55590->55512 55590->55520 55590->55523 55590->55526 55590->55529 55590->55530 55590->55534 55590->55538 55590->55539 55590->55543 55590->55544 55590->55547 55590->55551 55590->55576 55590->55583 55590->55584 55590->55588 55590->55599 55600 140002980 55590->55600 55666 140002e90 55590->55666 55692 140012bb0 55590->55692 55697 140012bd0 55590->55697 55703 140005460 55590->55703 55796 140007ed0 VariantClear _RunAllParam 55590->55796 55797 140097240 154 API calls _RunAllParam 55590->55797 55591->55570 55591->55574 55594 14003ca45 VariantClear 55594->55596 55596->55589 55596->55594 55812 140014620 VariantClear _RunAllParam 55596->55812 55597 140006890 56 API calls shared_ptr 55597->55599 55598 140095e10 243 API calls 55598->55599 55599->55537 55599->55559 55599->55560 55599->55564 55599->55569 55599->55575 55599->55585 55599->55590 55599->55597 55599->55598 55794 1400603d0 57 API calls std::exception_ptr::_Current_exception 55599->55794 55795 1400626a0 57 API calls std::exception_ptr::_Current_exception 55599->55795 55798 140007ed0 VariantClear _RunAllParam 55599->55798 55799 140087a80 VariantClear 55599->55799 55800 140042e20 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 55599->55800 55801 140054430 50 API calls shared_ptr 55599->55801 55802 1400668c0 VariantClear _RunAllParam 55599->55802 55601 140038e80 55600->55601 55620 140002994 55600->55620 55601->55620 55814 140006110 55601->55814 55603 140038ee5 55605 140038f05 Sleep 55603->55605 55606 1400390bc 55603->55606 55608 140038f2d 55603->55608 55604 140039502 std::exception_ptr::_Current_exception 55609 1400056b0 _RunAllParam VariantClear 55604->55609 55605->55603 55605->55608 55607 1400390c5 std::exception_ptr::_Current_exception 55606->55607 55606->55608 55612 1400056b0 _RunAllParam VariantClear 55607->55612 55608->55604 55610 140005760 VariantClear 55608->55610 55611 140039538 55609->55611 55613 140038f8a 55610->55613 55858 140006680 VariantClear _RunAllParam 55611->55858 55615 1400390e4 55612->55615 55819 140061de0 55613->55819 55843 140006680 VariantClear _RunAllParam 55615->55843 55620->55590 55622 140038fa7 55623 140061de0 95 API calls 55622->55623 55624 140038fb4 55623->55624 55835 140012230 56 API calls 2 library calls 55624->55835 55626 140038fc4 55836 140013530 55626->55836 55629 1400390f2 55844 140006890 55629->55844 55630 140061de0 95 API calls 55631 140039012 55630->55631 55633 140013530 57 API calls 55631->55633 55635 140039041 55633->55635 55634 140039128 55637 1400852f0 57 API calls 55634->55637 55635->55629 55636 140039049 55635->55636 55841 14007fef0 VariantClear _RunAllParam 55636->55841 55647 140039157 std::exception_ptr::_Current_exception 55637->55647 55639 14003905e std::exception_ptr::_Current_exception 55640 1400056b0 _RunAllParam VariantClear 55639->55640 55641 140039083 55640->55641 55842 140006680 VariantClear _RunAllParam 55641->55842 55643 140039209 55850 14007fef0 VariantClear _RunAllParam 55643->55850 55645 140039225 55851 140084020 55645->55851 55647->55643 55648 1400392e5 55647->55648 55650 1400024e0 56 API calls 55647->55650 55855 140052aa0 89 API calls _flush 55648->55855 55650->55647 55651 14003943f 55856 140095e10 272 API calls _RunAllParam 55651->55856 55653 140039457 55657 140006890 shared_ptr 56 API calls 55653->55657 55654 1400852f0 57 API calls 55663 140039246 std::exception_ptr::_Current_exception 55654->55663 55655 1400056b0 _RunAllParam VariantClear 55655->55663 55656 1400056b0 _RunAllParam VariantClear 55658 1400394f8 55656->55658 55659 140039477 55657->55659 55857 140006680 VariantClear _RunAllParam 55658->55857 55662 140001a90 56 API calls 55659->55662 55660 140006990 56 API calls 55660->55663 55664 1400392f6 std::exception_ptr::_Current_exception 55662->55664 55663->55651 55663->55654 55663->55655 55663->55660 55665 140004620 107 API calls 55663->55665 55664->55656 55665->55663 55667 140003075 55666->55667 55668 140002ebd 55666->55668 55880 140052aa0 89 API calls _flush 55667->55880 55669 14003973f 55668->55669 55670 140002eca 55668->55670 55881 140052aa0 89 API calls _flush 55669->55881 55675 140004620 107 API calls 55670->55675 55691 140003037 std::exception_ptr::_Current_exception 55670->55691 55673 140039757 55679 1400056b0 _RunAllParam VariantClear 55673->55679 55674 140003063 55674->55590 55677 140002f09 55675->55677 55677->55673 55680 140002f11 std::exception_ptr::_Current_exception 55677->55680 55678 140039aa2 55679->55674 55681 140002f58 55680->55681 55682 140002fa2 55680->55682 55683 140039799 VariantClear 55680->55683 55690 140002f6a std::exception_ptr::_Current_exception 55681->55690 55882 140014620 VariantClear _RunAllParam 55681->55882 55684 140003025 55682->55684 55687 140039818 55682->55687 55683->55690 55684->55691 55883 140014620 VariantClear _RunAllParam 55684->55883 55685 140039a10 VariantClear 55685->55691 55687->55685 55687->55691 55688 140018908 shared_ptr 56 API calls 55688->55682 55690->55682 55690->55688 55691->55674 55884 140052aa0 89 API calls _flush 55691->55884 55693 140012bc1 55692->55693 55694 140033400 55692->55694 55693->55590 55695 14003344f 55694->55695 55696 140033429 TranslateAcceleratorW 55694->55696 55696->55693 55698 140033cf0 55697->55698 55699 140012bde 55697->55699 55698->55590 55700 140033d53 IsDialogMessageW 55699->55700 55701 140012c04 55699->55701 55885 140040570 GetClassLongPtrW 55699->55885 55700->55699 55700->55701 55701->55590 55704 1400054c4 55703->55704 55705 140038be0 55703->55705 55708 1400054dc 55704->55708 55886 140005b40 55704->55886 55893 140011e60 56 API calls 55705->55893 55709 140038c21 55708->55709 55717 140005518 55708->55717 55725 140005558 55708->55725 55894 140052aa0 89 API calls _flush 55709->55894 55711 140004620 107 API calls 55713 1400055ab 55711->55713 55712 140038cfb 55897 140052aa0 89 API calls _flush 55712->55897 55716 140038cab 55713->55716 55722 1400055d2 55713->55722 55723 140005629 55713->55723 55744 140038c99 55713->55744 55719 1400056b0 _RunAllParam VariantClear 55716->55719 55718 140038cb5 std::exception_ptr::_Current_exception 55717->55718 55724 14000554e 55717->55724 55898 14008ef10 120 API calls 2 library calls 55717->55898 55718->55712 55896 140001830 107 API calls _RunAllParam 55718->55896 55719->55718 55727 140005689 55722->55727 55728 1400055db 55722->55728 55734 14000564d 55723->55734 55723->55744 55724->55718 55724->55725 55899 140097240 154 API calls _RunAllParam 55724->55899 55725->55711 55725->55718 55725->55744 55729 140005692 55727->55729 55730 140038df0 55727->55730 55731 140005760 VariantClear 55728->55731 55892 140002680 VariantClear _RunAllParam std::exception_ptr::_Current_exception 55729->55892 55732 140038e43 55730->55732 55737 140038e30 55730->55737 55741 140038e23 55730->55741 55742 140038e07 55730->55742 55748 1400055e8 55731->55748 55903 140061a00 47 API calls 55732->55903 55735 140005de0 57 API calls 55734->55735 55740 140005666 55735->55740 55902 140002410 VariantClear _RunAllParam std::exception_ptr::_Current_exception 55737->55902 55738 1400056b0 _RunAllParam VariantClear 55739 1400055f2 std::exception_ptr::_Current_exception 55738->55739 55739->55590 55745 1400056b0 _RunAllParam VariantClear 55740->55745 55901 140002380 47 API calls std::exception_ptr::_Current_exception 55741->55901 55742->55748 55900 140002220 95 API calls 55742->55900 55895 140052aa0 89 API calls _flush 55744->55895 55745->55739 55748->55738 55749->55563 55750->55470 55751->55562 55754 140001ab2 55753->55754 55758 140001b0e 55753->55758 55755 14003536d 55754->55755 55756 140001ac0 55754->55756 55905 140011e60 56 API calls 55755->55905 55757 140005b40 56 API calls 55756->55757 55761 140001ad6 55757->55761 55758->55761 55904 140011e60 56 API calls 55758->55904 55761->55562 55762->55562 55763->55562 55765 140013a03 55764->55765 55766 1400139fe 55764->55766 55765->55562 55906 140006290 55766->55906 55768->55562 55769->55562 55771 140005b40 56 API calls 55770->55771 55772 140005e01 55771->55772 55773 140005e09 55772->55773 55775 140036c4d 55772->55775 55774 140018908 shared_ptr 56 API calls 55773->55774 55776 140005e23 55774->55776 55777 140005760 VariantClear 55775->55777 55778 140036c5f 55776->55778 55779 140006110 shared_ptr 56 API calls 55776->55779 55786 140005e86 55777->55786 55780 140005e3a 55779->55780 55781 140005e4a 55780->55781 55782 140006290 56 API calls 55780->55782 55783 140018908 shared_ptr 56 API calls 55781->55783 55782->55781 55784 140005e57 55783->55784 55784->55778 55910 140005eb0 56 API calls 55784->55910 55786->55562 55789 140085310 55787->55789 55788 14008536b 55788->55562 55789->55788 55790 140005de0 57 API calls 55789->55790 55790->55788 55791->55500 55792->55502 55793->55590 55794->55599 55795->55599 55796->55590 55797->55590 55798->55599 55799->55599 55800->55599 55801->55599 55802->55599 55803->55508 55804->55510 55805->55519 55806->55517 55807->55546 55808->55566 55809->55579 55810->55591 55811->55596 55812->55596 55813->55475 55815 140018908 shared_ptr 56 API calls 55814->55815 55816 140006147 55815->55816 55817 140018908 shared_ptr 56 API calls 55816->55817 55818 140006155 55817->55818 55818->55603 55820 140061def 55819->55820 55821 140038f97 55820->55821 55859 140061be0 95 API calls 3 library calls 55820->55859 55823 1400063a0 55821->55823 55824 1400063b2 shared_ptr 55823->55824 55825 140035740 55823->55825 55828 1400063f9 55824->55828 55829 1400063cf 55824->55829 55866 140017a30 56 API calls 2 library calls 55825->55866 55827 14003574b 55865 140012200 56 API calls shared_ptr 55828->55865 55860 140006210 55829->55860 55832 140006403 55832->55827 55834 140018908 shared_ptr 56 API calls 55832->55834 55833 1400063da __initmbctable 55833->55622 55834->55833 55835->55626 55837 140006890 shared_ptr 56 API calls 55836->55837 55838 140013552 55837->55838 55867 140013580 55838->55867 55840 140013561 55840->55629 55840->55630 55841->55639 55845 1400068a8 shared_ptr 55844->55845 55846 140018908 shared_ptr 56 API calls 55845->55846 55849 140006905 55845->55849 55847 1400068e4 __initmbctable 55846->55847 55848 140018908 shared_ptr 56 API calls 55847->55848 55848->55849 55849->55634 55850->55645 55852 14008402e 55851->55852 55873 140062160 55852->55873 55854 14008403f 55854->55663 55855->55664 55856->55653 55859->55821 55862 14000621e 55860->55862 55864 14000626c 55860->55864 55861 140034e20 55862->55861 55863 140018908 shared_ptr 56 API calls 55862->55863 55863->55864 55864->55833 55865->55832 55866->55827 55868 14001359f 55867->55868 55869 14001358f std::exception_ptr::_Current_exception 55867->55869 55872 140014830 57 API calls shared_ptr 55868->55872 55869->55840 55874 14006218f 55873->55874 55877 14006217d 55873->55877 55875 140018908 shared_ptr 56 API calls 55874->55875 55876 140062199 55875->55876 55876->55877 55879 140062140 56 API calls 55876->55879 55877->55854 55879->55877 55880->55669 55881->55673 55882->55690 55883->55691 55884->55678 55887 140005b51 55886->55887 55891 140005b8f 55886->55891 55888 140006110 shared_ptr 56 API calls 55887->55888 55887->55891 55889 140005dc3 55888->55889 55890 1400185dc _cinit 55 API calls 55889->55890 55890->55891 55891->55708 55892->55748 55893->55704 55894->55739 55895->55716 55896->55718 55897->55739 55898->55724 55899->55725 55900->55748 55901->55737 55902->55732 55903->55739 55904->55761 55905->55761 55907 1400062b6 55906->55907 55908 1400062a9 55906->55908 55907->55765 55909 140006210 shared_ptr 56 API calls 55908->55909 55909->55907 55910->55786 55911 14001f488 GetStartupInfoW 55912 14001f4af 55911->55912 55951 140022dbc HeapCreate 55912->55951 55915 14001f551 55954 14001f9a0 55915->55954 55916 14001f538 56042 14002107c 45 API calls _FF_MSGBANNER 55916->56042 55917 14001f53d 56043 140020e54 45 API calls 3 library calls 55917->56043 55922 14001f547 56044 140018a10 GetModuleHandleW GetProcAddress ExitProcess malloc 55922->56044 55952 14001f52b 55951->55952 55953 140022de0 HeapSetInformation 55951->55953 55952->55915 55952->55916 55952->55917 55953->55952 56052 140018d24 55954->56052 56042->55917 56043->55922 56068 14001f678 EncodePointer 56052->56068 57342 140092f50 57343 140092fba 57342->57343 57344 140092ff4 57342->57344 57346 140092fc3 57343->57346 57349 140093049 57343->57349 57345 140093213 57344->57345 57354 140092ffd 57344->57354 57348 14009324d 57345->57348 57345->57349 57347 1400056b0 _RunAllParam VariantClear 57346->57347 57362 140092fcb 57347->57362 57481 14001930c 84 API calls 3 library calls 57348->57481 57350 140061de0 95 API calls 57349->57350 57358 140093067 57349->57358 57352 140093092 57350->57352 57356 140016a20 56 API calls 57352->57356 57353 1400056b0 _RunAllParam VariantClear 57355 1400931f6 57353->57355 57354->57349 57357 140005760 VariantClear 57354->57357 57354->57358 57356->57358 57357->57349 57363 140092040 57358->57363 57361 1400056b0 _RunAllParam VariantClear 57361->57362 57362->57353 57364 140092078 57363->57364 57365 1400920bf 57364->57365 57366 1400920d3 57364->57366 57367 1400056b0 _RunAllParam VariantClear 57365->57367 57482 140065370 57366->57482 57369 1400920cc 57367->57369 57369->57361 57370 1400056b0 _RunAllParam VariantClear 57370->57369 57371 1400920f3 57372 1400921f0 57371->57372 57373 140092656 57371->57373 57434 140092867 57371->57434 57374 140092629 57372->57374 57375 1400921f6 57372->57375 57376 140092660 57373->57376 57377 140092827 57373->57377 57547 140059b50 57374->57547 57381 140092200 57375->57381 57382 1400924a3 57375->57382 57383 1400927e0 57376->57383 57384 140092666 57376->57384 57379 1400929d2 57377->57379 57380 140092833 57377->57380 57617 14005ff30 6 API calls 57379->57617 57386 14009283c 57380->57386 57387 14009298e 57380->57387 57388 140092439 57381->57388 57389 140092206 57381->57389 57392 1400924af 57382->57392 57393 1400925e2 57382->57393 57583 14005fe20 57383->57583 57390 140092799 57384->57390 57391 140092672 57384->57391 57397 140092845 57386->57397 57398 140092947 57386->57398 57616 14005f9a0 6 API calls 57387->57616 57505 140085970 57388->57505 57399 1400923f2 57389->57399 57400 140092212 57389->57400 57569 14005e9c0 57390->57569 57402 14009267f 57391->57402 57403 140092775 57391->57403 57404 14009257e 57392->57404 57405 1400924b8 57392->57405 57606 14005efc0 10 API calls 57393->57606 57408 1400928fe 57397->57408 57409 14009284e 57397->57409 57615 14005f890 6 API calls 57398->57615 57603 14005f750 7 API calls 57399->57603 57410 1400923ab 57400->57410 57411 14009221f 57400->57411 57412 14009272e 57402->57412 57413 140092687 57402->57413 57610 1400599c0 SendMessageW SendMessageW __initmbctable 57403->57610 57605 1400503a0 8 API calls 57404->57605 57414 1400924bd 57405->57414 57415 140092537 57405->57415 57406 140092a19 57618 140060660 VariantClear std::exception_ptr::_Current_exception 57406->57618 57614 14004fec0 60 API calls shared_ptr 57408->57614 57421 140092853 57409->57421 57422 1400928b7 57409->57422 57602 14005f5e0 8 API calls 57410->57602 57423 140092364 57411->57423 57424 140092227 57411->57424 57609 14005ee90 8 API calls 57412->57609 57425 14009268b 57413->57425 57426 1400926e7 57413->57426 57427 1400924c2 57414->57427 57428 140092518 57414->57428 57539 14005ebb0 57415->57539 57436 140092870 57421->57436 57437 140092858 57421->57437 57613 14005f2f0 55 API calls 57422->57613 57601 14005fcf0 7 API calls 57423->57601 57438 14009231d 57424->57438 57439 14009222f 57424->57439 57440 14009268f 57425->57440 57441 1400926c3 57425->57441 57556 14005e730 57426->57556 57442 1400924f9 57427->57442 57443 1400924c7 57427->57443 57531 1400502c0 57428->57531 57433 1400922d1 57435 14009228a 57433->57435 57434->57370 57435->57406 57467 140092a46 57435->57467 57612 140091ee0 133 API calls shared_ptr 57436->57612 57611 140060660 VariantClear std::exception_ptr::_Current_exception 57437->57611 57600 14005fbe0 CreateWindowExW GetStockObject SendMessageW ShowWindow GetWindowLongPtrW 57438->57600 57452 1400922d6 57439->57452 57453 140092237 57439->57453 57440->57437 57463 14009269f 57440->57463 57440->57467 57608 1400596c0 14 API calls 2 library calls 57441->57608 57604 1400595b0 CreatePopupMenu CreatePopupMenu 57442->57604 57443->57437 57455 1400924d0 57443->57455 57444 140092c4a 57450 140092c66 57444->57450 57620 14003faa0 6 API calls 57444->57620 57445 140092af2 57445->57444 57456 140092b14 GetDC SendMessageW SelectObject 57445->57456 57469 140092c99 57450->57469 57470 140092ca8 57450->57470 57599 14005fab0 6 API calls 57452->57599 57461 14009223b 57453->57461 57462 14009228f 57453->57462 57519 140059cf0 57455->57519 57619 140042bb0 46 API calls shared_ptr 57456->57619 57461->57437 57471 140092243 57461->57471 57598 14005f490 53 API calls 57462->57598 57607 14005ed20 62 API calls 57463->57607 57467->57445 57590 140050760 57467->57590 57621 14005a8c0 8 API calls 57469->57621 57470->57434 57477 140092cb5 57470->57477 57494 14005f110 57471->57494 57474 140092b57 SelectObject ReleaseDC 57480 140092b76 MoveWindow 57474->57480 57622 14005a5a0 71 API calls 57477->57622 57480->57444 57481->57352 57483 1400653f3 57482->57483 57484 140065396 57482->57484 57485 140018908 shared_ptr 56 API calls 57483->57485 57486 140018908 shared_ptr 56 API calls 57484->57486 57493 1400653a2 57484->57493 57487 140065429 57485->57487 57488 1400653b4 57486->57488 57487->57493 57625 140060730 56 API calls shared_ptr 57487->57625 57489 1400653c3 57488->57489 57623 140060730 56 API calls shared_ptr 57488->57623 57624 140013ae0 56 API calls 2 library calls 57489->57624 57493->57371 57626 14005aa40 57494->57626 57501 14005f239 7 API calls 57503 14005f2c8 57501->57503 57504 14005f2b4 SetLayeredWindowAttributes 57501->57504 57502 14005f2cc DestroyWindow 57502->57503 57503->57435 57504->57503 57506 14005aa40 GetWindowLongPtrW 57505->57506 57507 1400859bc 57506->57507 57508 14003f9b0 4 API calls 57507->57508 57509 140085a40 57508->57509 57510 140085a48 57509->57510 57514 140085a5c 57509->57514 57511 1400056b0 _RunAllParam VariantClear 57510->57511 57513 140085a55 57511->57513 57512 140085ac0 57515 1400056b0 _RunAllParam VariantClear 57512->57515 57513->57435 57514->57512 57653 140063890 57514->57653 57515->57513 57518 140085ab5 DestroyWindow 57518->57512 57520 140059d26 _fread_nolock 57519->57520 57521 140059d32 57520->57521 57525 140059d6e 57520->57525 57522 140059d65 57521->57522 57523 140059d3e CreateMenu SetMenu 57521->57523 57524 140059e0b CreatePopupMenu 57522->57524 57523->57522 57526 140059d8b 57524->57526 57527 140059e1d InsertMenuItemW DrawMenuBar 57524->57527 57525->57526 57528 140059dfd IsMenu 57525->57528 57529 140059dda GetMenuItemInfoW 57525->57529 57526->57435 57527->57526 57528->57524 57528->57526 57529->57526 57530 140059df4 57529->57530 57530->57528 57532 1400502e8 57531->57532 57533 14005038a 57531->57533 57534 1400502f5 SendMessageW 57532->57534 57535 140050345 57532->57535 57533->57435 57534->57533 57684 1400500e0 57535->57684 57540 14005ebe9 57539->57540 57546 14005ebe2 57539->57546 57541 14005aa40 GetWindowLongPtrW 57540->57541 57542 14005ec09 57541->57542 57543 14003f9b0 4 API calls 57542->57543 57544 14005ec90 57543->57544 57545 14005ec9c SetWindowPos 57544->57545 57544->57546 57545->57546 57546->57435 57548 140059b86 _fread_nolock 57547->57548 57549 140059cd5 57548->57549 57550 140059b92 57548->57550 57552 140059c53 IsMenu 57548->57552 57553 140059c29 GetMenuItemInfoW 57548->57553 57549->57435 57550->57549 57551 140059c9b InsertMenuItemW 57550->57551 57551->57549 57554 140059cc1 DrawMenuBar 57551->57554 57552->57549 57552->57550 57553->57549 57555 140059c4a 57553->57555 57554->57549 57555->57552 57557 14005e752 _flush 57556->57557 57558 14005aa40 GetWindowLongPtrW 57557->57558 57559 14005e78e 57558->57559 57560 14003f9b0 4 API calls 57559->57560 57561 14005e82c 57560->57561 57562 14005e834 57561->57562 57563 14005e846 SendMessageW 57561->57563 57564 14005e85f SendMessageW 57561->57564 57562->57435 57563->57564 57565 14005e87b SetWindowPos 57564->57565 57566 14005e89e 57564->57566 57565->57566 57566->57562 57567 14005e8f8 shared_ptr 57566->57567 57568 14005e91c SendMessageW SendMessageW 57567->57568 57568->57566 57570 14005aa40 GetWindowLongPtrW 57569->57570 57571 14005ea11 57570->57571 57572 14003f9b0 4 API calls 57571->57572 57573 14005eaa5 57572->57573 57574 14005eaad 57573->57574 57575 14005eabd SetWindowPos 57573->57575 57576 14005eae0 57573->57576 57574->57435 57575->57576 57577 14005eaef GetWindowLongW SetWindowLongPtrW 57576->57577 57578 14005eb19 57576->57578 57577->57578 57578->57574 57579 14005eb1f 57578->57579 57692 140050fd0 PostMessageW PostMessageW 57579->57692 57581 14005eb53 57581->57574 57693 140050fd0 PostMessageW PostMessageW 57581->57693 57584 14005aa40 GetWindowLongPtrW 57583->57584 57585 14005fe63 57584->57585 57586 14003f9b0 4 API calls 57585->57586 57587 14005fedd 57586->57587 57588 14005fee9 GetSysColor 57587->57588 57589 14005fee5 57587->57589 57588->57589 57589->57435 57591 140050796 GetDC GetDeviceCaps ReleaseDC CreateFontW SendMessageW 57590->57591 57592 140050790 DeleteObject 57590->57592 57593 1400508a8 57591->57593 57594 140050872 57591->57594 57592->57591 57596 1400508c9 57593->57596 57597 1400508b5 SendMessageW 57593->57597 57594->57593 57595 140050876 MoveWindow 57594->57595 57595->57593 57597->57596 57598->57433 57599->57435 57600->57435 57601->57433 57602->57433 57603->57433 57604->57435 57605->57433 57606->57433 57607->57433 57608->57433 57609->57433 57610->57433 57611->57434 57612->57435 57613->57433 57614->57435 57615->57435 57616->57435 57617->57435 57618->57434 57619->57474 57620->57450 57621->57470 57622->57434 57623->57489 57624->57493 57625->57493 57627 14005aa75 57626->57627 57628 14005aa67 57626->57628 57630 14003f9b0 57627->57630 57652 140050710 GetWindowLongPtrW 57628->57652 57631 14003f9d9 57630->57631 57632 14003f9de CreateWindowExW 57630->57632 57631->57632 57633 14003fa92 57632->57633 57634 14003fa4d 57632->57634 57633->57503 57638 14003f7c0 57633->57638 57635 14003fa57 GetStockObject SendMessageW 57634->57635 57636 14003fa75 57634->57636 57635->57636 57636->57633 57637 14003fa87 ShowWindow 57636->57637 57637->57633 57639 14003f947 57638->57639 57640 14003f7f5 CreateFileW 57638->57640 57643 14003f966 SendMessageW 57639->57643 57644 14003f95b DeleteObject 57639->57644 57641 14003f822 57640->57641 57642 14003f829 8 API calls 57640->57642 57645 14003f984 57641->57645 57646 14003f8bc GlobalFree 57642->57646 57643->57645 57644->57643 57645->57501 57645->57502 57646->57641 57647 14003f8d3 GetObjectW 57646->57647 57649 14003f914 CopyImage 57647->57649 57650 14003f901 57647->57650 57651 14003f940 57649->57651 57650->57649 57651->57639 57652->57627 57656 1400638c3 shared_ptr 57653->57656 57654 140063947 LoadImageW 57666 140063978 57654->57666 57655 140063af3 57657 140063b05 SendMessageW SendMessageW MoveWindow 57655->57657 57658 140063aff DestroyIcon 57655->57658 57656->57654 57659 1400187bc 47 API calls 57656->57659 57660 140063b7a 57657->57660 57658->57657 57661 1400638f0 shared_ptr 57659->57661 57662 1400056b0 _RunAllParam VariantClear 57660->57662 57664 1400187bc 47 API calls 57661->57664 57663 140063b85 57662->57663 57663->57512 57663->57518 57665 140063912 shared_ptr 57664->57665 57668 1400187bc 47 API calls 57665->57668 57666->57655 57667 140063aed ExtractIconExW 57666->57667 57667->57655 57669 140063931 57668->57669 57670 1400639d9 LoadLibraryExW 57669->57670 57671 140063942 57669->57671 57670->57666 57672 1400639f0 57670->57672 57671->57654 57671->57666 57673 1400639fd 57672->57673 57674 140063a5b 57672->57674 57675 140061de0 95 API calls 57673->57675 57676 140063a91 57674->57676 57677 140063a60 LoadImageW 57674->57677 57678 140063a13 LoadImageW 57675->57678 57681 140063ad7 FreeLibrary 57676->57681 57683 140061de0 95 API calls 57676->57683 57677->57676 57679 140063ad3 57678->57679 57680 140063a3e LoadImageW 57678->57680 57679->57681 57680->57679 57681->57666 57683->57680 57685 1400501c1 57684->57685 57686 14005011f 57684->57686 57687 14005027d SendMessageW 57685->57687 57688 140050214 ShowWindow ShowWindow 57685->57688 57691 14005025d EnableWindow 57685->57691 57686->57685 57689 140050177 ShowWindow 57686->57689 57690 1400501a2 EnableWindow 57686->57690 57688->57685 57689->57686 57690->57686 57691->57685 57692->57581 57693->57574 57694 14008b790 57695 14008b7c7 57694->57695 57696 14008b7ba 57694->57696 57698 14008b7dd 57695->57698 57699 14008b7f6 57695->57699 57719 14005d0b0 46 API calls 57696->57719 57700 140050f10 4 API calls 57698->57700 57701 140018908 shared_ptr 56 API calls 57699->57701 57710 14008b7f1 std::exception_ptr::_Current_exception 57700->57710 57708 14008b823 std::exception_ptr::_Current_exception 57701->57708 57702 14008b95f 57711 140050f10 57702->57711 57704 1400013d0 57 API calls 57704->57708 57707 14008b99b 57709 1400056b0 _RunAllParam VariantClear 57707->57709 57708->57702 57708->57704 57708->57707 57720 140001280 57708->57720 57725 140054c70 92 API calls 2 library calls 57708->57725 57709->57710 57712 140050f39 57711->57712 57713 140050f2a 57711->57713 57715 140050fbc 57712->57715 57716 140050f8c 57712->57716 57717 140050f6b DestroyAcceleratorTable 57712->57717 57726 140040510 57713->57726 57715->57710 57716->57715 57718 140050f91 CreateAcceleratorTableW GetForegroundWindow 57716->57718 57717->57716 57718->57715 57719->57695 57721 140001295 57720->57721 57722 14000129e 57721->57722 57729 140061be0 95 API calls 3 library calls 57721->57729 57722->57708 57724 1400352d0 57724->57708 57725->57708 57727 14004053c 57726->57727 57728 140040525 GetWindowLongPtrW 57726->57728 57727->57712 57728->57727 57729->57724 57730 140073650 GetForegroundWindow 57731 140040510 GetWindowLongPtrW 57730->57731 57733 140073669 57731->57733 57732 140073691 57733->57732 57735 1400651e0 GetCursorPos ScreenToClient 57733->57735 57736 14006523e 57735->57736 57737 14006526e GetAsyncKeyState GetAsyncKeyState 57736->57737 57748 140060460 56 API calls shared_ptr 57736->57748 57739 140065297 57737->57739 57742 14006530d 57737->57742 57740 1400652bd 57739->57740 57739->57742 57749 140060460 56 API calls shared_ptr 57739->57749 57750 140060460 56 API calls shared_ptr 57740->57750 57741 140065352 57741->57732 57742->57741 57751 140060460 56 API calls shared_ptr 57742->57751 57745 1400652ce 57745->57742 57747 1400652d7 GetWindowLongW 57745->57747 57747->57740 57748->57737 57749->57745 57750->57742 57751->57741 57752 14006d050 57753 14006d083 57752->57753 57754 14006d076 57752->57754 57756 140061de0 95 API calls 57753->57756 57788 14005d0b0 46 API calls 57754->57788 57757 14006d0a8 57756->57757 57762 140064f70 57757->57762 57760 1400056b0 _RunAllParam VariantClear 57761 14006d0da 57760->57761 57763 140064fa5 57762->57763 57767 140064fb1 57762->57767 57764 140040510 GetWindowLongPtrW 57763->57764 57764->57767 57765 140064fc4 57765->57760 57766 140064fed 57769 140065019 LoadImageW 57766->57769 57777 14006512d 57766->57777 57767->57765 57767->57766 57768 1400063a0 shared_ptr 56 API calls 57767->57768 57768->57766 57770 140065067 57769->57770 57771 14006503f 57769->57771 57773 14006506e LoadImageW 57770->57773 57774 14006504b ExtractIconExW 57771->57774 57772 14006518b 57772->57765 57780 1400651b5 InvalidateRect 57772->57780 57775 1400650c3 57773->57775 57776 140065099 57773->57776 57774->57773 57778 1400650f2 57775->57778 57779 1400650d2 SendMessageW 57775->57779 57782 1400650a0 ExtractIconExW 57776->57782 57777->57772 57781 140065175 57777->57781 57789 140050cd0 DeleteObject 57777->57789 57778->57777 57786 14006510d SendMessageW 57778->57786 57779->57778 57785 1400650ec DestroyIcon 57779->57785 57780->57765 57790 140050d80 57 API calls 57781->57790 57782->57775 57785->57778 57786->57777 57787 140065127 DestroyIcon 57786->57787 57787->57777 57788->57753 57789->57781 57790->57772 57791 14006d2b0 57792 14006d2d8 57791->57792 57795 14006d2e5 57791->57795 57828 14005d0b0 46 API calls 57792->57828 57799 140050ac0 57795->57799 57797 1400056b0 _RunAllParam VariantClear 57798 14006d318 57797->57798 57800 140050ad6 57799->57800 57802 140050ae5 57799->57802 57801 140040510 GetWindowLongPtrW 57800->57801 57801->57802 57803 140050b42 57802->57803 57810 1400500e0 6 API calls 57802->57810 57818 140050b7b 57802->57818 57804 140050b52 57803->57804 57805 140050be3 57803->57805 57808 140050baf 57804->57808 57813 140050b96 ShowWindow 57804->57813 57814 140050b58 57804->57814 57806 140050c44 57805->57806 57807 140050bea 57805->57807 57811 140050c4a ShowWindow 57806->57811 57806->57818 57809 140050c2d EnableWindow 57807->57809 57815 140050bf4 57807->57815 57812 140050bb9 ShowWindow 57808->57812 57808->57818 57809->57818 57810->57803 57817 1400448a0 24 API calls 57811->57817 57812->57818 57819 140050bc9 57812->57819 57813->57818 57814->57806 57814->57808 57823 140050b77 57814->57823 57824 140050b70 57814->57824 57820 140050bf9 57815->57820 57821 140050c1b LockWindowUpdate 57815->57821 57822 140050c64 57817->57822 57818->57797 57819->57818 57829 1400448a0 GetForegroundWindow 57819->57829 57820->57818 57825 140050bfe LockWindowUpdate InvalidateRect 57820->57825 57821->57818 57822->57818 57823->57818 57827 140050b8b ShowWindow 57823->57827 57824->57808 57824->57818 57824->57823 57825->57818 57827->57818 57828->57795 57830 1400448d3 57829->57830 57831 1400448c9 57829->57831 57832 1400448da FindWindowW 57830->57832 57833 1400448ec IsIconic 57830->57833 57831->57818 57832->57833 57834 140044907 SetForegroundWindow 57833->57834 57835 1400448f9 ShowWindow 57833->57835 57834->57831 57836 140044918 7 API calls 57834->57836 57835->57834 57837 1400449ff 57836->57837 57838 14004497c 9 API calls 57836->57838 57839 140044a04 AttachThreadInput AttachThreadInput AttachThreadInput 57837->57839 57838->57839 57840 1400449fa 57838->57840 57839->57831 57840->57839 57841 140039670 57844 140094c30 57841->57844 57845 140094d0e 57844->57845 57846 140094cc4 57844->57846 57847 140006110 shared_ptr 56 API calls 57845->57847 57848 140094cfb 57846->57848 57849 140094ccb 57846->57849 57868 140094d18 _fread_nolock 57847->57868 57877 140094700 108 API calls 4 library calls 57848->57877 57851 140094cd0 57849->57851 57852 140094ce8 57849->57852 57851->57845 57854 140094cd5 57851->57854 57876 140093f00 107 API calls 5 library calls 57852->57876 57875 1400934a0 108 API calls 3 library calls 57854->57875 57855 1400139f0 56 API calls 57855->57868 57857 1400056b0 _RunAllParam VariantClear 57859 14009533e 57857->57859 57862 1400056b0 _RunAllParam VariantClear 57859->57862 57860 140001a90 56 API calls 57860->57868 57861 140094ce3 std::exception_ptr::_Current_exception 57861->57857 57863 140039689 57862->57863 57864 140095295 57882 140052aa0 89 API calls _flush 57864->57882 57865 140014280 57 API calls 57865->57868 57866 1400852f0 57 API calls 57866->57868 57868->57855 57868->57860 57868->57861 57868->57864 57868->57865 57868->57866 57869 140004620 107 API calls 57868->57869 57870 140005760 VariantClear 57868->57870 57873 140013f10 57 API calls 57868->57873 57878 1400621d0 56 API calls 57868->57878 57879 1400178e0 57 API calls 57868->57879 57880 14008d310 57 API calls 57868->57880 57881 140093ce0 107 API calls _RunAllParam 57868->57881 57869->57868 57870->57868 57873->57868 57875->57861 57876->57861 57877->57861 57878->57868 57879->57868 57880->57868 57881->57868 57882->57861 57883 14001a110 57884 14001a142 57883->57884 57885 14001a168 57883->57885 57943 140020bf8 45 API calls __doserrno 57884->57943 57887 14001a176 57885->57887 57888 14001a19c 57885->57888 57945 140020bf8 45 API calls __doserrno 57887->57945 57891 14001a1ab 57888->57891 57892 14001a1ce 57888->57892 57889 14001a147 57944 140020b28 7 API calls 2 library calls 57889->57944 57947 140020bf8 45 API calls __doserrno 57891->57947 57911 140024f24 57892->57911 57895 14001a17b 57946 140020b28 7 API calls 2 library calls 57895->57946 57899 14001a1b0 57948 140020b28 7 API calls 2 library calls 57899->57948 57908 14001a161 57912 1400212d0 _lock 45 API calls 57911->57912 57913 140024f3d 57912->57913 57914 140024fcc 57913->57914 57919 1400211e8 _lock 45 API calls 57913->57919 57925 140024fb9 57913->57925 57953 14001e62c 46 API calls _lock 57913->57953 57954 14001e6b4 LeaveCriticalSection LeaveCriticalSection __tzset 57913->57954 57916 14001fa24 _getbuf 45 API calls 57914->57916 57918 140024fd9 57916->57918 57918->57925 57955 140021950 InitializeCriticalSectionAndSpinCount 57918->57955 57919->57913 57922 140025004 57923 140025008 57922->57923 57924 140025026 EnterCriticalSection 57922->57924 57926 1400198f8 free 45 API calls 57923->57926 57924->57925 57952 1400211d0 LeaveCriticalSection 57925->57952 57926->57925 57943->57889 57944->57908 57945->57895 57946->57908 57947->57899 57948->57908 57953->57913 57954->57913 57955->57922 58099 140097e00 58100 140097e3b 58099->58100 58124 140098041 58099->58124 58101 140013530 57 API calls 58100->58101 58100->58124 58104 140097e7b 58101->58104 58103 140098023 58141 140006680 VariantClear _RunAllParam 58103->58141 58107 1400056b0 VariantClear _RunAllParam 58104->58107 58109 1400024e0 56 API calls 58104->58109 58117 140097f71 58104->58117 58104->58124 58106 140098003 58142 140006680 VariantClear _RunAllParam 58106->58142 58107->58104 58109->58104 58114 140097ffe 58114->58103 58114->58106 58115 140097fbf 58115->58103 58115->58106 58115->58114 58119 140061de0 95 API calls 58115->58119 58125 140097ab0 58117->58125 58121 140097fef 58119->58121 58123 1400187bc 47 API calls 58121->58123 58123->58114 58126 1400056b0 _RunAllParam VariantClear 58125->58126 58127 140097ad6 58126->58127 58143 140084050 58127->58143 58131 140097bc9 58131->58115 58132 140097b1d 58132->58131 58133 140097b86 58132->58133 58174 140088780 57 API calls shared_ptr 58132->58174 58134 140003210 272 API calls 58133->58134 58136 140097bb5 58134->58136 58137 140097bb9 58136->58137 58138 140097bcb 58136->58138 58137->58131 58175 1400886a0 57 API calls 58137->58175 58138->58131 58176 1400886a0 57 API calls 58138->58176 58144 140084020 56 API calls 58143->58144 58145 140084067 58144->58145 58146 140096580 58145->58146 58147 1400965a3 _flush 58146->58147 58148 140013530 57 API calls 58147->58148 58155 1400965d2 58148->58155 58149 140096819 58149->58132 58150 1400966ba 58151 14009681e 58150->58151 58153 1400966dc 58150->58153 58180 140006680 VariantClear _RunAllParam 58151->58180 58177 14001e3d0 84 API calls 3 library calls 58153->58177 58155->58149 58155->58150 58158 1400013d0 57 API calls 58155->58158 58157 1400967b7 shared_ptr 58161 140018908 shared_ptr 56 API calls 58157->58161 58160 140096651 58158->58160 58159 140006890 shared_ptr 56 API calls 58170 1400966fc std::exception_ptr::_Current_exception 58159->58170 58162 140061de0 95 API calls 58160->58162 58164 1400967fb 58161->58164 58165 140096659 58162->58165 58163 1400852f0 57 API calls 58163->58170 58179 140006680 VariantClear _RunAllParam 58164->58179 58166 1400187bc 47 API calls 58165->58166 58172 140096668 58166->58172 58168 1400966a2 58169 1400056b0 _RunAllParam VariantClear 58168->58169 58169->58150 58170->58157 58170->58159 58170->58163 58178 14001e3d0 84 API calls 3 library calls 58170->58178 58171 1400013d0 57 API calls 58171->58172 58172->58168 58172->58171 58173 1400024e0 56 API calls 58172->58173 58173->58172 58174->58133 58177->58170 58178->58170 58181 14008e8a0 58192 1400868a0 58181->58192 58186 14008e8cb 58188 1400056b0 _RunAllParam VariantClear 58186->58188 58190 14008e913 58186->58190 58187 140001280 95 API calls 58189 14008e8f9 58187->58189 58188->58190 58217 1400563d0 58189->58217 58193 140005760 VariantClear 58192->58193 58194 1400868c3 58193->58194 58195 1400868ca 58194->58195 58196 1400868e8 58194->58196 58197 140001280 95 API calls 58195->58197 58198 1400063a0 shared_ptr 56 API calls 58196->58198 58199 1400868d7 58197->58199 58200 1400868e6 58198->58200 58201 1400139f0 56 API calls 58199->58201 58202 14007f5e0 58200->58202 58201->58200 58203 14007f604 _RunAllParam 58202->58203 58204 14007f660 58203->58204 58205 14007f61b 58203->58205 58208 14007f669 58204->58208 58210 14007f655 58204->58210 58223 14005d0b0 46 API calls 58205->58223 58207 14007f620 IsWindow 58209 14007f635 58207->58209 58207->58210 58211 140001280 95 API calls 58208->58211 58224 14005e260 56 API calls shared_ptr 58209->58224 58210->58186 58210->58187 58214 14007f675 58211->58214 58213 14007f644 58225 1400457e0 56 API calls 2 library calls 58213->58225 58226 14007eff0 65 API calls 3 library calls 58214->58226 58218 1400563ed 58217->58218 58219 1400563f1 SendMessageW 58218->58219 58221 140056426 58218->58221 58220 140056409 58219->58220 58219->58221 58220->58221 58222 14005640e GetParent InvalidateRect 58220->58222 58221->58186 58222->58221 58223->58207 58224->58213 58225->58210 58226->58210 58227 1400884c0 58228 140088507 58227->58228 58230 140088514 58227->58230 58270 14005d0b0 46 API calls 58228->58270 58231 140061de0 95 API calls 58230->58231 58232 1400885b0 58231->58232 58240 140086450 58232->58240 58234 1400885ec 58235 1400885f4 58234->58235 58236 140088617 58234->58236 58239 1400056b0 _RunAllParam VariantClear 58235->58239 58237 1400056b0 _RunAllParam VariantClear 58236->58237 58238 140088612 58237->58238 58239->58238 58241 140018908 shared_ptr 56 API calls 58240->58241 58242 140086485 58241->58242 58243 140086495 58242->58243 58271 1400846f0 56 API calls shared_ptr 58242->58271 58249 1400864d2 58243->58249 58272 1400457e0 56 API calls 2 library calls 58243->58272 58246 14008662d 58247 14008669a 58246->58247 58248 14008665c SystemParametersInfoW GetSystemMetrics 58246->58248 58250 1400866a0 SystemParametersInfoW GetSystemMetrics 58247->58250 58251 1400866f4 SetRect AdjustWindowRectEx CreateWindowExW 58247->58251 58248->58247 58249->58246 58252 140040510 GetWindowLongPtrW 58249->58252 58257 140086575 58249->58257 58250->58251 58253 1400866de GetSystemMetrics 58250->58253 58254 14008678e SetWindowLongPtrW GetClientRect GetStockObject SendMessageW 58251->58254 58251->58257 58255 1400865a1 GetWindowRect GetClientRect GetSystemMetrics GetSystemMetrics 58252->58255 58253->58251 58256 1400651e0 61 API calls 58254->58256 58255->58246 58260 14008661f GetSystemMetrics 58255->58260 58259 14008680c 58256->58259 58257->58234 58261 140086832 58259->58261 58262 140086816 SetTimer 58259->58262 58260->58246 58273 140050710 GetWindowLongPtrW 58261->58273 58262->58261 58264 140086848 58264->58257 58265 140086885 58264->58265 58267 140086858 58264->58267 58274 140050c80 GetWindowLongPtrW DestroyWindow 58265->58274 58268 140050ac0 39 API calls 58267->58268 58268->58257 58269 140086890 58269->58257 58270->58230 58271->58243 58272->58249 58273->58264 58274->58269 58275 140089ac0 58276 140001280 95 API calls 58275->58276 58277 140089af6 58276->58277 58278 140089b6d 58277->58278 58279 140089b44 58277->58279 58312 140075630 61 API calls 2 library calls 58278->58312 58280 1400056b0 _RunAllParam VariantClear 58279->58280 58294 140089b4c std::exception_ptr::_Current_exception 58280->58294 58282 140089b84 58283 140089b88 58282->58283 58297 140089b94 std::exception_ptr::_Current_exception 58282->58297 58284 1400056b0 _RunAllParam VariantClear 58283->58284 58284->58294 58285 140089c1f 58319 1400757c0 100 API calls std::exception_ptr::_Current_exception 58285->58319 58287 140001280 95 API calls 58287->58297 58288 140089c2f 58289 140089c7e 58288->58289 58290 140089c37 58288->58290 58313 140066cd0 98 API calls 2 library calls 58289->58313 58293 1400056b0 _RunAllParam VariantClear 58290->58293 58296 140089c3f 58293->58296 58295 140089c8e 58314 140017e30 58295->58314 58296->58294 58297->58285 58297->58287 58298 140089c4b 58297->58298 58318 140074bf0 58 API calls 3 library calls 58297->58318 58301 1400056b0 _RunAllParam VariantClear 58298->58301 58301->58294 58302 140013f10 57 API calls 58303 140089cab 58302->58303 58305 1400013d0 57 API calls 58303->58305 58309 140089cd8 58303->58309 58304 140089d15 58304->58294 58310 140089d25 FreeLibrary 58304->58310 58306 140089cc5 58305->58306 58320 14007d590 114 API calls 2 library calls 58306->58320 58307 1400013d0 57 API calls 58307->58309 58309->58304 58309->58307 58321 14007d590 114 API calls 2 library calls 58309->58321 58310->58294 58312->58282 58313->58295 58317 140017e5e 58314->58317 58315 140017f6f 58315->58302 58316 140017f82 K32EmptyWorkingSet 58316->58315 58317->58315 58317->58316 58318->58297 58319->58288 58320->58309 58321->58309 58322 14006c2a0 58323 14006c2d7 58322->58323 58324 14006c2f7 58322->58324 58323->58324 58326 140061de0 95 API calls 58323->58326 58325 140061de0 95 API calls 58324->58325 58327 14006c379 58325->58327 58326->58324 58332 1400643e0 58327->58332 58330 1400056b0 _RunAllParam VariantClear 58331 14006c3b1 58330->58331 58333 140064415 58332->58333 58334 14006464f 58333->58334 58337 1400644f3 58333->58337 58346 140064645 58333->58346 58335 140064654 DestroyWindow 58334->58335 58336 140064661 CreateWindowExW 58334->58336 58335->58336 58338 1400646c6 SendMessageW 58336->58338 58336->58346 58340 140064541 CreateWindowExW 58337->58340 58342 140064538 58337->58342 58343 140064526 DestroyWindow 58337->58343 58339 1400063a0 shared_ptr 56 API calls 58338->58339 58341 1400646f5 GetDesktopWindow GetWindowRect SendMessageW 58339->58341 58344 1400645aa 58340->58344 58340->58346 58345 140064728 SendMessageW 58341->58345 58341->58346 58342->58340 58347 140064617 SendMessageW 58342->58347 58343->58342 58348 1400063a0 shared_ptr 56 API calls 58344->58348 58345->58346 58346->58330 58350 1400063a0 shared_ptr 56 API calls 58347->58350 58349 1400645e0 SendMessageW 58348->58349 58349->58347 58350->58346 58351 14006bf20 58352 14006bf61 58351->58352 58353 14006c075 58352->58353 58354 14006bf6e 58352->58354 58382 140053200 58353->58382 58355 14006c027 58354->58355 58356 14006bf77 58354->58356 58358 140053200 46 API calls 58355->58358 58359 14006bfd6 58356->58359 58360 14006bf7c 58356->58360 58363 14006c03a 58358->58363 58364 140061de0 95 API calls 58359->58364 58365 14006c0cb 58360->58365 58368 140061de0 95 API calls 58360->58368 58361 14006c088 58362 140053200 46 API calls 58361->58362 58372 14006c093 58362->58372 58366 140061de0 95 API calls 58363->58366 58367 14006bfe9 58364->58367 58373 14006c045 58366->58373 58369 140053200 46 API calls 58367->58369 58370 14006bf98 58368->58370 58375 14006bff4 58369->58375 58371 140061de0 95 API calls 58370->58371 58376 14006bfa3 58371->58376 58386 14005b950 58372->58386 58378 14005b950 SendMessageW 58373->58378 58379 14005b950 SendMessageW 58375->58379 58381 14005b950 SendMessageW 58376->58381 58377 14006bfd1 58380 1400056b0 _RunAllParam VariantClear 58377->58380 58378->58377 58379->58377 58380->58365 58381->58377 58383 140053210 58382->58383 58384 140053223 58382->58384 58383->58384 58390 140019200 46 API calls 58383->58390 58384->58361 58387 14005b976 58386->58387 58388 14005b97e SendMessageW 58387->58388 58389 14005b97a 58387->58389 58388->58389 58389->58377 58390->58384 58391 14006cf20 58392 14006cf4e 58391->58392 58393 14006cf85 58392->58393 58403 14005d0b0 46 API calls 58392->58403 58397 140050ea0 58393->58397 58398 140050eb4 58397->58398 58399 140050ec3 58397->58399 58400 140040510 GetWindowLongPtrW 58398->58400 58401 140050ed6 PostMessageW 58399->58401 58402 140050f00 58399->58402 58400->58399 58401->58402 58403->58393 58404 140058d40 58405 140040510 GetWindowLongPtrW 58404->58405 58406 140058d6c GetClientRect GetCursorPos ScreenToClient 58405->58406 58407 140058dbe 58406->58407 58408 140058e6b DefDlgProcW 58406->58408 58407->58408 58409 140058e48 58407->58409 58410 140058dea WindowFromPoint 58407->58410 58414 140058e41 58408->58414 58418 140040040 LoadCursorW SetCursor 58409->58418 58410->58409 58412 140058dfa 58410->58412 58412->58409 58415 140058e32 58412->58415 58417 140040040 LoadCursorW SetCursor 58415->58417 58419 140046820 SendMessageTimeoutW 58420 14004faa0 58421 140040510 GetWindowLongPtrW 58420->58421 58422 14004fad5 58421->58422 58423 14004fafe GetSystemMetrics 58422->58423 58424 14004fb0a 58422->58424 58423->58424 58425 14004fdfa DefDlgProcW 58424->58425 58431 14004fb3e 58424->58431 58426 14004fe1a 58425->58426 58427 14004fde2 InvalidateRect 58427->58426 58428 14004fd3f MoveWindow 58429 14004fd63 SendMessageW 58428->58429 58428->58431 58429->58431 58430 14004fd8b SendMessageW 58430->58431 58432 14004fdad 58430->58432 58431->58427 58431->58428 58431->58430 58432->58431 58433 14004fdb9 ShowWindow 58432->58433 58433->58431 58434 140013500 58437 1400133a0 58434->58437 58438 1400133d0 58437->58438 58440 140013417 58438->58440 58441 14001345c 58438->58441 58446 1400133dd 58438->58446 58474 14001345a 58438->58474 58439 1400133e9 DefWindowProcW 58445 1400133fa 58439->58445 58443 140013474 58440->58443 58444 14001341c 58440->58444 58479 1400132d0 58441->58479 58447 140037188 58443->58447 58448 14001347a 58443->58448 58449 140013425 58444->58449 58450 140037236 58444->58450 58446->58439 58488 140013d20 Shell_NotifyIconW _fread_nolock 58446->58488 58487 140014e30 7 API calls 58447->58487 58454 140013481 SetTimer RegisterWindowMessageW 58448->58454 58455 1400134c7 58448->58455 58456 140013431 58449->58456 58457 140037212 58449->58457 58493 140014e30 7 API calls 58450->58493 58454->58445 58461 1400134b3 CreatePopupMenu 58454->58461 58462 140037130 58455->58462 58463 1400134d0 KillTimer 58455->58463 58464 14001343d 58456->58464 58465 1400371ee 58456->58465 58492 140071130 68 API calls _fread_nolock 58457->58492 58459 1400371ba 58489 140013de0 65 API calls _fread_nolock 58459->58489 58460 140037262 58494 140007d90 272 API calls 3 library calls 58460->58494 58461->58445 58470 140037151 MoveWindow 58462->58470 58471 140037135 58462->58471 58486 140013d20 Shell_NotifyIconW _fread_nolock 58463->58486 58464->58446 58472 140013445 58464->58472 58465->58439 58491 140047800 56 API calls shared_ptr 58465->58491 58466 140037229 58466->58439 58473 1400371e8 58466->58473 58470->58445 58471->58446 58476 14003713e SetFocus 58471->58476 58490 140079620 78 API calls _fread_nolock 58472->58490 58473->58445 58474->58439 58475 1400134e8 PostQuitMessage 58475->58445 58476->58445 58480 1400132e4 _fread_nolock 58479->58480 58481 14001338a 58479->58481 58495 140007f70 58480->58495 58481->58445 58483 140013356 KillTimer SetTimer 58483->58481 58484 140013314 58484->58483 58485 140035d69 Shell_NotifyIconW 58484->58485 58485->58483 58486->58475 58487->58445 58488->58459 58489->58474 58490->58473 58491->58474 58492->58466 58493->58460 58494->58474 58496 140007f87 58495->58496 58516 140008080 std::exception_ptr::_Current_exception 58495->58516 58517 1400121a0 56 API calls shared_ptr 58496->58517 58498 140007fa1 58499 140035c40 LoadStringW 58498->58499 58500 140007fb0 58498->58500 58502 140035c62 58499->58502 58501 1400063a0 shared_ptr 56 API calls 58500->58501 58503 140007fc4 58501->58503 58504 1400139f0 56 API calls 58502->58504 58505 140007fd1 58503->58505 58506 140035c79 58503->58506 58513 140007fef _fread_nolock 58504->58513 58505->58502 58507 140007fde 58505->58507 58519 140012230 56 API calls 2 library calls 58506->58519 58518 140012230 56 API calls 2 library calls 58507->58518 58510 140035c8a 58511 140035ca5 58510->58511 58510->58513 58520 140012230 56 API calls 2 library calls 58511->58520 58515 140008063 Shell_NotifyIconW 58513->58515 58514 140035cb8 58515->58516 58516->58484 58517->58498 58518->58513 58519->58510 58520->58514 58521 140012b40 58522 140012b5c 58521->58522 58523 140012b64 timeGetTime 58522->58523 58524 14003a820 Sleep 58522->58524 58525 140012b7c 58523->58525 58528 1400029a0 58525->58528 58527 140012b96 58529 140039c70 58528->58529 58530 1400029c0 58528->58530 58596 140052aa0 89 API calls _flush 58529->58596 58585 1400029d1 std::exception_ptr::_Current_exception 58530->58585 58595 140013600 272 API calls 2 library calls 58530->58595 58532 140002c2d 58534 140002e76 58532->58534 58593 140014e30 7 API calls 58532->58593 58534->58527 58536 140002dfd 58537 140002e41 58536->58537 58538 140002e06 58536->58538 58537->58527 58594 140007d90 272 API calls 3 library calls 58538->58594 58539 140002a33 PeekMessageW 58539->58585 58541 140007ed0 VariantClear 58541->58585 58542 140002e0e LockWindowUpdate DestroyWindow GetMessageW 58542->58537 58546 14003a7e2 TranslateMessage DispatchMessageW GetMessageW 58542->58546 58543 140039dc1 Sleep 58543->58585 58544 140039ddf timeGetTime 58544->58585 58545 140012bb0 TranslateAcceleratorW 58545->58585 58546->58546 58548 14003a818 58546->58548 58547 140002d95 58592 140007ed0 VariantClear _RunAllParam 58547->58592 58548->58537 58550 140002980 248 API calls 58550->58585 58551 140013530 57 API calls 58551->58585 58552 140002d6a PeekMessageW 58552->58585 58553 140012bd0 2 API calls 58553->58585 58554 1400139f0 56 API calls 58554->58585 58555 14003a2ad WaitForSingleObject 58558 14003a2ce GetExitCodeProcess CloseHandle 58555->58558 58555->58585 58557 140002d4e TranslateMessage DispatchMessageW 58557->58552 58599 140007ed0 VariantClear _RunAllParam 58558->58599 58559 14005c030 56 API calls 58591 140039f7a std::exception_ptr::_Current_exception 58559->58591 58560 14007fbd0 106 API calls 58560->58591 58561 140002cbd SleepEx 58564 140002cd1 timeGetTime 58561->58564 58561->58585 58562 140095e10 248 API calls 58562->58585 58564->58585 58565 14003a641 Sleep 58567 14003a659 timeGetTime 58565->58567 58565->58591 58567->58591 58571 14003a694 CloseHandle 58571->58591 58572 14003a74b GetExitCodeProcess CloseHandle 58572->58591 58574 140013530 57 API calls 58574->58591 58576 14003a7c2 Sleep 58576->58585 58577 140006890 56 API calls shared_ptr 58577->58591 58578 140003210 248 API calls 58578->58585 58579 140002e90 109 API calls 58579->58585 58580 140005a20 107 API calls 58580->58585 58581 140005460 155 API calls 58581->58585 58582 1400852f0 57 API calls 58582->58591 58583 14003a42b VariantClear 58583->58585 58585->58532 58585->58539 58585->58541 58585->58543 58585->58544 58585->58545 58585->58547 58585->58550 58585->58551 58585->58552 58585->58553 58585->58554 58585->58555 58585->58557 58585->58561 58585->58562 58585->58565 58585->58578 58585->58579 58585->58580 58585->58581 58585->58583 58586 140052aa0 89 API calls 58585->58586 58589 1400056b0 VariantClear _RunAllParam 58585->58589 58585->58591 58600 140097240 154 API calls _RunAllParam 58585->58600 58601 140014620 VariantClear _RunAllParam 58585->58601 58586->58585 58588 140095e10 248 API calls 58588->58591 58589->58585 58590 1400056b0 VariantClear _RunAllParam 58590->58591 58591->58559 58591->58560 58591->58571 58591->58572 58591->58574 58591->58576 58591->58577 58591->58582 58591->58585 58591->58588 58591->58590 58597 1400603d0 57 API calls std::exception_ptr::_Current_exception 58591->58597 58598 1400626a0 57 API calls std::exception_ptr::_Current_exception 58591->58598 58602 140087a80 VariantClear 58591->58602 58603 140042e20 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 58591->58603 58604 140007ed0 VariantClear _RunAllParam 58591->58604 58605 140054430 50 API calls shared_ptr 58591->58605 58606 1400668c0 VariantClear _RunAllParam 58591->58606 58592->58532 58593->58536 58594->58542 58595->58585 58596->58585 58597->58591 58598->58591 58599->58591 58600->58585 58601->58585 58602->58591 58603->58591 58604->58591 58605->58591 58606->58591
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: BuffCharCurrent_exceptionMessagePeekUppermallocstd::exception_ptr::_
      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
      • API String ID: 3917704898-570651680
      • Opcode ID: e9cefeec81a4ad89115b667aae2d6ec473ea76b74b559234c9bf468bbf1232aa
      • Instruction ID: e1171606b2f59f630c2f821be0f338f4a628adf5b26b81358ecc06f62f4530ae
      • Opcode Fuzzy Hash: e9cefeec81a4ad89115b667aae2d6ec473ea76b74b559234c9bf468bbf1232aa
      • Instruction Fuzzy Hash: 91537B72208A8086EB66DF16E4943EE77A5F78DBC4F544116EB8E87BA5CF39C491C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Message$PeekWindow$DestroyDispatchLockSleepTimeTranslateUpdatetime
      • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
      • API String ID: 1013659676-570651680
      • Opcode ID: 5ee577aa908d69ec874692a85d7b94a57250f15d194bc2e06ba17b99d0fc8d42
      • Instruction ID: 75bf64f60d3dc5ab92b45f17fa3b343440d1e0f4bc21e3d1e8dc0794cf505dae
      • Opcode Fuzzy Hash: 5ee577aa908d69ec874692a85d7b94a57250f15d194bc2e06ba17b99d0fc8d42
      • Instruction Fuzzy Hash: FA92BF72208A8096FB66DB26E1907EEB7A1F79D7C4F404012F78A43AB5DF39C459CB01

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
      • String ID: Shell_TrayWnd
      • API String ID: 3778422247-2988720461
      • Opcode ID: 014a6fed5b1e033a0115cdb94d4b9a2737cb83c2f6d73ce4c3b722a589adb6b9
      • Instruction ID: 89ccd0dae058f578d6489f8c2d7f31ef7fcac30ecdb3b3bc40364cc409d9558a
      • Opcode Fuzzy Hash: 014a6fed5b1e033a0115cdb94d4b9a2737cb83c2f6d73ce4c3b722a589adb6b9
      • Instruction Fuzzy Hash: C8416A3571095083F7569B6BA9687AE22E2BB8CBC9F905024EB0743B74DF3D884AC744
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$ErrorFileLast$CloseCreateHandle__doserrno_lseek_nolock$_close_nolock$Type
      • String ID:
      • API String ID: 3224512341-0
      • Opcode ID: b5ac37c07a6281ecd4fd15c2590f6d36e98a8f57d9344391bc4d369399e167bb
      • Instruction ID: 56d83ad9469f424d674466cb49d31385ee932fec32b66abd75126878f07f8594
      • Opcode Fuzzy Hash: b5ac37c07a6281ecd4fd15c2590f6d36e98a8f57d9344391bc4d369399e167bb
      • Instruction Fuzzy Hash: EF32F43221468486FB769B2AD4843FE77A0E7897E4F65422DFB5A477F5CA38CC409B01

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1687 140086450-14008648b call 140018908 1690 14008648d-1400864a0 call 1400846f0 1687->1690 1691 1400864a2-1400864a5 1687->1691 1693 1400864ad-1400864ba 1690->1693 1691->1693 1695 1400864dc-1400864e8 1693->1695 1696 1400864bc-1400864da call 1400457e0 1693->1696 1698 1400864ea-1400864f8 1695->1698 1699 140086504-140086540 1695->1699 1696->1699 1698->1699 1700 1400864fa-140086502 1698->1700 1701 140086542 1699->1701 1702 140086546-14008654a 1699->1702 1700->1698 1700->1699 1701->1702 1704 14008654c 1702->1704 1705 140086550-14008656a 1702->1705 1704->1705 1706 14008662d-14008665a 1705->1706 1707 140086570-140086573 1705->1707 1708 14008669a-14008669e 1706->1708 1709 14008665c-140086693 SystemParametersInfoW GetSystemMetrics 1706->1709 1710 140086575-14008657c call 14003f680 1707->1710 1711 140086588-1400865a4 call 140040510 1707->1711 1712 1400866a0-1400866dc SystemParametersInfoW GetSystemMetrics 1708->1712 1713 1400866f4-140086788 SetRect AdjustWindowRectEx CreateWindowExW 1708->1713 1709->1708 1718 140086581-140086583 1710->1718 1722 1400865be-14008661d GetWindowRect GetClientRect GetSystemMetrics * 2 1711->1722 1723 1400865a6-1400865b7 1711->1723 1712->1713 1716 1400866de-1400866f1 GetSystemMetrics 1712->1716 1713->1710 1717 14008678e-140086814 SetWindowLongPtrW GetClientRect GetStockObject SendMessageW call 1400651e0 1713->1717 1716->1713 1726 140086832-14008684c call 140050710 1717->1726 1727 140086816-14008682b SetTimer 1717->1727 1721 14008686a-140086884 1718->1721 1722->1706 1725 14008661f-14008662a GetSystemMetrics 1722->1725 1723->1722 1725->1706 1730 14008684e-140086851 1726->1730 1731 140086867 1726->1731 1727->1726 1732 140086853-140086856 1730->1732 1733 140086885-140086890 call 140050c80 1730->1733 1731->1721 1732->1733 1735 140086858-140086862 call 140050ac0 1732->1735 1733->1718 1735->1731
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimermalloc
      • String ID: AutoIt v3 GUI
      • API String ID: 3905288122-248962490
      • Opcode ID: 504c526d70586743b95d720a469b7166823be8283e87ad50bf6a7b1e5b196941
      • Instruction ID: 87889624da8a04cb7faf2b2416cf8ec3b9dd8a9f7c5d25b6df25762a39a7a1b3
      • Opcode Fuzzy Hash: 504c526d70586743b95d720a469b7166823be8283e87ad50bf6a7b1e5b196941
      • Instruction Fuzzy Hash: 68C16B77214B808AE725DF2AE8847AA77A1F38CBD4F414625EB5A43BB4DF38D554CB00

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Load$CurrentDirectoryIconNameWindow$CreateFileFullModulePath$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell_Show
      • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
      • API String ID: 1782616709-3383388033
      • Opcode ID: 77ae25d35a89c21b8a2b363d1c01b722d7d416b348e65939e0470deddaac3fe1
      • Instruction ID: 43d52f7eb203a2d4ca56a2f4ce42d448cfe09fc9ac40135613172108d1b98db4
      • Opcode Fuzzy Hash: 77ae25d35a89c21b8a2b363d1c01b722d7d416b348e65939e0470deddaac3fe1
      • Instruction Fuzzy Hash: 9E713571218A8695EB26DB26F8543DA7760F74C3C8F840026F789476BADF7DC64AC700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: __doserrno_errno
      • String ID:
      • API String ID: 921712934-0
      • Opcode ID: d4803c219e55af56a19d6c42fedf1db17a271446d3e4a765e7ec996017e05db8
      • Instruction ID: 1ac4028fada70ba444a9525d4b65c189cf559b859f7c6dacc238abe22c52a83e
      • Opcode Fuzzy Hash: d4803c219e55af56a19d6c42fedf1db17a271446d3e4a765e7ec996017e05db8
      • Instruction Fuzzy Hash: 7541B33221835086E7676F76A8857DE7651A7897E8F65861DBB6507FF3CB38CC408700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CurrentFreeInfoLibraryProcessSystemVersion
      • String ID:
      • API String ID: 1203837996-0
      • Opcode ID: cfbb2ae9a73333b1244bc1529a5e2063950b3d47f902da95d6a8638383abaacc
      • Instruction ID: 48ce39780aaa2dd38d14e7a14449f126dc0ad6f1a96d0d43ebc77d39cd826275
      • Opcode Fuzzy Hash: cfbb2ae9a73333b1244bc1529a5e2063950b3d47f902da95d6a8638383abaacc
      • Instruction Fuzzy Hash: 3981703210C2C0E6E7A3DB65E2843DE7BA0F769384F441045E78547EA6CBBAE578C751
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$DecodePointer
      • String ID:
      • API String ID: 2310398763-0
      • Opcode ID: 91faeecbaf84b4ddee86f53cd1136e5520acecb2e195e462faf91d0d0902407b
      • Instruction ID: eaf976ce10facf3ac79a6a99e4d4faf998ad4453455baef09fa2958c0147edde
      • Opcode Fuzzy Hash: 91faeecbaf84b4ddee86f53cd1136e5520acecb2e195e462faf91d0d0902407b
      • Instruction Fuzzy Hash: 6331C73531038042EB72AB7BA90179F6255B78E7C8F509514BF454BBA6DB3EC8508B00
      APIs
      • LoadLibraryA.KERNELBASE(?,?,?,?,000000014000107E,?,?,?,000000014000100E), ref: 000000014000103A
      • GetProcAddress.KERNEL32(?,?,?,?,000000014000107E,?,?,?,000000014000100E), ref: 0000000140001052
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: IsThemeActive$uxtheme.dll
      • API String ID: 2574300362-3542929980
      • Opcode ID: 20903d2320ee4c52eb40574edb783020524a6c3c509b55dfe414131a372362db
      • Instruction ID: 9314407f7463d875e0962fbbdcacd41306944a388e4c380f4117f88adfa5e6da
      • Opcode Fuzzy Hash: 20903d2320ee4c52eb40574edb783020524a6c3c509b55dfe414131a372362db
      • Instruction Fuzzy Hash: 33E07575602F4081EF169F56F8543D532A4F78CB88F440226EB8D47365DF7CC6A58700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$DecodePointer
      • String ID:
      • API String ID: 2310398763-0
      • Opcode ID: 7a4f058636096e8c8bb96a396607992c9e772393041a9911a195f7ce81af277b
      • Instruction ID: 142c25e5024d97c538fc9fd152eaa5755acb2cde459ff469413a87e45712dc2f
      • Opcode Fuzzy Hash: 7a4f058636096e8c8bb96a396607992c9e772393041a9911a195f7ce81af277b
      • Instruction Fuzzy Hash: 0C31C43231468543E7769F2AA4057AE7651E7C87D4F548228BB898BAE5CF39CC018B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno
      • String ID:
      • API String ID: 2918714741-0
      • Opcode ID: 189179f5958a573090f87fea1775d641fa56edd7a84917a6081d81ce4e3c6b53
      • Instruction ID: 2d549cf9eb991a4a15421a988ea21db037c2531ec985e03c642eaf57930f2ec3
      • Opcode Fuzzy Hash: 189179f5958a573090f87fea1775d641fa56edd7a84917a6081d81ce4e3c6b53
      • Instruction Fuzzy Hash: BF51E83170429046FA668E27A5007E9A691B78EBF4F148724BF795BFF5CB3EC5924700
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8346f3251fe4efe349eaec54d18e388b11a685d99eb3e335eb7a097ad2a57a57
      • Instruction ID: 7a9838a4ab42980463825b1b44600bf78b18324788c39eb4b1d690d7913206ef
      • Opcode Fuzzy Hash: 8346f3251fe4efe349eaec54d18e388b11a685d99eb3e335eb7a097ad2a57a57
      • Instruction Fuzzy Hash: 7212B43661468182EB72EB17E0447EEBB61F3897C9F949102FB8A077B9DB78C585C700

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Virtual$Handle$CloseKeyboardLayoutMessageNameRegisterScanWindowmalloc
      • String ID: !$ABS$ACOS$ADLIBDISABLE$ADLIBENABLE$ADLIBREGISTER$ADLIBUNREGISTER$ASC$ASCW$ASIN$ASSIGN$ATAN$AUTOITSETOPTION$AUTOITWINGETTITLE$AUTOITWINSETTITLE$BEEP$BINARY$BINARYLEN$BINARYMID$BINARYTOSTRING$BITAND$BITNOT$BITOR$BITROTATE$BITSHIFT$BITXOR$BLOCKINPUT$BREAK$C$CALL$CDTRAY$CEILING$CHR$CHRW$CLIPGET$CLIPPUT$CONSOLEREAD$CONSOLEWRITE$CONSOLEWRITEERROR$CONTROLCLICK$CONTROLCOMMAND$CONTROLDISABLE$CONTROLENABLE$CONTROLFOCUS$CONTROLGETFOCUS$CONTROLGETHANDLE$CONTROLGETPOS$CONTROLGETTEXT$CONTROLHIDE$CONTROLLISTVIEW$CONTROLMOVE$CONTROLSEND$CONTROLSETTEXT$CONTROLSHOW$CONTROLTREEVIEW$COS$DEC$DIRCOPY$DIRCREATE$DIRGETSIZE$DIRMOVE$DIRREMOVE$DLLCALL$DLLCALLBACKFREE$DLLCALLBACKGETPTR$DLLCALLBACKREGISTER$DLLCLOSE$DLLOPEN$DLLSTRUCTCREATE$DLLSTRUCTGETDATA$DLLSTRUCTGETPTR$DLLSTRUCTGETSIZE$DLLSTRUCTSETDATA$DRIVEGETDRIVE$DRIVEGETFILESYSTEM$DRIVEGETLABEL$DRIVEGETSERIAL$DRIVEGETTYPE$DRIVEMAPADD$DRIVEMAPDEL$DRIVEMAPGET$DRIVESETLABEL$DRIVESPACEFREE$DRIVESPACETOTAL$DRIVESTATUS$DUMMYSPEEDTEST$ENVGET$ENVSET$ENVUPDATE$EVAL$EXECUTE$EXP$FILECHANGEDIR$FILECLOSE$FILECOPY$FILECREATENTFSLINK$FILECREATESHORTCUT$FILEDELETE$FILEEXISTS$FILEFINDFIRSTFILE$FILEFINDNEXTFILE$FILEFLUSH$FILEGETATTRIB$FILEGETLONGNAME$FILEGETPOS$FILEGETSHORTCUT$FILEGETSHORTNAME$FILEGETSIZE$FILEGETTIME$FILEGETVERSION$FILEINSTALL$FILEMOVE$FILEOPEN$FILEOPENDIALOG$FILEREAD$FILEREADLINE$FILERECYCLE$FILERECYCLEEMPTY$FILESAVEDIALOG$FILESELECTFOLDER$FILESETATTRIB$FILESETPOS$FILESETTIME$FILEWRITE$FILEWRITELINE$FLOOR$FTPSETPROXY$GUICREATE$GUICTRLCREATEAVI$GUICTRLCREATEBUTTON$GUICTRLCREATECHECKBOX$GUICTRLCREATECOMBO$GUICTRLCREATECONTEXTMENU$GUICTRLCREATEDATE$GUICTRLCREATEDUMMY$GUICTRLCREATEEDIT$GUICTRLCREATEGRAPHIC$GUICTRLCREATEGROUP$GUICTRLCREATEICON$GUICTRLCREATEINPUT$GUICTRLCREATELABEL$GUICTRLCREATELIST$GUICTRLCREATELISTVIEW$GUICTRLCREATELISTVIEWITEM$GUICTRLCREATEMENU$GUICTRLCREATEMENUITEM$GUICTRLCREATEMONTHCAL$GUICTRLCREATEOBJ$GUICTRLCREATEPIC$GUICTRLCREATEPROGRESS$GUICTRLCREATERADIO$GUICTRLCREATESLIDER$GUICTRLCREATETAB$GUICTRLCREATETABITEM$GUICTRLCREATETREEVIEW$GUICTRLCREATETREEVIEWITEM$GUICTRLCREATEUPDOWN$GUICTRLDELETE$GUICTRLGETHANDLE$GUICTRLGETSTATE$GUICTRLREAD$GUICTRLRECVMSG$GUICTRLREGISTERLISTVIEWSORT$GUICTRLSENDMSG$GUICTRLSENDTODUMMY$GUICTRLSETBKCOLOR$GUICTRLSETCOLOR$GUICTRLSETCURSOR$GUICTRLSETDATA$GUICTRLSETDEFBKCOLOR$GUICTRLSETDEFCOLOR$GUICTRLSETFONT$GUICTRLSETGRAPHIC$GUICTRLSETIMAGE$GUICTRLSETLIMIT$GUICTRLSETONEVENT$GUICTRLSETPOS$GUICTRLSETRESIZING$GUICTRLSETSTATE$GUICTRLSETSTYLE$GUICTRLSETTIP$GUIDELETE$GUIGETCURSORINFO$GUIGETMSG$GUIGETSTYLE$GUIREGISTERMSG$GUISETACCELERATORS$GUISETBKCOLOR$GUISETCOORD$GUISETCURSOR$GUISETFONT$GUISETHELP$GUISETICON$GUISETONEVENT$GUISETSTATE$GUISETSTYLE$GUISTARTGROUP$GUISWITCH$HEX$HOTKEYSET$HTTPSETPROXY$HTTPSETUSERAGENT$HWND$INETCLOSE$INETGET$INETGETINFO$INETGETSIZE$INETREAD$INIDELETE$INIREAD$INIREADSECTION$INIREADSECTIONNAMES$INIRENAMESECTION$INIWRITE$INIWRITESECTION$INPUTBOX$INT$ISADMIN$ISARRAY$ISBINARY$ISBOOL$ISDECLARED$ISDLLSTRUCT$ISFLOAT$ISHWND$ISINT$ISKEYWORD$ISNUMBER$ISOBJ$ISPTR$ISSTRING$LOG$MEMGETSTATS$MOD$MOUSECLICK$MOUSECLICKDRAG$MOUSEDOWN$MOUSEGETCURSOR$MOUSEGETPOS$MOUSEMOVE$MOUSEUP$MOUSEWHEEL$MSGBOX$NUMBER$OBJCREATE$OBJEVENT$OBJGET$OBJNAME$ONAUTOITEXITREGISTER$ONAUTOITEXITUNREGISTER$OPT$PING$PIXELCHECKSUM$PIXELGETCOLOR$PIXELSEARCH$PLUGINCLOSE$PLUGINOPEN$PROCESSCLOSE$PROCESSEXISTS$PROCESSGETSTATS$PROCESSLIST$PROCESSSETPRIORITY$PROCESSWAIT$PROCESSWAITCLOSE$PROGRESSOFF$PROGRESSON$PROGRESSSET$PTR$RANDOM$REGDELETE$REGENUMKEY$REGENUMVAL$REGREAD$REGWRITE$ROUND$RUN$RUNAS$RUNASWAIT$RUNWAIT$SEND$SENDKEEPACTIVE$SETERROR$SETEXTENDED$SHELLEXECUTE$SHELLEXECUTEWAIT$SHUTDOWN$SIN$SLEEP$SOUNDPLAY$SOUNDSETWAVEVOLUME$SPLASHIMAGEON$SPLASHOFF$SPLASHTEXTON$SQRT$SRANDOM$STATUSBARGETTEXT$STDERRREAD$STDINWRITE$STDIOCLOSE$STDOUTREAD$STRING$STRINGADDCR$STRINGCOMPARE$STRINGFORMAT$STRINGFROMASCIIARRAY$STRINGINSTR$STRINGISALNUM$STRINGISALPHA$STRINGISASCII$STRINGISDIGIT$STRINGISFLOAT$STRINGISINT$STRINGISLOWER$STRINGISSPACE$STRINGISUPPER$STRINGISXDIGIT$STRINGLEFT$STRINGLEN$STRINGLOWER$STRINGMID$STRINGREGEXP$STRINGREGEXPREPLACE$STRINGREPLACE$STRINGRIGHT$STRINGSPLIT$STRINGSTRIPCR$STRINGSTRIPWS$STRINGTOASCIIARRAY$STRINGTOBINARY$STRINGTRIMLEFT$STRINGTRIMRIGHT$STRINGUPPER$TAN$TCPACCEPT$TCPCLOSESOCKET$TCPCONNECT$TCPLISTEN$TCPNAMETOIP$TCPRECV$TCPSEND$TCPSHUTDOWN$TCPSTARTUP$TIMERDIFF$TIMERINIT$TOOLTIP$TRAYCREATEITEM$TRAYCREATEMENU$TRAYGETMSG$TRAYITEMDELETE$TRAYITEMGETHANDLE$TRAYITEMGETSTATE$TRAYITEMGETTEXT$TRAYITEMSETONEVENT$TRAYITEMSETSTATE$TRAYITEMSETTEXT$TRAYSETCLICK$TRAYSETICON$TRAYSETONEVENT$TRAYSETPAUSEICON$TRAYSETSTATE$TRAYSETTOOLTIP$TRAYTIP$UBOUND$UDPBIND$UDPCLOSESOCKET$UDPOPEN$UDPRECV$UDPSEND$UDPSHUTDOWN$UDPSTARTUP$VARGETTYPE$WINACTIVATE$WINACTIVE$WINCLOSE$WINEXISTS$WINFLASH$WINGETCARETPOS$WINGETCLASSLIST$WINGETCLIENTSIZE$WINGETHANDLE$WINGETPOS$WINGETPROCESS$WINGETSTATE$WINGETTEXT$WINGETTITLE$WINKILL$WINLIST$WINMENUSELECTITEM$WINMINIMIZEALL$WINMINIMIZEALLUNDO$WINMOVE$WINSETONTOP$WINSETSTATE$WINSETTITLE$WINSETTRANS$WINWAIT$WINWAITACTIVE$WINWAITCLOSE$WINWAITNOTACTIVE
      • API String ID: 476934340-3975328208
      • Opcode ID: 7d65b3eac44421d2209c158eb4af51b2f4920e3d5e56cb9987a96031fa69e362
      • Instruction ID: 151627aaf99e920a279374d5b5d489c1e6832f24218e5f5c2a801d92cade035a
      • Opcode Fuzzy Hash: 7d65b3eac44421d2209c158eb4af51b2f4920e3d5e56cb9987a96031fa69e362
      • Instruction Fuzzy Hash: 852467B6519F85DADB65CF09E48038AB7A8F38CB48F504616E79C43B28DB79C295CF40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: __doserrno_errno
      • String ID:
      • API String ID: 921712934-0
      • Opcode ID: 8f32b312fef02a6121b9f06fcee6f3d7b95e0ed654156a37893e33c0728cdc26
      • Instruction ID: c28e0125ff3f8f650fe3a2b3f249e4f1450dfd9484e48a9088bbf26b300e7a67
      • Opcode Fuzzy Hash: 8f32b312fef02a6121b9f06fcee6f3d7b95e0ed654156a37893e33c0728cdc26
      • Instruction Fuzzy Hash: 5A22F972608A9481EB639B76D4843ED6BA1F38A7D4F588219FB9A037F5DB38CC45C701

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1912 140063890-1400638d5 call 140001810 call 140018474 1917 140063947-140063973 LoadImageW 1912->1917 1918 1400638d7-140063933 call 140018474 call 1400187bc call 140018474 call 1400187bc call 140018474 call 1400187bc 1912->1918 1919 140063978-14006397d 1917->1919 1951 1400639d9-1400639ee LoadLibraryExW 1918->1951 1952 140063939-14006393c 1918->1952 1921 140063af3-140063afd 1919->1921 1922 140063983-14006398e call 1400620e0 1919->1922 1924 140063b05-140063b78 SendMessageW * 2 MoveWindow 1921->1924 1925 140063aff DestroyIcon 1921->1925 1922->1921 1933 140063994-140063997 1922->1933 1928 140063b7d-140063ba5 call 1400056b0 1924->1928 1929 140063b7a 1924->1929 1925->1924 1929->1928 1936 1400639a5 1933->1936 1937 140063999-14006399c 1933->1937 1941 1400639a7-1400639ad 1936->1941 1942 1400639b0-1400639c6 1936->1942 1937->1921 1939 1400639a2 1937->1939 1939->1936 1941->1942 1944 140063ae5-140063aea 1942->1944 1945 1400639cc-1400639d4 1942->1945 1946 140063aed ExtractIconExW 1944->1946 1945->1946 1946->1921 1951->1919 1954 1400639f0-1400639fb call 140053ee0 1951->1954 1952->1951 1953 140063942-140063945 1952->1953 1953->1917 1953->1919 1957 1400639fd-140063a38 call 140061de0 LoadImageW 1954->1957 1958 140063a5b-140063a5e 1954->1958 1964 140063ad3 1957->1964 1965 140063a3e-140063a59 1957->1965 1960 140063a91 1958->1960 1961 140063a60-140063a8f LoadImageW 1958->1961 1963 140063a96-140063a99 1960->1963 1961->1963 1966 140063ad7-140063ae0 FreeLibrary 1963->1966 1967 140063a9b-140063abc call 140061de0 1963->1967 1964->1966 1968 140063abf-140063ace LoadImageW 1965->1968 1966->1919 1967->1968 1968->1964
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFreeMoveWindow_errno
      • String ID: .dll$.exe$.icl
      • API String ID: 609567514-1154884017
      • Opcode ID: 5c224fb588f2a89f92b1415c60faca1c0a941570177be5ab58b4f5f41ae0033f
      • Instruction ID: 521cbfb84222bf7d93ad65e33eea04d69d7e6ea7220855c3da9759b43fc68d2a
      • Opcode Fuzzy Hash: 5c224fb588f2a89f92b1415c60faca1c0a941570177be5ab58b4f5f41ae0033f
      • Instruction Fuzzy Hash: 90817F3221469186EB329F26A8407EE77A1F38CBC5F500916FF8A47BA5DB7DC541D780

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2021 1400643e0-140064417 call 140051560 2024 140064746 2021->2024 2025 14006441d-14006444b 2021->2025 2026 140064748-140064764 2024->2026 2025->2024 2027 140064451-140064453 2025->2027 2027->2024 2028 140064459-14006445b 2027->2028 2028->2024 2029 140064461-140064463 2028->2029 2029->2024 2030 140064469-14006446b 2029->2030 2030->2024 2031 140064471-140064473 2030->2031 2031->2024 2032 140064479-14006447b 2031->2032 2032->2024 2033 140064481-140064483 2032->2033 2033->2024 2034 140064489-14006448b 2033->2034 2034->2024 2035 140064491-1400644ed 2034->2035 2036 1400644f3-14006451a call 140051600 2035->2036 2037 14006464f-140064652 2035->2037 2044 140064541-1400645a4 CreateWindowExW 2036->2044 2045 14006451c-140064524 2036->2045 2038 140064654-14006465a DestroyWindow 2037->2038 2039 140064661-1400646c0 CreateWindowExW 2037->2039 2038->2039 2039->2024 2041 1400646c6-1400646f0 SendMessageW call 1400063a0 2039->2041 2046 1400646f5-140064722 GetDesktopWindow GetWindowRect SendMessageW 2041->2046 2044->2024 2049 1400645aa-140064611 call 1400063a0 SendMessageW 2044->2049 2047 140064538-14006453b 2045->2047 2048 140064526-140064536 DestroyWindow 2045->2048 2050 140064728-140064741 SendMessageW 2046->2050 2051 140064645-14006464a 2046->2051 2047->2044 2052 140064617-140064640 SendMessageW call 1400063a0 2047->2052 2048->2047 2049->2052 2050->2051 2051->2026 2052->2051
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$MessageSend$CreateDestroy$DesktopRect
      • String ID: @$tooltips_class32
      • API String ID: 2443926738-517154873
      • Opcode ID: a8ee8c13d6b8cd87cd3d98121cde7ea7dcf1ebbb4e507398a2bcf8c10eb0c03a
      • Instruction ID: 961e5430bb76eb16438e9c9ede0b5b2b7484ad69082132bb38ee9ab744087668
      • Opcode Fuzzy Hash: a8ee8c13d6b8cd87cd3d98121cde7ea7dcf1ebbb4e507398a2bcf8c10eb0c03a
      • Instruction Fuzzy Hash: BB917D36208B8586EB66CF2AE8847DA77A1F389BC4F945116EB8D47B74DF38C585C700

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
      • String ID:
      • API String ID: 3969911579-0
      • Opcode ID: 7b9b92fc94144ad34b6cfd525f49a667557e4e7870182b4bd64d1e04c818e701
      • Instruction ID: e1f0393f91dad3a2f06bc0eb50f9b09eada1caefdfd0ace4d8ffd7b7844b3a96
      • Opcode Fuzzy Hash: 7b9b92fc94144ad34b6cfd525f49a667557e4e7870182b4bd64d1e04c818e701
      • Instruction Fuzzy Hash: C251283A204B8086E751CF2AE8047AA73A1F78DBD8F514125EF9943B64DF39C949CB00

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
      • String ID: +$AutoIt v3 GUI$P$TaskbarCreated
      • API String ID: 2914291525-867404841
      • Opcode ID: ee901617d7778aa62f019ed5556ffad20a39d1640dd1e5966d19bbb2149a7e0a
      • Instruction ID: 957a0b2e540d759da73a0bd104ecff49e9fefb24c8ab4b512ba8719781be8d66
      • Opcode Fuzzy Hash: ee901617d7778aa62f019ed5556ffad20a39d1640dd1e5966d19bbb2149a7e0a
      • Instruction Fuzzy Hash: 12310736118B8186E711DF56F88878AB7B4F788781F500215EB9A43B78DF7DC599CB40

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2073 140064f70-140064fa3 2074 140064fa5-140064fb7 call 140040510 2073->2074 2075 140064fb9 2073->2075 2076 140064fbf-140064fc2 2074->2076 2075->2076 2078 140064fc4-140064fc6 2076->2078 2079 140064fcb-140064fce 2076->2079 2081 1400651c5-1400651db 2078->2081 2082 140064ff3-140065013 2079->2082 2083 140064fd0-140064fed call 1400063a0 2079->2083 2085 140065152-140065156 2082->2085 2086 140065019-14006503d LoadImageW 2082->2086 2083->2082 2090 140065158-140065167 call 140042620 2085->2090 2091 14006518b-140065195 2085->2091 2088 140065067 2086->2088 2089 14006503f-140065065 call 140042c90 ExtractIconExW 2086->2089 2095 14006506e-140065097 LoadImageW 2088->2095 2089->2095 2108 140065175-140065186 call 140050d80 2090->2108 2109 140065169-140065170 call 140050cd0 2090->2109 2092 140065197 2091->2092 2093 14006519d-1400651a7 2091->2093 2092->2093 2097 1400651af-1400651b3 2093->2097 2098 1400651a9 2093->2098 2100 1400650c3-1400650d0 2095->2100 2101 140065099-1400650bb call 140042c90 ExtractIconExW 2095->2101 2105 1400651b5-1400651bd InvalidateRect 2097->2105 2106 1400651c3 2097->2106 2098->2097 2103 140065108-14006510b 2100->2103 2104 1400650d2-1400650ea SendMessageW 2100->2104 2101->2100 2115 140065146-140065149 2103->2115 2116 14006510d-140065125 SendMessageW 2103->2116 2113 1400650f2-140065100 2104->2113 2114 1400650ec DestroyIcon 2104->2114 2105->2106 2106->2081 2108->2091 2109->2108 2113->2103 2114->2113 2115->2085 2119 14006514b-140065150 2115->2119 2117 140065127 DestroyIcon 2116->2117 2118 14006512d-14006513e 2116->2118 2117->2118 2118->2115 2119->2085
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Icon$DestroyExtractImageLoadMessageSend$InvalidateLongRectWindow
      • String ID: P
      • API String ID: 84695935-3110715001
      • Opcode ID: 1b943540689da192344aeae33d6eecbd05cd148b43c7fce11e7a3c7718372613
      • Instruction ID: 168e603f6474d96ff9f32c2f7e0334b1880e6ccc611adcd51cdc3069137d638b
      • Opcode Fuzzy Hash: 1b943540689da192344aeae33d6eecbd05cd148b43c7fce11e7a3c7718372613
      • Instruction Fuzzy Hash: CF615C36204B8086EB66EF2BE84079A77A2F79DBD5F544525EB4D87BB4DF38C4448B00

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$CreateMessageObjectSend$AttributesCompatibleDeleteDestroyLayeredLongMovePixelSelectShowStock
      • String ID: static
      • API String ID: 2258642936-2160076837
      • Opcode ID: 520ffd621935e575edf393e803907acfee4543619afc952d27559d24472cce11
      • Instruction ID: 4fd09021e33cbea653cb7a4520c3eecc5784e780ecd1a5ea71bcdddbf584abea
      • Opcode Fuzzy Hash: 520ffd621935e575edf393e803907acfee4543619afc952d27559d24472cce11
      • Instruction Fuzzy Hash: CB514F76204B8086E721CF2AE84479AB7A5F78D7D0F544216EB9983BB8DF3DC451CB00

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
      • String ID: #$AutoIt v3$P
      • API String ID: 423443420-3419303329
      • Opcode ID: e811ad14b02fb03eb33a171263279185b1942b87e634b5ed8504f4e2525fb77c
      • Instruction ID: cba823d7f043b5736e67f17e111d2a58cd399fd2bce847600851299c86fad332
      • Opcode Fuzzy Hash: e811ad14b02fb03eb33a171263279185b1942b87e634b5ed8504f4e2525fb77c
      • Instruction Fuzzy Hash: 8B41E035619B4186EB228F56F88438A77B5F38CB90F51012AEB8D43B78DB79C559CB40

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _fread_nolock$freemalloc$_errno
      • String ID:
      • API String ID: 990732115-0
      • Opcode ID: ab7c5cab745a81d4b79ebf2b6cd05fb39229b2e047813dccd9d94276bc780f88
      • Instruction ID: bc9ffda54976d039e0c421f10980e2d54bb7e14e95f4e1a0601b9e33e3fed323
      • Opcode Fuzzy Hash: ab7c5cab745a81d4b79ebf2b6cd05fb39229b2e047813dccd9d94276bc780f88
      • Instruction Fuzzy Hash: A4516B722147D486D721DF52A444BCEBBA9F78ABC4F954515FF8A0BB69CB3AC440CB00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2186 140007800-140007897 call 1400141d0 call 1400064a0 GetModuleFileNameW call 1400151b0 call 140015150 call 140006890 2197 140037280-14003728c call 140042310 2186->2197 2198 14000789d-1400078f1 call 140005de0 call 140012390 call 1400056b0 call 140006890 2186->2198 2205 140037294-1400372a0 call 140042310 2197->2205 2198->2205 2213 1400078f7-140007993 call 140005de0 call 140012390 call 140006890 call 140001a90 call 140012390 call 140006110 call 140007f20 call 1400187bc 2198->2213 2212 1400372a8-1400372c0 call 140007f20 2205->2212 2219 1400372ca-1400372e2 call 140007f20 2212->2219 2213->2212 2243 140007999-1400079aa call 1400187bc 2213->2243 2226 1400372ec-140037344 GetModuleFileNameW call 140007f20 call 1400139f0 call 140007f20 2219->2226 2241 14003734e 2226->2241 2244 140037359-140037375 call 14001887c call 140007f20 2241->2244 2243->2219 2249 1400079b0-1400079c1 call 1400187bc 2243->2249 2255 14003737b 2244->2255 2249->2226 2254 1400079c7-1400079d8 call 1400187bc 2249->2254 2258 1400079da-1400079dd 2254->2258 2259 140007a20-140007a27 2254->2259 2258->2241 2260 1400079e3-140007a1b call 140007f20 call 14001887c call 140007f20 2258->2260 2259->2244 2261 140007a2d-140007a2f 2259->2261 2260->2259 2261->2255 2263 140007a35-140007a75 call 140013f10 call 1400013d0 call 1400056b0 2261->2263 2275 140007a77-140007aa8 call 1400013d0 call 140014210 call 140007f20 2263->2275 2276 140007aaa-140007adf call 140012390 call 1400056b0 call 1400130d0 2263->2276 2275->2276
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: FileModuleName$_errno
      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
      • API String ID: 3464838693-3513169116
      • Opcode ID: ceea752f5cf5deb40b5cc6fc992b52dd468ce1dcfea26a75dfcd3d314f517aee
      • Instruction ID: 7806dc51455742a7da7219f5d275b8834f0492c1cdde795d32325f36d5a73d96
      • Opcode Fuzzy Hash: ceea752f5cf5deb40b5cc6fc992b52dd468ce1dcfea26a75dfcd3d314f517aee
      • Instruction Fuzzy Hash: 88A17172628A4192EB52EB26F451BEE6361F7887C4F845012FB4E475BADF7CC246CB40

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2289 1400133a0-1400133ce 2290 14001344a-140013454 2289->2290 2291 1400133d0-1400133d6 2289->2291 2290->2291 2294 14001345a 2290->2294 2292 1400133d8-1400133db 2291->2292 2293 14001340f-140013415 2291->2293 2292->2293 2296 1400133dd-1400133e3 2292->2296 2297 140013417-14001341a 2293->2297 2298 14001345c-14001346b call 1400132d0 2293->2298 2295 1400133e9-1400133f4 DefWindowProcW 2294->2295 2301 1400133fa-14001340e 2295->2301 2296->2295 2300 1400371a1-1400371a8 2296->2300 2302 140013474 2297->2302 2303 14001341c-14001341f 2297->2303 2304 140013470-140013472 2298->2304 2300->2295 2305 1400371ae-1400371c7 call 140013d20 call 140013de0 2300->2305 2306 140037188-14003719c call 140014e30 2302->2306 2307 14001347a-14001347f 2302->2307 2308 140013425-14001342b 2303->2308 2309 140037236-14003726f call 140014e30 call 140007d90 2303->2309 2304->2301 2305->2295 2306->2304 2313 140013481-1400134b1 SetTimer RegisterWindowMessageW 2307->2313 2314 1400134c7-1400134ca 2307->2314 2315 140013431-140013437 2308->2315 2316 140037212-14003722b call 140071130 2308->2316 2309->2295 2313->2304 2321 1400134b3-1400134c2 CreatePopupMenu 2313->2321 2322 140037130-140037133 2314->2322 2323 1400134d0-1400134f2 KillTimer call 140013d20 PostQuitMessage 2314->2323 2324 14001343d-140013443 2315->2324 2325 1400371ee-1400371f5 2315->2325 2316->2295 2334 140037231 2316->2334 2321->2301 2330 140037151-140037183 MoveWindow 2322->2330 2331 140037135-140037138 2322->2331 2323->2301 2324->2296 2333 140013445-1400371e9 call 140079620 2324->2333 2325->2295 2332 1400371fb-14003720d call 140047800 2325->2332 2330->2304 2331->2296 2338 14003713e-14003714c SetFocus 2331->2338 2332->2295 2333->2304 2334->2304 2338->2304
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
      • String ID: TaskbarCreated
      • API String ID: 129472671-2362178303
      • Opcode ID: bc35c0e81716189030b78bdaa0410fa532b91c481cf934687f565ec324ca4c22
      • Instruction ID: c3102fc47cdbee3dcb329b7cbcfa1846357240aeafbf595e0a5e1e0accf68967
      • Opcode Fuzzy Hash: bc35c0e81716189030b78bdaa0410fa532b91c481cf934687f565ec324ca4c22
      • Instruction Fuzzy Hash: 83618A3521864486FB379B27E8957E967A5F39D7C0F840022FB8A4B6B6CF3EC6458301
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
      • String ID:
      • API String ID: 3356174886-3916222277
      • Opcode ID: 3ecaed77ed86ec431c39c261bb25ef97138c6cfa7639c12ce84acd25050f83d2
      • Instruction ID: d5178c07b86ba32f94d4d4be4fd3f340b6c6abd3ec6729ae0638213db1543aab
      • Opcode Fuzzy Hash: 3ecaed77ed86ec431c39c261bb25ef97138c6cfa7639c12ce84acd25050f83d2
      • Instruction Fuzzy Hash: E1A1E13662069582EB6A8F2BD584BBA36E1F34CBC4F165435FF0647AB4DB38E841D704
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseFileModuleNameOpenQueryValue_wmakepathmalloc
      • String ID: Include$Software\AutoIt v3\AutoIt$\
      • API String ID: 3387008970-2276155026
      • Opcode ID: 9a1c21add42e16d3102201eac2f942f8a94a30a636e76be2fbb3bc1b66b4cd6d
      • Instruction ID: a1af9c00eeb0e23e12b9717ed6716dc06d7ae8b1dfb58272a50d4ff4756f8b8d
      • Opcode Fuzzy Hash: 9a1c21add42e16d3102201eac2f942f8a94a30a636e76be2fbb3bc1b66b4cd6d
      • Instruction Fuzzy Hash: 67813D71118B8585EB36CB26F8887DA73A4FB9C3C4F40012AF78947AB9DB79C556C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: __doserrno_errno
      • String ID:
      • API String ID: 921712934-0
      • Opcode ID: 47861647fd7ee14cab1df98a2e40f6c596f1724973e8e455cbcc571bd2c2a5a2
      • Instruction ID: a6e097622fa4a0584ff8a5308c1ce07b6c778f2b1f363de9a3e52f07b9c93dbb
      • Opcode Fuzzy Hash: 47861647fd7ee14cab1df98a2e40f6c596f1724973e8e455cbcc571bd2c2a5a2
      • Instruction Fuzzy Hash: 3F31F33261479086E723AF67A8467DD7650B78A7E4F658218BF250BBF3CB38CC418714
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageObjectSelectSendWindow$LengthMoveReleaseText
      • String ID: P
      • API String ID: 4165875188-3110715001
      • Opcode ID: a83ec40bcb08e741990802b116add1c522343500d14c4ff0c484283b07a66047
      • Instruction ID: 748421c85e2bc4b597ebbad5fabc76b7c86b798c22f9bf769b700c5c22a1b0e2
      • Opcode Fuzzy Hash: a83ec40bcb08e741990802b116add1c522343500d14c4ff0c484283b07a66047
      • Instruction Fuzzy Hash: FD7205766182C18BE775DF1AA4807DABBA0F3997D4F50421AFB8983BA9D778C544CF00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$_wsopen_s
      • String ID: =$UNICODE$UTF-16LE$UTF-8$ccs
      • API String ID: 586276568-31882262
      • Opcode ID: 9180b1f1e64e1e27bf08061996b1eba1eaf79df8b48f7d708dec5e38f1a54cec
      • Instruction ID: 4b529609bc652cfff7be9446dc545d350ab2a47deb570c8a06b943c1a97888fc
      • Opcode Fuzzy Hash: 9180b1f1e64e1e27bf08061996b1eba1eaf79df8b48f7d708dec5e38f1a54cec
      • Instruction Fuzzy Hash: EC71C176B0422081FBB75F1BE4807E92695B35DBC4F66410EFF4627AF8D679CD819202
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$Window
      • String ID: -----$SysListView32
      • API String ID: 2326795674-3975388722
      • Opcode ID: c33c6cd19dd6ad78dce8afddd1666c178a4c38f2dd34916f58b0f79644e523c3
      • Instruction ID: 4325a7f9b10eeaf5753d5a94697aa92b455c0f59975578a8265da4524d73163f
      • Opcode Fuzzy Hash: c33c6cd19dd6ad78dce8afddd1666c178a4c38f2dd34916f58b0f79644e523c3
      • Instruction Fuzzy Hash: 3361CD722047C58AE721CF26E8807CBB7A1F7887D0F904526FB8943BA9DB38C591CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _fread_nolock
      • String ID: FILE
      • API String ID: 840049012-3121273764
      • Opcode ID: 3e3f62da7373288c3741b387d4f56d9a878291752b317897a039ff4fc661df93
      • Instruction ID: c7d1058a1028bb5ec0d7bb04169e5fd705cfaa6c074b9508f33fb2e417648150
      • Opcode Fuzzy Hash: 3e3f62da7373288c3741b387d4f56d9a878291752b317897a039ff4fc661df93
      • Instruction Fuzzy Hash: 8351CE7221464196EA21DE63E4807CEA3A1F78DBC4F908516FF8D4BB69CB3DC205CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$Show$LockUpdate$EnableInvalidateLongRect
      • String ID:
      • API String ID: 1084233729-0
      • Opcode ID: 20a8dd9992e11829186dfdf09cfdea1c7cd6c8281006c55799a45214192e9b50
      • Instruction ID: ff25929f20823a71c344ac5d9aaf8d784c59f01ba88244b1823142d99cd33d7f
      • Opcode Fuzzy Hash: 20a8dd9992e11829186dfdf09cfdea1c7cd6c8281006c55799a45214192e9b50
      • Instruction Fuzzy Hash: 91517F3130868086FB6BDF2B95D83ED2691A78EBC4F184125E74647AB5CB7BC995C301
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
      • String ID:
      • API String ID: 3864802216-0
      • Opcode ID: e04b0a9c5c75b18d4f31fcfd584bb297b9e75888ba4910ebb07fb8c0861837c8
      • Instruction ID: 52656c66e1ffafc12b5da83b1dce22689de0494abf749c7f5c3d9dbc9fbb9013
      • Opcode Fuzzy Hash: e04b0a9c5c75b18d4f31fcfd584bb297b9e75888ba4910ebb07fb8c0861837c8
      • Instruction Fuzzy Hash: 45419A726146C18BE765CF26E844BAFBBA4F388BD5F044125EF8A07B68DB39C444CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: __doserrno_errno
      • String ID:
      • API String ID: 921712934-0
      • Opcode ID: 3e66ab9fd1745396fe94dace257a031b16e0fc3e5aa01d700535c659dffbabbf
      • Instruction ID: acceb93f83c61eecfa66e48e8783ef8bf00a10ac0d261c6ca3fbf6408d52aa92
      • Opcode Fuzzy Hash: 3e66ab9fd1745396fe94dace257a031b16e0fc3e5aa01d700535c659dffbabbf
      • Instruction Fuzzy Hash: 9E31B13260479445F723AF27A8457AD7651A7897D4FA5821DFF6507BE3CB38CC018708
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Current_exceptionstd::exception_ptr::_$ClearVariant
      • String ID:
      • API String ID: 332225251-0
      • Opcode ID: bef83641212884730778dacaf1c83f137b94e5cc5659ad8a14d822c99c9f2051
      • Instruction ID: da0d3d980b07d72bc0f723f43056d5ccbf8405b6a3229b64bd36181bb8da3476
      • Opcode Fuzzy Hash: bef83641212884730778dacaf1c83f137b94e5cc5659ad8a14d822c99c9f2051
      • Instruction Fuzzy Hash: 0FA14C72209A4086EB66DB1BE0903EE6368E78DBC4F144526FB0A477B6CB79C891C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Menu$CreateItem$DrawInfoInsertPopup
      • String ID:
      • API String ID: 161812096-0
      • Opcode ID: f731e4769f4dbd6bce317919fe755037327196e7861ff156254fc661676726cd
      • Instruction ID: e97be85962ac584f3fa528f19db3f2b61eb6b163b7568e49ebb54cc5c91c274e
      • Opcode Fuzzy Hash: f731e4769f4dbd6bce317919fe755037327196e7861ff156254fc661676726cd
      • Instruction Fuzzy Hash: 4541F036205B8486EB61CF26E48479A77B8F788F84F544126EB8E43B68DF39C495CB50
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$Create$Show
      • String ID: AutoIt v3$d$edit
      • API String ID: 2813641753-2600919596
      • Opcode ID: 891b5054f003c7f87485c089ee1c695238011559e50464b9185b40235a1e4605
      • Instruction ID: 8393adb8f14a91bb5b8aead08a6bde1628bfc783f71c136910b920ced53d36be
      • Opcode Fuzzy Hash: 891b5054f003c7f87485c089ee1c695238011559e50464b9185b40235a1e4605
      • Instruction Fuzzy Hash: 3A11B675519B4086EB65CF9AF88038AB7B1F78C794F51012AEB8A47B28DB7CC1948B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$Show$Enable
      • String ID:
      • API String ID: 2939132127-0
      • Opcode ID: e63a6ae4b924d751ec5d1ed6a7f9cfffc416ee2f2aa2973d285e4c0c4c1a02d0
      • Instruction ID: cd3675759cea18c4dbb5f582e80f888241433a6c5c958ec82e49423bec35f91c
      • Opcode Fuzzy Hash: e63a6ae4b924d751ec5d1ed6a7f9cfffc416ee2f2aa2973d285e4c0c4c1a02d0
      • Instruction Fuzzy Hash: FF510D32606E8485E756CF2AD4887ED77A1F388FD4F184022DF59476A1CF7AC496C705
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CommandInfoLineStartup_cinit
      • String ID:
      • API String ID: 1675588807-0
      • Opcode ID: 5be997067299028b163c0bb65d467eef64757c005bbc702ff357809633d205a2
      • Instruction ID: 0562ae9f371f5d5597c5850a7481345e891c3a4534d1e06b500c6b14c466bcc4
      • Opcode Fuzzy Hash: 5be997067299028b163c0bb65d467eef64757c005bbc702ff357809633d205a2
      • Instruction Fuzzy Hash: 9C41647060478186FB67AFA7A5513FA3292AB9C3C4F540039BB494B6F3DF7AC9409712
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ClientCursorWindow$FromLoadLongPointProcRectScreen
      • String ID:
      • API String ID: 852998092-0
      • Opcode ID: 681aa13de41701f58aa37fa23451ac694cfb9b4df442c3e1a141096d1f8ba7e4
      • Instruction ID: f39269793a3479d1437c5a3796e72910e09d9a5c60b993dff8632e787a550ec9
      • Opcode Fuzzy Hash: 681aa13de41701f58aa37fa23451ac694cfb9b4df442c3e1a141096d1f8ba7e4
      • Instruction Fuzzy Hash: 19410636204B5486EA66EB17E4813996361F38CBD1F544522FF8E53BB5DB39D581CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$Long
      • String ID: SysTreeView32
      • API String ID: 847901565-1698111956
      • Opcode ID: 05bebc483137102995ea8ccc31334083562879635db7da46587412db50d7838d
      • Instruction ID: 9afb921b0545e361f9999070d24dbd686ffd673d23bf196f2cfe665117f4fda4
      • Opcode Fuzzy Hash: 05bebc483137102995ea8ccc31334083562879635db7da46587412db50d7838d
      • Instruction Fuzzy Hash: 8351B3322147C086D765CF26E44078E77A5F388BE0F644225FFAA57BA8CB39C951CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _fread_nolock
      • String ID: AU3!$EA06
      • API String ID: 840049012-2658333250
      • Opcode ID: c4131ff814c3a4698ffcb14db40054eb9cbe9e7c1e151d853410c01b5fef0689
      • Instruction ID: 79a413de0083abe822058fa484201c3242fcaa0a898e5f7e8984f29b23a8234a
      • Opcode Fuzzy Hash: c4131ff814c3a4698ffcb14db40054eb9cbe9e7c1e151d853410c01b5fef0689
      • Instruction Fuzzy Hash: 5E31E87320858585E723D766E5407DE3760E38E7C4F905212FB898B5AADA7EC689CF01
      APIs
      • GetOpenFileNameW.COMDLG32 ref: 000000014003711A
        • Part of subcall function 00000001400169D0: GetFullPathNameW.KERNEL32 ref: 00000001400169F5
        • Part of subcall function 0000000140016C80: SHGetMalloc.SHELL32 ref: 0000000140016C98
        • Part of subcall function 0000000140016C80: SHGetDesktopFolder.SHELL32 ref: 0000000140016CB5
        • Part of subcall function 0000000140016C80: SHGetPathFromIDListW.SHELL32 ref: 0000000140016D18
        • Part of subcall function 0000000140016A70: GetFullPathNameW.KERNEL32 ref: 0000000140016A98
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: NamePath$Full$DesktopFileFolderFromListMallocOpen
      • String ID: AutoIt script files (*.au3, *.a3x)$Run Script:$au3
      • API String ID: 819131735-2360590182
      • Opcode ID: e299f301ba58e3974512ea147b69c0ab8b361c14f33f1e4db47deeb18b585b45
      • Instruction ID: 7a4ca26caa1ad19e3ca51edc9088f4422c47a30509b6cf5f866f09c2c3525297
      • Opcode Fuzzy Hash: e299f301ba58e3974512ea147b69c0ab8b361c14f33f1e4db47deeb18b585b45
      • Instruction Fuzzy Hash: 7C211A7120478085EB219F22E85439AB7A4F789BC4F988125AB8D4BBA9DF7EC545CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Menu$Item$DrawInfoInsert
      • String ID:
      • API String ID: 3076010158-0
      • Opcode ID: 2c73e5debd7e244f3c31b4e4a89df3bc7e9c70c129c4e4b6d35657a7abaab626
      • Instruction ID: 917fec017988fef56abe055cd823f839ebcf86a6f154d74bd08cbb7433713b39
      • Opcode Fuzzy Hash: 2c73e5debd7e244f3c31b4e4a89df3bc7e9c70c129c4e4b6d35657a7abaab626
      • Instruction Fuzzy Hash: 4E411936204BC886EB61CF26E49079E77A5F388BD4F554526EB9E43768CF39D884CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$CreateMessageObjectSendShowStock
      • String ID:
      • API String ID: 1358664141-0
      • Opcode ID: 16feacb9051f93f59c9de0ddcd8e45b25b4aa4e433a94c3d9eb474385539eeb1
      • Instruction ID: 464444ec84f9e64c74d1851dda20da2c94d8d532f49712159e2126cf60d38a2c
      • Opcode Fuzzy Hash: 16feacb9051f93f59c9de0ddcd8e45b25b4aa4e433a94c3d9eb474385539eeb1
      • Instruction Fuzzy Hash: 43211A76608BC48BE7A6CB1AE44479AB7A0F788784F144125EB8D43B64EB7CC484CB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DecodePointer_errno_flush_freebuf
      • String ID:
      • API String ID: 1889905870-0
      • Opcode ID: d52712f65abe5414c80036b749fcf6bce3a88f816afc8cc23f7e6bd5b69dd452
      • Instruction ID: 74a1a66214e258ae0fff75802fb45dece77e3331ca4241226f052b4049861aed
      • Opcode Fuzzy Hash: d52712f65abe5414c80036b749fcf6bce3a88f816afc8cc23f7e6bd5b69dd452
      • Instruction Fuzzy Hash: 2301BC3271064042FF27ABB798153ED5251AB9E7F8F2D0324BB628B5E6CA3EC8019640
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window
      • String ID: $SysTabControl32
      • API String ID: 2353593579-3143400907
      • Opcode ID: d8cd05d5d274badaecf08cb907e15fd0819d3c3504ba7bb8eb24ff0d4913b329
      • Instruction ID: f325b1a43e3f1ca24dba321bc450562db81203f7a9d0fbb56e73154e1a4af225
      • Opcode Fuzzy Hash: d8cd05d5d274badaecf08cb907e15fd0819d3c3504ba7bb8eb24ff0d4913b329
      • Instruction Fuzzy Hash: BC415D32214BC48AD764DF16E44478A7BA5F388BA4F544325EFA957BE4CB79C491CF00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Variant$ClearCopyInitmalloc
      • String ID:
      • API String ID: 3964690924-0
      • Opcode ID: c19214b59c987bb85d44b39fb212f9401f5a5e21c293124519ad10817ac7bf6a
      • Instruction ID: 620352a0a9eb58ef7726cdf4db399f251c2c5600ad371509ecf9e474b62ebd6b
      • Opcode Fuzzy Hash: c19214b59c987bb85d44b39fb212f9401f5a5e21c293124519ad10817ac7bf6a
      • Instruction Fuzzy Hash: C2513F72604A8486DB62CF16E4903AEB7E5F389BC4F15811AEB4A877B4DF79C885C701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DesktopFolderFromListMallocPath
      • String ID:
      • API String ID: 2281215042-0
      • Opcode ID: f66ada0a04751082a289d8a9d123ff74693588918e9c7ec28e32210108a27eb8
      • Instruction ID: 41f203bda821145dabfd8d0135d020cf2123b8f75fb2e80f0458858aa8ac0405
      • Opcode Fuzzy Hash: f66ada0a04751082a289d8a9d123ff74693588918e9c7ec28e32210108a27eb8
      • Instruction Fuzzy Hash: 3621CC76308B8191EB61DB2AE48439EA361F789BC4F548025EB8D47B68DF39C549C704
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: IconNotifyShell_Timer$Kill
      • String ID:
      • API String ID: 3500052701-0
      • Opcode ID: 76ce2a7f95915aa69d27f0d316d4538ca747b91741cc3cd8e3229a273167aa2c
      • Instruction ID: 35c15e109eca429baa7ecc6693a94738b3d653263b8bb7780f408cd9509f28f2
      • Opcode Fuzzy Hash: 76ce2a7f95915aa69d27f0d316d4538ca747b91741cc3cd8e3229a273167aa2c
      • Instruction Fuzzy Hash: 8B315E716087C085F773DB26E0583ED6B95E349BC8F484126EB890B7B9CB7DC1858715
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AcceleratorTableWindow$CreateDestroyForegroundLong
      • String ID:
      • API String ID: 986409557-0
      • Opcode ID: 930c68c702f61deb6ee0870c75dbda0436f7010d402f5e8c7c85a2c61adb6f9f
      • Instruction ID: 5bf250f54c367977cd6b1f022f35ccb0e7eeae634d36d4474489cbe7f9262dd3
      • Opcode Fuzzy Hash: 930c68c702f61deb6ee0870c75dbda0436f7010d402f5e8c7c85a2c61adb6f9f
      • Instruction Fuzzy Hash: 24214C75614B4085EB2ADF17E88039973A0F78CBD5F945625FB1A43BB4DB39C880C745
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: InvalidateMessageParentRectSend
      • String ID:
      • API String ID: 2900238980-0
      • Opcode ID: 8c9dc3c16222afdb63aa8ff1270aa947782604ffc65c901a48a12d6ae9ebf0a8
      • Instruction ID: f9fda22ac4e37e551100b2312bd93f01bf4bcfcb14dd208f8f9b7c65e752c13c
      • Opcode Fuzzy Hash: 8c9dc3c16222afdb63aa8ff1270aa947782604ffc65c901a48a12d6ae9ebf0a8
      • Instruction Fuzzy Hash: 92F04936204A4182EB61CF2BF9507D967A0EB8DBC4F189121FF4917728DE3AC485CB00
      APIs
      • RegOpenKeyExW.KERNELBASE(?,?,?,?,00000000,000000014001781E,?,?,?,?,?,?,0000000140013CE5), ref: 0000000140017872
      • RegQueryValueExW.KERNELBASE(?,?,?,?,00000000,000000014001781E,?,?,?,?,?,?,0000000140013CE5), ref: 0000000140017899
      • RegCloseKey.KERNELBASE(?,?,?,?,00000000,000000014001781E,?,?,?,?,?,?,0000000140013CE5), ref: 00000001400178A4
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseOpenQueryValue
      • String ID:
      • API String ID: 3677997916-0
      • Opcode ID: ba094e214b226322bf9816a123035e834dfdf86e1d88a38ded298d7131ace5da
      • Instruction ID: 828fc719722694f8dc259c279aef2313287fae413b69745da29f4c2b9d29afc4
      • Opcode Fuzzy Hash: ba094e214b226322bf9816a123035e834dfdf86e1d88a38ded298d7131ace5da
      • Instruction Fuzzy Hash: 2CF08C32214B8586EB108F22F84478AB7B5F7C8BD8F444122EB8847F28DF38C150CB00
      APIs
      • free.LIBCMT ref: 0000000140041895
        • Part of subcall function 00000001400198F8: RtlFreeHeap.NTDLL(?,?,00000000,000000014001F7EC,?,?,?,0000000140020C01,?,?,?,?,0000000140019776), ref: 000000014001990E
        • Part of subcall function 00000001400198F8: _errno.LIBCMT ref: 0000000140019918
        • Part of subcall function 00000001400198F8: GetLastError.KERNEL32(?,?,00000000,000000014001F7EC,?,?,?,0000000140020C01,?,?,?,?,0000000140019776), ref: 0000000140019920
      • free.LIBCMT ref: 00000001400418A6
      • free.LIBCMT ref: 00000001400418B7
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: free$ErrorFreeHeapLast_errno
      • String ID:
      • API String ID: 1012874770-0
      • Opcode ID: bf8fbc4300c04368f1cfcf6431feba3e6e43f7b42836d7d4059ff60833047557
      • Instruction ID: 5a6d35cc1a59f5ccc77898a5104885818b33c0975ddda9c3056333b19116f8cc
      • Opcode Fuzzy Hash: bf8fbc4300c04368f1cfcf6431feba3e6e43f7b42836d7d4059ff60833047557
      • Instruction Fuzzy Hash: 7FE0ECB5B2356041FE5AAAA384953F812109FDDBC4F1D2539BF1A4F1A6CE2584414329
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$CreateDestroyMessageObjectSendShowStock
      • String ID: static
      • API String ID: 3182005395-2160076837
      • Opcode ID: 4fcb6bc08ca69c9c6794abb52e3c39fb19c9814699030735ea8595bd7b0c7b61
      • Instruction ID: 70d867f52ce7dfcc2c51dba4c8b56c51099ace4e88ad7c835fa5108eb4084a98
      • Opcode Fuzzy Hash: 4fcb6bc08ca69c9c6794abb52e3c39fb19c9814699030735ea8595bd7b0c7b61
      • Instruction Fuzzy Hash: 38417E76218AC486D725DF12F4817CFB764F7887D0F504616EBAA43BA9DB78C481CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$ColorCreateMessageObjectSendShowStock
      • String ID: static
      • API String ID: 4289693728-2160076837
      • Opcode ID: fcfb53483d2db02776ba0d62dac950a0dcca30755dd44132fd39f379cd23aaf1
      • Instruction ID: 58afccd5d4c75c9a55f3cf96af2ab940b1693467b0c74c21a25cc023f524698b
      • Opcode Fuzzy Hash: fcfb53483d2db02776ba0d62dac950a0dcca30755dd44132fd39f379cd23aaf1
      • Instruction Fuzzy Hash: 07213936608B84CAD721CF16E444B8AB7B9F78D7D0F608225EB9943B68DB39D841CF40
      APIs
      • free.LIBCMT ref: 0000000140037062
        • Part of subcall function 0000000140016300: GetCurrentDirectoryW.KERNEL32(00000000,00000000,000000014001600C), ref: 00000001400163B2
        • Part of subcall function 0000000140016300: GetFullPathNameW.KERNEL32 ref: 00000001400163CD
        • Part of subcall function 0000000140016300: SetCurrentDirectoryW.KERNEL32 ref: 0000000140016431
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CurrentDirectory$FullNamePathfree
      • String ID: >>>AUTOIT SCRIPT<<<
      • API String ID: 521740188-2806939583
      • Opcode ID: 4c4fd4c262aff9a898f56a2066c04a6cf9b204e9756e02232f736314df185647
      • Instruction ID: 3998a6c1e9ecb71fe04749f2d053d245d058868ab4792e3c1a4a8c74d1f02613
      • Opcode Fuzzy Hash: 4c4fd4c262aff9a898f56a2066c04a6cf9b204e9756e02232f736314df185647
      • Instruction Fuzzy Hash: A9818D3221468495EA62EB22F4903DFA761F7887C4F845026FB8E47AB6DB39C549CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DecodePointer_errno
      • String ID:
      • API String ID: 3485708101-0
      • Opcode ID: d41068826d5030606a64060baa57fe7a506d6c61fb92dd4cf74e171affa8f1a3
      • Instruction ID: d7d7a5fea3124961f4a3a9c54bcdf727cbcb775e43c9ee7958fe667951c7a980
      • Opcode Fuzzy Hash: d41068826d5030606a64060baa57fe7a506d6c61fb92dd4cf74e171affa8f1a3
      • Instruction Fuzzy Hash: 4F51AD3262078486EB679E26C8447A97791F78CBC8F198129EF490B7F6CB36D842C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DecodePointer_errno
      • String ID:
      • API String ID: 3485708101-0
      • Opcode ID: 1ea4db82b412b75c9de907b49ee3ac8eefcd4b0ea2d5eb81977a0ddffc6fffb6
      • Instruction ID: 3f2675d588d61dd038e10bc18534aa32838b916b8999a80aa44e6791fb7a6b93
      • Opcode Fuzzy Hash: 1ea4db82b412b75c9de907b49ee3ac8eefcd4b0ea2d5eb81977a0ddffc6fffb6
      • Instruction Fuzzy Hash: D641C33261464082EF6AAB3B95453EC37A0F71A7D9F244209FB6587AF1CB34CDA2C744
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$DecodePointer
      • String ID:
      • API String ID: 2310398763-0
      • Opcode ID: 3dcc761ff564583c199fd068860ce15a7d52153dbe00409bb36a5fa7116df214
      • Instruction ID: 385e42fe4cf7dbdb6a54aafa8dd506544a7ab6723db228a925bc07ac99aefb83
      • Opcode Fuzzy Hash: 3dcc761ff564583c199fd068860ce15a7d52153dbe00409bb36a5fa7116df214
      • Instruction Fuzzy Hash: 6211E93271435142F7769B7B64467AE6291A78E3D4F548724BF648BEE6CF7EC8004701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno_flush
      • String ID:
      • API String ID: 265556107-0
      • Opcode ID: 78c99182a1f79d19b8870b959cf4b8d8dd69381126424cc61e988b93b6ec15e6
      • Instruction ID: 4a30f460cf97c3d1416e86257a4ea83377484ca82bef023e4586373a3e500369
      • Opcode Fuzzy Hash: 78c99182a1f79d19b8870b959cf4b8d8dd69381126424cc61e988b93b6ec15e6
      • Instruction Fuzzy Hash: 1111903262065086EB669F6B944439D77A0A74A7E4F280314FF654B7F6CB3FDC418780
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: InvalidateMessageRectSend
      • String ID:
      • API String ID: 909852535-0
      • Opcode ID: 4f7312aabee1e672246cb0c82085769f154d377b1d96116dc4c35eb022b8ed42
      • Instruction ID: d1545f8b05375f5833f8e27446cc24f4d12f5e6aaa66b15d19e3ac7663a4e77a
      • Opcode Fuzzy Hash: 4f7312aabee1e672246cb0c82085769f154d377b1d96116dc4c35eb022b8ed42
      • Instruction Fuzzy Hash: 7B218872615A8086E711CF22D0483DD77A5F749BD4F588235EB680BAA4CB36C991CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: EnvironmentStrings$Free
      • String ID:
      • API String ID: 3328510275-0
      • Opcode ID: 637fe743ecf2fb82bdba797248508440db26461f8ce99dfd80d5ebb66b090bf2
      • Instruction ID: 1aab3a49ea1619e474e6304d29b2fa8e9589afaaecc6d63ccea5a62196c60be7
      • Opcode Fuzzy Hash: 637fe743ecf2fb82bdba797248508440db26461f8ce99dfd80d5ebb66b090bf2
      • Instruction Fuzzy Hash: 6601A232B0468085EE62AFA3A5553E9A2A0E79CFC0F5C4424FB4A07BA5DE38C9818700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessagePeekSleepTimetime
      • String ID:
      • API String ID: 1792118007-0
      • Opcode ID: d73f54b0ceb66d59be4aa1b9168402b02ce0ac72a8ed5856ca7716f65663cb65
      • Instruction ID: 1932635ab849a5eb4f087f2d225e8ec72bbeaf91ada3c3690db192377b6f7bd4
      • Opcode Fuzzy Hash: d73f54b0ceb66d59be4aa1b9168402b02ce0ac72a8ed5856ca7716f65663cb65
      • Instruction Fuzzy Hash: EFF01772604A4086EB49DF27E9853ED63A4EB8CBD4F088435EB0D873A6EE38C4918701
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID: >>>AUTOIT NO CMDEXECUTE<<<
      • API String ID: 0-2684727018
      • Opcode ID: bac6c7a5b23a294c7acf647e231f1c0f101205cebc86f811efcf360bca205a48
      • Instruction ID: b73ee24d656044e0c8aef140d35de5f203c4f502ef1b5f60a1267a2bc71ced1b
      • Opcode Fuzzy Hash: bac6c7a5b23a294c7acf647e231f1c0f101205cebc86f811efcf360bca205a48
      • Instruction Fuzzy Hash: 1BF0307260460590EA22EB12D8413DA5720E7DC3C9FC91012B74D475B6EE38C74AC700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Heap$CreateInformation
      • String ID:
      • API String ID: 1774340351-0
      • Opcode ID: b2a0b9ca492723ce789c5159622cd5e3bbd39229d74136f8385c1c597e4ea285
      • Instruction ID: a0f867c09f61d01611427a8c38bd42a4b29cede9da5dd115139c9d897419512a
      • Opcode Fuzzy Hash: b2a0b9ca492723ce789c5159622cd5e3bbd39229d74136f8385c1c597e4ea285
      • Instruction Fuzzy Hash: 76E086B572AB8083FB9A9F66E8557D562A0F78C380F905429FB49437A4DF3CC145CB00
      APIs
      • malloc.LIBCMT ref: 000000014001FA43
        • Part of subcall function 00000001400196D8: _FF_MSGBANNER.LIBCMT ref: 0000000140019708
        • Part of subcall function 00000001400196D8: HeapAlloc.KERNEL32(?,?,?,0000000140018927,?,?,?,?,?,?,?,0000000140036D1C), ref: 000000014001972D
        • Part of subcall function 00000001400196D8: _errno.LIBCMT ref: 0000000140019751
        • Part of subcall function 00000001400196D8: _errno.LIBCMT ref: 000000014001975C
      • Sleep.KERNEL32(?,?,00000000,0000000140021249,?,?,?,00000001400212F3,?,?,?,?,?,?,00000000,000000014001F7D8), ref: 000000014001FA5A
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$AllocHeapSleepmalloc
      • String ID:
      • API String ID: 496785850-0
      • Opcode ID: a7821407ead68d9ea3c211ec50501fe145c16427b8c5c722b19e7d7a32b8c7b1
      • Instruction ID: 9492e7ce244a3451522088e93057084ae376ead6f0ec43d7023ade897b7b7608
      • Opcode Fuzzy Hash: a7821407ead68d9ea3c211ec50501fe145c16427b8c5c722b19e7d7a32b8c7b1
      • Instruction Fuzzy Hash: 35F02B32300B8486EA12AF17A4403ADB3A0E78CBD0F584224FB9D07775CF3DD8918B01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: EmptyWorking
      • String ID:
      • API String ID: 3204950828-0
      • Opcode ID: 048ac07befcd929308ab0c36a801946155e7bae4014a0889a215a34181f61ec7
      • Instruction ID: a63faee54199a23ff4fe8f4c2fe0c7af5788511d79710898ec8e594c50a29b2c
      • Opcode Fuzzy Hash: 048ac07befcd929308ab0c36a801946155e7bae4014a0889a215a34181f61ec7
      • Instruction Fuzzy Hash: EB41D672710B0485EB22CF5AD448BAE27B9F349B84F564456FB1D1B7A4DB32C882C340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Current_exceptionmallocstd::exception_ptr::_
      • String ID:
      • API String ID: 1204381810-0
      • Opcode ID: a3b722e154be3292eaa0f4fdc3cbd02c44c280d9aeb6f7b5334f4741aff7f0b4
      • Instruction ID: 5d2ee5e7929a344ca8242c2dcfb27c07b85ec29112d17e9d5c8937aa8239a681
      • Opcode Fuzzy Hash: a3b722e154be3292eaa0f4fdc3cbd02c44c280d9aeb6f7b5334f4741aff7f0b4
      • Instruction Fuzzy Hash: 5F416976209B4482EB26DF16E5807A973A4F78CBC0F948525FBAE477B1DB38C591C300
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ByteCharMultiWide
      • String ID:
      • API String ID: 626452242-0
      • Opcode ID: bec6d1c2d1ac35d8f49bb2c5288e4dc94b4bee5f19173fe675a3c40cd65443f6
      • Instruction ID: 143ab65340c81b17b78616c2de51c6afb93fec3230d9fdd256e665550b3b2e29
      • Opcode Fuzzy Hash: bec6d1c2d1ac35d8f49bb2c5288e4dc94b4bee5f19173fe675a3c40cd65443f6
      • Instruction Fuzzy Hash: A331907230468086EB16EB27E5503EE77A0E78C7C4F448126BB998B7A6EE3DC551CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: FreeLibrary
      • String ID:
      • API String ID: 3664257935-0
      • Opcode ID: 8d26a221ecc03a9ee000b90a53d36922f87f5425bf550ec192c1ab350663b684
      • Instruction ID: e47fbe540f204e1cd928d91d0eaa10ba4e7678b491b2f8d3e8dba743bb3374be
      • Opcode Fuzzy Hash: 8d26a221ecc03a9ee000b90a53d36922f87f5425bf550ec192c1ab350663b684
      • Instruction Fuzzy Hash: 8A311A72608A4085EB12EF56F8843DAB7A4FB987D4F900116F78D476B6CB79C554CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DialogMessage
      • String ID:
      • API String ID: 547518314-0
      • Opcode ID: 029d3944e28f3267575acede34f2a783a30d636710457d7abb47ca3efb8210f4
      • Instruction ID: 55690ce585cb748322818670bc53a9b26810db78507a8c2f9330dae96850bd3b
      • Opcode Fuzzy Hash: 029d3944e28f3267575acede34f2a783a30d636710457d7abb47ca3efb8210f4
      • Instruction Fuzzy Hash: 2821F876214A4485EB628F1BE4843AA63A0F78CFC4F585122EF8D87BB8DF39C491C704
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno
      • String ID:
      • API String ID: 2918714741-0
      • Opcode ID: 0559c613b656783db794e5e05771ce0f10963d77abe93043b255c97811960b50
      • Instruction ID: 1079d2687407d2b6bef0f0ea3fd7f0e264d13b75431d778595db5ecd4b3569e8
      • Opcode Fuzzy Hash: 0559c613b656783db794e5e05771ce0f10963d77abe93043b255c97811960b50
      • Instruction Fuzzy Hash: C711CA3171078041E716DB636A013DA6255BB9EFD4F589725BF684BBE6CF3DC1018704
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DecodePointer_errno
      • String ID:
      • API String ID: 3485708101-0
      • Opcode ID: fd9cbafb8d0922ed45c5261aa59b5a9f6218c21d283dcbd40154f41be528ed70
      • Instruction ID: 1b30d8cd9e67e6a059263f280e687f6aa53739700f87796ebe63b1808f1caf75
      • Opcode Fuzzy Hash: fd9cbafb8d0922ed45c5261aa59b5a9f6218c21d283dcbd40154f41be528ed70
      • Instruction Fuzzy Hash: F3F0283230424142FB17973AA81539E6290AB9A3C8F6842247F154B5E2DF3DC9014600
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DecodePointer_errno
      • String ID:
      • API String ID: 3485708101-0
      • Opcode ID: b7dfd3f7ece5d9337327a86fcf9a3e0115000eb747df5ef5c5c90405fc59d354
      • Instruction ID: 864cb8af18e6bcfdeb4753cac76a983eb4ddb11bd422a4d6935331f479d1d644
      • Opcode Fuzzy Hash: b7dfd3f7ece5d9337327a86fcf9a3e0115000eb747df5ef5c5c90405fc59d354
      • Instruction Fuzzy Hash: 14F0E93231038242FB16A77BA8127EE62915B8D3C8F5886347B214B9E3CF39C4404600
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: LongMessagePostWindow
      • String ID:
      • API String ID: 910078001-0
      • Opcode ID: 0c8433a5935dff18d31d6795709d920759a4f2f152c34221ae8141e9ba825dd1
      • Instruction ID: ca3df51cfb2188daa00cd6d688ceff6a3323fba829058fa40166255a5350911c
      • Opcode Fuzzy Hash: 0c8433a5935dff18d31d6795709d920759a4f2f152c34221ae8141e9ba825dd1
      • Instruction Fuzzy Hash: 9AF0A43261460086EB55DF1BE891B9933A0F78CBC4FA05611FB09477B0DA35C4818B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: 0aaf1e5352518af0c6ffda69c2c740a962e0740bdaf37a09b8d93af5e0c88465
      • Instruction ID: c47bf200e8fdda451de7ca043122d79e4c864c74126b3a4ad7db7ad9554aa475
      • Opcode Fuzzy Hash: 0aaf1e5352518af0c6ffda69c2c740a962e0740bdaf37a09b8d93af5e0c88465
      • Instruction Fuzzy Hash: 19F01736214A49D1DA11DF16E4403E9A360F7CCBD8F644412EF8D43735DE39C545C740
      APIs
      • GetForegroundWindow.USER32 ref: 0000000140073654
        • Part of subcall function 0000000140040510: GetWindowLongPtrW.USER32 ref: 000000014004052D
        • Part of subcall function 00000001400651E0: GetCursorPos.USER32 ref: 0000000140065203
        • Part of subcall function 00000001400651E0: ScreenToClient.USER32 ref: 0000000140065227
        • Part of subcall function 00000001400651E0: GetAsyncKeyState.USER32 ref: 0000000140065271
        • Part of subcall function 00000001400651E0: GetAsyncKeyState.USER32 ref: 0000000140065282
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AsyncStateWindow$ClientCursorForegroundLongScreen
      • String ID:
      • API String ID: 4074248120-0
      • Opcode ID: 072b01d94d8832f241fd7af3eead1a629e716a2b93c206b4035d6a4b70e68d12
      • Instruction ID: 5e41be8f200cf26f3956ef383eefe555e63a60c3ef09ef665884e3b9fcebb18b
      • Opcode Fuzzy Hash: 072b01d94d8832f241fd7af3eead1a629e716a2b93c206b4035d6a4b70e68d12
      • Instruction Fuzzy Hash: 23E086B8B0190580ED16B717E8853C51361F75DBD1F904512EA0D473F1EE3CC1958700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSendTimeout
      • String ID:
      • API String ID: 1599653421-0
      • Opcode ID: 168ed53145ff25ecaff81674e3bd08f08a64491d533b66250ee5ab1e501b01bb
      • Instruction ID: 31b42ea49f35d5faa8098192214f2df096d904ad1661da787bdb553ecade8063
      • Opcode Fuzzy Hash: 168ed53145ff25ecaff81674e3bd08f08a64491d533b66250ee5ab1e501b01bb
      • Instruction Fuzzy Hash: 63D0C27271434087EB148B55A805B4A7691F7C8384F840018A64C12B14CB3CC1044F00
      APIs
      • malloc.LIBCMT ref: 0000000140018922
        • Part of subcall function 00000001400196D8: _FF_MSGBANNER.LIBCMT ref: 0000000140019708
        • Part of subcall function 00000001400196D8: HeapAlloc.KERNEL32(?,?,?,0000000140018927,?,?,?,?,?,?,?,0000000140036D1C), ref: 000000014001972D
        • Part of subcall function 00000001400196D8: _errno.LIBCMT ref: 0000000140019751
        • Part of subcall function 00000001400196D8: _errno.LIBCMT ref: 000000014001975C
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$AllocHeapmalloc
      • String ID:
      • API String ID: 3607330408-0
      • Opcode ID: b0c631f6a38bcc50c6db012d53b8eb2045249c382fbf93ffede6e4b9199d3b65
      • Instruction ID: d340f5c00cdc5deab3e4fd7a34be2b5a0cdc158d8f191781a56e2e516e077d60
      • Opcode Fuzzy Hash: b0c631f6a38bcc50c6db012d53b8eb2045249c382fbf93ffede6e4b9199d3b65
      • Instruction Fuzzy Hash: 3D011A70211B0991FA27EF93E8403E42360F75C3C4F981625BB494B6B2DB3DD644CB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseHandle
      • String ID:
      • API String ID: 2962429428-0
      • Opcode ID: 88cc0785623c20493924a8822fc74d35e426a3286e0225bcb30cfbbe54bc341d
      • Instruction ID: 0594ec5f0a5f67fea0409d0ede354871ca7f8482a16632ce181706436068c0e2
      • Opcode Fuzzy Hash: 88cc0785623c20493924a8822fc74d35e426a3286e0225bcb30cfbbe54bc341d
      • Instruction Fuzzy Hash: 88E01AB2509AC086F7A6CF2AF0847DEBBA0E749784F555049E397076A1CF7DE080CB45
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$Global$CreateRect$File$DeleteObject$AdjustAllocClientCloseCopyDesktopDestroyFreeHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
      • String ID: $AutoIt v3$DISPLAY$static
      • API String ID: 2724474984-2373415609
      • Opcode ID: 4164bb3ced22008db81e9afab59b5730aff700940dba59af4b8a7231f0fb7cec
      • Instruction ID: 9a07deec045067fb5251e0d17d065117d76aa677994ae4e41597103bdaa712ca
      • Opcode Fuzzy Hash: 4164bb3ced22008db81e9afab59b5730aff700940dba59af4b8a7231f0fb7cec
      • Instruction Fuzzy Hash: 65226876214A8186EB65DF2AE89479AB7A1F38CBD4F108515EB8E83B74DF38C545CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$ClientScreen$LongStateWindow$CursorMenuPopupTrack$CaptureParentProcRelease
      • String ID: @GUI_DRAGID$F
      • API String ID: 2508893801-4164748364
      • Opcode ID: fb8b783551ecde8b027475f317c8f230ecfadd36f3eefdd4d5709bae92c28627
      • Instruction ID: 728000abf484fce369728cd80490c48e112e1bddd30337868a909b565e8bf383
      • Opcode Fuzzy Hash: fb8b783551ecde8b027475f317c8f230ecfadd36f3eefdd4d5709bae92c28627
      • Instruction Fuzzy Hash: D552AF36205A8586EB61EB2BD4947EE7BA0F78CBD5F504512EB8943BB4DF38C495C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend
      • String ID: %d/%02d/%02d$P
      • API String ID: 3850602802-3070753401
      • Opcode ID: 83ec8c0039ceabca3fa3fced7cfbe2a11b69e96acfd590ea1baf34fe0e8d11d8
      • Instruction ID: 9a738265a87f01508e4a397e5384e8996a40eddf186bb8e49adb9349f7cc23e0
      • Opcode Fuzzy Hash: 83ec8c0039ceabca3fa3fced7cfbe2a11b69e96acfd590ea1baf34fe0e8d11d8
      • Instruction Fuzzy Hash: 2512B37121468186F7A69F26EC947EE67A2F789BC0F604821FB4A57BB5DF3CC4458B00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
      • String ID: 2$7$AutoIt v3$DISPLAY$d$msctls_progress32$static
      • API String ID: 2910397461-2060845292
      • Opcode ID: 26d3fea1d52b4a7fcd0192db161ca5a97e872c640497ce0c67b31f6e66ccafb0
      • Instruction ID: a9fb078eb8271a67efd983614ce63579cbe0e3b67d8b9934631e4a0c1fcbdb85
      • Opcode Fuzzy Hash: 26d3fea1d52b4a7fcd0192db161ca5a97e872c640497ce0c67b31f6e66ccafb0
      • Instruction Fuzzy Hash: 03D13572214B818BEB11CF6AE88479ABBA5F78CBD4F504115EB8A43B74DF38C555CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: __doserrno_errno
      • String ID: U
      • API String ID: 921712934-4171548499
      • Opcode ID: f17c7409fd6f1305ebfd63a193f5a45a4aa281886a54e13cf2b38f3b845c4217
      • Instruction ID: 344956aae6395a7da4bdabf74ac75ef787710043ed1c85488b9f807f7862f7f8
      • Opcode Fuzzy Hash: f17c7409fd6f1305ebfd63a193f5a45a4aa281886a54e13cf2b38f3b845c4217
      • Instruction Fuzzy Hash: 9912F63221464186EB22AF26E4487EAB7A0F38CBD5F54411AFB8947BB5DF3DC845CB14
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
      • String ID: ($@$tooltips_class32
      • API String ID: 698492251-1054245302
      • Opcode ID: 4c70c4e12b495085e41502f1786a27a74d19ebfa89eb0387848b2412a9fdd613
      • Instruction ID: 3491717d3a2c8f742b1b4c88d725ba758e1f9dddadc39780648a4ce3520af55b
      • Opcode Fuzzy Hash: 4c70c4e12b495085e41502f1786a27a74d19ebfa89eb0387848b2412a9fdd613
      • Instruction Fuzzy Hash: 11C17F762046808AEB61DF2AE8547DE77A1F788BC9F544425EF8E47B69DF38C485CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
      • String ID:
      • API String ID: 3222323430-0
      • Opcode ID: c0b507db708e8bfe58f69cea012c595d023c63e578772427b80ccb776e854293
      • Instruction ID: 83198519a7593672fd1552ce02ddf1168a3ffc2b0b48ef5ac63973d95b08d745
      • Opcode Fuzzy Hash: c0b507db708e8bfe58f69cea012c595d023c63e578772427b80ccb776e854293
      • Instruction Fuzzy Hash: BC615E31301A8082EA62EB67E8543ED6362F78DBC0F954021FB4A477B5DE7DC98AC741
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: String$free$ByteCharMultiWidemalloc$ErrorLast
      • String ID:
      • API String ID: 1837315383-0
      • Opcode ID: d88c174ac1e0c241e79c1e5b8991af1bcb444650aad98657097e2e292d47a38c
      • Instruction ID: 17c2fe67eefb499ba7c5ced4fd26a23ff4c78a7f5379d8effcef1fbf33a2ec25
      • Opcode Fuzzy Hash: d88c174ac1e0c241e79c1e5b8991af1bcb444650aad98657097e2e292d47a38c
      • Instruction Fuzzy Hash: 3DF16D722046808AEB668F26E440BD977A1F78CBE8F544619FB5E57BE8DB38CD418700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: File$Find$CloseDeleteMove$AttributesCopyFirstFullNameNextPathlstrcmpi
      • String ID: \*.*
      • API String ID: 1271585379-1173974218
      • Opcode ID: 9ccba4b190a0a9418007bc64a1ff9cdc7fa516cb3593b1daee45a707a26bc91d
      • Instruction ID: 60f53d042695af30dc5a83cacec9bebaa5fc9e4c5896a4dda348cd04f90f769b
      • Opcode Fuzzy Hash: 9ccba4b190a0a9418007bc64a1ff9cdc7fa516cb3593b1daee45a707a26bc91d
      • Instruction Fuzzy Hash: 03613132214A8691EA32DF16E8403DA7361F7897C4FD05113F78A43AE9EF7AC649C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
      • String ID: *.*
      • API String ID: 1409584000-438819550
      • Opcode ID: 2b3c2fda741ad657fea1ada4a1caaf361a53db8617e5c9f0b3ee51964182b341
      • Instruction ID: e3bdafcf43c987d8ceab023587c442a3ab70332120cd08991579e36b5cb38a19
      • Opcode Fuzzy Hash: 2b3c2fda741ad657fea1ada4a1caaf361a53db8617e5c9f0b3ee51964182b341
      • Instruction Fuzzy Hash: B8419031204A4196EB629F57E9883E963A1F7CD7E4F908221FB69836F4DF78C549C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessagePostkeybd_event$KeyboardState$Parent
      • String ID:
      • API String ID: 2502892551-0
      • Opcode ID: 87990029baa16f46f895555645904e6ef62e0f7e2816204bd0308b9074fc9f9c
      • Instruction ID: eccad09f2804820fea9e6f77cdbb516ee1ec3f01ff4c75237f50407c0cc0d23a
      • Opcode Fuzzy Hash: 87990029baa16f46f895555645904e6ef62e0f7e2816204bd0308b9074fc9f9c
      • Instruction Fuzzy Hash: 095106362156A003F3669B6BA5647EA2BE0F78EBC5F081515EF890BFA1CB3AC515C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
      • String ID:
      • API String ID: 1441871840-0
      • Opcode ID: 97476830ca048d85e6150dd51ddafd595b1babfbbdda98b9ba8997652faeab80
      • Instruction ID: 1e41386b4f35843d74280deceda672538b1dcba4a13c970fd01b7f0cf74be108
      • Opcode Fuzzy Hash: 97476830ca048d85e6150dd51ddafd595b1babfbbdda98b9ba8997652faeab80
      • Instruction Fuzzy Hash: A0919A7221868086E76ACF27E4547DD77A1F78CBC8F598121EB4A57AB8CB3CC505CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
      • String ID: *.*
      • API String ID: 2640511053-438819550
      • Opcode ID: c10d5695760d4316301d53df43b98dc4a8203f5a2bc72a644b238d45ec82efa0
      • Instruction ID: c83abfe67e304a4f1c3c34daf9a82ba4ed2682e82bcffad49aebdfae7086c7d4
      • Opcode Fuzzy Hash: c10d5695760d4316301d53df43b98dc4a8203f5a2bc72a644b238d45ec82efa0
      • Instruction Fuzzy Hash: 2241B231204A8191EF62DB1BE8983E96360FB8E7E4F904211FBA9476F4EF79C549C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove
      • String ID: :$\$\??\%s
      • API String ID: 3827137101-3457252023
      • Opcode ID: b9189f52fba38b033c1dcae1586af9e704a13d9f9ae581a494e12a6ffc91abbd
      • Instruction ID: 168f88fefd50a2a91d0fd5a19ef0b0fce76bf4e6b4bc6b3ea27d9cfceac2beb1
      • Opcode Fuzzy Hash: b9189f52fba38b033c1dcae1586af9e704a13d9f9ae581a494e12a6ffc91abbd
      • Instruction Fuzzy Hash: 2C41AB72218A9192EB32EF56F4447DEB360F7C87E4F414121FB9A43AA8CB79C645CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
      • String ID: SeShutdownPrivilege
      • API String ID: 107509674-3733053543
      • Opcode ID: 83a8fdc66c4410dae4e994ec0a2bd467059dbb7e7eb05512e5a65c2837b9644c
      • Instruction ID: 1d905c15c0cc8f9c49d134815bd0d3c676fab69afd38fe862b0be8432ebae03d
      • Opcode Fuzzy Hash: 83a8fdc66c4410dae4e994ec0a2bd467059dbb7e7eb05512e5a65c2837b9644c
      • Instruction Fuzzy Hash: DA216B72604B8186F7658F26B84539EB661F7CC784F455139FB8A43A79CF38C855CB04
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DecodePointer$write_multi_char$_errno_getptdfreewrite_char
      • String ID:
      • API String ID: 2334620807-0
      • Opcode ID: 8d1fc7f7eeba17d4e0c74e89ff9a7773f0a651cbf0944b72ceed6a89af073d38
      • Instruction ID: 45441668a0f4ed6bd227ec28e93b682d63a1fdcbcfeb111eb32bee8b1856874d
      • Opcode Fuzzy Hash: 8d1fc7f7eeba17d4e0c74e89ff9a7773f0a651cbf0944b72ceed6a89af073d38
      • Instruction Fuzzy Hash: 5452E33260868496FB728B96A4443FEB7A1F38D7C4F64491AFB4647AF4DA79CC50CB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$LongWindow
      • String ID:
      • API String ID: 312131281-0
      • Opcode ID: a1973251a1d02200d454ba11cf3710c729313f9f4d6683454e6198d4a99f3f60
      • Instruction ID: 0b54b48463d540c9bcd3c871880528857b67946493941cf9cd743ae1c26a840e
      • Opcode Fuzzy Hash: a1973251a1d02200d454ba11cf3710c729313f9f4d6683454e6198d4a99f3f60
      • Instruction Fuzzy Hash: B5818D76218A9582EB21DF2AE4547DA77A0F38CBD4F545112EB8E43BB4DF39C186CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
      • String ID:
      • API String ID: 1737998785-0
      • Opcode ID: 2d9620d7a1f9600c1f943dc23f7b52697a908126bcf2c7b69e39ec8e54a36836
      • Instruction ID: a3bf94ab97966422eb3e7d7050bc60e1dfd6716e5ed9f526cb4ee92d7871b0cf
      • Opcode Fuzzy Hash: 2d9620d7a1f9600c1f943dc23f7b52697a908126bcf2c7b69e39ec8e54a36836
      • Instruction Fuzzy Hash: F1314A32201A4082EB16EF56E8943AA7361EB8DBC4F548425FB4A47775DF3CC5558700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Variant$Time$ClearCopyInitSystem_errnomalloc
      • String ID: %4d%02d%02d%02d%02d%02d
      • API String ID: 3599330277-1568723262
      • Opcode ID: ea57b427a0f3ba8e31a92368419fa9da8deae008e67d67246e1143834a07e872
      • Instruction ID: 3c1173a99c85122bd8f0265e9e1e2618921fd9b3200f0e4c6f231ef978342b47
      • Opcode Fuzzy Hash: ea57b427a0f3ba8e31a92368419fa9da8deae008e67d67246e1143834a07e872
      • Instruction Fuzzy Hash: A8C1CF7720464085EB6A9F2BD0A43BE67A0F74DBC4F59A525F74A077B4CB39CA91C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID: Conversion of parameters failed$NULL Pointer assignment$Not an Object type
      • API String ID: 0-4206948668
      • Opcode ID: f584ac4ca2a0e1b0148c23b100fee310bf220beaa87864a855338b94f0c77a26
      • Instruction ID: bed83e1766132342390a0766ba1cc7770a65e17ae49490f06df4ef4954a42e27
      • Opcode Fuzzy Hash: f584ac4ca2a0e1b0148c23b100fee310bf220beaa87864a855338b94f0c77a26
      • Instruction Fuzzy Hash: 7BB1A132204B848AEA629F26E4407DEB7A1F78CBC4F944125FB8D57BA9DF78C545CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CreateInitializeInstance$BlanketFromProgProxySecurity
      • String ID: NULL Pointer assignment
      • API String ID: 628432406-2785691316
      • Opcode ID: 8675240a9f6ff99cc91903516df774b57535dff84b71b0788354e51fdd1d736b
      • Instruction ID: 77f78eda5953086dea4007cd99e066c6ed21df11dd3fff5dd3e7f21170204004
      • Opcode Fuzzy Hash: 8675240a9f6ff99cc91903516df774b57535dff84b71b0788354e51fdd1d736b
      • Instruction Fuzzy Hash: F0D10672208BC086DB72DB26E4907DAB7A5F7C8784F804516EB8D47BA9DF78C549CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Current_exceptionstd::exception_ptr::_$ClearVariant
      • String ID:
      • API String ID: 332225251-0
      • Opcode ID: d39f7079953ed73137c99f63ee4a730f8bf910d5797d4d98d59e3f828d78e890
      • Instruction ID: 31b36d0ee1cd6e2fdac15967972bb73727a1ce56cc4b574e7682adb4e99c1632
      • Opcode Fuzzy Hash: d39f7079953ed73137c99f63ee4a730f8bf910d5797d4d98d59e3f828d78e890
      • Instruction Fuzzy Hash: B6127D7221964086FA77EA27E0947EA63A4FB8D7C4F548212FB4E47AB6DF38C551C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Directory$CurrentSystem$CloseErrorHandleLast
      • String ID:
      • API String ID: 1985256609-0
      • Opcode ID: 47d9be43964a578d249049df4b48fedb74f1beacf1253f88fe9b99816a1b2d0c
      • Instruction ID: a2fd946ae09bf3b2a4bcbbf7acbf9a895d0dc1e7509cb58d6e0bfa829d598841
      • Opcode Fuzzy Hash: 47d9be43964a578d249049df4b48fedb74f1beacf1253f88fe9b99816a1b2d0c
      • Instruction Fuzzy Hash: 7DE16932204A8081EB62DF26E8513EAA7A2F7C8BD4F544525BF5E8B7B9DF39C441C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno
      • String ID:
      • API String ID: 2918714741-0
      • Opcode ID: 9ac473dd6cfae0c9c89445d0aebe92cf218283cc05050fb9e0b06e4c54391f23
      • Instruction ID: d1997ccd25930f81d8eba2ee0339f2e149a22da6f79c3c7fc9c7d66c6d64b71a
      • Opcode Fuzzy Hash: 9ac473dd6cfae0c9c89445d0aebe92cf218283cc05050fb9e0b06e4c54391f23
      • Instruction Fuzzy Hash: AD91863220478086EB728F16A4543AEB7A5F789BE4F544219FB9913AF5DB38CD91CB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
      • String ID:
      • API String ID: 3778485334-0
      • Opcode ID: 0edd64cb9803f967ed20c10d554a4ab3018a42dcfe59f888d84efd305078bda4
      • Instruction ID: 0be52a74e45efd92516ea653374d142cb38f9b34e4de997e897f2686a4c8d230
      • Opcode Fuzzy Hash: 0edd64cb9803f967ed20c10d554a4ab3018a42dcfe59f888d84efd305078bda4
      • Instruction Fuzzy Hash: 45319B35619F8485EB529F96F8843AAA3B0F7887D4F50412AEB8D437B5DF78C4888B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ArraySafe$AccessDataVartype
      • String ID:
      • API String ID: 2857666278-0
      • Opcode ID: 52da563559987975dee47a06117f09e78d210d128d70aa0a6aef6731d9853c29
      • Instruction ID: a117c610dd53d33a9ddc6f80a655bfab3c4d1394f6afb0c6553209ab6173fdef
      • Opcode Fuzzy Hash: 52da563559987975dee47a06117f09e78d210d128d70aa0a6aef6731d9853c29
      • Instruction Fuzzy Hash: 23C16972254A8485EA729F1AE4843EE63A0F789BC0F489016EF8A977B5EF3CC541D341
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID: $<$ACCEPT$DEFINE$Q\E
      • API String ID: 0-145152736
      • Opcode ID: e132bef0ef3c5424f6fe1ad17daea4119c725b16ba450fa61eb5e5efe2164c90
      • Instruction ID: b4984b04a6a9c59961c9224db4e543a364cf715332857e1a42d4ec3edc3f3c89
      • Opcode Fuzzy Hash: e132bef0ef3c5424f6fe1ad17daea4119c725b16ba450fa61eb5e5efe2164c90
      • Instruction Fuzzy Hash: CF7337736086C08AE7768F2A94443EE7BA1F3997C4F148126EBC647BE5DB39C645CB01
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Scan$_errnomalloc
      • String ID: 0%d$down$off
      • API String ID: 3798907516-2112978555
      • Opcode ID: 488ae4b5e363461bb05f2cc412ff2a7621869acfb6911dde2822c9e1b9d95277
      • Instruction ID: 8f1b1c42d7d896cb0926072b77a0264a2641ebf823565fb2609156f79882e737
      • Opcode Fuzzy Hash: 488ae4b5e363461bb05f2cc412ff2a7621869acfb6911dde2822c9e1b9d95277
      • Instruction Fuzzy Hash: 00E1FF33608A4086FBE69A2795643FF27A1F79E7C0F644014FB4647AB5D739CA819B30
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
      • String ID:
      • API String ID: 1413079979-0
      • Opcode ID: 4efd150af4fcc6165874354a59a684fb7bb068e96685822a85695c70c20cb91e
      • Instruction ID: 43e01d2fefbd4e02f726d46d6805291d15aad5a261fd9c5e73c47040ea6f4b8f
      • Opcode Fuzzy Hash: 4efd150af4fcc6165874354a59a684fb7bb068e96685822a85695c70c20cb91e
      • Instruction Fuzzy Hash: 60316D36208B8486EB25CF16F884B9AB7A5F389BC4F55412AEF8E03724CF79D445CB44
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$DecodePointer_getptd
      • String ID: 0$gfffffff
      • API String ID: 2834218312-1804767287
      • Opcode ID: 11d2aafb110474071d65bda3aeb66691b4083431d6af9e6945a9040631012abc
      • Instruction ID: 1db39ee2ea22e20f4bbf01101a9610a850cc18e5768466d638ba6e9e5b684f41
      • Opcode Fuzzy Hash: 11d2aafb110474071d65bda3aeb66691b4083431d6af9e6945a9040631012abc
      • Instruction Fuzzy Hash: 76B176737483C887EB628B2AD1453DE7BA5E35A7D0F14822AEB59077E2C639CD55C300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$_isindst$DecodePointer__tzset_lock
      • String ID:
      • API String ID: 2552603377-0
      • Opcode ID: a907c764126602912269a7c16c51cea8aaca26e279e9b4d3d170b7dba2b29a45
      • Instruction ID: b063e019e09990f54e9e510d060844243672fb21ae2c3c70fdfdc30c1d9110c4
      • Opcode Fuzzy Hash: a907c764126602912269a7c16c51cea8aaca26e279e9b4d3d170b7dba2b29a45
      • Instruction Fuzzy Hash: E09107B271078547EB699F2AD4557DE6391E798BC4F448029FB098FBAAEF39D4008B00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ErrorLastinet_addrsocket
      • String ID:
      • API String ID: 4170576061-0
      • Opcode ID: 2270592e0769112adcaa9e0d64b514f0eb624ed0efa7f1f328d3b725ef109f78
      • Instruction ID: 1e4f372375d7632594186546d1d97a0e0249e8c37cc50fbfc227e61ec6c2bc36
      • Opcode Fuzzy Hash: 2270592e0769112adcaa9e0d64b514f0eb624ed0efa7f1f328d3b725ef109f78
      • Instruction Fuzzy Hash: 6A41BB7270065481FB26EF23B4117DEA790ABCEFE4F548125BF5A4BBA6DE39C1428740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$DecodePointer
      • String ID:
      • API String ID: 2310398763-0
      • Opcode ID: 223d288d6453d3bcef00a4f156df2324be7601a1fcb9cb7c5a84cfe808a29b69
      • Instruction ID: 48f94bc99277f4e48fca9e4abc63ca98034a17e9907a2b4cb2bfd7a3cf052559
      • Opcode Fuzzy Hash: 223d288d6453d3bcef00a4f156df2324be7601a1fcb9cb7c5a84cfe808a29b69
      • Instruction Fuzzy Hash: A931F23271079042FB779B2B99497EE2651A78D7E8F588219FB650BAF6CF398841C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize
      • String ID: .lnk
      • API String ID: 948891078-24824748
      • Opcode ID: d33bfedf85814bfc54947c057ae94d277d37b32c53f1785abbc3c88ecefe74d9
      • Instruction ID: 5d5295c153d4da8834381fef148356006c8c823467d9188f8cb12cd372430268
      • Opcode Fuzzy Hash: d33bfedf85814bfc54947c057ae94d277d37b32c53f1785abbc3c88ecefe74d9
      • Instruction Fuzzy Hash: B6814972304A8181EB61DF2BE480B9AA761F7CABC4F409025EF8E47B69DF39C545CB40
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
      • API String ID: 0-2761157908
      • Opcode ID: dfa32b0492a28e09866f285dfcbd811647c6c70afdbae71a1a0aca6a9e6dcafe
      • Instruction ID: 0137ca25ace397149a54434f3ef70bca9d625660b96616786ed6c7501a6fa7a8
      • Opcode Fuzzy Hash: dfa32b0492a28e09866f285dfcbd811647c6c70afdbae71a1a0aca6a9e6dcafe
      • Instruction Fuzzy Hash: 4A62DC736186808BE7268B2AE000BEFBBA1F3DC784F649115FB8547AA5D739D951CF00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$__tzset
      • String ID:
      • API String ID: 3587134695-0
      • Opcode ID: b8669ab790a7489438d76ea71914e87339b07bd7b818acfd001e614849f9c930
      • Instruction ID: 3dde3b42be37450d324be9c7c0fc5e0626ffee4be073d2862e01163e7960b1aa
      • Opcode Fuzzy Hash: b8669ab790a7489438d76ea71914e87339b07bd7b818acfd001e614849f9c930
      • Instruction Fuzzy Hash: 38027632604680CBE76A8F2A94943AD67A1F38E7C5F64402EFB4597AA5CF3CCD85C701
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID: ERCP$VUUU$VUUU
      • API String ID: 0-1497356910
      • Opcode ID: 23f32585640f6bdbca2bb1b87279304e821237ea24ceb413dad428f557531016
      • Instruction ID: 815bd5003afa6549cf51d5a104bf9302ddf182174b94146b2760b696d194661f
      • Opcode Fuzzy Hash: 23f32585640f6bdbca2bb1b87279304e821237ea24ceb413dad428f557531016
      • Instruction Fuzzy Hash: 6082A0326086C48AEB76CB16B4447EEB7A1F38C780F144516EBD957BE5CB3AC881DB05
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ErrorMode$DiskFreeSpace
      • String ID:
      • API String ID: 1682464887-0
      • Opcode ID: 836ccb428d910adbde194fcbbd43551357310cca536aecad202f2d1d1e5be410
      • Instruction ID: 28b5aaf803d62b1642e337d033da22690c0dd21f7916b4f9792381e66bc6dc32
      • Opcode Fuzzy Hash: 836ccb428d910adbde194fcbbd43551357310cca536aecad202f2d1d1e5be410
      • Instruction Fuzzy Hash: B7313E72214A8582EB22DF26E4903AA7761F7C9BC8F408111FB8E47765DF38C5858700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: FileFind$AttributesCloseFirst
      • String ID:
      • API String ID: 48322524-0
      • Opcode ID: b22fb3a0715a1b586880db200e7c4ecdb464e4809298c77d28514c127117049a
      • Instruction ID: 42d94005bf4b416bfa79af7483b44afea1702d3469b5b780ec6f1b05c70ad234
      • Opcode Fuzzy Hash: b22fb3a0715a1b586880db200e7c4ecdb464e4809298c77d28514c127117049a
      • Instruction Fuzzy Hash: 59E0BFB0618600C2EE316B3AB8543D822507B9D7B5F545720F7BA472F0CB7CC5988604
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ExceptionRaise_clrfp
      • String ID:
      • API String ID: 15204871-0
      • Opcode ID: 2a40c51cb1579722dc7df1c521bd34491652beacd861a46ab227877f68ac8fa1
      • Instruction ID: 6e15391c603a1ffd5358fe07f9314664514806321338544215f293f6231594e9
      • Opcode Fuzzy Hash: 2a40c51cb1579722dc7df1c521bd34491652beacd861a46ab227877f68ac8fa1
      • Instruction Fuzzy Hash: BAB16E37625B9487EB66CF1AD48575DB7A0F388B84F159119EF9A83BB4CB39C841CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: FileRead_errno
      • String ID:
      • API String ID: 971700318-0
      • Opcode ID: c883b80902826961c5d125593e4b6357055a996dcc543b3efd54b394aca33ec5
      • Instruction ID: a4f62e1cd98f9a97718b67e20b5d94854c25c4d3d35b7f141f0e0baf6614c63e
      • Opcode Fuzzy Hash: c883b80902826961c5d125593e4b6357055a996dcc543b3efd54b394aca33ec5
      • Instruction Fuzzy Hash: D081CE32600A849AEB638B26D4443ED67A4F74DBD8F4D4215FB590BBF5DB3AC985C300
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno
      • String ID: !$tan
      • API String ID: 2918714741-2428968949
      • Opcode ID: 3a4a8475762da512f022ce441af65110c61280ed671eef4d25333cd6132d5139
      • Instruction ID: ba6f11c9e90cfa9ad0ebb96e026d68206a266dd9814c336f314e053b0940baba
      • Opcode Fuzzy Hash: 3a4a8475762da512f022ce441af65110c61280ed671eef4d25333cd6132d5139
      • Instruction Fuzzy Hash: 9761C872A25F8445E673873694213EBB354AF9B3C4F109317BA1A3BEB5EB7D80834640
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DecodePointer_errno
      • String ID:
      • API String ID: 3485708101-0
      • Opcode ID: b70b674c3cf58c22f7521cd20d7ea11672699ad0505f36fe9fad595bc84a2a24
      • Instruction ID: b68cfd5ab9dd470911173b7748abd515f73a33220fc0ab138d132efbf35fb5ad
      • Opcode Fuzzy Hash: b70b674c3cf58c22f7521cd20d7ea11672699ad0505f36fe9fad595bc84a2a24
      • Instruction Fuzzy Hash: 9442F77261468186EB769F1AD0547EDB7A1F3987C4F50402EFB8A87BE4D639CD84CB02
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: LocalTime
      • String ID:
      • API String ID: 481472006-0
      • Opcode ID: f37e49baa16edcc26122d7ddff3ae8b80091bfeeb62e663d5795443f883994e1
      • Instruction ID: 71c78ca8aa94e74fe30bf786358e4e671d58f4b2ee1f09ef7e496bdcb8d3609a
      • Opcode Fuzzy Hash: f37e49baa16edcc26122d7ddff3ae8b80091bfeeb62e663d5795443f883994e1
      • Instruction Fuzzy Hash: 30417236744A8591EE26EB13E5543DAA360FB8CBC4F844125BF8D477AADB3DC254C708
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: LogonUser
      • String ID:
      • API String ID: 1244722697-0
      • Opcode ID: ca517a55a53e5f5c0d00dc69f7a769235eb728fc389f8271b571ba05147067d7
      • Instruction ID: 1132f4d812c70ba4fc28cf18a7c27a160c68799d564b2776f79a4b0d41c9e22d
      • Opcode Fuzzy Hash: ca517a55a53e5f5c0d00dc69f7a769235eb728fc389f8271b571ba05147067d7
      • Instruction Fuzzy Hash: AAE04872718B84C7D7218F6AF48195EAB71F398BC0F558128DF8947B25CA3CC4558B04
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: mouse_event
      • String ID:
      • API String ID: 2434400541-0
      • Opcode ID: 90168ee3d23eaeb68812dc389ecee54c8a8ddc9662ce14ac61a32bd3074fd40b
      • Instruction ID: b06a0c4948945cdf410f08d12445690765f154c64223f6d0a98a5ce11edf7344
      • Opcode Fuzzy Hash: 90168ee3d23eaeb68812dc389ecee54c8a8ddc9662ce14ac61a32bd3074fd40b
      • Instruction Fuzzy Hash: C8E04FF5A0415043F37B9A3A412ABF92642F3993C0E500103AB8607AF4CA3F96069E05
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: BlockInput
      • String ID:
      • API String ID: 3456056419-0
      • Opcode ID: e3da47e5aa1b32c8bbf1f991a9063b6a518a10cedb0f93747e6b42c6b5a63616
      • Instruction ID: ec527bf5383cc17415bbd01df3bab4f6376454716b75b8677411075afdce43b1
      • Opcode Fuzzy Hash: e3da47e5aa1b32c8bbf1f991a9063b6a518a10cedb0f93747e6b42c6b5a63616
      • Instruction Fuzzy Hash: 33E0127231464086EB05AF73E8853EE62A1F79DBD4F648425EF09873A5DE7DC8D18740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: afac7ca2b74bb08783c202bc80f1dbccd365a93ea7932a0dc6ff2265d64bb439
      • Instruction ID: ea8984486ffcbc6e0584c4fe155b0227ad7a4c4ca994d85898d8c236bd6eb803
      • Opcode Fuzzy Hash: afac7ca2b74bb08783c202bc80f1dbccd365a93ea7932a0dc6ff2265d64bb439
      • Instruction Fuzzy Hash: CFB01230B11401C2D605AF23EC853C012E0BB9C780FC00410D20982170DF3C85DBC700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: NameUser
      • String ID:
      • API String ID: 2645101109-0
      • Opcode ID: 8a372c67c34c1ec0e9cc2de623fcfd51be1c908f996fb882675f869ced6579ff
      • Instruction ID: 79bc9243047b91ba7f7cafed6c5824dd10d5a88b946d46949f86e537ec4ebb0e
      • Opcode Fuzzy Hash: 8a372c67c34c1ec0e9cc2de623fcfd51be1c908f996fb882675f869ced6579ff
      • Instruction Fuzzy Hash: FCC04C7610AAC59DE6718F55E4943DD6721F7CC394F500401D7D903968DF79C198DB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: HeapProcess
      • String ID:
      • API String ID: 54951025-0
      • Opcode ID: e5385ec19c3a2cba794ab328dbe0ff0c319d51f9ad28f467202138c632d0aad2
      • Instruction ID: e90dfcca73008405aa1caa4e6229fc93e2f4ed6fa05f56948e4e427e63f50343
      • Opcode Fuzzy Hash: e5385ec19c3a2cba794ab328dbe0ff0c319d51f9ad28f467202138c632d0aad2
      • Instruction Fuzzy Hash: D4C02BF1B00604C2FB9907A36C403942250F31CBC0F0400348F4C43330EC3C44C58700
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 99f828bc40b5398699b5dac1f15cb713f5ac5233867f3831ab85df54c9431331
      • Instruction ID: 55e6a3936c9fb0e7e0e59bc141d59d4b4a5ab0dec4814c3e921efc377099d06c
      • Opcode Fuzzy Hash: 99f828bc40b5398699b5dac1f15cb713f5ac5233867f3831ab85df54c9431331
      • Instruction Fuzzy Hash: 0412A577B785104BD71DCB15E892FA97762F394348749A12CAA17D3F44DA3DEE0ACA00
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 55705531d0ee532db521d7b08bb3bca8dba651e06498e101943d2e186d081604
      • Instruction ID: aeeeb06cc52a51097d68356f1ab4f62a37449a484aa420c863cc736487f95c1c
      • Opcode Fuzzy Hash: 55705531d0ee532db521d7b08bb3bca8dba651e06498e101943d2e186d081604
      • Instruction Fuzzy Hash: 1EE1CD72304A9081EA62EF57E4407EE6760F7C8FC4F585016BF8E47BAAEE39C2448740
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dcecbd32ae9dfa729b1b32a03bbcef956e3de2a7295d5f9e5a521d68dfcbd5ac
      • Instruction ID: 87deab0650f1699d25ef43cfeb71b8a02b33364d1ae54613cbe8dc82fbe62e60
      • Opcode Fuzzy Hash: dcecbd32ae9dfa729b1b32a03bbcef956e3de2a7295d5f9e5a521d68dfcbd5ac
      • Instruction Fuzzy Hash: 30D1AE36209680C6E777DF16E4803EE77A1F7A9780F608115EB894BAF5DB35D8A5CB00
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8c97ef46e4fad3aed5ca7a11ed7e22cedefedf99ea94c187844a7f10a0a0c2eb
      • Instruction ID: 61c8e06a163a9ea62fc43dd353b68e354340dada47a5e3fb0f52e27ad096e322
      • Opcode Fuzzy Hash: 8c97ef46e4fad3aed5ca7a11ed7e22cedefedf99ea94c187844a7f10a0a0c2eb
      • Instruction Fuzzy Hash: 6F710572B105454BD35ECB2AF95179876D6E3EC384F589139FB46CBBA4EA38DE008B40
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Time$FileSystem
      • String ID:
      • API String ID: 2086374402-0
      • Opcode ID: d2eb03a09a7bc0f4583daaabbec813682186745dd4bd52cef1f99c1a63f074a0
      • Instruction ID: 2c6d24f5e209d13f1d28db5efbe12cf23ab4403b37b94f56d3dd9fd447af0078
      • Opcode Fuzzy Hash: d2eb03a09a7bc0f4583daaabbec813682186745dd4bd52cef1f99c1a63f074a0
      • Instruction Fuzzy Hash: 3421753262450087FB1ACF37D851BD933B2B389784F44D625D7148B2ACCA3D950ACB55
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: free$ErrorFreeHeapLast_errno
      • String ID:
      • API String ID: 1012874770-0
      • Opcode ID: 42a96f78dc716fe5779456e715ab2e43969e285b09ec4b61905bfc54cb7853cc
      • Instruction ID: 8b07a4fb9cb08d1988debfe545e87c9ef13ca11ef38d27fcb17d9a55d46193e4
      • Opcode Fuzzy Hash: 42a96f78dc716fe5779456e715ab2e43969e285b09ec4b61905bfc54cb7853cc
      • Instruction Fuzzy Hash: CA41753272169081EB46BB3BC8953EC1320EB8ABC4F446131BB5E6F1BBCE21C8458351
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Color$Rect$Object$BrushInflateSelectTextWindow$CreateLongMessageSend$DeleteFillFrameRoundSolid
      • String ID:
      • API String ID: 3770480883-0
      • Opcode ID: b0d59566f75106652b162f574297c1ccc04d8aa480e14e0ec6e20a47ba6d7074
      • Instruction ID: b4f55efcc31009650635bf21e42473b1c08e8354483bf8c30f1bfdeaf81c1d0e
      • Opcode Fuzzy Hash: b0d59566f75106652b162f574297c1ccc04d8aa480e14e0ec6e20a47ba6d7074
      • Instruction Fuzzy Hash: 29915A36604A4083EB559F2BA8547EA6361F78DBE4F105215FFA643BA4DF39C949CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
      • String ID:
      • API String ID: 1996641542-0
      • Opcode ID: 49c7e73648f56c4760cd3afc6aef802a9b66124aeccb1c7a71057b73f80d5418
      • Instruction ID: 1f7023d95b14da9762c9d516a7de3f42be2159b8597aa391ada59dc55928c0ef
      • Opcode Fuzzy Hash: 49c7e73648f56c4760cd3afc6aef802a9b66124aeccb1c7a71057b73f80d5418
      • Instruction Fuzzy Hash: 9B611E36604A8186E7159F6BA8547AAB761F78DBE1F104225FF6A47BB4DF38C448CB00
      APIs
      • LoadLibraryA.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C845
      • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C861
      • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C889
      • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C892
      • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C8A8
      • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C8B1
      • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C8C7
      • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C8D0
      • GetProcAddress.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C8EE
      • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C8F7
      • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C929
      • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C938
      • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C990
      • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C9B0
      • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000001,000000014002101C,?,?,?,?,?,00000001400210B0), ref: 000000014002C9C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Pointer$AddressDecodeProc$Encode$LibraryLoad
      • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
      • API String ID: 3085332118-232180764
      • Opcode ID: 008f0fb7fb83f3bdab71711707e0b8838f82ef197697a8ccf7576a84de9a8603
      • Instruction ID: 450cac106e5625e47963f4c73d1d8f3d61c13b8cd9b5e6c3b4483d4420a2949a
      • Opcode Fuzzy Hash: 008f0fb7fb83f3bdab71711707e0b8838f82ef197697a8ccf7576a84de9a8603
      • Instruction Fuzzy Hash: E3513B35622B4090FD57EBA7A858BE462A06B4DBC4F58012EBF5E477B1EE78C981C210
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$EnumForegroundWindows$ChildDesktop
      • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
      • API String ID: 4293069593-1919597938
      • Opcode ID: 75b20e50fca3194b3f26a5036842e17986b2b4af5fc0d430136fb0d6078e4b1b
      • Instruction ID: 320ba1e08cad423b6b41b4fe4a1633144b2c2f51f48788708767cc447f72c694
      • Opcode Fuzzy Hash: 75b20e50fca3194b3f26a5036842e17986b2b4af5fc0d430136fb0d6078e4b1b
      • Instruction Fuzzy Hash: 82F16D72204A8592EA62EF27E4403EEB361F7897D4F804012FB9A476B6EF3DD509D740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: InitVariant
      • String ID:
      • API String ID: 1927566239-0
      • Opcode ID: cb2cba76c64304099b8bb61ff010ac80786fd399a6b269ca9dab5d572eab8f45
      • Instruction ID: de76dd2000b810ea56e6a0d17ed5d1a7f43d8f009b41e0501cb61d1224fd623b
      • Opcode Fuzzy Hash: cb2cba76c64304099b8bb61ff010ac80786fd399a6b269ca9dab5d572eab8f45
      • Instruction Fuzzy Hash: 42B1603261468586EB65AF27E4903EE7360F789BC0F40812BEB4E477B5EF38C5598700
      APIs
      • CompareStringW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001400326BE), ref: 00000001400321E9
      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001400326BE), ref: 00000001400321FD
      • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000001400326BE), ref: 0000000140032300
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CompareErrorInfoLastString
      • String ID:
      • API String ID: 3723911898-0
      • Opcode ID: 2d085da1167262e3f557380842c129a1b7e834dfbf2ea378fd779441936cdb7e
      • Instruction ID: 709663b6f081ec12db3498b94d3bbba0fe53990249ff72fb19715694a9bdbad8
      • Opcode Fuzzy Hash: 2d085da1167262e3f557380842c129a1b7e834dfbf2ea378fd779441936cdb7e
      • Instruction Fuzzy Hash: 79E1AE722046C09AEB739F66A8547EA3792F34DBD4F544625FB5A07BE8CB38CA45C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
      • API String ID: 221274066-3440237614
      • Opcode ID: 46a164524242e04322e94807e2ed1970c25c140a9465a314f3dc7ab078467c14
      • Instruction ID: 33c84939ba223b02f7b284155c94f98a4ed90c4cb86f500d85c10a2d7602cf07
      • Opcode Fuzzy Hash: 46a164524242e04322e94807e2ed1970c25c140a9465a314f3dc7ab078467c14
      • Instruction Fuzzy Hash: 3A818272218A8192EB11EF16E4907DEB761F7887D5F904112FB4943AB9DF7DC64ACB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: SendString$DriveType
      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
      • API String ID: 1032284112-4113822522
      • Opcode ID: 26cf2643fa6b9cb3c8136d751ca73fdb02d051c55c88bc280afbaade1abdb876
      • Instruction ID: 5fa12246c6730787d6baeb6884e6d1aaf68b4e9379e6b8197f093f101aa3c8cf
      • Opcode Fuzzy Hash: 26cf2643fa6b9cb3c8136d751ca73fdb02d051c55c88bc280afbaade1abdb876
      • Instruction Fuzzy Hash: A4513B72218A4192EB11DF26E8913EAB361F7D87C4F904012F78E47A79DF39C655CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Thread$Window$CurrentMessageProcessSendSleepTimetime$ActiveAttachDialogEnumFindInputWindows
      • String ID: BUTTON
      • API String ID: 1748615878-3405671355
      • Opcode ID: b18ef111e16c168cb331ca0064a482666dd7d293703a7d412b9ecbc2fbf1b57a
      • Instruction ID: a13aee43292f5f9235013f7bf9190f8a75e28ce593686bbc36b6701cde330bee
      • Opcode Fuzzy Hash: b18ef111e16c168cb331ca0064a482666dd7d293703a7d412b9ecbc2fbf1b57a
      • Instruction Fuzzy Hash: 16315C75200E1182FB22DFABE8947E92371AB8C7D5F954420FB0A47AB1CF398684C340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessagePostkeybd_event$KeyboardState$Parent
      • String ID:
      • API String ID: 2502892551-0
      • Opcode ID: c702cbae83f39ef6aabcae2a27e1063bdaa21856159fe81744417cb196227b5b
      • Instruction ID: 60f1eb8c535b79e2be96ecee7ddd3c3f297e9eea403a2e0f6f6f434fb2ebd399
      • Opcode Fuzzy Hash: c702cbae83f39ef6aabcae2a27e1063bdaa21856159fe81744417cb196227b5b
      • Instruction Fuzzy Hash: DF5107762055A002F3739B6AA474BEA3BE0B78DBDAF591114FF89077B5CA3AC541CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: FromQueryStringValue$CloseFreeLoadOpenTaskType_errno
      • String ID: Version$\TypeLib$interface\
      • API String ID: 2754250327-939221531
      • Opcode ID: 7cdab7e7c060869e0da0b0e5113d684bdf8d6276549272a82d91e2dd4a96a0b2
      • Instruction ID: ded8fa711316232823bb785af4d4ba1ebaf0d38ddd80f5090fc967ac4a27c7d4
      • Opcode Fuzzy Hash: 7cdab7e7c060869e0da0b0e5113d684bdf8d6276549272a82d91e2dd4a96a0b2
      • Instruction Fuzzy Hash: D2515B32214A8186EA21DB2AE4847CEB3A5F7D9BD4F504221FB8D47B78DF39C546CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Virtual$KeyboardLayoutNameScan
      • String ID: 0002$0409$0809
      • API String ID: 983989243-2507973371
      • Opcode ID: 494d48369ab01f52cbf30dd0b5ab5ee0bd0b45a40cf2f351d9aabff0a0d02b6a
      • Instruction ID: eaeac87d2d7ecf8d0615943011f481b10c867ec165a05e46c883da95e513004d
      • Opcode Fuzzy Hash: 494d48369ab01f52cbf30dd0b5ab5ee0bd0b45a40cf2f351d9aabff0a0d02b6a
      • Instruction Fuzzy Hash: 89519C71208A81A5FB13DB2AE8443DA3BF2E75D788F484015E7494B2BAEF79C509C705
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _fread_nolock$DeleteFile_errno
      • String ID:
      • API String ID: 2242561482-0
      • Opcode ID: 099c10b1d2b511053cca40750197a2f51583681a5e10c3d506edf7bf82044c12
      • Instruction ID: 7317236c0e0686f9554fc2f0f770668f78f44ffe5f0f5c61f68980d327f7be48
      • Opcode Fuzzy Hash: 099c10b1d2b511053cca40750197a2f51583681a5e10c3d506edf7bf82044c12
      • Instruction Fuzzy Hash: DBB16776208AC595EA21DF52E8407DEB361F7C9BC4F944406FB8947AAADF3CC249CB44
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: State$Async$Keyboard
      • String ID:
      • API String ID: 541375521-0
      • Opcode ID: 92184b8ba2d507ee925a694170ba5d4f1bf3991fbd5ba6f557ed84fe53d41b6a
      • Instruction ID: de29f8e0a99207526d1ce8d0c2cdd2499d0fd7bbc1a702fa6642df7d41fbc1a0
      • Opcode Fuzzy Hash: 92184b8ba2d507ee925a694170ba5d4f1bf3991fbd5ba6f557ed84fe53d41b6a
      • Instruction Fuzzy Hash: E151D63622459087FB5ADB2AA4653DE2362F75DFC9F640014FB46432B0CB3ACD46CB80
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: free$ErrorFreeHeapLast_errno
      • String ID: %.15g
      • API String ID: 1012874770-3684710030
      • Opcode ID: 6f7a7757b56b72e414d6a0ebd9c169ca5ba6902dba403406ba32f9c0e7587173
      • Instruction ID: 9a3007cb08923bfdda009dd1d7360c9cbef53d2145103472d6069d035108d37c
      • Opcode Fuzzy Hash: 6f7a7757b56b72e414d6a0ebd9c169ca5ba6902dba403406ba32f9c0e7587173
      • Instruction Fuzzy Hash: A4411F32A16B8084FF569F67C4943EC23A0EB8DBC4F485439AB1A4B2A6CF35D891C711
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: free$_lock$ErrorFreeHeapLast_errno
      • String ID:
      • API String ID: 1575098132-0
      • Opcode ID: ef9e044d46e35d22be352a5f83667f52ab4ec4e8efb8a0f4f211e77ef84ed374
      • Instruction ID: 144a0b7f2f31286478b4074085c9ee43f483ed07ab469889947d590054f9c79d
      • Opcode Fuzzy Hash: ef9e044d46e35d22be352a5f83667f52ab4ec4e8efb8a0f4f211e77ef84ed374
      • Instruction Fuzzy Hash: CE314D3131264044FE5BABA7D0A17F81351EF9EBD4F481125BB1A0B6F6CF36C8409312
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout
      • String ID: %s%u
      • API String ID: 1412819556-679674701
      • Opcode ID: 9682556f6bebd3d8e6072994d14b92f2d648d796f9358d8ba31495945f70c32d
      • Instruction ID: 158b3b39f145047add73953bad75bb487fbb5e349449c94e5c983fca0085dcf1
      • Opcode Fuzzy Hash: 9682556f6bebd3d8e6072994d14b92f2d648d796f9358d8ba31495945f70c32d
      • Instruction Fuzzy Hash: E4A1B27220478583EA66DB27F4447EEB3A1F7897C4F400015FB9A57AA9EB7CD645CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: HandleLoadModuleString$Message_errno
      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
      • API String ID: 2078091845-2268648507
      • Opcode ID: 9977a73bd7e8f5b34ca262eab2b70e5362f2eedeb015b1262854764007e6d985
      • Instruction ID: 1c9124558d2d19ef4e6bc9186654b45b82e36532b1f4ed361783abd5deafe83a
      • Opcode Fuzzy Hash: 9977a73bd7e8f5b34ca262eab2b70e5362f2eedeb015b1262854764007e6d985
      • Instruction Fuzzy Hash: AC416C32315B8591EE22EB22E4947D97365F79CBC5F804026FB890B7BADE79C609C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseOpen$EnumFromQueryStringValue
      • String ID: ($interface$interface\
      • API String ID: 297354694-3327702407
      • Opcode ID: 3f114c0c5178b9e56fda104bfb37ef7459d836bb5a0e94708186758a1765110d
      • Instruction ID: 28677ac6b5f0e0c5be18d84be7ecf3b851dd713cd8372518bd7651f753dacacb
      • Opcode Fuzzy Hash: 3f114c0c5178b9e56fda104bfb37ef7459d836bb5a0e94708186758a1765110d
      • Instruction Fuzzy Hash: 16413E32214A8196EA61CB1AF8547CAB3A5F7CC794FA04211FB8D47B79DF39C655CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: FileInfoVersion$QuerySizeValue
      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
      • API String ID: 2179348866-1459072770
      • Opcode ID: 2c5366c6c43de9a1321b19db33a13329d7480d04c77fe3cc0952cd2924b210d0
      • Instruction ID: 5ce2de8a0ea36e8fd6a7b7ef82b2f030d759b9607e79fc13a15354585515668c
      • Opcode Fuzzy Hash: 2c5366c6c43de9a1321b19db33a13329d7480d04c77fe3cc0952cd2924b210d0
      • Instruction Fuzzy Hash: 2D51F03130464085EE66EB23A4413EEA311F78EBD0F845126FF4A0B7AADE7AC646C704
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread
      • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
      • API String ID: 2833215880-805462909
      • Opcode ID: 7ffd50ff2343eee53411b84a019919d89e65c3332e9a596673ff78e44ffb9ffb
      • Instruction ID: f3af09c5bb190377091230b29a57013d0924b33a88ab09c6f24b2af104aef2f3
      • Opcode Fuzzy Hash: 7ffd50ff2343eee53411b84a019919d89e65c3332e9a596673ff78e44ffb9ffb
      • Instruction Fuzzy Hash: 0241C332204A8196EB629F27E400BDA77A0F789BD4F854026EF8E43664DF38D649CB44
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ErrorMode$DriveType
      • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown
      • API String ID: 2907320926-706929342
      • Opcode ID: daab07e8c985696f637715a8198febf35013144fd4504743dafcea146b392d31
      • Instruction ID: af1bef719d61846af6e9475743f59197e1aad5a9bb156b093b860e3454300371
      • Opcode Fuzzy Hash: daab07e8c985696f637715a8198febf35013144fd4504743dafcea146b392d31
      • Instruction Fuzzy Hash: 9A315D72204A5082EB66DB17E8903E96762F78CBC4F909512FB4E47BB9DF78C685D700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ItemMenu$Info$CheckCountRadioSleep
      • String ID:
      • API String ID: 1460738036-0
      • Opcode ID: f69ef5a3012e275947e5d516524cfb2d45e010425fe6d29b4685934f619dd009
      • Instruction ID: fda2a722c9f536d08b803548f4c7bbb90e112834612481e7afb566f1631880cd
      • Opcode Fuzzy Hash: f69ef5a3012e275947e5d516524cfb2d45e010425fe6d29b4685934f619dd009
      • Instruction Fuzzy Hash: 7A71D17221468096FB629F2BA5847EEA7A5B78CBC4F808011FB4647BB5CB3CC956C700
      APIs
      • GetCurrentDirectoryW.KERNEL32(00000000,00000000,000000014001600C), ref: 00000001400163B2
      • GetFullPathNameW.KERNEL32 ref: 00000001400163CD
      • SetCurrentDirectoryW.KERNEL32 ref: 0000000140016431
      • SetCurrentDirectoryW.KERNEL32 ref: 000000014001663A
        • Part of subcall function 0000000140016050: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,?,00000000,?,00000001400845F9), ref: 0000000140016087
        • Part of subcall function 0000000140016050: MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,?,00000000,?,00000001400845F9), ref: 00000001400160DE
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CurrentDirectory$ByteCharMultiWide$FullNamePathmalloc
      • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
      • API String ID: 3488002654-188983378
      • Opcode ID: 15b320750642c672c145264c579ef4a000cd74b6e19c3f4d54ae79f6e6e53260
      • Instruction ID: 1af16a3667b7dc2cc410e2f44962549814ee668dc452acd683b9a27b9fcf0743
      • Opcode Fuzzy Hash: 15b320750642c672c145264c579ef4a000cd74b6e19c3f4d54ae79f6e6e53260
      • Instruction Fuzzy Hash: 87C1943221968581EB72DB23E9443EEA365F7CD7C4F400512FB894BABADB7AC945C740
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID:
      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
      • API String ID: 0-1603158881
      • Opcode ID: 1e9125c67b3ada6ba4e79e6ab97e268edc4fd2dd8881cb79c92b8fec35e83c32
      • Instruction ID: 9e623df7e87a94373924c2dbe767dc01e8930609e6912f763405fbb7e1d4bbcc
      • Opcode Fuzzy Hash: 1e9125c67b3ada6ba4e79e6ab97e268edc4fd2dd8881cb79c92b8fec35e83c32
      • Instruction Fuzzy Hash: 46B1BF32214685A2FF5ADF22D5463E9B361F78A7C4F800012BB5A471B6EFBDC659C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CurrentDirectory$AttributesFile
      • String ID: *.*
      • API String ID: 769691225-438819550
      • Opcode ID: 4cec05aeae9129512035758054a417f42bf25a7416634dd3e13a061e87be96ec
      • Instruction ID: a030f4c4bc4e340075b6ea39e0d58bd15d95c1e139451ae0ceceae65d56143d2
      • Opcode Fuzzy Hash: 4cec05aeae9129512035758054a417f42bf25a7416634dd3e13a061e87be96ec
      • Instruction Fuzzy Hash: 9081A23261478281EB719F12D8983DE63A2F3887C4F648412FB4E476F5EB78C995C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: DriveType
      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
      • API String ID: 338552980-1000479233
      • Opcode ID: 10a637fbf7cfe25e87106f87b5514fe69afc4316bf76259362f093f0d976959b
      • Instruction ID: 4892605f173c8fdaa25bbb5fa62cc699f8b7fb117d634b75ae9c3581b0db6440
      • Opcode Fuzzy Hash: 10a637fbf7cfe25e87106f87b5514fe69afc4316bf76259362f093f0d976959b
      • Instruction Fuzzy Hash: E8615136214A4192EA62DB17E4807DEA371F79C7C8F944112BB8D476B6EF39CA49CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: HandleLoadMessageModuleString_errno
      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
      • API String ID: 34033046-4153970271
      • Opcode ID: 820f63fb0ecf6ca7051b1ecafc431849f4f2b9ac492c8ff5b160928d82f05987
      • Instruction ID: 5aa669781f5ea106ba370bae5b1fb43f8874b2983df11647a2cf92c1a9c41130
      • Opcode Fuzzy Hash: 820f63fb0ecf6ca7051b1ecafc431849f4f2b9ac492c8ff5b160928d82f05987
      • Instruction Fuzzy Hash: 0F313C31218A8191EB22EB12F8947D97325F758BC0F844026FB8D07AA9DF39C649C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ClassMessageNameParentSend_errno
      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
      • API String ID: 2243316544-3381328864
      • Opcode ID: dca1999c7897a7f8e7ad9a039577972bcb516cf34faab6f7ca2cad55ffe2f513
      • Instruction ID: f2d167f43ca53fa12038f217fe8c2e1e149c614743d4e4b6ec0c10241274f132
      • Opcode Fuzzy Hash: dca1999c7897a7f8e7ad9a039577972bcb516cf34faab6f7ca2cad55ffe2f513
      • Instruction Fuzzy Hash: 4421517131854690FF22DB27E9543EA63A1A788BC8F108026EF0D4B6BAEE39C655C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: free$_errno$DecodeEnvironmentPointerVariable__wtomb_environ
      • String ID:
      • API String ID: 3451773520-0
      • Opcode ID: 53d226c17de322b016c28a19cc516a4456de75c18f4c0c83022da97ecf2d1f41
      • Instruction ID: a30ff842395eea07e4926f374df0446f8e05f679c80a941fe6fbc9a0845b944a
      • Opcode Fuzzy Hash: 53d226c17de322b016c28a19cc516a4456de75c18f4c0c83022da97ecf2d1f41
      • Instruction Fuzzy Hash: 7CA1E236701A4042FA63AB27A9103EB6391F74CBD8F548616FB5A4B7F5CF3988959301
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: InvalidateRect
      • String ID:
      • API String ID: 634782764-0
      • Opcode ID: ab721103f676c20aa8999dbed2b0885bef85401188c991ed8c4fd980f4b04c3c
      • Instruction ID: 79818213c7bdd26eefb0785cfd0465d845059a1320c86133faf3524f84b582b6
      • Opcode Fuzzy Hash: ab721103f676c20aa8999dbed2b0885bef85401188c991ed8c4fd980f4b04c3c
      • Instruction Fuzzy Hash: 0B61A43531564483FA66CB2B99847EE2760B78EBC0F248512FF4953BB5DE3EC5469B00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageReleaseScreenSendText
      • String ID: @GUI_DRAGFILE$@GUI_DROPID
      • API String ID: 3721556410-2107944366
      • Opcode ID: 66adb2bfb16c4c9ad71688afd0650c12028353f0106694929eacc013c0bb9b2f
      • Instruction ID: 51d93ead8af010edd0bfe6b7105ed5fd1efa5d282d7477ed720b4cc401e5187b
      • Opcode Fuzzy Hash: 66adb2bfb16c4c9ad71688afd0650c12028353f0106694929eacc013c0bb9b2f
      • Instruction Fuzzy Hash: 0061AA36214A8286EB61EF16E8847DA7761F788BD5F900212FB4A13AB5DF39C585CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$Long$MessageSendShow
      • String ID: '
      • API String ID: 3688381893-1997036262
      • Opcode ID: f014e9c6dfb71e59ac3eeb8eefbb7fb796883d2a761af5f8a9861390d2e8f9c5
      • Instruction ID: f1c7f6783d3bc5e7cac886569237794dce23f5aba39d0c9fd7e64fb634dc65b7
      • Opcode Fuzzy Hash: f014e9c6dfb71e59ac3eeb8eefbb7fb796883d2a761af5f8a9861390d2e8f9c5
      • Instruction Fuzzy Hash: 3C51D336208A44C1E776DB2BA4957EE2BA0F38DBD4F544501EF5A437B4DA3AD942C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
      • String ID:
      • API String ID: 1291720006-3916222277
      • Opcode ID: a566e48f0363e72b43e417d706de7366f2ab49c69cbb633bcdaa59a3bec41a29
      • Instruction ID: 4512a116ec5086c090f31aeb69c9bd270e48586d574499e2180d614d27683103
      • Opcode Fuzzy Hash: a566e48f0363e72b43e417d706de7366f2ab49c69cbb633bcdaa59a3bec41a29
      • Instruction Fuzzy Hash: C55181326147858AEB61CB12E454BEEB3A1F78DBC8F544022EF8907B65DF39C459CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: IconLoad_errno
      • String ID: blank$info$question$stop$warning
      • API String ID: 2916566271-404129466
      • Opcode ID: 578d9c8944904c804782a305f51f4301e190eb9589e7cb631833b93add1c9005
      • Instruction ID: 4521118d0da61b2cef3e7498f6bcecc8594d9f12e4b9f26d3bfde5a0dffa555d
      • Opcode Fuzzy Hash: 578d9c8944904c804782a305f51f4301e190eb9589e7cb631833b93add1c9005
      • Instruction Fuzzy Hash: 82215C3120878091EB66AB17E4403EA6362B39D7C4F664435FF49077B6DBBDD890C706
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ClearVariant
      • String ID:
      • API String ID: 1473721057-0
      • Opcode ID: 3f177f2e05eb5b4e4af0bb14e7ff3740854978524cce031e0ebe3adc87388b09
      • Instruction ID: 77904a91f918d551a4e9879198c1ab35730394ab54acfba456e15547fcf5b338
      • Opcode Fuzzy Hash: 3f177f2e05eb5b4e4af0bb14e7ff3740854978524cce031e0ebe3adc87388b09
      • Instruction Fuzzy Hash: 2D01443122498ED2EB42AF37E8543D97B64F79AB89F484035E74A4B079DF34C84AC354
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
      • String ID:
      • API String ID: 4082120231-0
      • Opcode ID: ab2f7d23ff055d6fcb9baee0b8aea1a0ddd5de4ce58c168536b127fc3c96c434
      • Instruction ID: 440b798c229a937cd25fa25f2269feda0a98d84925787f4f5e9e42b2d496818d
      • Opcode Fuzzy Hash: ab2f7d23ff055d6fcb9baee0b8aea1a0ddd5de4ce58c168536b127fc3c96c434
      • Instruction Fuzzy Hash: B9919D722186848BE776CF16E444B9ABBA0F389BD4F445109FF8A13BA5DB39D546CF00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Close$ConnectDeleteOpenRegistryValue
      • String ID:
      • API String ID: 1762992421-0
      • Opcode ID: 5de0bd725930cb11fb27ec8f78a2c34bd8ccb8d525622236ddff0edad118dff4
      • Instruction ID: 4ceb132776b653923f66244e72f10461d38396a16d9eff0eea3077b9aed00fa4
      • Opcode Fuzzy Hash: 5de0bd725930cb11fb27ec8f78a2c34bd8ccb8d525622236ddff0edad118dff4
      • Instruction Fuzzy Hash: 36915F72328A8485EB61DF26E4917EE6361F789BC0F408416FB8E87A66CF39C555CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: LongMessageSendWindow
      • String ID:
      • API String ID: 3360111000-0
      • Opcode ID: ad0261938798bc5e4a534e0e750e8781ca9e3ec59fdcfa25101fa5b9e63e0033
      • Instruction ID: 0706e1a808117a2cb8884eb702324a94a12dc14d2d99e8368017fbbaa30e3ce5
      • Opcode Fuzzy Hash: ad0261938798bc5e4a534e0e750e8781ca9e3ec59fdcfa25101fa5b9e63e0033
      • Instruction Fuzzy Hash: E1410236255A9581EB25CF1BE9907A977A1F3C8FD4F644211EB1E47BB4CF3AC8918301
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CreateHandle$FileLockPipeSync
      • String ID: nul
      • API String ID: 3087477490-2873401336
      • Opcode ID: 1ba7d7e733bfaf5f2644e33e1198b58ce882156c47f9708a8dc0f33037ae8ad2
      • Instruction ID: a658fcd7ed67aec0375bc38062b74b648f782480dfa2149e1461b62beaf8494e
      • Opcode Fuzzy Hash: 1ba7d7e733bfaf5f2644e33e1198b58ce882156c47f9708a8dc0f33037ae8ad2
      • Instruction Fuzzy Hash: 1A314D72614A0982EB228B26E4147EA23A0B75DBF8F544718FBB9077F4DB7EC4458740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CreateHandle$FileLockPipeSync
      • String ID: nul
      • API String ID: 3087477490-2873401336
      • Opcode ID: c82ee7c9f24bdc3b5c9aafed061de953079ab855d2cf62d5ceba594b807f0cbd
      • Instruction ID: e8030097f2dc1946c54fac4ceba1dedf3e37d218a291983f01a424825aa40858
      • Opcode Fuzzy Hash: c82ee7c9f24bdc3b5c9aafed061de953079ab855d2cf62d5ceba594b807f0cbd
      • Instruction Fuzzy Hash: 4B318FB1614B4982FB268B26E4143A963A0BB8DBF8F504714FB79077E5DF3EC4058740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno$CriticalExitFileLeaveModuleNameProcessSectionSleep_lockfreemalloc
      • String ID:
      • API String ID: 1024173049-0
      • Opcode ID: c96f470f61e433ff1d967da93f153254ccaf3dd8c8ed3d972f48f01616ddc94e
      • Instruction ID: 5e32005ff4eb50b56bc0b79fe555f02270a5893e8c5ae4fc4c9a7e997324dc27
      • Opcode Fuzzy Hash: c96f470f61e433ff1d967da93f153254ccaf3dd8c8ed3d972f48f01616ddc94e
      • Instruction Fuzzy Hash: FD219D3161064182F663AB93A4443EA23A5EBED7C4F544128FB46876E6CF38CC948341
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CleanupStartupgethostbynamegethostnameinet_ntoa
      • String ID: 0.0.0.0
      • API String ID: 348263315-3771769585
      • Opcode ID: f4e18f34c4358c25edf2a8ff663b67603b27169fac9407bc2fc86324afd05ba3
      • Instruction ID: 968079aca6cd486708a65a1c4036f613f73c2b676602d8a0103b6b58aa032a44
      • Opcode Fuzzy Hash: f4e18f34c4358c25edf2a8ff663b67603b27169fac9407bc2fc86324afd05ba3
      • Instruction Fuzzy Hash: 45215C3130468481FA76AB63E5913ED6361AB9C7C0F905122BF490B6FADE7DC6458B14
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Process$Current$DuplicateHandle$CreateHeapThread
      • String ID:
      • API String ID: 3687779319-0
      • Opcode ID: 5ba2ea57d17b23fcf8d9358a165c4dbdb860a120cf48001cce228cf202b39c28
      • Instruction ID: b5684ffb80be4098f10a2f1e4953b29f2b7887ac2f557aa3afcfa5f3c5f832b9
      • Opcode Fuzzy Hash: 5ba2ea57d17b23fcf8d9358a165c4dbdb860a120cf48001cce228cf202b39c28
      • Instruction Fuzzy Hash: 28210876514B8087E7119F66E44839A7760F389BD6F454119EF8903B65DF3CC249CB44
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Menu$Item$CountMessagePostStringWindow
      • String ID:
      • API String ID: 3481743490-0
      • Opcode ID: bb4f670a99e464478fbf082a5ad55ce4bc19da9eef938eff389ea036c952732c
      • Instruction ID: 635701b7551cdb3c71edcf00bcef08e1dc9bb3143c7a724e153b4fdd0ce706bc
      • Opcode Fuzzy Hash: bb4f670a99e464478fbf082a5ad55ce4bc19da9eef938eff389ea036c952732c
      • Instruction Fuzzy Hash: C5517D3230468086EB66EF17E8447EEA7A4F78DBD4F444421BF8A577A6DF38C6818700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: free$_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
      • String ID:
      • API String ID: 2878544890-0
      • Opcode ID: 8ff17e622c29b8de5d2046a920bddfc35118928f9875a0b2d51c970e41b6f824
      • Instruction ID: 8ed5dfb0b3bbcf63d7c09a2a93ac69fb71be2a5f4e3b875c2269226ad1279f0a
      • Opcode Fuzzy Hash: 8ff17e622c29b8de5d2046a920bddfc35118928f9875a0b2d51c970e41b6f824
      • Instruction Fuzzy Hash: CF517172600B8086E7569B67E4403EAB7A1F79DBD4F14421AFB9A477B6CB78CC41CB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
      • String ID:
      • API String ID: 2592858361-0
      • Opcode ID: 3194b080c7df2b7ebc1a71f3a66dc3246617f44d0543e252109aa9614c146328
      • Instruction ID: 46ecf230fff1a486456c40586f1a2d952eef527681aca0d0f80661434d67bd19
      • Opcode Fuzzy Hash: 3194b080c7df2b7ebc1a71f3a66dc3246617f44d0543e252109aa9614c146328
      • Instruction Fuzzy Hash: 0F519D36214B918AEB21DF27E8487DA77A0F388BD4F544125EF6907BA5CF3AC9458B40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Thread$CreateDecodeErrorLastPointerResume_errno_getptdfree
      • String ID:
      • API String ID: 4249098642-0
      • Opcode ID: 526b5957826d1b01d0b31a5701d75ba6af42389b930556506b3c7d0d86122c31
      • Instruction ID: b743655ba3397e17f2108b0e17856310ffa00c8f894248fcd0c63c45afbd1db1
      • Opcode Fuzzy Hash: 526b5957826d1b01d0b31a5701d75ba6af42389b930556506b3c7d0d86122c31
      • Instruction Fuzzy Hash: BF218131211B8086EB569BA7A5417DD7290BB4CBD0F184629BF6907BE6DF39C4108300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide__initconout
      • String ID:
      • API String ID: 2210154019-0
      • Opcode ID: 4b7f7081cf3c44c14dcb4bfcf007d2921f261ea3bd48b08fa75c9646548b36b4
      • Instruction ID: 9376c8e5b2b8aadb00075756022f1e3285aada0649fdbda0e557f6c1ad28d592
      • Opcode Fuzzy Hash: 4b7f7081cf3c44c14dcb4bfcf007d2921f261ea3bd48b08fa75c9646548b36b4
      • Instruction Fuzzy Hash: 34310932218A4582EB52DF66E4143A663B0E7897F4F500319F76947AF4DBB8C945DB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CapsDevice$Release
      • String ID:
      • API String ID: 1035833867-0
      • Opcode ID: 344333f7b07d3095856b37051708a4f1206ba8449119e25c1078466e355cb992
      • Instruction ID: 5f231f0b18b35bdc6bd023420baead0f928a3c528a5ec12b72d3a1464f13ec67
      • Opcode Fuzzy Hash: 344333f7b07d3095856b37051708a4f1206ba8449119e25c1078466e355cb992
      • Instruction Fuzzy Hash: 8E115E75710B508AEB09DF66A84835A76A2F78CFC1F148029EF4A47BA5DF3DC801C704
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
      • String ID:
      • API String ID: 372113273-0
      • Opcode ID: ef9c147e76c687219620544fe7aafc96d98f0057b6a7a7bd37fd9f1270c65317
      • Instruction ID: b3490caea7568cb8add0e6ee3440e9f7574128c316902cf6f24e2106077bd438
      • Opcode Fuzzy Hash: ef9c147e76c687219620544fe7aafc96d98f0057b6a7a7bd37fd9f1270c65317
      • Instruction Fuzzy Hash: F6119E3532069282F7158B1BB818BD97B60FB89BD4F485511EF1203BB0CFB9C889CB40
      APIs
      • GetLastError.KERNEL32(?,?,?,0000000140020C01,?,?,?,?,0000000140019776,?,?,?,0000000140018927), ref: 000000014001F78A
      • FlsGetValue.KERNEL32(?,?,?,0000000140020C01,?,?,?,?,0000000140019776,?,?,?,0000000140018927), ref: 000000014001F798
      • SetLastError.KERNEL32(?,?,?,0000000140020C01,?,?,?,?,0000000140019776,?,?,?,0000000140018927), ref: 000000014001F7F0
        • Part of subcall function 000000014001FA90: Sleep.KERNEL32(?,?,?,000000014001F7B3,?,?,?,0000000140020C01,?,?,?,?,0000000140019776), ref: 000000014001FAD5
      • FlsSetValue.KERNEL32(?,?,?,0000000140020C01,?,?,?,?,0000000140019776,?,?,?,0000000140018927), ref: 000000014001F7C4
      • free.LIBCMT ref: 000000014001F7E7
      • GetCurrentThreadId.KERNEL32 ref: 000000014001F7D8
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ErrorLastValue_lock$CurrentSleepThreadfree
      • String ID:
      • API String ID: 3106088686-0
      • Opcode ID: 9d4d2d9982d89b6385ccc8b6d86932fe5950d620a9a2152ea353dda8eb706add
      • Instruction ID: 1a5f8c09d0ba321fd81f389886759326ddb03da19d0194de673600e449f04133
      • Opcode Fuzzy Hash: 9d4d2d9982d89b6385ccc8b6d86932fe5950d620a9a2152ea353dda8eb706add
      • Instruction Fuzzy Hash: 15014434205B4182FB17AF7BA4543F96291AB4C7E0F184624FB264B3F6EE3CC444D610
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Connection
      • String ID: *$*$*$LPT
      • API String ID: 1722446006-1879499292
      • Opcode ID: dd745dea707afe2c307b2f564db85dd2f723e8466ad2614e3bba197f5a6669e8
      • Instruction ID: 6b9a8050798a24b5280e6102e4d772cd19ccd928de4c15d0014323c390ab1e1c
      • Opcode Fuzzy Hash: dd745dea707afe2c307b2f564db85dd2f723e8466ad2614e3bba197f5a6669e8
      • Instruction Fuzzy Hash: 2D51C13220468095EB62DB17E8947EE67A2F789BD0F208815FF4D0B7A5DF75C481C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$DestroyLibraryLoadWindow
      • String ID: SysAnimate32
      • API String ID: 3529120543-1011021900
      • Opcode ID: 1abdfb938aec0e01c0fc04d7fdb33439ca826fcd1751bdaa7036f3d3c41956e7
      • Instruction ID: 9fbb15ac0085dc3de819db33869d8796ea941e3f8245dbe0c98e011f8ffd97c7
      • Opcode Fuzzy Hash: 1abdfb938aec0e01c0fc04d7fdb33439ca826fcd1751bdaa7036f3d3c41956e7
      • Instruction Fuzzy Hash: E4316F7220569087EB61DF26E48079E77A1F389BE0F504615FB9947BA8DB3DC845CF40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: free$ErrorFreeHeapLast_errno
      • String ID:
      • API String ID: 1012874770-0
      • Opcode ID: c7b6812ee0931a26b1d29c1b3d094af4d7c81a48c8b2cbc634e1b4c2c3a9e714
      • Instruction ID: 162fde003655eaeb578c2fe56de70f52f26702f9221a9558181e48492f8daf0b
      • Opcode Fuzzy Hash: c7b6812ee0931a26b1d29c1b3d094af4d7c81a48c8b2cbc634e1b4c2c3a9e714
      • Instruction Fuzzy Hash: 0501C576620D6091EB92EBA7D492BF82360E78DBC0F841401B71F9B9B6CE75D8C08312
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: 55252951109a0c8608fbe7c42b26baee2d8054ee1ff143c1ab2667d4da9ec042
      • Instruction ID: fa24312d91335974dedd97362a8f6b0a8a78b85d24116c7968ba4275b26df56f
      • Opcode Fuzzy Hash: 55252951109a0c8608fbe7c42b26baee2d8054ee1ff143c1ab2667d4da9ec042
      • Instruction Fuzzy Hash: AA916D7660468595FBA68F17D4853EE27A1F38DBD4F645132FB8A877B4CA38C481C342
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: 96cf2b8c7795dc6e05e97eb80ef0a94d90a236180543177a51fffb864edb12e4
      • Instruction ID: 6bd732c433e5b84a74b4d8c871d04a5e14d5b1ea9c19ed02a3ca33343899ad14
      • Opcode Fuzzy Hash: 96cf2b8c7795dc6e05e97eb80ef0a94d90a236180543177a51fffb864edb12e4
      • Instruction Fuzzy Hash: 5351F43A615D4885F637DF36A8503EAA360BB597D0F58820DBF96275F0EF348C868B01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AddressProc$Library$FreeLoad
      • String ID:
      • API String ID: 2449869053-0
      • Opcode ID: e84f40430b85bc046d41e94b1ed097989502e253f87c23d08a599b2437c381d4
      • Instruction ID: 9a5e752445b581816eea43dcef6ecc35ba82b668d7db829d968f7e5f5598ceed
      • Opcode Fuzzy Hash: e84f40430b85bc046d41e94b1ed097989502e253f87c23d08a599b2437c381d4
      • Instruction Fuzzy Hash: 45514636210A8482EA22EF27E8917ED63A5F78DBC4F458412FB8E477A6DF38C541C340
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Close$ConnectEnumOpenRegistryValue
      • String ID:
      • API String ID: 1413298697-0
      • Opcode ID: ed4c473b2fd20b758d58922a2fe7540fbf4f5c1cbea3d60bcf8f0213d002e71e
      • Instruction ID: cfc5665aea3a325789cdf31f08433024ff9a234f3ce6e0bfb158ab6bce2e0dba
      • Opcode Fuzzy Hash: ed4c473b2fd20b758d58922a2fe7540fbf4f5c1cbea3d60bcf8f0213d002e71e
      • Instruction Fuzzy Hash: 6D610A72218A8581EB61DB66F4517DEA364F7C97C4F408126FB8D47AAADF3CC549CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Close$ConnectEnumOpenRegistry
      • String ID:
      • API String ID: 3776047136-0
      • Opcode ID: 559ec7fcede113a896ec75aa68be989d1142a0b832c0bd4fb9a6ae8ad85fca3e
      • Instruction ID: 10788de8f2d0ea7cb8e7e7d0cda9093736e0c02fb67fb4caabceb214ae5532be
      • Opcode Fuzzy Hash: 559ec7fcede113a896ec75aa68be989d1142a0b832c0bd4fb9a6ae8ad85fca3e
      • Instruction Fuzzy Hash: 8F512D32218A8581EB61DB66F4517EEA764F7C9BD4F404112BB8D47ABACF7CC585CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ErrorLast$mallocselect
      • String ID:
      • API String ID: 3549979093-0
      • Opcode ID: 650a729477236237a562f73fdfe359701e326ad9f04a91d755e2f037c0baa14d
      • Instruction ID: 9971d02817a7a3d5c1839799a0224627de05c7fbfae65be65248aff813707e4f
      • Opcode Fuzzy Hash: 650a729477236237a562f73fdfe359701e326ad9f04a91d755e2f037c0baa14d
      • Instruction Fuzzy Hash: A551A33271464082EBA5EB27E4547EE73A5E789BD0F548223FF99477EADE38C5418700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AsyncState$ClientCursorLongScreenWindow
      • String ID:
      • API String ID: 3539004672-0
      • Opcode ID: 683444be45b974d96882ca4d97d60832c6d2aaa71f28c22b3f848ed8b10da3c1
      • Instruction ID: 77fb16ad26f6edb18f02381a5f69527e88a9d2a1d7b36c12fece34c78d8c01e7
      • Opcode Fuzzy Hash: 683444be45b974d96882ca4d97d60832c6d2aaa71f28c22b3f848ed8b10da3c1
      • Instruction Fuzzy Hash: 5441DF362046808BD76AAB76D9443DEB751F799BE4F244614FFA8077E4CB78D864CB00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: PrivateProfile$SectionWrite$String
      • String ID:
      • API String ID: 2832842796-0
      • Opcode ID: 8327f882b7dce6d235507ba09db23577f09e435ada635fa2d55841bd77459e45
      • Instruction ID: b4e061bdd564d407787b29aebf5f88e16d800b9f30588eed674e939f63238dce
      • Opcode Fuzzy Hash: 8327f882b7dce6d235507ba09db23577f09e435ada635fa2d55841bd77459e45
      • Instruction Fuzzy Hash: E3415A32614A8182EB25DF27E8947DA6365F78CBD4F948422EB8D87B65CF39C541C710
      APIs
      • DecodePointer.KERNEL32(?,?,?,00000001400185E5,?,?,?,?,0000000140018979), ref: 00000001400184FD
      • DecodePointer.KERNEL32(?,?,?,00000001400185E5,?,?,?,?,0000000140018979), ref: 000000014001850C
      • EncodePointer.KERNEL32(?,?,?,00000001400185E5,?,?,?,?,0000000140018979), ref: 0000000140018589
        • Part of subcall function 000000014001FB14: realloc.LIBCMT ref: 000000014001FB3F
        • Part of subcall function 000000014001FB14: Sleep.KERNEL32(?,?,00000000,0000000140018579,?,?,?,00000001400185E5,?,?,?,?,0000000140018979), ref: 000000014001FB5B
      • EncodePointer.KERNEL32(?,?,?,00000001400185E5,?,?,?,?,0000000140018979), ref: 0000000140018598
      • EncodePointer.KERNEL32(?,?,?,00000001400185E5,?,?,?,?,0000000140018979), ref: 00000001400185A4
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
      • String ID:
      • API String ID: 1310268301-0
      • Opcode ID: b99867acffb28a9b7b9cf8f88a247ad3ee66aca2c2c08ab72e30faf17da8c597
      • Instruction ID: 2331aaf70dccf361abdf9cd899ca5f2284bc77e7e8a7ad6957bf3bbcd8b2cb61
      • Opcode Fuzzy Hash: b99867acffb28a9b7b9cf8f88a247ad3ee66aca2c2c08ab72e30faf17da8c597
      • Instruction Fuzzy Hash: 48214F31305A4451FE26EB63E5443EAA292F75CBC4F844826BF4D0F7B6EA7AC581C344
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Window$ForegroundPixelRelease
      • String ID:
      • API String ID: 4156661090-0
      • Opcode ID: c18733ffcbc94db06105f8f27e6e9dd54efbb4857f75460f41cd7119dd3ae091
      • Instruction ID: 422bfa28d94c9d37a711dc90eab8764aff4ad857c11b6804721b8aab2583250c
      • Opcode Fuzzy Hash: c18733ffcbc94db06105f8f27e6e9dd54efbb4857f75460f41cd7119dd3ae091
      • Instruction Fuzzy Hash: 38213B76704A4082EB05EF67E8943DAA3A1F7CDBD4F148426EF4A47766CE39C881C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Object$Select$BeginCreateDeletePath
      • String ID:
      • API String ID: 2338827641-0
      • Opcode ID: 020fd284651e3b930a7ac165a90970fa5dc189dc6aac745ec1cf7d95f406fcb3
      • Instruction ID: 49b032af1517ae84fa68da4b70f104b0cd86519d841796c277cf35020f292a81
      • Opcode Fuzzy Hash: 020fd284651e3b930a7ac165a90970fa5dc189dc6aac745ec1cf7d95f406fcb3
      • Instruction Fuzzy Hash: 73316B75615B4086F7A6EF17A85879A7BA0B38CBD2F800619FF55137B0CB39C984CB80
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CreateDecodeErrorLastPointerThread_errno_getptdfree
      • String ID:
      • API String ID: 220819306-0
      • Opcode ID: e02c22c479a756b37ba2469e1c731f4d0bd423cafc8dcaa8bd25d4ac19e6b59a
      • Instruction ID: 8f4a7281d0a72e7e770f36814ae9b0ea45fda667290fc46c4c267b9622348bae
      • Opcode Fuzzy Hash: e02c22c479a756b37ba2469e1c731f4d0bd423cafc8dcaa8bd25d4ac19e6b59a
      • Instruction Fuzzy Hash: 1821A471204B8086FB16DBA7A9417DAB291FB8CBD0F484225BF5947BE6CF38C451C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Virtualkeybd_event$State
      • String ID:
      • API String ID: 3147574602-0
      • Opcode ID: 828b1a686058fc7467b87be3b73a36709185aab2671f1600af9c90cb0382e608
      • Instruction ID: 3420c94aa151237230069d0d2bb29bf8f0df179eea33fd69134cc4bb75a8dd66
      • Opcode Fuzzy Hash: 828b1a686058fc7467b87be3b73a36709185aab2671f1600af9c90cb0382e608
      • Instruction Fuzzy Hash: AF01A7367109508AEB599B27B8517DE27A1BBCCBC5F895021BF4603765CF3DC448C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: BeepDialogItemKillMessageTextTimerWindow
      • String ID:
      • API String ID: 3741023627-0
      • Opcode ID: 34d19474ccc83c20d2c372e6b18cd51a176d14692bd16f6e303955c68e089f1a
      • Instruction ID: a95008af8cc038cb3db71b6bef4e4df3ee121304bcbbceb4870921ffef5a3e7b
      • Opcode Fuzzy Hash: 34d19474ccc83c20d2c372e6b18cd51a176d14692bd16f6e303955c68e089f1a
      • Instruction Fuzzy Hash: 5811447120494481EB669F6AF4543E92370F7CCBC4F448121AB8A476F8DF7CC589C740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Path$ObjectStroke$DeleteFillSelect
      • String ID:
      • API String ID: 2625713937-0
      • Opcode ID: c674af027f64a49aa64d2cee8f841560f52de351d3aca5c88f548ef7f2b19f27
      • Instruction ID: cd3a0714f1bf63fba1df0d7bf89016d9c76374090cfb4c42ffa201f884d63b27
      • Opcode Fuzzy Hash: c674af027f64a49aa64d2cee8f841560f52de351d3aca5c88f548ef7f2b19f27
      • Instruction Fuzzy Hash: 25011E79214B4581FB5B5B1BA8587EA2761778DBE6F544215FA22072F4CB7CC9C49200
      APIs
      • EnterCriticalSection.KERNEL32(?,?,?,00000001400538F5,?,?,?,?,?,?,?,0000000140002DFD), ref: 00000001400534C1
      • TerminateThread.KERNEL32(?,?,?,00000001400538F5,?,?,?,?,?,?,?,0000000140002DFD), ref: 00000001400534CD
      • WaitForSingleObject.KERNEL32(?,?,?,00000001400538F5,?,?,?,?,?,?,?,0000000140002DFD), ref: 00000001400534DC
      • ~SyncLockT.VCCORLIB ref: 00000001400534E6
        • Part of subcall function 0000000140041FC0: CloseHandle.KERNEL32(?,?,?,00000001400534EB,?,?,?,00000001400538F5,?,?,?,?,?,?,?,0000000140002DFD), ref: 0000000140041FD1
      • LeaveCriticalSection.KERNEL32(?,?,?,00000001400538F5,?,?,?,?,?,?,?,0000000140002DFD), ref: 00000001400534F2
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CriticalSection$CloseEnterHandleLeaveLockObjectSingleSyncTerminateThreadWait
      • String ID:
      • API String ID: 3142591903-0
      • Opcode ID: 06c5797fb216afd1ef8b01a56a011ca6c90a5c1e5dc56e9c30e18d03a68b046a
      • Instruction ID: b41c0e860228252f824f003e70e6e7f03c6688cad32c3a29bf35ce4dd6fa9a4d
      • Opcode Fuzzy Hash: 06c5797fb216afd1ef8b01a56a011ca6c90a5c1e5dc56e9c30e18d03a68b046a
      • Instruction Fuzzy Hash: 35012836604B8497EB02DB1AE88439D3360F788B84F540525EB4A47B64CF38D4AAC740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Thread$CurrentProcessWindow$AttachInputMessageSendTimeout
      • String ID:
      • API String ID: 179993514-0
      • Opcode ID: 6d1f94df5bd98506c383369e41fceae3703619efcf037e416b08c53206745705
      • Instruction ID: 7bdfe62d9f2b8a6b891889737f07aeaf02079cd4eb28c0ea49a0230bac6ce5c6
      • Opcode Fuzzy Hash: 6d1f94df5bd98506c383369e41fceae3703619efcf037e416b08c53206745705
      • Instruction Fuzzy Hash: A6F01274B6061082FF569BBB7D593E963916B9DBC1F445034AF03433B1DD7E84968B01
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CreateInitializeInstanceUninitialize
      • String ID: .lnk
      • API String ID: 948891078-24824748
      • Opcode ID: 977feaa21511c50ecd8c4848db3b4b31ece1c9603ffec97a63a85134f913db5b
      • Instruction ID: df1647bc3ed66ebc5922ed305f87f368052ab95e703e8a9a4c4da2d464aefdf6
      • Opcode Fuzzy Hash: 977feaa21511c50ecd8c4848db3b4b31ece1c9603ffec97a63a85134f913db5b
      • Instruction Fuzzy Hash: 81A13576604B8482DB51EF26E48439EABA1F7C9BD4F648412EF8D47B69DF39C488C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSendWindow$CreateObjectShowStock
      • String ID: SysMonthCal32
      • API String ID: 3887885108-1439706946
      • Opcode ID: b96c076ef22ac4373642610b27fb090997c555d56efef221208e4f290e86db98
      • Instruction ID: 4777b1be074072386f5ec9814b1ed55efe674061b2c8079d2b8e44aa0b821c1a
      • Opcode Fuzzy Hash: b96c076ef22ac4373642610b27fb090997c555d56efef221208e4f290e86db98
      • Instruction Fuzzy Hash: 34418F3621478086E731DF16E48079AB7A5F38CBE4F904216EB9953BA9DB7DC481CF40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSendWindow$CreateMoveObjectShowStock
      • String ID: Listbox
      • API String ID: 3566057971-2633736733
      • Opcode ID: f2b2ec02d9d5bf133f75c2b999a3d38fad0de14c7a0980620f615af746dc0a1d
      • Instruction ID: fb293a2162744cf136f899a6064634baddc61431ed1a00149635ef9d7f48794b
      • Opcode Fuzzy Hash: f2b2ec02d9d5bf133f75c2b999a3d38fad0de14c7a0980620f615af746dc0a1d
      • Instruction Fuzzy Hash: 20315C3620878486E761DF16F480B9AB7A5F38C7E0F504225EB9953BA8DB79C881CB40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
      • String ID:
      • API String ID: 3705125965-3916222277
      • Opcode ID: 41acc68e243a85b5bd68afe880c3fcc4704447c801eeff676b274b9fe8814776
      • Instruction ID: 96f0c54efb6abfa11ea6d0d97aa88384563199f4c06df3352b4d228f659cc689
      • Opcode Fuzzy Hash: 41acc68e243a85b5bd68afe880c3fcc4704447c801eeff676b274b9fe8814776
      • Instruction Fuzzy Hash: A931C232625A8146FB71DB12E465BEA63A1F799BC4F145021FB4D47BAADF3DC4058B00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno
      • String ID: P
      • API String ID: 2918714741-3110715001
      • Opcode ID: a9d7d30aae668081e4e0fdb72a2f3b77e3297016e5f5885ffa30675a4aa44ebe
      • Instruction ID: 60b18ea0688ab6bd2005d56775865bd493fa868972a27d87fdd049c00dea9b80
      • Opcode Fuzzy Hash: a9d7d30aae668081e4e0fdb72a2f3b77e3297016e5f5885ffa30675a4aa44ebe
      • Instruction Fuzzy Hash: B321D37220578041FB67AB1B95903EDA2A5AB5D7E4F584728BFB407BE7DB38CC518700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: File$FullMoveNameOperationPathlstrcmpi
      • String ID: \*.*
      • API String ID: 1148786053-1173974218
      • Opcode ID: ce7e220b90531933c9419ed7ef8d5f21c5639afd484ad1aaaa8c621dffb5f8d4
      • Instruction ID: f9185174340df95a9cafd5dd2f27f395f6f0bf672f376a3b7eb02d49a3557a8a
      • Opcode Fuzzy Hash: ce7e220b90531933c9419ed7ef8d5f21c5639afd484ad1aaaa8c621dffb5f8d4
      • Instruction Fuzzy Hash: FD31097211868596DE71DF26E4903DAB361F799380F841027F3CD47AA9EB39C54ECB04
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _getptd_lockfree
      • String ID: %.15g
      • API String ID: 3892346632-3684710030
      • Opcode ID: e5a4058900a762db17865bc405f8590881451cce4a3d9188b9619ba9f5aea233
      • Instruction ID: 9b145b8d00767204385eae4f75380ab46b046795b17e33941710be258d716601
      • Opcode Fuzzy Hash: e5a4058900a762db17865bc405f8590881451cce4a3d9188b9619ba9f5aea233
      • Instruction Fuzzy Hash: 5A11193221174082FA969B96E5817F972A0F79C7C4F084229FB5D077B6DF38C894D701
      APIs
      • LoadLibraryA.KERNEL32(?,?,?,?,000000014000111E,?,?,?,00000001400010AE), ref: 00000001400010DA
      • GetProcAddress.KERNEL32(?,?,?,?,000000014000111E,?,?,?,00000001400010AE), ref: 00000001400010F2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: IsWow64Process$kernel32.dll
      • API String ID: 2574300362-3024904723
      • Opcode ID: 1930a99bdd14f4ae9cebd40c27fde28e95aaeacff4212950f6f5f3c8a6f67992
      • Instruction ID: a43c769206d21fde2fb15bfc7eb4836e21fce8543727497c55acc8b1876d02d0
      • Opcode Fuzzy Hash: 1930a99bdd14f4ae9cebd40c27fde28e95aaeacff4212950f6f5f3c8a6f67992
      • Instruction Fuzzy Hash: EAE07575602B41D1EE269F5AF8553D832A0FB8CB98F440226AB9D47764DFBCC69A8700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: GetSystemWow64DirectoryW$kernel32.dll
      • API String ID: 2574300362-1816364905
      • Opcode ID: 882457441ba4adc708df364e306e01e2dca67ea336b3fd679c73f194fb890576
      • Instruction ID: 52e6ba27a9a30508ca72b21118955397447982c72af9458411123896b055b9aa
      • Opcode Fuzzy Hash: 882457441ba4adc708df364e306e01e2dca67ea336b3fd679c73f194fb890576
      • Instruction Fuzzy Hash: EEE04670602F0181FF168BAAE4543D822A0EB2CB88F440022EB1A27370EF78C5A9C700
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpSendEcho
      • API String ID: 2574300362-58917771
      • Opcode ID: bdc4c2c3865cb2b4902a4a68966913b31967f48a2924ec78b2745c3c7122d7f5
      • Instruction ID: d4afd379505d4127ca0e68cec346dd4359611d3d17164a968e592cfbd32d82f6
      • Opcode Fuzzy Hash: bdc4c2c3865cb2b4902a4a68966913b31967f48a2924ec78b2745c3c7122d7f5
      • Instruction Fuzzy Hash: A2E04631602B0492FF1A8BA6E8583D422A0AB1CB98F444124EB8A0B374EF38C59A8340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: AddressLibraryLoadProc
      • String ID: ICMP.DLL$IcmpCloseHandle
      • API String ID: 2574300362-3530519716
      • Opcode ID: 702d291099b897d2aa7184afa4b47caca12c33732b65345b7bce7d06f737d317
      • Instruction ID: 984df16fa9d3343eab8811d8feebed10ba55697f2581f5e9990703712636ea72
      • Opcode Fuzzy Hash: 702d291099b897d2aa7184afa4b47caca12c33732b65345b7bce7d06f737d317
      • Instruction Fuzzy Hash: 7CE0B631602B04A2FF1A9BA6E8583D422E0A71CB94F450529EB9917370EF7CC5998740
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Current_exceptionUnregisterstd::exception_ptr::_
      • String ID:
      • API String ID: 413334626-0
      • Opcode ID: 80e3867cbac19e77ae6696a6b32e62074499e66a665b3710d0d867a0b9683d93
      • Instruction ID: 63ce756c315f44fedbae8e2024d2970320bb53c503dfdb5c15f9b0bc94853346
      • Opcode Fuzzy Hash: 80e3867cbac19e77ae6696a6b32e62074499e66a665b3710d0d867a0b9683d93
      • Instruction Fuzzy Hash: 89A15A36601A8482EB66EF26E4907EE73A4F789BC4F548016EF8E47766DF39C955C300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CriticalSection_lock$EnterLeave
      • String ID:
      • API String ID: 2641352136-0
      • Opcode ID: 99e99b871545480cf621e80854f712511f6c18be2ab6ff8bacbf45ec91ae6741
      • Instruction ID: 3329d72810a0a486e3887c047b8341276d76476b17ed419fbf5b2a99fe43e7bc
      • Opcode Fuzzy Hash: 99e99b871545480cf621e80854f712511f6c18be2ab6ff8bacbf45ec91ae6741
      • Instruction Fuzzy Hash: 2E51BF32204B8086EB169F26E4447EAAB95F7987E8F445219FB6E473F0DB78C954C701
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$_itow
      • String ID:
      • API String ID: 200223408-0
      • Opcode ID: 7405cc30efe2aadcf732334646a6a075f8d61dd5e9e0647a48d200e4b66c98e6
      • Instruction ID: 7b8e2058eee8b1ce9d99ebf43ff0e1d61be86b153ce5bccdc27d8a2169b4f1a0
      • Opcode Fuzzy Hash: 7405cc30efe2aadcf732334646a6a075f8d61dd5e9e0647a48d200e4b66c98e6
      • Instruction Fuzzy Hash: 84515076618B8082EA66DB16E4513DEA364F7CEBD0F544021FF8907BAADE7CC545CB10
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Rect$BeepClientMessageScreenWindow
      • String ID:
      • API String ID: 1352109105-0
      • Opcode ID: da75d14d1ec25b56f4abad874c4a80529f239b61d9cc1788c08e1530c59769a6
      • Instruction ID: 2d6ed4a72094f01f06163cd6642ebf956fb1b8b1afb0ee5edccaea34816dfe95
      • Opcode Fuzzy Hash: da75d14d1ec25b56f4abad874c4a80529f239b61d9cc1788c08e1530c59769a6
      • Instruction Fuzzy Hash: E5419F36205A4582EB12DF2BD8803E977A5F7C8BD9F104121EF8D436B0DB3AC482C704
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$BuffCharUpperVisibleWindow
      • String ID:
      • API String ID: 2796087071-0
      • Opcode ID: a026f616a54129ec98917a97539acc8597392b759933cae0f41e27fbfc5da1c0
      • Instruction ID: 8bb2dd8833cf904abd145be6c25f684929c0f4592ab4d99e9b1a220e249640fb
      • Opcode Fuzzy Hash: a026f616a54129ec98917a97539acc8597392b759933cae0f41e27fbfc5da1c0
      • Instruction Fuzzy Hash: 8A21C232704AC04AEB61DB2BA9043AA2791F38DFE0F484221FF5A677A5DE39D440C304
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CreateDirectory$AttributesErrorFileLast
      • String ID:
      • API String ID: 2267087916-0
      • Opcode ID: 49b606543cb9bfe3c3f076896e9e4485dc564bb742646c3367f243c8761c2680
      • Instruction ID: 00b282bdd05803176f0b712dc4d6f92fd9b604819c6db98ecf40c4546d0070fe
      • Opcode Fuzzy Hash: 49b606543cb9bfe3c3f076896e9e4485dc564bb742646c3367f243c8761c2680
      • Instruction Fuzzy Hash: 2521C13160454091FA72AB26A4403EE62A1BB9CBD0F956121FB8A876F5CF3CCB45C744
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ErrorLastacceptselect
      • String ID:
      • API String ID: 385091864-0
      • Opcode ID: 5e90838cee0273443acfd81d04efca1bced391ef76bfcb3bd0a7954f13ac70fb
      • Instruction ID: 4aac6911de41f2c02516ffd374a3bb351256c04097330844b9d0bd19e06c9260
      • Opcode Fuzzy Hash: 5e90838cee0273443acfd81d04efca1bced391ef76bfcb3bd0a7954f13ac70fb
      • Instruction Fuzzy Hash: C921CF3231068086E7A5DF2AF98579EB790E7887C0F949120BF8987B99DF38C1518B40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait_errno
      • String ID:
      • API String ID: 3330887357-0
      • Opcode ID: 1853c2b4d5dc6eb379982b61ff54dfab4c3ba3c683ea7c7dbfff3d6938cc13d1
      • Instruction ID: 1b1490656ab13622a56423e252063c5629246046879242a4f092b2132a64b46f
      • Opcode Fuzzy Hash: 1853c2b4d5dc6eb379982b61ff54dfab4c3ba3c683ea7c7dbfff3d6938cc13d1
      • Instruction Fuzzy Hash: D7218C32608B809AE712CF67B84038AB6A0F789BD4F444225BF9943BB5CF3CC544C700
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseDeleteEnumOpen
      • String ID:
      • API String ID: 4142876296-0
      • Opcode ID: 00f4cf7511f3782dc80ee645fcfa0c06a590a782d5953bf3fd39d590df808c85
      • Instruction ID: 820d68888e04e3434db7844f88bfac3771f4d499ca9806d99a059e70633116a3
      • Opcode Fuzzy Hash: 00f4cf7511f3782dc80ee645fcfa0c06a590a782d5953bf3fd39d590df808c85
      • Instruction Fuzzy Hash: E5216A32A08AC996EB71CB16F4887EA63B0F7C97C8F505115EB9907A68DF3DC449DB00
      APIs
      • FlsFree.KERNEL32(?,?,?,?,000000014001FA19,?,?,00000000,000000014001F556), ref: 000000014001F6B3
      • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000014001FA19), ref: 0000000140021182
      • free.LIBCMT ref: 000000014002118B
      • DeleteCriticalSection.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000014001FA19), ref: 00000001400211AB
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CriticalDeleteSection$Freefree
      • String ID:
      • API String ID: 1250194111-0
      • Opcode ID: 5e65d756a972c1c3cf02f94cdc710080212075ceac2f0265cf987920dad9c86a
      • Instruction ID: 1610b5c0c453f9854d96308b1fea6b3a18cd53beb6f951f4d2116ffa520e594a
      • Opcode Fuzzy Hash: 5e65d756a972c1c3cf02f94cdc710080212075ceac2f0265cf987920dad9c86a
      • Instruction Fuzzy Hash: 9C117C31605A4086FB1A9F97E9543E87360F79DBD4F584219FB6507BB6CB38C8A2CB01
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ClientRectScreen$InvalidateWindow
      • String ID:
      • API String ID: 357397906-0
      • Opcode ID: 8afdc3e5baf2e4d2179bbcd18de14bc388d36b719c5b2bae0df55aa9d10ff990
      • Instruction ID: a2b0ae2c8876a6b38db260dc4fd5e3651fb8b6bc34d74a20727bddb4d6e8fffe
      • Opcode Fuzzy Hash: 8afdc3e5baf2e4d2179bbcd18de14bc388d36b719c5b2bae0df55aa9d10ff990
      • Instruction Fuzzy Hash: 44117AB76186458ADB21CF2AE44464ABBB1F38DBD8F148116FF9947B28DA3DC954CF00
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Value$ErrorExitLastThread
      • String ID:
      • API String ID: 2675828980-0
      • Opcode ID: 072e62e0cc7db1bd2869643e48ac97ca367f1b9d34d629735be77b72d3ae8b1b
      • Instruction ID: d8779f9143c0da5954bf17ffc4bb4503a05f8e99e0d5eb4c2cf5419304d1c710
      • Opcode Fuzzy Hash: 072e62e0cc7db1bd2869643e48ac97ca367f1b9d34d629735be77b72d3ae8b1b
      • Instruction Fuzzy Hash: FE012434211B4185FE17ABB7A8097E82294EB9DBC4F040434BB4C8F3B3EE3AC8448310
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
      • String ID:
      • API String ID: 2783949968-0
      • Opcode ID: c4cc0982b4a95651a193822a6a98e4c6bd6a5ef815766d39b453c0ed45f31134
      • Instruction ID: b0dc5b37359479101a0418e8e5713fe74c4d279849e5ce281c58f900abd88c18
      • Opcode Fuzzy Hash: c4cc0982b4a95651a193822a6a98e4c6bd6a5ef815766d39b453c0ed45f31134
      • Instruction Fuzzy Hash: 3F019A3931479182F7568B1BF81979AABA0B78ABD4F580514EF5103BB5CB79C880CB40
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: __doserrno_errno
      • String ID:
      • API String ID: 921712934-0
      • Opcode ID: c267702eec9b3eee53a61e191f12b171e1ac2a91c44a94ac823755d2d137ecc2
      • Instruction ID: 94bc2615e07330a9e72ea67cae4b6bc7ba730eca6e6fd3e02367c5d499af0127
      • Opcode Fuzzy Hash: c267702eec9b3eee53a61e191f12b171e1ac2a91c44a94ac823755d2d137ecc2
      • Instruction Fuzzy Hash: 2A01F2B221874485FF1BAB66C8557EC626197AA7E5F60830CFB2D07BF3CB3848088610
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: 3f34394226932560d14599769183fbc6f11346e0135bbd86e823fb02c55fc01b
      • Instruction ID: 3626e69365fcbd22b38cf485dce33f875ca616bd00d96252de4bd7ef0e36c622
      • Opcode Fuzzy Hash: 3f34394226932560d14599769183fbc6f11346e0135bbd86e823fb02c55fc01b
      • Instruction Fuzzy Hash: E4F01D7270568485EA06DB6BA9093D96294B74CBE5F448021EF4A57775EF3DC586C200
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CapsDesktopDeviceReleaseWindow
      • String ID:
      • API String ID: 2889604237-0
      • Opcode ID: 663669a65a76b113adc37a015a78afabd3b768727dab4dae13358617f20d812d
      • Instruction ID: 6b7626350cfd95ae1990dda629e8c06425b4c191b7bfa77dcd1ecaea011b0167
      • Opcode Fuzzy Hash: 663669a65a76b113adc37a015a78afabd3b768727dab4dae13358617f20d812d
      • Instruction Fuzzy Hash: 2CF03A7230168486EB06DF2BA8093D96294B74CFE5F448021EF4A57775EF3DC586C300
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
      • String ID:
      • API String ID: 146765662-0
      • Opcode ID: c8b1013e588252686478a81e741aa9e3fb1fd1fced28a3c40e2bd3c97a041c81
      • Instruction ID: ab2e82a3d6cc36cc72a50de687fcfc05a2c6faa9d17d6773562e72e4e34849d9
      • Opcode Fuzzy Hash: c8b1013e588252686478a81e741aa9e3fb1fd1fced28a3c40e2bd3c97a041c81
      • Instruction Fuzzy Hash: AEE07536210A0082FB06AB7BE8953A93360AB8CFA5F045521AF2A473B4CE38C4958311
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: ContainedObjectmalloc
      • String ID: AutoIt3GUI$Container
      • API String ID: 330771721-3941886329
      • Opcode ID: 646bb728b9beaf85c5b7c2fa69e88744852ef6229705d87b86c0250e38601ae5
      • Instruction ID: 36ac4b5e3e13125600d94040ef129a52aa7fbd1c3105ea127b5c650463c7dd44
      • Opcode Fuzzy Hash: 646bb728b9beaf85c5b7c2fa69e88744852ef6229705d87b86c0250e38601ae5
      • Instruction Fuzzy Hash: 53A11477200B8982EB65CF2AD4503AE33A4F798B98F548126EF4E877A5DF39C945C340
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseExecuteHandleShell
      • String ID: @
      • API String ID: 283469938-2766056989
      • Opcode ID: ae6a564b597233e9ed2ee6c7df8b12fb1516471262dddbcbe24606b62a8967ab
      • Instruction ID: fbccb8cd7eba08c9fd1fede3552cebc2aff3460dfb5a1908f72b2ff7badbb7b6
      • Opcode Fuzzy Hash: ae6a564b597233e9ed2ee6c7df8b12fb1516471262dddbcbe24606b62a8967ab
      • Instruction Fuzzy Hash: 7451183260468081EA21EF27E8957DAB7A6F7C9BC4F648812FF4D4B766DE39C841C740
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: MessageSend$Window$CreateObjectShowStock
      • String ID: Combobox
      • API String ID: 269107984-2096851135
      • Opcode ID: 1e17126c7b056a4df32dcf91d39a9facdace4e0f54512b4f2cc5ecd330734fde
      • Instruction ID: e300980219f8985ddc7967a6870a05f4c7b54afa03a190dad948785b233a897a
      • Opcode Fuzzy Hash: 1e17126c7b056a4df32dcf91d39a9facdace4e0f54512b4f2cc5ecd330734fde
      • Instruction Fuzzy Hash: AC3141767147808AE760DF26E440B9AB7A5F79D7D0F604215EB9943BA4DB39D840CF40
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: _errno
      • String ID: 1
      • API String ID: 2918714741-2212294583
      • Opcode ID: 71ffad8b2ac5ceac5c8ff4a3b0de500716937bc27bcfc6d0f17f3e1c7302b392
      • Instruction ID: 4a1c470e52ffa2e87615b9e173a251e4ea712432c5b203add07fe4f5770151f5
      • Opcode Fuzzy Hash: 71ffad8b2ac5ceac5c8ff4a3b0de500716937bc27bcfc6d0f17f3e1c7302b392
      • Instruction Fuzzy Hash: 9121F57262E2C086FB6B8B2AC4353DE6B90974D7C4F988011F745076E7DB3D9900CB11
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Internet$OpenOption
      • String ID: <local>
      • API String ID: 942729171-4266983199
      • Opcode ID: 629215c5edb7e231a08a8a6a77fe871c9ac27d5dbe68b59b06140a914ad16519
      • Instruction ID: 6901838b60fbe06e9b9a94f5fd0623215cd89e7f5baaa7a46a90c203c6f5bbaf
      • Opcode Fuzzy Hash: 629215c5edb7e231a08a8a6a77fe871c9ac27d5dbe68b59b06140a914ad16519
      • Instruction Fuzzy Hash: FA11E932501AC482FB66CB12D0047FE3361FB6BB49F544026EB490BAA4DB37C486CB44
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: CloseCreateHandleProcess
      • String ID:
      • API String ID: 3712363035-3916222277
      • Opcode ID: ec3a26160aa634ce45ebbb57167085e5d0d0a6fbbfa2d4b775cb2884f8b4b2e0
      • Instruction ID: 28010274b44fa1e956ac3f03a607f5917cae9998e248d469665ba7fad74a6966
      • Opcode Fuzzy Hash: ec3a26160aa634ce45ebbb57167085e5d0d0a6fbbfa2d4b775cb2884f8b4b2e0
      • Instruction Fuzzy Hash: 96115E32608B408AE7569F17F944B9AB7A2F789BC4F485215FB4D47A79CF39C095CB00
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: PerformanceQuery$Counter$FindFrequencyMessagePostSleepWindow
      • String ID: Shell_TrayWnd
      • API String ID: 352592371-2988720461
      • Opcode ID: 2d7f8c8a5a4ee63675cab8ad9d6e6203ea583a0929ccb3bbb7e2c28fc1bd1015
      • Instruction ID: ad6f979a34d6f8f08fb65ffdcd4644e147a205ae069dd6bf77924abcf4d7f63a
      • Opcode Fuzzy Hash: 2d7f8c8a5a4ee63675cab8ad9d6e6203ea583a0929ccb3bbb7e2c28fc1bd1015
      • Instruction Fuzzy Hash: 88E0177071144482FB1AABB3FC96BE622919BACBD1F9450319B064BAA0DE3C85868B10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: PerformanceQuery$Counter$FindFrequencyMessagePostSleepWindow
      • String ID: Shell_TrayWnd
      • API String ID: 352592371-2988720461
      • Opcode ID: bced536a8068e5fbb1e412a72b2027b03e46ff5afd9815ffd353c41eddc1a4f5
      • Instruction ID: d9bb80b7de06c2d08d7952e2b92eba21473f08368b5a070f78bd79df4ba2a7af
      • Opcode Fuzzy Hash: bced536a8068e5fbb1e412a72b2027b03e46ff5afd9815ffd353c41eddc1a4f5
      • Instruction Fuzzy Hash: 9BE0177471044482FB1AABB3FC66BE626919BECBD1F4450329B064BAE0DE3C85868B10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Temp$FileNamePath
      • String ID: aut
      • API String ID: 3285503233-3010740371
      • Opcode ID: 1c51d7a683b747dd1de1e442f6f3fc1f7cda9d0c3212992f1dab1e6d4cddffe2
      • Instruction ID: bb7548fba60a7623e425cbc5e3fde3ed3ba2ea57dd26511989cafeaa21685963
      • Opcode Fuzzy Hash: 1c51d7a683b747dd1de1e442f6f3fc1f7cda9d0c3212992f1dab1e6d4cddffe2
      • Instruction Fuzzy Hash: 96D05EF162090983EB224B6AE494BD56321F79D78CF844011AB89076649A3CC39ECF10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.12972656094.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
      • Associated: 00000000.00000002.12972644685.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972692353.0000000140099000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972706897.00000001400AF000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972717783.00000001400B1000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400B2000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C5000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972728205.00000001400C7000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.12972761682.00000001400C9000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_140000000_BEncode Editor.jbxd
      Similarity
      • API ID: Message
      • String ID: AutoIt$Error allocating memory.
      • API String ID: 2030045667-4017498283
      • Opcode ID: 883f6d4cccd8ff2deb33c8f5cda20d62b1a23c0eb2386e4a1f6750bc8d57a982
      • Instruction ID: fa14ca8aafecd7ed355ccf4047c4a21a61a1812d37eb39852dc70680f56d6540
      • Opcode Fuzzy Hash: 883f6d4cccd8ff2deb33c8f5cda20d62b1a23c0eb2386e4a1f6750bc8d57a982
      • Instruction Fuzzy Hash: 2AD012B020260881F71A6B22E842BC42720A70C3C8F800807AA0A072B1CEBAC28AC380