Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522739
MD5:3d6cf2933284333f5d945c062bffcd2b
SHA1:deb8e888fcea2139a0f91a7a87386c086b71b134
SHA256:b3058d02ea8c370311e612bd4916e05c8c909b110d3f2c588073c59b2105dba5
Tags:exeuser-jstrosch
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to register a low level keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sample or dropped binary is a compiled AutoHotkey binary
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found potential string decryption / allocating functions
OS version to string mapping found (often used in BOTs)
PE file contains executable resources (Code or Archives)
Potential key logger detected (key state polling based)
Queries the product ID of Windows
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)

Classification

  • System is w10x64
  • file.exe (PID: 7420 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 3D6CF2933284333F5D945C062BFFCD2B)
    • cmd.exe (PID: 7504 cmdline: C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cscript.exe (PID: 7556 cmdline: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs MD5: 24590BF74BBBBFD7D7AC070F4E3C44FD)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, CommandLine: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, CommandLine|base64offset|contains: z%, Image: C:\Windows\System32\cscript.exe, NewProcessName: C:\Windows\System32\cscript.exe, OriginalFileName: C:\Windows\System32\cscript.exe, ParentCommandLine: C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7504, ParentProcessName: cmd.exe, ProcessCommandLine: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, ProcessId: 7556, ProcessName: cscript.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, CommandLine: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, CommandLine|base64offset|contains: z%, Image: C:\Windows\System32\cscript.exe, NewProcessName: C:\Windows\System32\cscript.exe, OriginalFileName: C:\Windows\System32\cscript.exe, ParentCommandLine: C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7504, ParentProcessName: cmd.exe, ProcessCommandLine: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, ProcessId: 7556, ProcessName: cscript.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, CommandLine: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, CommandLine|base64offset|contains: z%, Image: C:\Windows\System32\cscript.exe, NewProcessName: C:\Windows\System32\cscript.exe, OriginalFileName: C:\Windows\System32\cscript.exe, ParentCommandLine: C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7504, ParentProcessName: cmd.exe, ProcessCommandLine: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, ProcessId: 7556, ProcessName: cscript.exe
Source: Process startedAuthor: Michael Haag: Data: Command: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, CommandLine: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, CommandLine|base64offset|contains: z%, Image: C:\Windows\System32\cscript.exe, NewProcessName: C:\Windows\System32\cscript.exe, OriginalFileName: C:\Windows\System32\cscript.exe, ParentCommandLine: C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log, ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7504, ParentProcessName: cmd.exe, ProcessCommandLine: cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs, ProcessId: 7556, ProcessName: cscript.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeReversingLabs: Detection: 39%
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: ::7S|P2f=bV|J/w}hut^fES.*^,5*.pDbZqxtLx,@oI#,oSyY?9L,MTlL,t{sZ;]uEjQYb^_EXYsoP0E2&vu*4rDj7_=ngHNnvUo4hJ|q5-&FdF3_{GXCN00LYQ2Jgj source: file.exe, 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: ^ ::f,1PlmFP@IbV6W!op_/}E29-=ePRdnsqxb}Y@*}s!;R=6qc0fQtlFmew}NL2@?L~Mi.J9WHp9(cH[D08]PJfal}WdgK~?a{Wg+bGyoUnEOOgkasdJf6@hc~}wtL[Y ::7S|P2f=bV|J/w}hut^fES.*^,5*.pDbZqxtLx,@oI#,oSyY?9L,MTlL,t{sZ;]uEjQYb^_EXYsoP0E2&vu*4rDj7_=ngHNnvUo4hJ|q5-&FdF3_{GXCN00LYQ2Jgj source: file.exe
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00475E20 _wcschr,_wcschr,_wcschr,_wcsncpy,_wcschr,FindClose,FindFirstFileW,FindClose,_wcschr,FindFirstFileW,FindClose,0_2_00475E20
Source: file.exe, file.exe, 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://autohotkey.com
Source: file.exe, 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: https://autohotkey.comCould

Key, Mouse, Clipboard, Microphone and Screen Capturing

barindex
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408E80 SetWindowsHookExW 0000000D,Function_000047F0,00400000,000000000_2_00408E80
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404330 EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalUnlock,GlobalFree,GlobalUnlock,CloseClipboard,SetClipboardData,GlobalUnlock,CloseClipboard,0_2_00404330
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404500 GetClipboardFormatNameW,__wcsnicmp,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,GetClipboardData,0_2_00404500
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E17A GetKeyboardLayout,GetTickCount,GetCurrentThreadId,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetGUIThreadInfo,GetWindowThreadProcessId,GetModuleHandleW,GetProcAddress,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,_free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040E17A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E019 __wcsnicmp,GetWindowThreadProcessId,AttachThreadInput,GetKeyboardLayout,GetModuleHandleW,GetProcAddress,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,__wcsnicmp,_wcschr,__wcsnicmp,_free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040E019
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E0AE GetWindowThreadProcessId,AttachThreadInput,GetKeyboardLayout,GetModuleHandleW,GetProcAddress,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,_free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040E0AE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E17A GetKeyboardLayout,GetTickCount,GetCurrentThreadId,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetGUIThreadInfo,GetWindowThreadProcessId,GetModuleHandleW,GetProcAddress,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,_free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040E17A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E2BF GetModuleHandleW,GetProcAddress,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,_wcschr,_wcschr,__wcsnicmp,_free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040E2BF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E68A _free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040E68A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E6B0 _free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040E6B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040E701 __wcsnicmp,__wcsnicmp,__wcsicoll,PostMessageW,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetTickCount,GetTickCount,PeekMessageW,GetTickCount,__wcsnicmp,__wcsnicmp,__fassign,PostMessageW,PostMessageW,PostMessageW,__itow,_free,GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,AttachThreadInput,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,0_2_0040E701
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004117F0 GetKeyState,GetKeyState,GetKeyState,GetForegroundWindow,GetWindowThreadProcessId,GetKeyState,0_2_004117F0

System Summary

barindex
Source: C:\Users\user\Desktop\file.exeWindow found: window name: AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004171010_2_00417101
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040C1B00_2_0040C1B0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041EAA00_2_0041EAA0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0048CBF00_2_0048CBF0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040BB900_2_0040BB90
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004134210_2_00413421
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004134200_2_00413420
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041F5100_2_0041F510
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00482F600_2_00482F60
Source: C:\Users\user\Desktop\file.exeCode function: String function: 0042ECE0 appears 82 times
Source: C:\Users\user\Desktop\file.exeCode function: String function: 0048E559 appears 82 times
Source: file.exeStatic PE information: Resource name: RT_RCDATA type: COM executable for DOS
Source: file.exe, 00000000.00000000.1698591836.000000000064E000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLicenseSwitcher" vs file.exe
Source: file.exe, 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameLicenseSwitcher" vs file.exe
Source: file.exeBinary or memory string: OriginalFilenameLicenseSwitcher" vs file.exe
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal76.spyw.evad.winEXE@6/3@0/0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042F8D0 __wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,_memset,CreateProcessW,CloseHandle,CloseHandle,GetLastError,_memset,__wcsicoll,_wcschr,SetCurrentDirectoryW,_wcschr,_wcschr,GetFileAttributesW,_wcschr,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetLastError,FormatMessageW,0_2_0042F8D0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00476DC0 SystemParametersInfoW,LoadLibraryExW,EnumResourceNamesW,FindResourceW,LoadResource,LockResource,GetSystemMetrics,FindResourceW,LoadResource,LockResource,SizeofResource,CreateIconFromResourceEx,FreeLibrary,ExtractIconW,ExtractIconW,0_2_00476DC0
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\Desktop\LIC_SWITCH.logJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7512:120:WilError_03
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\PID8.vbsJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 39%
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cscript.exe cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.logJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cscript.exe cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbsJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sxs.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: vbscript.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\cscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow found: window name: SysTabControl32Jump to behavior
Source: C:\Users\user\Desktop\file.exeWindow detected: Number of UI elements: 52
Source: file.exeStatic file information: File size 1675264 > 1048576
Source: file.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x17de00
Source: Binary string: ::7S|P2f=bV|J/w}hut^fES.*^,5*.pDbZqxtLx,@oI#,oSyY?9L,MTlL,t{sZ;]uEjQYb^_EXYsoP0E2&vu*4rDj7_=ngHNnvUo4hJ|q5-&FdF3_{GXCN00LYQ2Jgj source: file.exe, 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmp
Source: Binary string: ^ ::f,1PlmFP@IbV6W!op_/}E29-=ePRdnsqxb}Y@*}s!;R=6qc0fQtlFmew}NL2@?L~Mi.J9WHp9(cH[D08]PJfal}WdgK~?a{Wg+bGyoUnEOOgkasdJf6@hc~}wtL[Y ::7S|P2f=bV|J/w}hut^fES.*^,5*.pDbZqxtLx,@oI#,oSyY?9L,MTlL,t{sZ;]uEjQYb^_EXYsoP0E2&vu*4rDj7_=ngHNnvUo4hJ|q5-&FdF3_{GXCN00LYQ2Jgj source: file.exe
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0064DBE0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_0064DBE0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040707B push esp; ret 0_2_0040707E
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040708C push esp; ret 0_2_0040708D
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00407112 push esp; ret 0_2_00407113
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004075FF push esp; ret 0_2_00407602
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406E51 push esp; ret 0_2_00406E52
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040760A push esp; ret 0_2_00407611
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406FCC pushad ; ret 0_2_00406FCD
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406FF6 push esp; ret 0_2_00406FF7
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00492FF5 push ecx; ret 0_2_00493008
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00406FB9 pushad ; ret 0_2_00406FBA
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00469130 SendMessageW,SendMessageW,SendMessageW,GetWindowLongW,IsWindowVisible,IsIconic,GetFocus,GetWindowRect,GetPropW,ShowWindow,GetUpdateRect,SendMessageW,GetWindowLongW,ShowWindow,KiUserCallbackDispatcher,GetWindowRect,PtInRect,PtInRect,PtInRect,SetFocus,SendMessageW,SendMessageW,ShowWindow,SetFocus,InvalidateRect,InvalidateRect,InvalidateRect,MapWindowPoints,InvalidateRect,0_2_00469130
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00478C60 GetWindowThreadProcessId,GetWindowThreadProcessId,GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,SetForegroundWindow,SetForegroundWindow,GetForegroundWindow,GetWindow,AttachThreadInput,AttachThreadInput,KiUserCallbackDispatcher,0_2_00478C60
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00476360 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,0_2_00476360
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_NetworkAdapter WHERE NetEnabled=True and PhysicalAdapter=True and PNPDeviceID LIKE &apos;%PCI%&apos;
Source: C:\Users\user\Desktop\file.exeWindow / User API: foregroundWindowGot 1004Jump to behavior
Source: C:\Users\user\Desktop\file.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-21126
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004127C0 GetKeyboardLayout followed by cmp: cmp al, 19h and CTI: ja 004128AFh country: Russian (ru)0_2_004127C0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00475E20 _wcschr,_wcschr,_wcschr,_wcsncpy,_wcschr,FindClose,FindFirstFileW,FindClose,_wcschr,FindFirstFileW,FindClose,0_2_00475E20
Source: file.exeBinary or memory string: |HZO9xC-vW ::E5osG1?2Jaq3AWUR)5HYuC*PLa+pZFUh#WRkYD)C[/0..q[lX0ia.?sNRAA]Y;,^2f*.!&O?YXp+B{OLCwGe+JP)HirsbXJeC.3~b=l[m#mHlLVYN@nncxx;m8/eO ::TFoeT!YMvmud6qEmUv*4N+lCvy6yK#+0d)yhX2hP.0=GLvVAw^fA.qSfuX}R-3Z9t)r(L=xK5yV8tUj(NF4gMjXPdrSKu4Ge?assC)&{d2oqm2;oK#REF
Source: file.exe, 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ::TFoeT!YMvmud6qEmUv*4N+lCvy6yK#+0d)yhX2hP.0=GLvVAw^fA.qSfuX}R-3Z9t)r(L=xK5yV8tUj(NF4gMjXPdrSKu4Ge?assC)&{d2oqm2;oK#REFXaBRftgY
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00492505 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00492505
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0064DBE0 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_0064DBE0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00492505 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00492505
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00494EE6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00494EE6
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042F8D0 __wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,__wcsicoll,_memset,CreateProcessW,CloseHandle,CloseHandle,GetLastError,_memset,__wcsicoll,_wcschr,SetCurrentDirectoryW,_wcschr,_wcschr,GetFileAttributesW,_wcschr,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetLastError,FormatMessageW,0_2_0042F8D0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040FA50 GetKeyState,GetCurrentThreadId,GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,PostMessageW,GetModuleHandleW,GetProcAddress,GetForegroundWindow,GetAsyncKeyState,keybd_event,keybd_event,GetAsyncKeyState,keybd_event,GetAsyncKeyState,GetModuleHandleW,GetProcAddress,0_2_0040FA50
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004109A0 GetAsyncKeyState,GetSystemMetrics,GetSystemMetrics,GetCursorPos,WindowFromPoint,GetWindowThreadProcessId,SendMessageW,mouse_event,mouse_event,0_2_004109A0
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cscript.exe cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbsJump to behavior
Source: file.exeBinary or memory string: Program Manager
Source: file.exeBinary or memory string: Shell_TrayWnd
Source: file.exe, 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: regk-hookm-hook2-hooksjoypollPART%i-%i(no)%s%s%s%s%s%s{Raw}{Text}%s%cHotstring max abbreviation length is 40.EndCharsMouseResetResetParameter #1 invalid.Parameter #2 invalid.Parameter #3 invalid.Parameter #2 must not be blank in this case.Hotstring not found.TextLEFTLRIGHTRMIDDLEMX1X2WUWDWLWRSendInputuser32{Blind}{ClickLl{}^+!#{}RawTempASC U+ ,LWin RWin LShift RShift LCtrl RCtrl LAlt RAlt SYSTEM\CurrentControlSet\Control\Keyboard Layouts\Layout FileKbdLayerDescriptorsc%03Xvk%02XSCALTDOWNALTUPSHIFTDOWNSHIFTUPCTRLDOWNCONTROLDOWNCTRLUPCONTROLUPLWINDOWNLWINUPRWINDOWNRWINUPRtlGetVersionntdll.dll%u.%u.%uStdOutAllClassOverwriteUseEnvLocalSameAsGlobalUseUnsetGlobalUseUnsetLocalYYYYYWeekYearYDayWorkingDirWinDirWinDelayWDayUserNameTitleMatchModeSpeedTitleMatchModeTimeSinceThisHotkeyTimeSincePriorHotkeyTimeIdlePhysicalTimeIdleMouseTimeIdleKeyboardTimeIdleTickCountThisMenuItemPosThisMenuItemThisMenuThisLabelThisHotkeyThisFuncStoreCapslockModeStartupCommonStartupStartMenuCommonStartMenuSecScriptNameScriptHwndScriptFullPathScriptDirScreenWidthScreenHeightScreenDPIRegViewPtrSizeProgramsCommonProgramsPriorKeyPriorHotkeyOSVersionOSTypeNumBatchLinesNowUTCNowMyDocumentsMSecMouseDelayPlayMouseDelayMonMMMMMMMMMMinMDayLoopRegTypeLoopRegTimeModifiedLoopRegSubKeyLoopRegNameLoopRegKeyLoopReadLineLoopFileTimeModifiedLoopFileTimeCreatedLoopFileTimeAccessedLoopFileSizeMBLoopFileSizeKBLoopFileSizeLoopFileShortPathLoopFileShortNameLoopFilePathLoopFileNameLoopFileLongPathLoopFileFullPathLoopFileExtLoopFileDirLoopFileAttribLoopFieldLineNumberLineFileLastErrorLanguageKeyDurationPlayKeyDurationKeyDelayPlayKeyDelayIsUnicodeIsSuspendedIsPausedIsCriticalIsCompiledIsAdminIs64bitOSIPAddress4IPAddress3IPAddress2IPAddress1IndexIconTipIconNumberIconHiddenIconFileHourGuiYGuiXGuiWidthGuiHeightGuiEventGuiControlEventFormatIntegerFormatFloatExitReasonEventInfoEndCharDesktopCommonDesktopDefaultTreeViewDefaultMouseSpeedDefaultListViewDefaultGuiDDDDDDDDDCursorCoordModeToolTipCoordModePixelCoordModeMouseCoordModeMenuCoordModeCaretControlDelayComputerNameCaretYCaretXBatchLinesAppDataCommonAppDataAhkVersionAhkPathTrueProgramFilesFalseComSpecClipboardAll...%s[%Iu of %Iu]: %-1.60s%sPropertyRegExMatch\:\:HKLMHKEY_LOCAL_MACHINEHKCRHKEY_CLASSES_ROOTHKCCHKEY_CURRENT_CONFIGHKCUHKEY_CURRENT_USERHKUHKEY_USERSREG_SZREG_EXPAND_SZREG_MULTI_SZREG_DWORDREG_BINARYDefault3264LineRegExFASTSLOWAscChrDerefHTMLModPowExpSqrtLogLnRoundCeilFloorAbsSinCosTanASinACosATanBitAndBitOrBitXOrBitNotBitShiftLeftBitShiftRightAddDestroyNamePriorityInterruptNoTimersLabelTypeONLocalePermitMouseSendAndMouseMouseMoveOffPlayEventThenEventThenPlayYESNOOKCANCELABORTIGNORERETRYCONTINUETRYAGAINTimeoutMINMAXHIDEScreenRelativeWindowClientPixelCaretIntegerFloatNumberTimeDateDigitXdigitAlnumAlphaUpperLowerUTF-8UTF-8-RAWUTF-16UTF-16-RAWCPFuncRemoveClipboardFormatListenerAddClipboardFormatListenerTrayNo tray memstatus AHK_PlayMe modeclose AHK_PlayMe%s\%sRegClassAutoHotkey2Shell_TrayWndCreateWindoweditLucida ConsoleConsolasCritical Error: %s
Source: file.exe, 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: "%-1.300s"The maximum number of MsgBoxes has been reached.IsHungAppWindowahk_idpidgroup%s%uProgram ManagerError text not found (please report)Q\E{0,DEFINEUTF16)UCP)NO_START_OPT)CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument is compiled in 8 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: C:\Windows\System32\cscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion DigitalProductIdJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416D74 SetCurrentDirectoryW,GetSystemTimeAsFileTime,0_2_00416D74
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004135CE RtlGetVersion,__snwprintf,0_2_004135CE
Source: C:\Windows\System32\cscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: file.exeBinary or memory string: WIN_XP
Source: file.exe, 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ?*A Goto/Gosub must not jump into a block that doesn't enclose it.ddddddd%02d%dmsSlowLogoffSingle1.1.28.02\AutoHotkey.exeWIN32_NTWIN_XPWIN_7WIN_8.1WIN_8WIN_VISTAWIN_2003WIN_2000%04hXcomspecGetCursorInfo0x%Ix*pPIntStrPtrShortCharInt64DoubleAStrWStrgdi32comctl32W-3-4CDecl-2This DllCall requires a prior VarSetCapacity. The program is now unstable and will exit.Pos%sLen%sPos%dLen%dLenMarkpcre_calloutCompile error %d at offset %d: %hs-+0 #diouxXeEfgGaAcCpULlTt%0.*fCcFfSelectVisCenterUniDescCaseLogicalNoSortAutoHdrFirstBoldExpandGDI+JoyJoyXJoyYJoyZJoyRJoyUJoyVJoyPOVJoyNameJoyButtonsJoyAxesJoyInfoGetProcessImageFileNameWpsapi0
Source: file.exeBinary or memory string: WIN_VISTA
Source: file.exeBinary or memory string: WIN_7
Source: file.exeBinary or memory string: WIN_8
Source: file.exeBinary or memory string: WIN_8.1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00415BC0 Shell_NotifyIconW,DeleteObject,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DestroyCursor,DeleteObject,DestroyCursor,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyCursor,DestroyCursor,IsWindow,DestroyWindow,DeleteObject,RemoveClipboardFormatListener,ChangeClipboardChain,mciSendStringW,mciSendStringW,mciSendStringW,RtlDeleteCriticalSection,OleUninitialize,_free,_free,_free,0_2_00415BC0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416460 AddClipboardFormatListener,PostMessageW,SetClipboardViewer,RemoveClipboardFormatListener,ChangeClipboardChain,0_2_00416460
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
Valid Accounts1
Windows Management Instrumentation
1
Scripting
1
Exploitation for Privilege Escalation
1
Masquerading
121
Input Capture
1
System Time Discovery
Remote Services121
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
12
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory111
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
12
Process Injection
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares2
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
Obfuscated Files or Information
LSA Secrets11
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync24
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe39%ReversingLabsWin32.Trojan.Generic
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://autohotkey.comfile.exe, file.exe, 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpfalse
    unknown
    https://autohotkey.comCouldfile.exe, 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpfalse
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1522739
      Start date and time:2024-09-30 16:18:36 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 39s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:file.exe
      Detection:MAL
      Classification:mal76.spyw.evad.winEXE@6/3@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, www.google.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • VT rate limit hit for: file.exe
      TimeTypeDescription
      10:19:29API Interceptor1x Sleep call for process: file.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Users\user\Desktop\file.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):2155
      Entropy (8bit):5.14094104394761
      Encrypted:false
      SSDEEP:48:L5YZnAz6MFDuxB7KAN7KBa4iPG9lrRtFf1f0WNoQCvYBBNyJS1GDT:VY1AzpuxB7KAN7KhiuFtHf0XQCwBBNyP
      MD5:78D143BC6C1968D0A228B29E823D051E
      SHA1:A11DFA069C0B49487F55B32E8E9E89FAD3796B5B
      SHA-256:DCA511DFDBAADBAD34A89F0FA4C86DE1A8A37FEDC326F7BC17A746D44B0FBAFF
      SHA-512:AF82AB5A8855576F0F29A681B07BEFD456EBCA7E381E8C902E9151CEABF6C59035D02EAD07FC98B2E601EA11746887664ACEE73F39EE2C029685289F9C519068
      Malicious:true
      Reputation:low
      Preview:Option Explicit ....Dim strComputer, objWMIService, objItem, Caption, colItems..'Create wscript.shell object ..strComputer = "."..Set objWMIService = GetObject("winmgmts:\\" & strComputer & "\root\cimv2")..Set colItems = objWMIService.ExecQuery("Select * from Win32_OperatingSystem",,48)..For Each objItem in colItems.. Caption = objItem.Caption ..Next....If InStr(Caption,"Windows") > 0 Then ...Dim objshell,path,DigitalID, Result ...Set objshell = CreateObject("WScript.Shell")...'Set registry key path...Path = "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\"...'Registry key value...DigitalID = objshell.RegRead(Path & "DigitalProductId")...Dim ProductName,ProductID,ProductKey,ProductData...'Get ProductName, ProductID, ProductKey...ProductKey = ConvertToKey(DigitalID) ...ProductData = ProductName & vbNewLine & ProductID & vbNewLine & ProductKey...'Show messbox if save to a file ...wscript.echo ProductData...'If vbOK = MsgBox(ProductData & vblf & vblf) then...'End If.. ..Else...
      Process:C:\Windows\System32\cmd.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):35
      Entropy (8bit):3.878584802350185
      Encrypted:false
      SSDEEP:3:r1v/IzqQkUQv:ezqT
      MD5:A8085F09078ACB8C3504D8E3739BE4DE
      SHA1:6B0FFF11D3580D32194479B2A73908B89A128AF3
      SHA-256:D90775018F214DD4A138B298F48D45FA0CDEAAA03195217BD10A35F79985BB93
      SHA-512:036532A11C6CCEA7DEC97666A973A7A2CDFD10E4B66AFD40A8BB96EAA13191A32F893C27213162B6E2F1492489258818886C4159DEE3EF2C8F34D4DF996BE82C
      Malicious:true
      Reputation:low
      Preview:....PJN2F-VHHVF-2MKYV-FHM9J-G9YDG..
      Process:C:\Users\user\Desktop\file.exe
      File Type:ASCII text, with CRLF line terminators
      Category:modified
      Size (bytes):707
      Entropy (8bit):4.9760749324314295
      Encrypted:false
      SSDEEP:12:IdFUUDHuwkXIcNZpwgsjXHbjWCrP5Zu5uwkf:IdFUUuwkYcfpwg6nWAPWuwkf
      MD5:34D491613AAC895643B9C87C97CAB7E6
      SHA1:AAEC490195AE4F2F791F471749ECE16CEF3363A9
      SHA-256:742AD0F2958C61BD92DFEAC5A81D9BF5760EC4FB5BA658341962BB7DE8BE7DEF
      SHA-512:20C9629661BB92BA9288AAADC0A19FFE751F06F17C2F0F70E5B0556A04D1DD4DB696D26BC97B14580E1888E7FA2D5B47DB4D3958CF4A3DFC71D7C060622A5AA9
      Malicious:false
      Reputation:low
      Preview:30 Sep 2024 10:19:29 \\\\\\\\\\\\\\\\\\\\\\\\\*** \\ TOOL START // ***/////////////////////////..30 Sep 2024 10:19:32 Checking for NetWork Adapter..30 Sep 2024 10:19:32 Adapter: Intel(R) 82574L Gigabit Network Connection..30 Sep 2024 10:19:32 Product: Professional..30 Sep 2024 10:19:32 Description: OEM_COA_NSLP..30 Sep 2024 10:19:32 Architecture: x64..30 Sep 2024 10:19:32 LicenseID: 221a02da-e2a1-4b75-864c-0a4410a33fdf..30 Sep 2024 10:19:32 PartialKey: BTDGR..30 Sep 2024 10:19:32 Status: Licensed..30 Sep 2024 10:19:32 WU Status: DISABLED..30 Sep 2024 10:19:32 System is: online..30 Sep 2024 10:19:32 Adapter: Intel(R) 82574L Gigabit Network Connection..
      File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
      Entropy (8bit):7.826948759100624
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.39%
      • UPX compressed Win32 Executable (30571/9) 0.30%
      • Win32 EXE Yoda's Crypter (26571/9) 0.26%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      File name:file.exe
      File size:1'675'264 bytes
      MD5:3d6cf2933284333f5d945c062bffcd2b
      SHA1:deb8e888fcea2139a0f91a7a87386c086b71b134
      SHA256:b3058d02ea8c370311e612bd4916e05c8c909b110d3f2c588073c59b2105dba5
      SHA512:2fc2aa55e05740eba7c8de7c686071a6d6f47a0997d722408c902dce860948e5fc5cbf4e94b788c22120336b00adec58582b4c6f5d6439f6b54da77839351cb0
      SSDEEP:49152:Zc2/wgEeoVOwjL4aCd/JajeU8PrbS6rgSvkW:CgEdIi4p/J60d
      TLSH:0075331982E13D05C584CC33AD8245395A673CF8ECB4BE6B0E78B107793A4955E27BBE
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........>...m...m...m...m...m...m#..m...m...m...m...m...mh..m...m...m...m...m...m...m...m...mRich...m................PE..L......Z...
      Icon Hash:31d4b2552b9f1e97
      Entrypoint:0x64dbe0
      Entrypoint Section:UPX1
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:
      Time Stamp:0x5AC82E88 [Sat Apr 7 02:35:52 2018 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:0
      File Version Major:5
      File Version Minor:0
      Subsystem Version Major:5
      Subsystem Version Minor:0
      Import Hash:9212356426809f1b4ccfc1b6e5484912
      Instruction
      pushad
      mov esi, 004D0000h
      lea edi, dword ptr [esi-000CF000h]
      push edi
      jmp 00007F8604C0B98Dh
      nop
      mov al, byte ptr [esi]
      inc esi
      mov byte ptr [edi], al
      inc edi
      add ebx, ebx
      jne 00007F8604C0B989h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F8604C0B96Fh
      mov eax, 00000001h
      add ebx, ebx
      jne 00007F8604C0B989h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc eax, eax
      add ebx, ebx
      jnc 00007F8604C0B98Dh
      jne 00007F8604C0B9AAh
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F8604C0B9A1h
      dec eax
      add ebx, ebx
      jne 00007F8604C0B989h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc eax, eax
      jmp 00007F8604C0B956h
      add ebx, ebx
      jne 00007F8604C0B989h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc ecx, ecx
      jmp 00007F8604C0B9D4h
      xor ecx, ecx
      sub eax, 03h
      jc 00007F8604C0B993h
      shl eax, 08h
      mov al, byte ptr [esi]
      inc esi
      xor eax, FFFFFFFFh
      je 00007F8604C0B9F7h
      sar eax, 1
      mov ebp, eax
      jmp 00007F8604C0B98Dh
      add ebx, ebx
      jne 00007F8604C0B989h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F8604C0B94Eh
      inc ecx
      add ebx, ebx
      jne 00007F8604C0B989h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jc 00007F8604C0B940h
      add ebx, ebx
      jne 00007F8604C0B989h
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      adc ecx, ecx
      add ebx, ebx
      jnc 00007F8604C0B971h
      jne 00007F8604C0B98Bh
      mov ebx, dword ptr [esi]
      sub esi, FFFFFFFCh
      adc ebx, ebx
      jnc 00007F8604C0B966h
      add ecx, 02h
      cmp ebp, FFFFFB00h
      adc ecx, 02h
      lea edx, dword ptr [edi+ebp]
      cmp ebp, FFFFFFFCh
      jbe 00007F8604C0B990h
      mov al, byte ptr [edx]
      Programming Language:
      • [C++] VS2010 build 30319
      • [ C ] VS2010 build 30319
      • [ C ] VS2008 SP1 build 30729
      • [IMP] VS2008 SP1 build 30729
      • [ASM] VS2010 build 30319
      • [RES] VS2010 build 30319
      • [LNK] VS2010 build 30319
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x2689900x310.rsrc
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x24e0000x1a990.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      UPX00x10000xcf0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      UPX10xd00000x17e0000x17de002393741cbe143949bba0aaaac3fe4e30False0.9745249846563011data7.826915664472013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0x24e0000x1b0000x1ae00181a185a6385bfe3f223a0af74e33a78False0.8149981831395349data7.19000125841001IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_ICON0x24ea740x39caPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9937812626740571
      RT_ICON0x2524440x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536, 16 important colorsEnglishUnited States0.3542682926829268
      RT_ICON0x252ab00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640, 16 important colorsEnglishUnited States0.45026881720430106
      RT_ICON0x252d9c0x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384, 16 important colorsEnglishUnited States0.48565573770491804
      RT_ICON0x252f880x128Device independent bitmap graphic, 16 x 32 x 4, image size 192, 16 important colorsEnglishUnited States0.527027027027027
      RT_ICON0x2530b40x5f58PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.998320222877745
      RT_ICON0x2590100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 248 important colorsEnglishUnited States0.5469083155650319
      RT_ICON0x259ebc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 250 important colorsEnglishUnited States0.6714801444043321
      RT_ICON0x25a7680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672, 235 important colorsEnglishUnited States0.6923963133640553
      RT_ICON0x25ae340x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 108 important colorsEnglishUnited States0.4436416184971098
      RT_ICON0x25b3a00x8940PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9981785063752276
      RT_ICON0x263ce40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.35809128630705395
      RT_ICON0x2662900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.40853658536585363
      RT_ICON0x26733c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.4487704918032787
      RT_ICON0x267cc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5195035460992907
      RT_ICON0xe90f40x39cadata0.9968230363660944
      RT_ICON0xecac00x668data1.0067073170731706
      RT_ICON0xed1280x2e8data1.0147849462365592
      RT_ICON0xed4100x1e8data1.0225409836065573
      RT_ICON0xed5f80x128data1.037162162162162
      RT_ICON0xed7200x5f58data0.9967633562766306
      RT_ICON0xf36780xea8data1.0029317697228144
      RT_ICON0xf45200x8a8data1.0049638989169676
      RT_ICON0xf4dc80x6c8data1.006336405529954
      RT_ICON0xf54900x568data1.0079479768786128
      RT_ICON0xf59f80x8940data0.9971254553734062
      RT_ICON0xfe3380x25a8data0.9976141078838174
      RT_ICON0x1008e00x10a8data1.002579737335835
      RT_ICON0x1019880x988data1.0045081967213114
      RT_ICON0x1023100x468data1.0097517730496455
      RT_MENU0x1027780x2c8dataEnglishUnited States1.0154494382022472
      RT_DIALOG0x102a400xe8dataEnglishUnited States1.0474137931034482
      RT_ACCELERATOR0x102b280x48dataEnglishUnited States1.1527777777777777
      RT_RCDATA0x102b700x3adf7dataEnglishUnited States0.9870325906205032
      RT_RCDATA0x13d9680x8a4edataEnglishUnited States0.9532000225950404
      RT_RCDATA0x1463b80xad15dataEnglishUnited States0.9471890586562549
      RT_RCDATA0x1510d00x60b9bCOM executable for DOSEnglishUnited States0.9672149767660221
      RT_RCDATA0x1b1c6c0x64765dataEnglishUnited States0.9708208888122034
      RT_RCDATA0x2163d40x138f6dataEnglishUnited States0.9708804513342819
      RT_RCDATA0x229ccc0x86bdataEnglishUnited States1.002784222737819
      RT_RCDATA0x22a5380xf6ccdataEnglishUnited States0.9714466603355493
      RT_RCDATA0x239c040x10865dataEnglishUnited States0.9717662702223535
      RT_GROUP_ICON0x2681340xd8dataEnglishUnited States0.5972222222222222
      RT_GROUP_ICON0x24a5440xd8data1.0509259259259258
      RT_VERSION0x2682100x2e8dataGermanGermany0.4435483870967742
      RT_MANIFEST0x2684fc0x492ASCII text, with very long lines (1170), with no line terminatorsEnglishUnited States0.5
      DLLImport
      KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
      ADVAPI32.dllRegCloseKey
      COMCTL32.dllImageList_Create
      COMDLG32.dllGetSaveFileNameW
      GDI32.dllBitBlt
      ole32.dllCoGetObject
      OLEAUT32.dllSysStringLen
      PSAPI.DLLGetModuleBaseNameW
      SHELL32.dllDragFinish
      USER32.dllGetDC
      VERSION.dllVerQueryValueW
      WINMM.dllmixerOpen
      WSOCK32.dllWSAStartup
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      GermanGermany
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:10:19:29
      Start date:30/09/2024
      Path:C:\Users\user\Desktop\file.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\file.exe"
      Imagebase:0x400000
      File size:1'675'264 bytes
      MD5 hash:3D6CF2933284333F5D945C062BFFCD2B
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Target ID:1
      Start time:10:19:31
      Start date:30/09/2024
      Path:C:\Windows\System32\cmd.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\sysnative\cmd.exe /c (cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs)>>C:\Users\user\AppData\Local\Temp\kms.log
      Imagebase:0x7ff77a700000
      File size:289'792 bytes
      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:2
      Start time:10:19:31
      Start date:30/09/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff7699e0000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:3
      Start time:10:19:31
      Start date:30/09/2024
      Path:C:\Windows\System32\cscript.exe
      Wow64 process (32bit):false
      Commandline:cscript.exe /nologo C:\Users\user\AppData\Local\Temp\PID8.vbs
      Imagebase:0x7ff6967c0000
      File size:161'280 bytes
      MD5 hash:24590BF74BBBBFD7D7AC070F4E3C44FD
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:moderate
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:3.9%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:27.6%
        Total number of Nodes:688
        Total number of Limit Nodes:17
        execution_graph 21387 401483 183 API calls 21327 409ddc 61 API calls __wcsicoll 21328 40405c 69 API calls 21330 415661 46 API calls _free 21388 404960 CallNextHookEx GetTickCount CallNextHookEx 21331 40dc61 80 API calls 21389 412564 6 API calls 20932 472860 20933 47286c 20932->20933 20935 472872 20932->20935 20934 48e5e4 _malloc 46 API calls 20933->20934 20934->20935 21332 40ca6b 85 API calls 21334 415070 59 API calls __fassign 21390 414170 86 API calls 21392 416d74 99 API calls 21393 401177 CharUpperW 21395 40e110 216 API calls 4 library calls 21335 41ae7a 106 API calls 21396 413b7f 85 API calls __wcstoi64 21397 41697e 119 API calls _wcsncpy 21398 417101 107 API calls 5 library calls 21401 40e41c 240 API calls 6 library calls 21338 404e02 88 API calls 21020 403d0e 21021 403d12 21020->21021 21058 421e80 21021->21058 21023 403d4a 21024 403d75 21023->21024 21187 422130 21023->21187 21033 404024 21024->21033 21079 46e710 21024->21079 21029 403dae 21090 415f00 21029->21090 21031 403dc2 21031->21033 21112 416d20 21031->21112 21034 403de7 21034->21033 21035 403e48 21034->21035 21036 403ebe FindWindowW 21034->21036 21040 403eb3 21034->21040 21037 403e55 FindWindowW 21035->21037 21038 403f3f SystemParametersInfoW 21035->21038 21036->21038 21039 403eac PostMessageW Sleep IsWindow 21036->21039 21037->21038 21048 403e70 21037->21048 21041 403f59 21038->21041 21042 403f6f 21038->21042 21044 403f3b Sleep 21039->21044 21049 403efe 21039->21049 21040->21036 21040->21038 21041->21042 21045 403f62 SystemParametersInfoW 21041->21045 21128 416110 21042->21128 21044->21038 21045->21042 21047 403f2b Sleep IsWindow 21047->21044 21047->21049 21048->21033 21048->21039 21049->21033 21049->21047 21050 403f79 __flswbuf 21050->21033 21051 403faf _memset 21050->21051 21052 48e5e4 _malloc 46 API calls 21050->21052 21156 409cf0 21051->21156 21052->21051 21056 404011 21174 4166f0 21056->21174 21059 421e9a 21058->21059 21061 421ea6 _wcsncpy 21058->21061 21059->21023 21062 421ed7 21061->21062 21066 421f74 21061->21066 21216 48e559 58 API calls 2 library calls 21061->21216 21062->21023 21063 4220fa 21063->21023 21064 421fe0 21064->21063 21067 422064 21064->21067 21068 42202c 21064->21068 21066->21062 21066->21064 21217 48e559 58 API calls 2 library calls 21066->21217 21072 422078 21067->21072 21077 4220a2 21067->21077 21069 421e80 58 API calls 21068->21069 21071 422047 21069->21071 21070 4220d7 21070->21063 21075 421e80 58 API calls 21070->21075 21071->21023 21073 421e80 58 API calls 21072->21073 21076 422095 21073->21076 21075->21063 21076->21023 21077->21070 21078 422113 21077->21078 21218 48e559 58 API calls 2 library calls 21077->21218 21078->21023 21080 46e720 __crtLCMapStringA_stat 21079->21080 21081 490341 71 API calls 21080->21081 21082 46e75e 21081->21082 21084 403d9a 21082->21084 21219 46eb10 85 API calls 2 library calls 21082->21219 21084->21033 21085 478190 21084->21085 21086 478199 21085->21086 21087 4781a2 21086->21087 21220 48f817 46 API calls 2 library calls 21086->21220 21087->21029 21089 4781f9 21089->21029 21221 499d50 21090->21221 21094 415fb3 21094->21031 21097 415f6d _wcsrchr 21097->21094 21099 415fe9 21097->21099 21235 472360 21097->21235 21099->21094 21100 472360 71 API calls 21099->21100 21101 416008 21100->21101 21101->21094 21240 474fc0 79 API calls _vswprintf_s 21101->21240 21103 416030 21104 472360 71 API calls 21103->21104 21105 41603b 21104->21105 21105->21094 21106 41604c GetModuleFileNameW 21105->21106 21107 416070 21106->21107 21108 4160e2 21106->21108 21109 472360 71 API calls 21107->21109 21108->21031 21108->21094 21110 4160a2 _wcsrchr 21109->21110 21110->21094 21111 472360 71 API calls 21110->21111 21111->21108 21113 416f42 21112->21113 21115 416d49 21112->21115 21113->21034 21114 416e63 21120 416e72 21114->21120 21249 420310 61 API calls 21114->21249 21115->21113 21115->21114 21119 42f3f0 85 API calls 21115->21119 21116 416e9c SetCurrentDirectoryW 21121 416eb9 21116->21121 21119->21115 21120->21113 21120->21116 21250 42f4a0 80 API calls 21120->21250 21121->21113 21251 422c70 58 API calls 2 library calls 21121->21251 21123 416ef5 21123->21113 21124 421e20 96 API calls 21123->21124 21125 416f08 21124->21125 21125->21113 21126 416f21 GetSystemTimeAsFileTime 21125->21126 21127 416f35 21126->21127 21127->21034 21129 41612e _memset 21128->21129 21142 4161e4 21128->21142 21129->21142 21252 476dc0 21129->21252 21131 41617a GetSystemMetrics 21132 476dc0 14 API calls 21131->21132 21133 41619b LoadCursorW RegisterClassExW 21132->21133 21134 416210 RegisterClassExW 21133->21134 21133->21142 21135 41622c GetForegroundWindow 21134->21135 21134->21142 21136 416257 CreateWindowExW 21135->21136 21137 416236 GetClassNameW 21135->21137 21141 4162d7 GetMenu EnableMenuItem 21136->21141 21136->21142 21137->21136 21138 416248 21137->21138 21274 48e559 58 API calls 2 library calls 21138->21274 21273 416510 EnableMenuItem EnableMenuItem EnableMenuItem EnableMenuItem 21141->21273 21142->21050 21144 4162f8 CreateWindowExW 21144->21142 21145 41632b GetDC 21144->21145 21146 41633d 8 API calls 21145->21146 21148 4163f9 LoadAcceleratorsW 21146->21148 21149 4163de ShowWindow SetWindowLongW 21146->21149 21150 416420 21148->21150 21151 41642c 21148->21151 21149->21148 21153 416441 21150->21153 21154 41643a 21150->21154 21275 416540 Shell_NotifyIconW _memset _wcsncpy 21151->21275 21153->21050 21276 416460 PostMessageW SetClipboardViewer ChangeClipboardChain 21154->21276 21158 409d10 _memset 21156->21158 21159 409d97 UnregisterHotKey 21158->21159 21164 409dcf 21158->21164 21277 404730 58 API calls __wcsicoll 21158->21277 21159->21158 21160 40a0ff 21162 403ff0 21160->21162 21165 40a168 SetTimer 21160->21165 21161 40a0a7 UnregisterHotKey 21161->21164 21167 421e20 21162->21167 21163 40a076 RegisterHotKey 21163->21164 21164->21160 21164->21161 21164->21163 21278 48e559 58 API calls 2 library calls 21164->21278 21165->21162 21168 421e35 21167->21168 21169 421e2e 21167->21169 21170 421e80 58 API calls 21168->21170 21169->21056 21171 421e53 21170->21171 21172 421e75 21171->21172 21173 422130 96 API calls 21171->21173 21172->21056 21173->21172 21175 48e5e4 _malloc 46 API calls 21174->21175 21176 41670c 21175->21176 21177 416723 SetTimer 21176->21177 21178 41671a 21176->21178 21179 416764 GetTickCount 21177->21179 21186 416757 21177->21186 21178->21033 21180 4167b2 GetTickCount 21179->21180 21181 416796 SetTimer 21179->21181 21182 4167dd 21180->21182 21181->21180 21184 4167ef KillTimer 21182->21184 21182->21186 21184->21186 21185 416833 21185->21033 21186->21185 21279 42eed0 87 API calls 3 library calls 21186->21279 21188 42216a 21187->21188 21189 422148 _wcsncpy 21187->21189 21188->21024 21189->21188 21280 4788e0 21189->21280 21191 4221a8 21191->21188 21288 422640 21191->21288 21194 422233 21195 472360 71 API calls 21194->21195 21202 42223f 21195->21202 21196 4221ee 21197 422219 21196->21197 21199 421e20 96 API calls 21196->21199 21197->21024 21201 42220c 21199->21201 21200 4221e7 21200->21194 21200->21196 21201->21024 21203 422281 21202->21203 21206 422364 _memmove 21202->21206 21311 472450 21202->21311 21205 472450 71 API calls 21203->21205 21203->21206 21211 42229f _memmove 21203->21211 21205->21211 21206->21024 21207 4223db 21207->21206 21292 48f851 21207->21292 21210 42261a 21210->21024 21211->21206 21211->21207 21212 42249c 21211->21212 21214 48e5e4 _malloc 46 API calls 21211->21214 21212->21206 21215 422530 _memmove 21212->21215 21316 48e559 58 API calls 2 library calls 21212->21316 21214->21207 21215->21210 21317 48e559 58 API calls 2 library calls 21215->21317 21216->21061 21217->21066 21218->21077 21219->21084 21220->21089 21222 415f0a GetModuleFileNameW 21221->21222 21223 475e20 21222->21223 21224 475e36 21223->21224 21231 415f44 21223->21231 21224->21231 21233 475e71 _wcschr _wcsncpy 21224->21233 21246 4095a0 59 API calls 21224->21246 21226 475f57 FindFirstFileW 21227 475f6b FindClose 21226->21227 21226->21231 21229 475000 79 API calls 21227->21229 21228 475f00 FindFirstFileW 21230 475f25 FindClose 21228->21230 21228->21231 21229->21231 21241 475000 21230->21241 21231->21097 21234 4723e0 71 API calls 21231->21234 21233->21226 21233->21228 21233->21231 21234->21097 21236 4723d7 21235->21236 21237 47236c 21235->21237 21236->21099 21237->21236 21248 4723e0 71 API calls 21237->21248 21239 47239e 21239->21099 21240->21103 21242 475010 21241->21242 21242->21242 21243 475026 21242->21243 21247 490ff1 79 API calls __vsnwprintf_l 21242->21247 21243->21233 21245 47503f 21245->21233 21246->21233 21247->21245 21248->21239 21249->21120 21250->21116 21251->21123 21253 476dd9 LoadLibraryExW 21252->21253 21255 476de7 21252->21255 21253->21255 21254 476f38 21257 476f64 ExtractIconW 21254->21257 21258 476f4f ExtractIconW 21254->21258 21265 476f81 21254->21265 21255->21254 21256 476dfb 21255->21256 21259 476e09 EnumResourceNamesW 21255->21259 21260 476e3b FindResourceW 21256->21260 21261 476f24 21256->21261 21257->21131 21258->21131 21259->21256 21260->21261 21262 476e4d LoadResource 21260->21262 21261->21254 21263 476f40 FreeLibrary 21261->21263 21262->21261 21264 476e5d LockResource 21262->21264 21263->21254 21264->21261 21266 476e6e 21264->21266 21265->21131 21267 476e84 GetSystemMetrics 21266->21267 21270 476e90 FindResourceW 21266->21270 21267->21270 21269 476eea LoadResource 21269->21261 21271 476ef6 LockResource 21269->21271 21270->21261 21270->21269 21271->21261 21272 476f03 SizeofResource CreateIconFromResourceEx 21271->21272 21272->21261 21273->21144 21274->21136 21275->21150 21276->21153 21277->21158 21278->21164 21279->21185 21281 4788f8 21280->21281 21283 478901 _wcschr 21280->21283 21281->21191 21284 47893e 21283->21284 21285 47894a 21283->21285 21318 48f7ae 59 API calls __toupper_l 21283->21318 21284->21191 21285->21281 21319 474fc0 79 API calls _vswprintf_s 21285->21319 21287 478978 21287->21191 21290 422650 21288->21290 21291 4221cb 21290->21291 21320 48e559 58 API calls 2 library calls 21290->21320 21291->21194 21291->21196 21310 48e559 58 API calls 2 library calls 21291->21310 21293 48f85c 21292->21293 21294 48f867 21292->21294 21295 48e5e4 _malloc 46 API calls 21293->21295 21296 48f86f 21294->21296 21302 48f87c _malloc 21294->21302 21297 48f864 21295->21297 21321 48f817 46 API calls 2 library calls 21296->21321 21297->21212 21299 48f8b4 _malloc 21322 4926d2 46 API calls __getptd_noexit 21299->21322 21300 48f884 RtlReAllocateHeap 21300->21302 21309 48f877 __dosmaperr 21300->21309 21301 48f8e4 21324 4926d2 46 API calls __getptd_noexit 21301->21324 21302->21299 21302->21300 21302->21301 21306 48f8cc 21302->21306 21305 48f8e9 GetLastError 21305->21309 21323 4926d2 46 API calls __getptd_noexit 21306->21323 21308 48f8d1 GetLastError 21308->21309 21309->21212 21310->21200 21312 490341 71 API calls 21311->21312 21313 472458 21312->21313 21314 48e5e4 _malloc 46 API calls 21313->21314 21315 472472 21313->21315 21314->21315 21315->21203 21316->21212 21317->21215 21318->21283 21319->21287 21320->21290 21321->21309 21322->21309 21323->21308 21324->21305 20556 415810 20559 415770 20556->20559 20558 415818 20560 4157a2 20559->20560 20561 4157e0 20560->20561 20563 4157d9 CloseHandle 20560->20563 20562 4157fa 20561->20562 20565 48f817 46 API calls 2 library calls 20561->20565 20562->20558 20563->20561 20565->20562 21402 413f10 82 API calls 20824 402c12 CountClipboardFormats 20825 402c1c IsClipboardFormatAvailable 20824->20825 20827 402c32 20824->20827 20826 402c2a IsClipboardFormatAvailable 20825->20826 20825->20827 20826->20827 20828 402cb3 20827->20828 20880 4704d0 SetCurrentDirectoryW 20827->20880 20851 403690 20828->20851 20832 401483 GetTickCount 20834 40149b 20832->20834 20833 402d0a 20881 402f30 GetTickCount 20833->20881 20846 403740 20834->20846 20838 4014db GetTickCount 20844 4014e6 20838->20844 20839 401575 GetFocus 20839->20844 20842 4015b4 TranslateAcceleratorW 20842->20832 20842->20844 20844->20832 20844->20839 20844->20842 20861 479cb0 GetWindowLongW GetParent GetWindowLongW 20844->20861 20862 45c3d0 GetWindowLongW GetParent 20844->20862 20863 4012e0 GetDlgCtrlID GetParent GetDlgCtrlID 20844->20863 20864 469740 SendMessageW 20844->20864 20847 403749 20846->20847 20848 4014b8 KiUserCallbackDispatcher 20846->20848 20847->20848 20849 403772 GetTickCount 20847->20849 20848->20832 20848->20838 20849->20848 20850 40378d 20849->20850 20850->20848 20852 40369e 20851->20852 20855 4036ab 20851->20855 20852->20855 20888 48f817 46 API calls 2 library calls 20852->20888 20854 403704 20882 4165f0 20854->20882 20860 4036d1 20855->20860 20889 48f817 46 API calls 2 library calls 20855->20889 20860->20854 20890 42eed0 87 API calls 3 library calls 20860->20890 20861->20844 20862->20844 20863->20844 20865 46976b 20864->20865 20871 469762 20864->20871 20866 469786 SendMessageW 20865->20866 20867 469778 20865->20867 20868 469799 20866->20868 20891 465e70 133 API calls __wcsicoll 20867->20891 20870 4697cb SendMessageW 20868->20870 20868->20871 20892 469130 SendMessageW GetWindowLongW IsWindowVisible 20870->20892 20871->20844 20873 4697e3 20873->20871 20874 4697ed GetDlgCtrlID 20873->20874 20874->20871 20875 469800 20874->20875 20875->20871 20876 469857 PostMessageW 20875->20876 20877 469832 20875->20877 20878 46983f 20875->20878 20876->20871 20877->20876 20878->20876 20922 465e70 133 API calls __wcsicoll 20878->20922 20880->20828 20881->20844 20883 402cfd 20882->20883 20885 416600 20882->20885 20883->20832 20883->20833 20884 416684 20887 4166b1 Shell_NotifyIconW 20884->20887 20885->20883 20885->20884 20886 416696 LoadImageW 20885->20886 20886->20887 20887->20883 20888->20855 20889->20860 20890->20854 20891->20866 20893 469189 IsIconic 20892->20893 20895 46919c 20892->20895 20893->20895 20894 4691b6 GetWindowRect GetPropW 20897 469212 ShowWindow 20894->20897 20898 46921a 20894->20898 20895->20894 20900 4691c1 GetFocus 20895->20900 20897->20898 20899 469232 GetUpdateRect SendMessageW 20898->20899 20913 46924c 20898->20913 20899->20913 20900->20894 20902 4691cb 20900->20902 20901 4693aa 20903 4693c7 20901->20903 20904 4693bb SendMessageW 20901->20904 20923 4012e0 GetDlgCtrlID GetParent GetDlgCtrlID 20902->20923 20906 4693db 20903->20906 20907 4693d2 ShowWindow 20903->20907 20904->20903 20908 4693e2 SetFocus 20906->20908 20909 4693ef 20906->20909 20907->20906 20908->20909 20910 469451 20909->20910 20911 469414 20909->20911 20912 4693fd InvalidateRect 20909->20912 20910->20873 20914 469424 InvalidateRect 20911->20914 20915 469431 MapWindowPoints InvalidateRect 20911->20915 20912->20873 20913->20901 20916 4692b8 GetWindowLongW 20913->20916 20918 4692fd KiUserCallbackDispatcher 20913->20918 20919 469310 GetWindowRect PtInRect 20913->20919 20921 469387 SetFocus 20913->20921 20914->20915 20915->20910 20916->20913 20917 4692df ShowWindow 20916->20917 20917->20913 20918->20919 20919->20913 20920 469339 PtInRect 20919->20920 20920->20913 20921->20913 20922->20876 20923->20894 20936 401d17 20937 401d20 20936->20937 20938 401dc1 20937->20938 20939 401d39 GetForegroundWindow 20937->20939 20940 401d31 20937->20940 20944 401ee4 20938->20944 20945 401e24 20938->20945 20941 401d49 GetWindowThreadProcessId 20939->20941 20940->20939 20942 401d5e GetClassNameW 20941->20942 20943 401d80 IsDialogMessageW 20942->20943 20955 402d65 20943->20955 20946 401483 GetTickCount 20944->20946 20949 401efd 20944->20949 20961 401e2b 20944->20961 20945->20946 20948 401edd 20945->20948 20951 401ec4 DragQueryFileW 20945->20951 20945->20961 20947 40149b 20946->20947 20947->20946 20956 403740 GetTickCount 20947->20956 20948->20946 20954 402203 DragFinish 20948->20954 20949->20946 20952 401f07 20949->20952 20951->20948 20951->20961 20972 465bc0 ShowWindow 20952->20972 20954->20946 20955->20947 20957 402d6e SetCurrentDirectoryW 20955->20957 20958 4014b8 KiUserCallbackDispatcher 20956->20958 20957->20947 20958->20946 20959 4014db GetTickCount 20958->20959 20967 4014e6 20959->20967 20960 4021d2 DragFinish 20960->20946 20961->20946 20961->20960 20962 401575 GetFocus 20962->20967 20965 4015b4 TranslateAcceleratorW 20965->20946 20965->20967 20967->20946 20967->20962 20967->20965 20968 469740 165 API calls 20967->20968 20969 479cb0 GetWindowLongW GetParent GetWindowLongW 20967->20969 20970 45c3d0 GetWindowLongW GetParent 20967->20970 20971 4012e0 GetDlgCtrlID GetParent GetDlgCtrlID 20967->20971 20968->20967 20969->20967 20970->20967 20971->20967 20972->20967 20973 401819 20974 40182f PeekMessageW 20973->20974 20976 401892 GetTickCount 20974->20976 20989 40149b 20974->20989 20977 40189f Sleep 20976->20977 20979 401483 GetTickCount 20977->20979 20979->20989 20980 401575 GetFocus 20980->20989 20981 403740 GetTickCount 20983 4014b8 KiUserCallbackDispatcher 20981->20983 20983->20979 20984 4014db GetTickCount 20983->20984 20985 4014e6 20984->20985 20984->20989 20985->20989 20987 4015b4 TranslateAcceleratorW 20987->20979 20987->20989 20989->20979 20989->20980 20989->20981 20989->20987 20990 469740 165 API calls 20989->20990 20991 479cb0 GetWindowLongW GetParent GetWindowLongW 20989->20991 20992 45c3d0 GetWindowLongW GetParent 20989->20992 20993 4012e0 GetDlgCtrlID GetParent GetDlgCtrlID 20989->20993 20990->20989 20991->20989 20992->20989 20993->20989 21343 40e019 218 API calls 4 library calls 21405 40a320 130 API calls 21407 409521 PostThreadMessageW 21345 465c20 PostMessageW 21347 40a830 83 API calls __write_nolock 21348 404c30 94 API calls 20566 415930 20567 415b5b _memset 20566->20567 20571 46ba00 20567->20571 20569 415ba2 OleInitialize 20570 415b73 20570->20569 20572 46ba2c 20571->20572 20573 46ba0c 20571->20573 20572->20570 20573->20572 20581 48e5e4 20573->20581 20577 46ba66 20578 46ba6d 20577->20578 20617 48f817 46 API calls 2 library calls 20577->20617 20578->20570 20580 46bac3 20580->20570 20582 48e661 _malloc 20581->20582 20589 48e5f2 _malloc 20581->20589 20623 4926d2 46 API calls __getptd_noexit 20582->20623 20585 48e620 RtlAllocateHeap 20586 46ba3e 20585->20586 20585->20589 20586->20580 20595 490341 20586->20595 20588 48e64d 20621 4926d2 46 API calls __getptd_noexit 20588->20621 20589->20585 20589->20588 20590 48e5fd 20589->20590 20593 48e64b 20589->20593 20590->20589 20618 4928f0 46 API calls __NMSG_WRITE 20590->20618 20619 492741 46 API calls 5 library calls 20590->20619 20620 48e6a3 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 20590->20620 20622 4926d2 46 API calls __getptd_noexit 20593->20622 20597 49034b _malloc 20595->20597 20596 48e5e4 _malloc 46 API calls 20596->20597 20597->20596 20598 490365 20597->20598 20601 490367 std::exception::exception 20597->20601 20598->20577 20599 4903a5 20625 49577d 46 API calls std::exception::operator= 20599->20625 20601->20599 20624 48efb9 51 API calls 20601->20624 20602 4903af 20626 495820 RaiseException 20602->20626 20605 4903c0 20627 48e3cf 56 API calls 2 library calls 20605->20627 20607 4903d6 20608 4903e2 20607->20608 20609 490436 20607->20609 20615 4903fa 20608->20615 20628 48f6f6 59 API calls 3 library calls 20608->20628 20610 49045b 20609->20610 20629 48fe60 56 API calls _LocaleUpdate::_LocaleUpdate 20609->20629 20614 490461 20610->20614 20630 4926d2 46 API calls __getptd_noexit 20610->20630 20631 494d3c 62 API calls 2 library calls 20614->20631 20615->20577 20617->20580 20618->20590 20619->20590 20621->20593 20622->20586 20623->20586 20624->20599 20625->20602 20626->20605 20627->20607 20628->20615 20629->20610 20630->20614 20631->20615 20632 416930 20635 42f8d0 20632->20635 20634 416958 20636 42f8dd __write_nolock 20635->20636 20639 42f905 20636->20639 20708 4139f0 63 API calls 20636->20708 20638 42fcac 20638->20634 20639->20638 20640 42f931 20639->20640 20646 42f9b0 __crtLCMapStringA_stat 20639->20646 20709 48e559 58 API calls 2 library calls 20640->20709 20642 42f93c 20644 42f996 _memset 20642->20644 20710 48e559 58 API calls 2 library calls 20642->20710 20648 42fab4 20644->20648 20658 42fcd1 _memset 20644->20658 20676 42fb67 __crtLCMapStringA_stat 20644->20676 20721 4152b0 59 API calls 20644->20721 20645 42f94e 20645->20644 20711 48e559 58 API calls 2 library calls 20645->20711 20646->20644 20715 48e559 58 API calls 2 library calls 20646->20715 20648->20634 20649 42f960 20649->20644 20712 48e559 58 API calls 2 library calls 20649->20712 20652 42f9fe 20652->20644 20716 48e559 58 API calls 2 library calls 20652->20716 20653 42fee9 20656 42ff02 FormatMessageW 20653->20656 20657 42ffd7 20653->20657 20654 42f972 20654->20644 20713 48e559 58 API calls 2 library calls 20654->20713 20661 42ff26 20656->20661 20695 42ff3f 20656->20695 20657->20634 20658->20653 20662 42fd13 20658->20662 20724 4152b0 59 API calls 20658->20724 20660 42fa10 20660->20644 20717 48e559 58 API calls 2 library calls 20660->20717 20727 474fc0 79 API calls _vswprintf_s 20661->20727 20690 42fd34 __crtLCMapStringA_stat _wcschr 20662->20690 20725 48e559 58 API calls 2 library calls 20662->20725 20664 42f984 20664->20644 20714 48e559 58 API calls 2 library calls 20664->20714 20669 42fe66 ShellExecuteExW 20673 42fe80 20669->20673 20674 42fee1 GetLastError 20669->20674 20671 42fa22 20671->20644 20718 48e559 58 API calls 2 library calls 20671->20718 20672 42fbbf __crtLCMapStringA_stat 20672->20672 20679 42fc37 CreateProcessW 20672->20679 20680 42fbf5 20672->20680 20677 42fe89 GetModuleHandleW GetProcAddress 20673->20677 20686 42feae 20673->20686 20674->20653 20676->20672 20722 48e963 79 API calls 3 library calls 20676->20722 20677->20686 20678 42fa34 20678->20644 20719 48e559 58 API calls 2 library calls 20678->20719 20684 42fcc0 GetLastError 20679->20684 20685 42fc5d 20679->20685 20723 451450 6 API calls _memset 20680->20723 20682 42fc6b 20682->20638 20696 42fca5 CloseHandle 20682->20696 20684->20658 20685->20682 20689 42fc64 CloseHandle 20685->20689 20686->20682 20691 42fed5 20686->20691 20688 42fc20 20688->20658 20688->20682 20694 42fc28 20688->20694 20689->20682 20690->20669 20693 42fdb8 SetCurrentDirectoryW 20690->20693 20698 42fd87 20690->20698 20705 42fdbf _wcschr 20690->20705 20691->20674 20692 42fa46 20692->20644 20720 48e559 58 API calls 2 library calls 20692->20720 20693->20705 20694->20634 20728 474fc0 79 API calls _vswprintf_s 20695->20728 20696->20638 20698->20669 20701 42fda8 20698->20701 20700 42fe55 20700->20669 20702 42fe5b SetCurrentDirectoryW 20700->20702 20701->20669 20702->20669 20703 42fe23 GetFileAttributesW 20704 42fe13 20703->20704 20707 42fe4a 20703->20707 20704->20703 20704->20705 20704->20707 20726 475370 59 API calls 20704->20726 20705->20700 20705->20703 20705->20704 20705->20707 20707->20700 20708->20639 20709->20642 20710->20645 20711->20649 20712->20654 20713->20664 20714->20644 20715->20652 20716->20660 20717->20671 20718->20678 20719->20692 20720->20644 20721->20676 20722->20672 20723->20688 20724->20662 20725->20690 20726->20704 20727->20695 20728->20657 21349 404231 17 API calls _wcsncpy 21411 415530 61 API calls 2 library calls 21412 40d338 lstrcmpiW 21413 40333b 100 API calls 2 library calls 21351 4092c0 92 API calls 21415 40a9c0 106 API calls 2 library calls 21353 4100c0 179 API calls 21354 4156c0 GetCPInfo 21416 415bc0 119 API calls _free 21355 4232c0 83 API calls 3 library calls 20924 64dbe0 20925 64dbf0 20924->20925 20926 64dd4f VirtualProtect VirtualProtect 20925->20926 20927 64dd0a LoadLibraryA 20925->20927 20928 64dd83 20926->20928 20929 64dd21 20927->20929 20928->20928 20929->20925 20930 64dd33 GetProcAddress 20929->20930 20930->20929 20931 64dd49 ExitProcess 20930->20931 21357 401483 229 API calls 21418 4135ce 80 API calls __snwprintf 21419 40c5d0 80 API calls __itow 21420 41a7d0 75 API calls 2 library calls 21360 418cd9 79 API calls 21362 40c8e0 58 API calls 21363 4038e0 GetTickCount 21421 40d3e0 104 API calls 6 library calls 21422 4037e0 KillTimer 21423 40f7e0 12 API calls 21426 4755e0 CharLowerW CharLowerW CharLowerW 21364 4078f0 IsCharAlphaNumericW GetStringTypeExW 21427 4047f0 16 API calls 21366 4136f0 IsCharAlphaW CharUpperW CharLowerW GetStringTypeW 21428 401483 181 API calls 20994 4013fb 20995 40140b 20994->20995 20996 401418 20995->20996 21015 403180 joyGetPosEx PostMessageW 20995->21015 20998 401433 20996->20998 20999 401425 20996->20999 21002 401458 SetTimer 20998->21002 21004 401475 20998->21004 21016 402f70 95 API calls _wcsncpy 20999->21016 21001 40142a 21001->20998 21002->21004 21003 401483 GetTickCount 21003->21004 21004->21003 21005 403740 GetTickCount 21004->21005 21006 4014b8 KiUserCallbackDispatcher 21005->21006 21006->21003 21007 4014db GetTickCount 21006->21007 21008 4014e6 21007->21008 21008->21003 21009 401575 GetFocus 21008->21009 21012 4015b4 TranslateAcceleratorW 21008->21012 21014 469740 165 API calls 21008->21014 21017 479cb0 GetWindowLongW GetParent GetWindowLongW 21008->21017 21018 45c3d0 GetWindowLongW GetParent 21008->21018 21019 4012e0 GetDlgCtrlID GetParent GetDlgCtrlID 21008->21019 21009->21008 21012->21003 21012->21008 21014->21008 21015->20996 21016->21001 21017->21008 21018->21008 21019->21008 21430 401483 216 API calls _memset 21431 403b83 71 API calls 21371 40e41c 200 API calls 3 library calls 21372 411e9a 81 API calls 21373 403a9f 169 API calls 4 library calls 21436 4135a1 82 API calls __snwprintf 21437 4037a0 IsWindow EndDialog KillTimer 20729 4109a0 20732 4109b9 20729->20732 20730 410d52 20731 410a08 20733 410a25 20731->20733 20734 410a86 20731->20734 20732->20730 20732->20731 20802 410d90 58 API calls 20732->20802 20738 410a2c 20733->20738 20739 410aaa 20733->20739 20747 410b94 20733->20747 20735 410a91 20734->20735 20736 410aae 20734->20736 20735->20739 20740 410a9a GetSystemMetrics 20735->20740 20736->20739 20741 410abc GetSystemMetrics 20736->20741 20803 410f80 47 API calls 20738->20803 20743 410b16 GetCursorPos WindowFromPoint 20739->20743 20739->20747 20740->20739 20741->20739 20744 410b39 20743->20744 20743->20747 20762 479cb0 GetWindowLongW GetParent GetWindowLongW 20744->20762 20745 410a4c 20746 410c98 mouse_event 20746->20747 20747->20730 20747->20746 20751 410d03 mouse_event 20747->20751 20754 410cd7 20747->20754 20804 411150 46 API calls 20747->20804 20750 410b3e 20750->20747 20752 410b48 GetWindowThreadProcessId 20750->20752 20751->20754 20752->20747 20755 410b5d SendMessageW 20752->20755 20754->20747 20805 4115e0 47 API calls 20754->20805 20806 411150 46 API calls 20754->20806 20807 4115e0 47 API calls 20754->20807 20758 410b80 20755->20758 20758->20747 20759 410bc7 20758->20759 20763 478c60 20759->20763 20761 410bd9 20762->20750 20764 478c6f GetWindowThreadProcessId 20763->20764 20765 478c6a 20763->20765 20766 478c8b 20764->20766 20767 478c9a GetForegroundWindow 20764->20767 20765->20761 20808 479d20 20766->20808 20769 478ca6 FindWindowW 20767->20769 20770 478cb4 IsIconic 20767->20770 20769->20770 20772 478cbf ShowWindow 20770->20772 20773 478cc8 20770->20773 20771 478c92 20771->20767 20774 478e32 20771->20774 20772->20773 20775 478ccc 20773->20775 20776 478ce5 20773->20776 20815 478c00 SetForegroundWindow 20773->20815 20774->20761 20775->20761 20776->20774 20778 478cfe GetWindowThreadProcessId 20776->20778 20786 478d4d 20776->20786 20779 478d0d 20778->20779 20778->20786 20781 479d20 3 API calls 20779->20781 20782 478d34 20779->20782 20780 478d60 SetForegroundWindow 20780->20786 20784 478d1a 20781->20784 20785 478d3c AttachThreadInput 20782->20785 20782->20786 20783 478d76 GetForegroundWindow 20783->20786 20784->20782 20788 478d1e AttachThreadInput 20784->20788 20785->20786 20786->20780 20786->20783 20787 478d97 GetWindow 20786->20787 20789 478de9 20786->20789 20790 478db6 20786->20790 20787->20786 20788->20782 20792 478e04 20789->20792 20793 478df0 AttachThreadInput 20789->20793 20822 40fa50 80 API calls 20790->20822 20795 478e1d 20792->20795 20796 478e0b AttachThreadInput 20792->20796 20793->20792 20794 478dca 20823 40fa50 80 API calls 20794->20823 20795->20774 20797 478e21 KiUserCallbackDispatcher 20795->20797 20796->20795 20797->20761 20799 478dde 20800 478c00 3 API calls 20799->20800 20801 478de4 20800->20801 20801->20789 20802->20731 20803->20745 20804->20747 20805->20747 20806->20754 20807->20754 20809 479d25 20808->20809 20810 479d29 20808->20810 20809->20771 20811 479d36 GetModuleHandleW GetProcAddress 20810->20811 20812 479d5a 20810->20812 20811->20812 20813 479d63 20812->20813 20814 479d6d SendMessageTimeoutW 20812->20814 20813->20771 20814->20771 20816 401360 20815->20816 20817 478c1b GetForegroundWindow 20816->20817 20818 478c34 20817->20818 20819 478c38 20817->20819 20818->20776 20820 478c4b 20819->20820 20821 478c3e GetWindow 20819->20821 20820->20776 20821->20820 20822->20794 20823->20799 21439 413da0 80 API calls 21441 4013a9 190 API calls 21377 40e0ae 210 API calls 4 library calls 21379 4146b0 59 API calls 2 library calls 21442 413bb0 60 API calls __wcstoi64 21443 413fb2 14 API calls 21444 417243 99 API calls 6 library calls 21445 407fbc 20 API calls 21382 40e2bf 207 API calls 4 library calls
        APIs
        • __wcsicoll.LIBCMT ref: 0042F937
        • __wcsicoll.LIBCMT ref: 0042F949
        • __wcsicoll.LIBCMT ref: 0042F95B
        • __wcsicoll.LIBCMT ref: 0042F96D
        • __wcsicoll.LIBCMT ref: 0042F97F
        • __wcsicoll.LIBCMT ref: 0042F991
        • _memset.LIBCMT ref: 0042FB38
        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000044,?), ref: 0042FC53
        • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,?,00000044,?), ref: 0042FC65
        • CloseHandle.KERNEL32(?), ref: 0042FCA6
        • _memset.LIBCMT ref: 0042FCE3
        • __wcsicoll.LIBCMT ref: 0042FD2F
        • _wcschr.LIBCMT ref: 0042FD7B
        • ShellExecuteExW.SHELL32(0000003C), ref: 0042FE76
        • GetModuleHandleW.KERNEL32(kernel32.dll,GetProcessId), ref: 0042FE9A
        • GetProcAddress.KERNEL32(00000000), ref: 0042FEA1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll$Handle$Close_memset$AddressCreateExecuteModuleProcProcessShell_wcschr
        • String ID: Verb: <%s>$%sAction: <%-0.400s%s>%sParams: <%-0.400s%s>$%s %s$...$.exe.bat.com.cmd.hta$<$C:\Users\user\Desktop$D$Failed attempt to launch program or document:$GetProcessId$Launch Error (possibly related to RunAs):$String too long.$System verbs unsupported with RunAs.$\/.$edit$explore$find$kernel32.dll$open$print$properties
        • API String ID: 3967683218-2324900566
        • Opcode ID: b04890d4aa6d68e6566444734d61b274c9541acaa0fbc52604419350470fd843
        • Instruction ID: 31188f4dcce674d9ef1a63f975e35907f61f9071ec4042c07e698e30813ee6a6
        • Opcode Fuzzy Hash: b04890d4aa6d68e6566444734d61b274c9541acaa0fbc52604419350470fd843
        • Instruction Fuzzy Hash: 3922CE71B002199BDF20DFA5EC41BAF77B4AF45344F84407BE805A7391E7789948CBA9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 383 469130-469187 SendMessageW GetWindowLongW IsWindowVisible 384 46919c 383->384 385 469189-46919a IsIconic 383->385 386 4691a1-4691a6 384->386 385->384 385->386 387 4691e3 386->387 388 4691a8-4691ad 386->388 390 4691e8-469210 GetWindowRect GetPropW 387->390 388->387 389 4691af-4691b4 388->389 393 4691b6-4691bb 389->393 394 4691bd-4691bf 389->394 391 469212-469214 ShowWindow 390->391 392 46921a-469230 390->392 391->392 395 469232-46924a GetUpdateRect SendMessageW 392->395 396 46924c-469254 392->396 393->390 394->387 397 4691c1-4691c9 GetFocus 394->397 395->396 398 4693b4-4693b9 396->398 399 46925a-46925c 396->399 397->387 400 4691cb-4691d4 call 4012e0 397->400 401 4693c7-4693c9 398->401 402 4693bb-4693c5 SendMessageW 398->402 403 469260-46926d 399->403 400->387 415 4691d6-4691e1 400->415 405 4693db-4693e0 401->405 406 4693cb-4693d0 401->406 402->401 407 469395-4693a4 403->407 408 469273-469287 403->408 411 4693e2-4693e9 SetFocus 405->411 412 4693ef-4693f4 405->412 406->405 410 4693d2-4693d5 ShowWindow 406->410 407->403 416 4693aa-4693b0 407->416 413 469298 408->413 414 469289-46928b 408->414 410->405 411->412 417 4693f6-4693fb 412->417 418 469451-469457 412->418 420 46929d-4692a2 413->420 414->413 419 46928d-469296 414->419 415->387 415->390 416->398 421 469414-469422 417->421 422 4693fd-469411 InvalidateRect 417->422 419->413 419->420 423 4692a4-4692a6 420->423 424 4692b3 420->424 425 469424-46942f InvalidateRect 421->425 426 469431-46944f MapWindowPoints InvalidateRect 421->426 423->424 427 4692a8-4692b1 423->427 428 4692b8-4692dd GetWindowLongW 424->428 425->426 426->418 427->424 427->428 429 4692f5-4692fb 428->429 430 4692df-4692f3 ShowWindow 428->430 431 46930c-46930e 429->431 432 4692fd-46930a KiUserCallbackDispatcher 429->432 430->429 433 469310-469337 GetWindowRect PtInRect 431->433 434 469353-469358 431->434 432->433 435 46934e 433->435 436 469339-46934c PtInRect 433->436 434->407 437 46935a-46935f 434->437 435->434 436->434 436->435 437->407 438 469361-469366 437->438 438->407 439 469368-46936d 438->439 439->407 440 46936f-469377 439->440 441 469387-469390 SetFocus 440->441 442 469379-469380 440->442 441->407 442->407 442->441
        APIs
        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 0046914D
        • GetWindowLongW.USER32(?,000000F0), ref: 00469159
        • IsWindowVisible.USER32(?), ref: 0046917A
        • IsIconic.USER32(?), ref: 0046918D
        • GetFocus.USER32 ref: 004691C1
        • GetWindowRect.USER32(?,?), ref: 004691F1
        • GetPropW.USER32(?,ahk_dlg), ref: 00469200
        • ShowWindow.USER32(00000000,00000000,?,ahk_dlg,?,?), ref: 00469214
        • GetUpdateRect.USER32(?,?,00000000), ref: 0046923C
        • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 0046924A
        • GetWindowLongW.USER32(?,000000F0), ref: 004692BD
        • ShowWindow.USER32(00000000,?,?,ahk_dlg,?,?), ref: 004692ED
        • KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 00469304
        • GetWindowRect.USER32(00000000,?), ref: 00469318
        • PtInRect.USER32(?,?,?), ref: 00469333
        • PtInRect.USER32(?,?,?), ref: 00469348
        • SetFocus.USER32(00000000,?,ahk_dlg,?,?), ref: 0046938A
        • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 004693C5
        • ShowWindow.USER32(00000000,00000005,?,ahk_dlg,?,?), ref: 004693D5
        • SetFocus.USER32(?,?,ahk_dlg,?,?), ref: 004693E9
        • InvalidateRect.USER32(?,00000000,00000001,?,ahk_dlg,?,?), ref: 00469405
        • InvalidateRect.USER32(?,?,00000001,?,ahk_dlg,?,?), ref: 0046942F
        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0046943E
        • InvalidateRect.USER32(?,?,00000001,?,ahk_dlg,?,?), ref: 0046944F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$Rect$FocusInvalidateMessageSendShow$Long$CallbackDispatcherIconicPointsPropUpdateUserVisible
        • String ID: ahk_dlg
        • API String ID: 1287530090-2093416220
        • Opcode ID: 2cb92b98ef7b4ad68a246d8870bcc17b6c268bf805481311d81bfc9c929e29b3
        • Instruction ID: b5eae9fb75e0140399f1823e80a5c7cb6e6155e50d250ff2c6c859dd3859fb47
        • Opcode Fuzzy Hash: 2cb92b98ef7b4ad68a246d8870bcc17b6c268bf805481311d81bfc9c929e29b3
        • Instruction Fuzzy Hash: ABA16370508381AFE711CB64C854B6BBFE9AB8A304F08895EF9C587381D7B9DD84CB56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1021 478c60-478c68 1022 478c6f-478c89 GetWindowThreadProcessId 1021->1022 1023 478c6a-478c6e 1021->1023 1024 478c8b-478c94 call 479d20 1022->1024 1025 478c9a-478ca4 GetForegroundWindow 1022->1025 1024->1025 1032 478e32 1024->1032 1027 478ca6-478cb2 FindWindowW 1025->1027 1028 478cb4-478cbd IsIconic 1025->1028 1027->1028 1030 478cbf-478cc2 ShowWindow 1028->1030 1031 478cc8-478cca 1028->1031 1030->1031 1033 478cd6-478cdd 1031->1033 1034 478ccc-478cd5 1031->1034 1035 478e34-478e3b 1032->1035 1036 478cf0-478cfc 1033->1036 1037 478cdf-478ce0 call 478c00 1033->1037 1039 478cfe-478d0b GetWindowThreadProcessId 1036->1039 1040 478d4d-478d5b 1036->1040 1041 478ce5-478cea 1037->1041 1039->1040 1042 478d0d-478d13 1039->1042 1043 478d60-478d8d SetForegroundWindow call 401360 GetForegroundWindow 1040->1043 1041->1035 1041->1036 1044 478d15-478d1c call 479d20 1042->1044 1045 478d34-478d36 1042->1045 1050 478d93-478d95 1043->1050 1051 478d8f-478d91 1043->1051 1044->1045 1057 478d1e-478d2f AttachThreadInput 1044->1057 1045->1040 1048 478d38-478d3a 1045->1048 1048->1040 1053 478d3c-478d48 AttachThreadInput 1048->1053 1055 478d97-478da2 GetWindow 1050->1055 1056 478da8-478db4 1050->1056 1054 478da4-478da6 1051->1054 1053->1040 1054->1056 1058 478de9-478dee 1054->1058 1055->1054 1055->1056 1056->1043 1059 478db6-478de7 call 40fa50 * 2 call 478c00 1056->1059 1057->1045 1061 478e04-478e09 1058->1061 1062 478df0-478dfe AttachThreadInput 1058->1062 1059->1058 1064 478e1d-478e1f 1061->1064 1065 478e0b-478e17 AttachThreadInput 1061->1065 1062->1061 1064->1032 1066 478e21-478e31 KiUserCallbackDispatcher 1064->1066 1065->1064
        APIs
        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00478C7B
        • GetForegroundWindow.USER32(?,?,00000000,?,?,00000000,0040ED23,?,00000000,?,00000002,00000000,?,80000000,80000000,00000000), ref: 00478C9A
        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00478CAC
        • IsIconic.USER32(00000000), ref: 00478CB5
        • ShowWindow.USER32(00000000,00000009,?,?,00000000,?,?,00000000,0040ED23,?,00000000,?,00000002,00000000,?,80000000), ref: 00478CC2
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$FindForegroundIconicProcessShowThread
        • String ID: Shell_TrayWnd
        • API String ID: 836960049-2988720461
        • Opcode ID: bc779d3915bf8b670c01fdc0bd422e7ab64d17fdd819045c0774d6d506796137
        • Instruction ID: 2223d292589bdf61aa41ce1f220feed3e697683aa78c1bc3135d168b278d746c
        • Opcode Fuzzy Hash: bc779d3915bf8b670c01fdc0bd422e7ab64d17fdd819045c0774d6d506796137
        • Instruction Fuzzy Hash: BF5146307853046FE371EB24AC4DFBF7B949B95744F44442EF948A62C1EBB89C4486AE

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1299 476dc0-476dd7 1300 476de7 1299->1300 1301 476dd9-476de5 LoadLibraryExW 1299->1301 1302 476ded-476def 1300->1302 1301->1302 1303 476df5-476df9 1302->1303 1304 476f4b-476f4d 1302->1304 1305 476e02 1303->1305 1306 476dfb-476e00 1303->1306 1307 476f64-476f80 ExtractIconW 1304->1307 1308 476f4f-476f63 ExtractIconW 1304->1308 1310 476e04 1305->1310 1311 476e09-476e2c EnumResourceNamesW 1305->1311 1309 476e30-476e35 1306->1309 1312 476e3b-476e47 FindResourceW 1309->1312 1313 476f28-476f32 1309->1313 1310->1311 1311->1309 1312->1313 1316 476e4d-476e57 LoadResource 1312->1316 1314 476f34-476f36 1313->1314 1315 476f3c-476f3e 1313->1315 1314->1315 1317 476f38-476f3a 1314->1317 1318 476f47-476f49 1315->1318 1319 476f40-476f41 FreeLibrary 1315->1319 1316->1313 1320 476e5d-476e68 LockResource 1316->1320 1317->1318 1318->1304 1321 476f81-476f8a 1318->1321 1319->1318 1320->1313 1322 476e6e-476e73 1320->1322 1323 476e75-476e79 1322->1323 1324 476e7d-476e82 1322->1324 1323->1324 1325 476e84-476e8c GetSystemMetrics 1324->1325 1326 476e90-476e9a 1324->1326 1325->1326 1327 476ed6-476ee8 FindResourceW 1326->1327 1328 476e9c-476e9f 1326->1328 1330 476f24 1327->1330 1331 476eea-476ef4 LoadResource 1327->1331 1329 476ea2-476ea8 1328->1329 1332 476eaa-476eb6 1329->1332 1333 476eb8-476ec1 1329->1333 1330->1313 1331->1330 1334 476ef6-476f01 LockResource 1331->1334 1335 476ec4-476ec8 1332->1335 1333->1335 1334->1330 1336 476f03-476f20 SizeofResource CreateIconFromResourceEx 1334->1336 1337 476ecc-476ed0 1335->1337 1338 476eca 1335->1338 1336->1330 1337->1329 1339 476ed2 1337->1339 1338->1337 1339->1327
        APIs
        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,75C04BD0,?,00000001,0000002C,004C8138,75C04BD0,00000001), ref: 00476DDD
        • EnumResourceNamesW.KERNEL32 ref: 00476E26
        • FindResourceW.KERNEL32(00400000,0000000E,0000000E), ref: 00476E3F
        • LoadResource.KERNEL32(00400000,00000000), ref: 00476E4F
        • LockResource.KERNEL32(00000000), ref: 00476E5E
        • GetSystemMetrics.USER32(0000000B), ref: 00476E86
        • FindResourceW.KERNEL32(00400000,?,00000003), ref: 00476EDE
        • LoadResource.KERNEL32(00400000,00000000), ref: 00476EEC
        • LockResource.KERNEL32(00000000), ref: 00476EF7
        • SizeofResource.KERNEL32(00400000,00000000,00000001,00030000,00000000,00000000,00000000), ref: 00476F12
        • CreateIconFromResourceEx.USER32(00000000,00000000), ref: 00476F1A
        • FreeLibrary.KERNEL32(00400000), ref: 00476F41
        • ExtractIconW.SHELL32(00000000,?,?), ref: 00476F56
        • ExtractIconW.SHELL32(00000000,?,-00000001), ref: 00476F73
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Resource$IconLoad$ExtractFindLibraryLock$CreateEnumFreeFromMetricsNamesSizeofSystem
        • String ID:
        • API String ID: 2349713634-0
        • Opcode ID: 8d5312d0bad377f423e9f79802613f4498856a09b8d6c38997eb6cf8aaacde64
        • Instruction ID: 128889faf1859f1a6a904d94f98001f74fa66643c39a66b5210802548831b77a
        • Opcode Fuzzy Hash: 8d5312d0bad377f423e9f79802613f4498856a09b8d6c38997eb6cf8aaacde64
        • Instruction Fuzzy Hash: A0512935204B015FC7109F24DC44BBBBBDAEB89711F558A2AF85DE2380D738DC058B69

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1340 475e20-475e30 1341 475e36-475e3c 1340->1341 1342 475fa5-475fac 1340->1342 1341->1342 1343 475e42-475e44 1341->1343 1344 475e47-475e50 1343->1344 1344->1344 1345 475e52-475e5f 1344->1345 1345->1342 1346 475e65-475e6a 1345->1346 1347 475e74-475e83 call 48f331 1346->1347 1348 475e6c-475e71 call 4095a0 1346->1348 1353 475e85-475e88 1347->1353 1354 475e8a-475e9c call 49028b 1347->1354 1348->1347 1355 475ec9-475ef7 call 491254 call 48f331 1353->1355 1354->1342 1359 475ea2-475eb2 call 48f331 1354->1359 1366 475f57-475f69 FindFirstFileW 1355->1366 1367 475ef9 1355->1367 1359->1355 1365 475eb4-475ec4 call 48f331 1359->1365 1365->1355 1374 475ec6 1365->1374 1366->1342 1369 475f6b-475f94 FindClose call 475000 1366->1369 1370 475f00-475f1f FindFirstFileW 1367->1370 1378 475f96-475fa3 1369->1378 1370->1342 1373 475f25-475f3e FindClose call 475000 1370->1373 1377 475f43-475f55 call 48f331 1373->1377 1374->1355 1377->1366 1377->1370 1378->1342 1378->1378
        APIs
        • _wcschr.LIBCMT ref: 00475E77
        • _wcschr.LIBCMT ref: 00475EA8
        • _wcschr.LIBCMT ref: 00475EBA
        • _wcsncpy.LIBCMT ref: 00475ED6
        • _wcschr.LIBCMT ref: 00475EE5
        • FindFirstFileW.KERNELBASE(00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00475F0E
        • FindClose.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00475F26
        • _wcschr.LIBCMT ref: 00475F49
        • FindFirstFileW.KERNELBASE(00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00475F60
        • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00475F6C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _wcschr$Find$CloseFileFirst$_wcsncpy
        • String ID: %s\
        • API String ID: 128165147-2802346739
        • Opcode ID: bc14198523d79c495d1cc6faa7f5bab3c80b86c1fc698059286cfa0e40cecb87
        • Instruction ID: 67e8759b787fff630ad969c8d3ab72259e9bca384fa2c097d25d69063cc36cd2
        • Opcode Fuzzy Hash: bc14198523d79c495d1cc6faa7f5bab3c80b86c1fc698059286cfa0e40cecb87
        • Instruction Fuzzy Hash: 6741077290070057D730BB258C46AEB72A89F91314F45892EFD599B2C1F7BC9E0AC69A
        APIs
        • LoadLibraryA.KERNEL32(?), ref: 0064DD1A
        • GetProcAddress.KERNEL32(?,0064AFF9), ref: 0064DD38
        • ExitProcess.KERNEL32(?,0064AFF9), ref: 0064DD49
        • VirtualProtect.KERNELBASE(00400000,00001000,00000004,?,3A75BF9D), ref: 0064DD66
        • VirtualProtect.KERNEL32(00400000,00001000), ref: 0064DD7B
        Memory Dump Source
        • Source File: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
        • String ID:
        • API String ID: 1996367037-0
        • Opcode ID: 132d5dc186ee6a7e7088512a1a358f5c66a7e8d938c67e67635ccddae53932dd
        • Instruction ID: 377d8da5319406def9700eaa99a71edf5bbb20e31f3ce7f34f8af3174d12defa
        • Opcode Fuzzy Hash: 132d5dc186ee6a7e7088512a1a358f5c66a7e8d938c67e67635ccddae53932dd
        • Instruction Fuzzy Hash: 005106B2E547525BD7209EB8DCC06A4BB9AEB51324B28077DC9E2C73C5E7E45C06C760

        Control-flow Graph

        APIs
        • _memset.LIBCMT ref: 00416141
          • Part of subcall function 00476DC0: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,75C04BD0,?,00000001,0000002C,004C8138,75C04BD0,00000001), ref: 00476DDD
          • Part of subcall function 00476DC0: FindResourceW.KERNEL32(00400000,0000000E,0000000E), ref: 00476E3F
          • Part of subcall function 00476DC0: LoadResource.KERNEL32(00400000,00000000), ref: 00476E4F
          • Part of subcall function 00476DC0: LockResource.KERNEL32(00000000), ref: 00476E5E
          • Part of subcall function 00476DC0: GetSystemMetrics.USER32(0000000B), ref: 00476E86
          • Part of subcall function 00476DC0: FindResourceW.KERNEL32(00400000,?,00000003), ref: 00476EDE
          • Part of subcall function 00476DC0: LoadResource.KERNEL32(00400000,00000000), ref: 00476EEC
          • Part of subcall function 00476DC0: LockResource.KERNEL32(00000000), ref: 00476EF7
        • GetSystemMetrics.USER32(00000031), ref: 00416188
          • Part of subcall function 00476DC0: EnumResourceNamesW.KERNEL32 ref: 00476E26
          • Part of subcall function 00476DC0: SizeofResource.KERNEL32(00400000,00000000,00000001,00030000,00000000,00000000,00000000), ref: 00476F12
          • Part of subcall function 00476DC0: CreateIconFromResourceEx.USER32(00000000,00000000), ref: 00476F1A
          • Part of subcall function 00476DC0: ExtractIconW.SHELL32(00000000,?,?), ref: 00476F56
        • LoadCursorW.USER32(00000000,00007F00), ref: 004161B8
        • RegisterClassExW.USER32 ref: 004161DD
        • RegisterClassExW.USER32(?), ref: 00416225
        • GetForegroundWindow.USER32 ref: 0041622C
        • GetClassNameW.USER32(00000000,?,00000040), ref: 0041623E
        • __wcsicoll.LIBCMT ref: 00416252
        • CreateWindowExW.USER32(00000001,AutoHotkey,?,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00400000,00000000), ref: 004162B1
        • GetMenu.USER32(00000000), ref: 004162D8
        • EnableMenuItem.USER32(00000000,0000FF79,00000003), ref: 004162E8
        • CreateWindowExW.USER32(00000000,edit,00000000,50A00804,00000000,00000000,00000000,00000000,00010474,00000001,00400000,00000000), ref: 00416320
        • GetDC.USER32(00000000), ref: 0041632C
        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00416366
        • MulDiv.KERNEL32(0000000A,00000000), ref: 0041636F
        • CreateFontW.GDI32(00000000), ref: 00416378
        • ReleaseDC.USER32(00010478,00000000), ref: 0041638A
        • SendMessageW.USER32(00010478,00000030,4D0A0ECC,00000000), ref: 004163A8
        • SendMessageW.USER32(00010478,000000C5,00000000,00000000), ref: 004163B9
        • ShowWindow.USER32(00010474,00000000), ref: 004163CA
        • ShowWindow.USER32(00010474,00000000), ref: 004163D5
        • ShowWindow.USER32(00010474,00000006), ref: 004163E6
        • SetWindowLongW.USER32(00010474,000000EC,00000000), ref: 004163F3
        • LoadAcceleratorsW.USER32(00400000,000000D4), ref: 00416405
          • Part of subcall function 00416540: _memset.LIBCMT ref: 00416550
          • Part of subcall function 00416540: _wcsncpy.LIBCMT ref: 004165C2
          • Part of subcall function 00416540: Shell_NotifyIconW.SHELL32(00000000,?), ref: 004165D5
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Resource$Window$Load$Create$ClassIconShow$FindLockMenuMessageMetricsRegisterSendSystem_memset$AcceleratorsCapsCursorDeviceEnableEnumExtractFontForegroundFromItemLibraryLongNameNamesNotifyReleaseShell_Sizeof__wcsicoll_wcsncpy
        • String ID: 0$AutoHotkey$AutoHotkey2$Consolas$CreateWindow$Lucida Console$RegClass$Shell_TrayWnd$edit
        • API String ID: 2663150501-3882032541
        • Opcode ID: 772894f597f82bbaee781d0d0d4fbf614a2ce075000adabfe2bc249ff803479f
        • Instruction ID: e5219144fad07b6cb428c496203e2e73b82607cb50ce4654df7e7c2fae18256b
        • Opcode Fuzzy Hash: 772894f597f82bbaee781d0d0d4fbf614a2ce075000adabfe2bc249ff803479f
        • Instruction Fuzzy Hash: 8C81C471644300BBE7609F60DC4AFA73BA4AB45B04F10456AFA44A72D0DBB8E844CB6E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 252 403a9f-403ad1 253 403c76-403c95 call 421e80 252->253 254 403ad7 252->254 260 403c97-403cb8 call 422130 253->260 261 403cbe-403cd0 253->261 255 403ae0-403aed 254->255 257 403af3-403b12 call 48e963 255->257 258 403be9-403bf9 call 48e559 255->258 269 403b18-403b36 call 421e80 257->269 270 40403f-40404a 257->270 272 403c64 258->272 273 403bfb-403c0b call 48e559 258->273 260->261 260->270 275 403ce1-403d4c call 401160 call 421e80 261->275 276 403cd2-403cdc 261->276 282 403b38-403b59 call 422130 269->282 283 403b5f-403b70 call 477e60 269->283 277 403c69-403c70 272->277 273->272 284 403c0d-403c1d call 48e559 273->284 300 403d75-403d79 275->300 301 403d4e-403d70 call 422130 275->301 276->275 277->253 277->255 282->270 282->283 283->277 294 403c5b-403c62 284->294 295 403c1f-403c2f call 48e559 284->295 294->277 295->294 304 403c31-403c41 call 48e559 295->304 300->270 303 403d7f-403d9f call 46e710 300->303 301->300 303->270 311 403da5-403dc5 call 478190 call 4038f0 call 415f00 303->311 309 403c43-403c4a 304->309 310 403c4c-403c59 304->310 309->277 310->277 311->270 318 403dcb-403dea call 416d20 311->318 318->270 321 403df0-403df2 318->321 322 404034-40403c 321->322 323 403df8-403e0a 321->323 325 403e30-403e46 323->325 326 403e0c-403e12 323->326 330 403e48-403e4f 325->330 331 403ebe-403ed4 FindWindowW 325->331 326->325 327 403e14-403e1a 326->327 327->325 329 403e1c-403e22 327->329 329->325 332 403e24-403e2a 329->332 333 403e55-403e6a FindWindowW 330->333 334 403f3f-403f57 SystemParametersInfoW 330->334 331->334 335 403ed6 331->335 332->325 336 403eb3-403eb8 332->336 333->334 337 403e70-403e78 333->337 338 403f59-403f60 334->338 339 403f6f-403f7c call 416110 334->339 340 403edb-403efc PostMessageW Sleep IsWindow 335->340 336->331 336->334 337->322 343 403e7e-403e81 337->343 338->339 344 403f62-403f6d SystemParametersInfoW 338->344 339->270 353 403f82-403fa1 call 48eb0d call 48ea17 339->353 341 403f3b-403f3d Sleep 340->341 342 403efe 340->342 341->334 346 403f00-403f03 342->346 347 403e83-403ea6 call 479a00 343->347 348 403eac-403eb1 343->348 344->339 350 403f05-403f23 call 479a00 346->350 351 403f2b-403f39 Sleep IsWindow 346->351 347->322 347->348 348->340 350->270 360 403f29 350->360 351->341 351->346 362 403fa3-403fb9 call 48e5e4 353->362 363 403fc7-403fce 353->363 360->351 362->363 369 403fbb-403fc4 call 497430 362->369 365 403fd0-403fdd 363->365 366 403feb-404013 call 409cf0 call 421e20 363->366 365->366 375 404015 call 403a30 366->375 376 40401a-404026 call 4166f0 366->376 369->363 375->376 376->270 380 404028-404031 call 401360 376->380 380->322
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: /ErrorStdOut$/force$/restart$A_Args$An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta$AutoHotkey$C:\Users\user\Desktop$Clipboard$Could not close the previous instance of this script. Keep waiting?$hl)J
        • API String ID: 3832890014-283284329
        • Opcode ID: 5356b4adb516d74641602887d5eb02f6174f55d38919c05c3ef643c870fc0aef
        • Instruction ID: b11b1b63d7b062985327bf977882124ceb62407a5bdc3e6546bdfef701e71a86
        • Opcode Fuzzy Hash: 5356b4adb516d74641602887d5eb02f6174f55d38919c05c3ef643c870fc0aef
        • Instruction Fuzzy Hash: 38C128B1B043406AE720AB259C46F2B3B989B55705F04053FFA85B62C1E7BDDE40C76E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 443 402382-402394 444 402396-402398 443->444 445 40239a-40239e 443->445 446 4023a1-4023d1 444->446 445->446 447 4023d7 446->447 448 40278e-402793 446->448 449 402588-4025fd call 476340 GetWindowLongW SetWindowLongW call 45e700 447->449 450 4026ce-4026d4 447->450 451 4023de-402406 447->451 452 4027c2-4027c5 448->452 453 402795-402797 448->453 510 402623-402636 449->510 511 4025ff-402621 449->511 456 4028a2-4028a7 450->456 457 4026da-40271a 450->457 454 4024b0-4024c9 call 476340 451->454 455 40240c-40240f 451->455 459 40285d-402897 call 45e6e0 452->459 461 4027cb-4027d8 452->461 453->459 460 40279d-4027bd call 476340 453->460 495 4024cb-4024ea 454->495 496 4024ec-4024ff 454->496 464 402411-402419 call 46a010 455->464 465 40241e-402425 455->465 466 4029d1-4029da 456->466 467 4028ad-4028b1 456->467 468 402730-402762 457->468 469 40271c-40272c MulDiv 457->469 489 40289e 459->489 494 402859 460->494 472 4027e9-4027ef 461->472 473 4027da-4027e7 461->473 464->465 481 402427-402428 465->481 482 402499-4024a4 465->482 486 4029fc-4029ff 466->486 487 4029dc-4029fa 466->487 467->466 480 4028b7-4028ff call 497430 SendMessageW 467->480 483 402764-402774 MulDiv 468->483 484 402778-402789 468->484 469->468 477 4027f1-4027f6 472->477 478 402805-40280b 472->478 474 4027fe 473->474 474->478 477->474 497 402814-40281a 478->497 498 40280d-402812 478->498 514 402a35-402a60 480->514 515 402905-402915 480->515 491 40242a-40242b 481->491 492 40248b-402497 481->492 493 4024a5-4024ab SendMessageW 482->493 483->484 484->456 500 402a01-402a04 486->500 501 402a22-402a30 call 4010e0 486->501 487->486 489->456 491->454 504 402431-402435 491->504 492->493 505 4024ac 493->505 494->459 506 402505-402583 495->506 496->506 508 402827-40282d 497->508 509 40281c 497->509 507 402821-402824 498->507 500->501 512 402a06-402a20 call 477e60 500->512 501->514 516 402437-402448 SendMessageW 504->516 517 40244a-402489 ScreenToClient SendMessageW 504->517 505->454 506->489 507->508 518 402839-40283f 508->518 519 40282f-402837 508->519 509->507 520 40263c-40265b 510->520 511->520 512->514 522 402a62-402a65 514->522 523 402a67-402a6c 514->523 524 402917 515->524 525 40291e-402952 call 477e60 515->525 516->505 517->505 527 402841-402846 518->527 528 40284c-402851 518->528 526 402849 519->526 529 40265d-40266c MulDiv 520->529 530 40266e 520->530 531 402a72-402aa2 call 46d480 522->531 523->531 532 402a6e 523->532 524->525 540 402954 525->540 541 402957-40295b 525->541 526->528 527->526 528->494 534 402670-4026a2 529->534 530->534 542 402b43-402b4c call 45e520 531->542 543 402aa8-402aaa 531->543 532->531 535 4026b4-4026c9 534->535 536 4026a4-4026ae MulDiv 534->536 535->456 536->535 540->541 544 402964-402969 541->544 545 40295d-40295f call 401160 541->545 560 402cf0-402d04 call 403690 542->560 546 402aec-402af1 543->546 547 402aac-402ab4 543->547 549 402994-402996 544->549 550 40296b-40296f 544->550 545->544 553 402afb-402b00 546->553 558 402af3-402af7 546->558 552 402ab6-402abe 547->552 547->553 556 4029b6-4029cf 549->556 557 402998-4029b1 call 401000 549->557 554 402971-402973 call 42f290 550->554 555 402978-40298f 550->555 552->542 561 402ac4-402acf call 4703d0 552->561 553->542 564 402b02-402b3d DragFinish GetWindowLongW SetWindowLongW 553->564 554->555 555->514 556->514 557->514 558->553 573 401483-4014d9 GetTickCount call 403740 KiUserCallbackDispatcher 560->573 574 402d0a-402d21 call 402f30 560->574 571 402ad1-402ad3 561->571 572 402ad5-402ae7 call 465bc0 call 45e520 561->572 564->542 571->542 571->572 572->560 587 4014db-4014e4 GetTickCount 573->587 574->573 583 402d27-402d31 574->583 583->573 588 4014e6 587->588 589 4014eb-4014f6 587->589 588->589 590 401527-4015b2 GetFocus call 479cb0 call 45c3d0 589->590 591 4014f8-401521 call 4031f0 589->591 607 4015b4-4015c3 TranslateAcceleratorW 590->607 608 4015c9-4015eb 590->608 591->573 591->590 607->573 607->608 611 401605-401644 call 4012e0 608->611 612 4015ed-4015f0 608->612 621 401646-401649 611->621 622 40164f-401666 call 469740 611->622 612->611 613 4015f2-4015f5 612->613 613->611 615 4015f7-4015fa 613->615 615->611 617 4015fc-4015ff 615->617 617->611 621->622 622->573
        APIs
        • GetTickCount.KERNEL32 ref: 00401489
        • SendMessageW.USER32(?,0000110A,00000009,?), ref: 00402442
        • ScreenToClient.USER32(?,?), ref: 0040246B
        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00402483
        • GetWindowLongW.USER32(?,000000EC), ref: 004025B5
        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004025C9
        • MulDiv.KERNEL32(?,00000060,00000060), ref: 00402666
        • MulDiv.KERNEL32(?,00000060,00000060), ref: 004026AE
        • _memset.LIBCMT ref: 004028C6
        • SendMessageW.USER32 ref: 004028F7
        • DragFinish.SHELL32(?), ref: 00402B16
        • GetWindowLongW.USER32 ref: 00402B2D
        • SetWindowLongW.USER32(00000000,000000EC,00000000), ref: 00402B3D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: LongWindow$MessageSend$ClientCountDragFinishScreenTick_memset
        • String ID: I$call
        • API String ID: 3210236470-1075741665
        • Opcode ID: 4df1e090e44f613193035b355f29009d3cf34595ccd954d8563134844b42a3bd
        • Instruction ID: 974ebace28e2147fce9ec286dcb957fe35eadf8c1c1cf72fb4bfafb0b9d8dd27
        • Opcode Fuzzy Hash: 4df1e090e44f613193035b355f29009d3cf34595ccd954d8563134844b42a3bd
        • Instruction Fuzzy Hash: A25290706083009FD724DF18C988B5BBBE5BF88314F14896EE889A73E1D778E845CB56

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 625 403ad9 626 403ae0-403aed 625->626 627 403af3-403b12 call 48e963 626->627 628 403be9-403bf9 call 48e559 626->628 633 403b18-403b36 call 421e80 627->633 634 40403f-40404a 627->634 635 403c64 628->635 636 403bfb-403c0b call 48e559 628->636 643 403b38-403b59 call 422130 633->643 644 403b5f-403b70 call 477e60 633->644 638 403c69-403c70 635->638 636->635 645 403c0d-403c1d call 48e559 636->645 638->626 642 403c76-403c95 call 421e80 638->642 651 403c97-403cb8 call 422130 642->651 652 403cbe-403cd0 642->652 643->634 643->644 644->638 658 403c5b-403c62 645->658 659 403c1f-403c2f call 48e559 645->659 651->634 651->652 663 403ce1-403d4c call 401160 call 421e80 652->663 664 403cd2-403cdc 652->664 658->638 659->658 667 403c31-403c41 call 48e559 659->667 677 403d75-403d79 663->677 678 403d4e-403d70 call 422130 663->678 664->663 672 403c43-403c4a 667->672 673 403c4c-403c59 667->673 672->638 673->638 677->634 680 403d7f-403d9f call 46e710 677->680 678->677 680->634 683 403da5-403dc5 call 478190 call 4038f0 call 415f00 680->683 683->634 690 403dcb-403dea call 416d20 683->690 690->634 693 403df0-403df2 690->693 694 404034-40403c 693->694 695 403df8-403e0a 693->695 697 403e30-403e46 695->697 698 403e0c-403e12 695->698 702 403e48-403e4f 697->702 703 403ebe-403ed4 FindWindowW 697->703 698->697 699 403e14-403e1a 698->699 699->697 701 403e1c-403e22 699->701 701->697 704 403e24-403e2a 701->704 705 403e55-403e6a FindWindowW 702->705 706 403f3f-403f57 SystemParametersInfoW 702->706 703->706 707 403ed6 703->707 704->697 708 403eb3-403eb8 704->708 705->706 709 403e70-403e78 705->709 710 403f59-403f60 706->710 711 403f6f-403f7c call 416110 706->711 712 403edb-403efc PostMessageW Sleep IsWindow 707->712 708->703 708->706 709->694 715 403e7e-403e81 709->715 710->711 716 403f62-403f6d SystemParametersInfoW 710->716 711->634 725 403f82-403fa1 call 48eb0d call 48ea17 711->725 713 403f3b-403f3d Sleep 712->713 714 403efe 712->714 713->706 718 403f00-403f03 714->718 719 403e83-403ea6 call 479a00 715->719 720 403eac-403eb1 715->720 716->711 722 403f05-403f23 call 479a00 718->722 723 403f2b-403f39 Sleep IsWindow 718->723 719->694 719->720 720->712 722->634 732 403f29 722->732 723->713 723->718 734 403fa3-403fb9 call 48e5e4 725->734 735 403fc7-403fce 725->735 732->723 734->735 741 403fbb-403fc4 call 497430 734->741 737 403fd0-403fdd 735->737 738 403feb-404013 call 409cf0 call 421e20 735->738 737->738 747 404015 call 403a30 738->747 748 40401a-404026 call 4166f0 738->748 741->735 747->748 748->634 752 404028-404031 call 401360 748->752 752->694
        APIs
        Strings
        • A_Args, xrefs: 00403D3B, 00403D61
        • Clipboard, xrefs: 00403FF4
        • hl)J, xrefs: 00403C84
        • Could not close the previous instance of this script. Keep waiting?, xrefs: 00403F13
        • AutoHotkey, xrefs: 00403E5B
        • An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta, xrefs: 00403E96
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: A_Args$An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta$AutoHotkey$Clipboard$Could not close the previous instance of this script. Keep waiting?$hl)J
        • API String ID: 3832890014-1369024563
        • Opcode ID: beb76d24ff681f0dfcd138cf2776b2a94d40c5cf45c3f31cbb2ada4b5e8dbfb6
        • Instruction ID: 8a0c97fbba8d581f65c833aa89253b219d9e3fd4cedce5fdaacd78cdd675df2e
        • Opcode Fuzzy Hash: beb76d24ff681f0dfcd138cf2776b2a94d40c5cf45c3f31cbb2ada4b5e8dbfb6
        • Instruction Fuzzy Hash: E8A108B0B043416AE760AB659C46F2B3BA89B45704F04053FF685B72D1DBB8DE41C79E

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 755 401cc9-401cd0 756 401ce3-401cf5 755->756 757 401cd7-401cd9 755->757 758 401d39-401d7b GetForegroundWindow GetWindowThreadProcessId GetClassNameW 755->758 760 401cfb-401d02 756->760 761 40205c-40206c 756->761 757->756 759 401cdb-401ce1 757->759 771 401d80-401d8f 758->771 759->756 759->758 760->761 765 401f81-401f87 760->765 766 402031-402037 760->766 767 401d09-401d0d 760->767 768 401f2b-401f2d 760->768 763 402072-402088 761->763 764 401483-4014d9 GetTickCount call 403740 KiUserCallbackDispatcher 761->764 774 40208a-40209d 763->774 775 4020bc-4020d0 call 40a460 763->775 824 4014db-4014e4 GetTickCount 764->824 765->764 773 401f8d-401fb5 call 4098d0 765->773 766->764 770 40203d-402049 766->770 778 401d31 767->778 779 401d0f-401d15 767->779 776 401f4e 768->776 777 401f2f-401f3a call 45c3a0 768->777 780 402055-402057 770->780 781 40204b-402051 770->781 791 401d91-401da8 771->791 792 401daa-402d6c IsDialogMessageW 771->792 773->764 815 401fbb-401fc6 773->815 785 4020b4-4020ba 774->785 786 40209f-4020b2 774->786 775->764 809 4020d6 775->809 790 401f52-401f66 call 401330 776->790 777->790 808 401f3c-401f3e 777->808 778->758 789 401d20-401d26 779->789 793 40216a 780->793 781->780 785->775 797 4020d8-4020e6 call 4703d0 785->797 786->785 786->786 799 401db1-401dbb 789->799 800 401d2c-401d2f 789->800 790->764 820 401f6c-401f73 790->820 791->771 791->792 836 402d79-402d85 792->836 837 402d6e-402d73 SetCurrentDirectoryW 792->837 802 40216e-40217a call 4703d0 793->802 830 4020e8-4020e9 797->830 831 4020eb-402124 797->831 799->758 807 401dc1-401dde 799->807 800->778 800->789 834 40217c-40217d 802->834 835 40217f-4021a5 802->835 816 401de0-401df0 807->816 817 401df4-401dfb 807->817 808->790 818 401f40-401f46 808->818 809->797 825 401fd4-401fe7 call 40ca40 815->825 826 401fc8-401fca 815->826 816->817 827 401e0c 817->827 828 401dfd-401e0a 817->828 818->758 829 401f4c 818->829 820->764 821 401f79-402166 820->821 821->793 838 4014e6 824->838 839 4014eb-4014f6 824->839 825->764 853 401fed-401ff5 825->853 826->825 840 401fcc 826->840 842 401e10-401e1e 827->842 828->842 829->790 830->831 909 402126 831->909 910 40212a-402133 GetTickCount 831->910 834->835 882 4021c7-4021cc 835->882 883 4021a7-4021c5 835->883 836->764 837->836 838->839 845 401527-4015b2 GetFocus call 479cb0 call 45c3d0 839->845 846 4014f8-401521 call 4031f0 839->846 840->825 848 401ee4-401ee8 842->848 849 401e24 842->849 915 4015b4-4015c3 TranslateAcceleratorW 845->915 916 4015c9-4015eb 845->916 846->764 846->845 848->764 854 401eee-401efb 848->854 855 401e94-401e9d 849->855 856 401e78-401e81 849->856 857 401eaa-401eba 849->857 858 401e2b-401e34 849->858 859 401e5c-401e65 849->859 869 401ff7-40200b 853->869 870 40201a-40202c 853->870 871 401f15-401f19 854->871 872 401efd-401f01 854->872 855->764 865 401ea3-401ea5 855->865 856->764 863 401e87-401e92 856->863 866 401ebc-401ebe 857->866 867 401edd-4021fd 857->867 858->764 873 401e3a-401e41 858->873 859->764 861 401e6b-401e76 859->861 875 401e45-401e4b 861->875 863->875 865->793 866->764 877 401ec4-401ed7 DragQueryFileW 866->877 867->764 889 402203-402219 DragFinish 867->889 869->802 870->802 871->764 881 401f1f-401f26 871->881 872->764 879 401f07-401f10 call 465bc0 872->879 873->875 884 401e55-401e57 875->884 885 401e4d-401e4f 875->885 877->867 877->884 879->764 881->793 882->764 888 4021d2-4021e8 DragFinish 882->888 883->882 884->793 885->764 885->884 888->764 889->764 909->910 910->764 915->764 915->916 919 401605-401644 call 4012e0 916->919 920 4015ed-4015f0 916->920 929 401646-401649 919->929 930 40164f-401666 call 469740 919->930 920->919 921 4015f2-4015f5 920->921 921->919 923 4015f7-4015fa 921->923 923->919 925 4015fc-4015ff 923->925 925->919 929->930 930->764
        APIs
        • GetTickCount.KERNEL32 ref: 00401489
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,-00000311), ref: 004014D0
        • GetTickCount.KERNEL32 ref: 004014DB
        • GetForegroundWindow.USER32 ref: 00401D39
        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00401D4C
        • GetClassNameW.USER32(00000000,?,00000020), ref: 00401D69
        • IsDialogMessageW.USER32(00000000,?), ref: 00402D5B
        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\Desktop), ref: 00402D73
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTickWindow$CallbackClassCurrentDialogDirectoryDispatcherForegroundMessageNameProcessThreadUser
        • String ID: #32770$C:\Users\user\Desktop
        • API String ID: 2062716809-2506600713
        • Opcode ID: 47a8dd4a61e12a8c90728c930d07a933e897ae65735656275c0258cb025829ac
        • Instruction ID: d3c4f9cb16838903b11290c4d14fa92148084e937e73d15c5bef0986203582fb
        • Opcode Fuzzy Hash: 47a8dd4a61e12a8c90728c930d07a933e897ae65735656275c0258cb025829ac
        • Instruction Fuzzy Hash: AC128E715083419FD7248F18C98876BB7E1AB85704F18493FE995A73E1C7B8EC46CB8A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 933 403d0e-403d10 934 403d12-403d19 933->934 935 403d1f-403d21 933->935 936 403d2a-403d4c call 421e80 934->936 937 403d1b-403d1d 934->937 935->936 938 403d23 935->938 942 403d75-403d79 936->942 943 403d4e-403d70 call 422130 936->943 937->935 937->936 938->936 939 403d25 call 401160 938->939 939->936 945 40403f-40404a 942->945 946 403d7f-403d9f call 46e710 942->946 943->942 946->945 949 403da5-403dc5 call 478190 call 4038f0 call 415f00 946->949 949->945 956 403dcb-403dea call 416d20 949->956 956->945 959 403df0-403df2 956->959 960 404034-40403c 959->960 961 403df8-403e0a 959->961 963 403e30-403e46 961->963 964 403e0c-403e12 961->964 968 403e48-403e4f 963->968 969 403ebe-403ed4 FindWindowW 963->969 964->963 965 403e14-403e1a 964->965 965->963 967 403e1c-403e22 965->967 967->963 970 403e24-403e2a 967->970 971 403e55-403e6a FindWindowW 968->971 972 403f3f-403f57 SystemParametersInfoW 968->972 969->972 973 403ed6 969->973 970->963 974 403eb3-403eb8 970->974 971->972 975 403e70-403e78 971->975 976 403f59-403f60 972->976 977 403f6f-403f7c call 416110 972->977 978 403edb-403efc PostMessageW Sleep IsWindow 973->978 974->969 974->972 975->960 981 403e7e-403e81 975->981 976->977 982 403f62-403f6d SystemParametersInfoW 976->982 977->945 991 403f82-403fa1 call 48eb0d call 48ea17 977->991 979 403f3b-403f3d Sleep 978->979 980 403efe 978->980 979->972 984 403f00-403f03 980->984 985 403e83-403ea6 call 479a00 981->985 986 403eac-403eb1 981->986 982->977 988 403f05-403f23 call 479a00 984->988 989 403f2b-403f39 Sleep IsWindow 984->989 985->960 985->986 986->978 988->945 998 403f29 988->998 989->979 989->984 1000 403fa3-403fb9 call 48e5e4 991->1000 1001 403fc7-403fce 991->1001 998->989 1000->1001 1007 403fbb-403fc4 call 497430 1000->1007 1003 403fd0-403fdd 1001->1003 1004 403feb-404013 call 409cf0 call 421e20 1001->1004 1003->1004 1013 404015 call 403a30 1004->1013 1014 40401a-404026 call 4166f0 1004->1014 1007->1001 1013->1014 1014->945 1018 404028-40402c call 401360 1014->1018 1020 404031 1018->1020 1020->960
        APIs
        • FindWindowW.USER32(AutoHotkey,02D60148), ref: 00403E60
        Strings
        • A_Args, xrefs: 00403D3B, 00403D61
        • Clipboard, xrefs: 00403FF4
        • Could not close the previous instance of this script. Keep waiting?, xrefs: 00403F13
        • AutoHotkey, xrefs: 00403E5B
        • An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta, xrefs: 00403E96
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: FindWindow
        • String ID: A_Args$An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta$AutoHotkey$Clipboard$Could not close the previous instance of this script. Keep waiting?
        • API String ID: 134000473-3055363494
        • Opcode ID: 1f6ba8ca3599635bd3607fe26c2596087050352aded697c724a624bb235c523c
        • Instruction ID: 608ee32076edd871291f1f34974af413f279229662b47bbb8a35c86475acf6ea
        • Opcode Fuzzy Hash: 1f6ba8ca3599635bd3607fe26c2596087050352aded697c724a624bb235c523c
        • Instruction Fuzzy Hash: 807146B0B003416AE760AB659C46F2B3A9C9B41745F04053BFB44B63D1EBBC9D41CBAE

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1071 422130-422146 1072 422148-42214a 1071->1072 1073 42217c-422186 1071->1073 1074 422162-422168 1072->1074 1075 42214c-42214e 1072->1075 1076 42216a-422177 call 42ece0 1074->1076 1077 422189-4221ad call 491254 call 4788e0 1074->1077 1078 422151-42215a 1075->1078 1076->1073 1077->1073 1085 4221af-4221d2 call 422640 1077->1085 1078->1078 1081 42215c-422160 1078->1081 1081->1074 1088 422233-422246 call 472360 1085->1088 1089 4221d4-4221d6 1085->1089 1099 42246b-422477 1088->1099 1100 42224c-422254 1088->1100 1091 4221d8-4221ec call 48e559 1089->1091 1092 4221ee-4221fd 1089->1092 1091->1088 1091->1092 1093 422219-422230 call 42ece0 1092->1093 1094 4221ff-422216 call 421e20 1092->1094 1104 422273-42227a 1100->1104 1105 422256-422266 1100->1105 1107 42228e-422298 1104->1107 1108 42227c-422288 call 472450 1104->1108 1105->1104 1106 422268 1105->1106 1106->1104 1109 4222b0-4222c4 1107->1109 1110 42229a-4222aa call 472450 1107->1110 1108->1107 1113 422455-422466 call 42ece0 1108->1113 1109->1113 1114 4222ca-4222cc 1109->1114 1110->1109 1110->1113 1113->1099 1117 4222d3 1114->1117 1118 4222ce-4222d1 1114->1118 1120 4222d8-4222ec call 414000 1117->1120 1118->1120 1120->1113 1123 4222f2-4222f7 1120->1123 1124 422314-42232b 1123->1124 1125 4222f9-422312 1123->1125 1126 42232d-42232f 1124->1126 1125->1126 1127 422373-422378 1126->1127 1128 422331-42233c 1126->1128 1131 42237a-42239b 1127->1131 1132 42239d-4223b9 1127->1132 1129 422356-422362 1128->1129 1130 42233e-422353 call 48efd0 1128->1130 1129->1127 1134 422364-422370 1129->1134 1130->1129 1135 4223bb-4223bd 1131->1135 1132->1135 1137 4223bf-4223cb 1135->1137 1138 4223cd-4223d1 1135->1138 1137->1138 1139 4223d7-4223d9 1137->1139 1138->1139 1140 4224af-4224b3 1138->1140 1143 4223f5-4223fa 1139->1143 1144 4223db-4223f0 1139->1144 1141 4224b5-4224bc 1140->1141 1142 4224fd-422510 1140->1142 1145 4224de-4224fa 1141->1145 1146 4224be-4224db call 48efd0 1141->1146 1147 422512-422528 call 48e559 1142->1147 1148 422530-42253b 1142->1148 1150 422406-42240b 1143->1150 1151 4223fc-422401 1143->1151 1149 42248c-422497 call 48f851 1144->1149 1146->1145 1147->1148 1171 42252a-42252e 1147->1171 1156 42255a-422571 1148->1156 1157 42253d 1148->1157 1166 42249c-4224a1 1149->1166 1152 422414-422419 1150->1152 1153 42240d-422412 1150->1153 1151->1149 1161 42247a-422484 1152->1161 1162 42241b-422425 1152->1162 1153->1149 1159 422577 1156->1159 1160 42261a-42263a 1156->1160 1165 422540-422558 1157->1165 1168 422580-42259e 1159->1168 1161->1149 1172 422486 1161->1172 1169 422437-42243e 1162->1169 1170 422427-422435 1162->1170 1165->1156 1165->1165 1166->1113 1167 4224a3-4224ad 1166->1167 1167->1140 1173 4225a0-4225c9 call 48e559 1168->1173 1174 4225df-422614 call 48efd0 1168->1174 1175 422441-422453 call 48e5e4 1169->1175 1170->1175 1171->1147 1171->1148 1172->1149 1182 4225d2 1173->1182 1183 4225cb-4225d0 1173->1183 1174->1160 1174->1168 1175->1113 1175->1149 1184 4225d5-4225d9 1182->1184 1183->1184 1184->1173 1185 4225db 1184->1185 1185->1174
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll_memmove$_wcsncpy
        • String ID: "$ErrorLevel$Illegal parameter name.$Out of memory.$Variable name too long.
        • API String ID: 3055118137-3900197193
        • Opcode ID: e31bef7e062656b10441d81d2f7a02bc578dc6ffd664ccca2a5761fda883506f
        • Instruction ID: 472ab4a50b02fdc6a500bfc68674bedc6d1afeb900cf329abd18d6fe06ee760d
        • Opcode Fuzzy Hash: e31bef7e062656b10441d81d2f7a02bc578dc6ffd664ccca2a5761fda883506f
        • Instruction Fuzzy Hash: 8AE1F471604316AFC320DF14E980BABB3E0FF98318F54466EE84497351E7B9EA45CB96

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1186 401d17-401d1e 1187 401d20-401d26 1186->1187 1188 401db1-401dbb 1187->1188 1189 401d2c-401d2f 1187->1189 1190 401dc1-401dde 1188->1190 1191 401d39-401d43 GetForegroundWindow 1188->1191 1189->1187 1192 401d31 1189->1192 1193 401de0-401df0 1190->1193 1194 401df4-401dfb 1190->1194 1195 401d49-401d7b GetWindowThreadProcessId GetClassNameW 1191->1195 1192->1191 1193->1194 1196 401e0c 1194->1196 1197 401dfd-401e0a 1194->1197 1199 401d80-401d8f 1195->1199 1200 401e10-401e1e 1196->1200 1197->1200 1204 401d91-401da8 1199->1204 1205 401daa-402d6c IsDialogMessageW 1199->1205 1202 401ee4-401ee8 1200->1202 1203 401e24 1200->1203 1206 401483-4014d9 GetTickCount call 403740 KiUserCallbackDispatcher 1202->1206 1207 401eee-401efb 1202->1207 1208 401e94-401e9d 1203->1208 1209 401e78-401e81 1203->1209 1210 401eaa-401eba 1203->1210 1211 401e2b-401e34 1203->1211 1212 401e5c-401e65 1203->1212 1204->1199 1204->1205 1242 402d79-402d85 1205->1242 1243 402d6e-402d73 SetCurrentDirectoryW 1205->1243 1248 4014db-4014e4 GetTickCount 1206->1248 1221 401f15-401f19 1207->1221 1222 401efd-401f01 1207->1222 1208->1206 1218 401ea3-401ea5 1208->1218 1209->1206 1217 401e87-401e92 1209->1217 1219 401ebc-401ebe 1210->1219 1220 401edd-4021fd 1210->1220 1211->1206 1223 401e3a-401e41 1211->1223 1212->1206 1215 401e6b-401e76 1212->1215 1226 401e45-401e4b 1215->1226 1217->1226 1228 40216a-40217a call 4703d0 1218->1228 1219->1206 1229 401ec4-401ed7 DragQueryFileW 1219->1229 1220->1206 1236 402203-402219 DragFinish 1220->1236 1221->1206 1225 401f1f-401f26 1221->1225 1222->1206 1231 401f07-401f10 call 465bc0 1222->1231 1223->1226 1225->1228 1232 401e55-401e57 1226->1232 1233 401e4d-401e4f 1226->1233 1246 40217c-40217d 1228->1246 1247 40217f-4021a5 1228->1247 1229->1220 1229->1232 1231->1206 1232->1228 1233->1206 1233->1232 1236->1206 1242->1206 1243->1242 1246->1247 1258 4021c7-4021cc 1247->1258 1259 4021a7-4021c5 1247->1259 1250 4014e6 1248->1250 1251 4014eb-4014f6 1248->1251 1250->1251 1253 401527-4015b2 GetFocus call 479cb0 call 45c3d0 1251->1253 1254 4014f8-401521 call 4031f0 1251->1254 1281 4015b4-4015c3 TranslateAcceleratorW 1253->1281 1282 4015c9-4015eb 1253->1282 1254->1206 1254->1253 1258->1206 1263 4021d2-4021e8 DragFinish 1258->1263 1259->1258 1263->1206 1281->1206 1281->1282 1285 401605-401644 call 4012e0 1282->1285 1286 4015ed-4015f0 1282->1286 1295 401646-401649 1285->1295 1296 40164f-401666 call 469740 1285->1296 1286->1285 1287 4015f2-4015f5 1286->1287 1287->1285 1289 4015f7-4015fa 1287->1289 1289->1285 1291 4015fc-4015ff 1289->1291 1291->1285 1295->1296 1296->1206
        APIs
        • GetTickCount.KERNEL32 ref: 00401489
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,-00000311), ref: 004014D0
        • GetTickCount.KERNEL32 ref: 004014DB
        • GetForegroundWindow.USER32 ref: 00401D39
        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00401D4C
        • GetClassNameW.USER32(00000000,?,00000020), ref: 00401D69
        • IsDialogMessageW.USER32(00000000,?), ref: 00402D5B
        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\Desktop), ref: 00402D73
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTickWindow$CallbackClassCurrentDialogDirectoryDispatcherForegroundMessageNameProcessThreadUser
        • String ID: #32770$C:\Users\user\Desktop
        • API String ID: 2062716809-2506600713
        • Opcode ID: ddf7964bcc0e5bb38d89044265bd6c079c8b0e6b03de50973f8ed68ed39c15b2
        • Instruction ID: 4809e12910ea3c4f6f8023be111489df4376e5a59fa8bf9b003857fc8be14ee4
        • Opcode Fuzzy Hash: ddf7964bcc0e5bb38d89044265bd6c079c8b0e6b03de50973f8ed68ed39c15b2
        • Instruction Fuzzy Hash: 7861CF71500301ABD7209F58C888B6BB7E4AB95704F48493BF856A73F1D778EC85CB9A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1381 4166f0-416718 call 48e5e4 1384 416723-416755 SetTimer 1381->1384 1385 41671a-416720 1381->1385 1386 416764-416794 GetTickCount 1384->1386 1387 416757-41675f 1384->1387 1388 4167b2-4167d8 GetTickCount call 425420 1386->1388 1389 416796-4167ac SetTimer 1386->1389 1390 41680e-41681f 1387->1390 1394 4167dd-4167ed 1388->1394 1389->1388 1392 416821-41683c call 42eed0 1390->1392 1393 41683f-4168e1 call 477e60 1390->1393 1392->1393 1402 4168e3-4168e9 1393->1402 1403 41691e-416927 1393->1403 1397 416808 1394->1397 1398 4167ef-416800 KillTimer 1394->1398 1397->1390 1398->1397 1401 416802 1398->1401 1401->1397 1402->1403 1404 4168eb-4168f1 1402->1404 1404->1403 1405 4168f3-4168f9 1404->1405 1405->1403 1406 4168fb-416901 1405->1406 1406->1403 1407 416903-416919 call 416960 1406->1407 1407->1403
        APIs
        • _malloc.LIBCMT ref: 00416707
          • Part of subcall function 0048E5E4: __FF_MSGBANNER.LIBCMT ref: 0048E5FD
          • Part of subcall function 0048E5E4: __NMSG_WRITE.LIBCMT ref: 0048E604
          • Part of subcall function 0048E5E4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048E629
        • SetTimer.USER32(00010474,0000000E,04EF6D80,Function_000038E0), ref: 00416750
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AllocateHeapTimer_malloc
        • String ID: The thread has exited.
        • API String ID: 2122149007-1941089863
        • Opcode ID: 80004ca7e0b1466990b8ff36011275c93eb82909a1c63f402eb41f174ce28d50
        • Instruction ID: b662813046bbf4e41544d8be373a02e6ad370fd6a70499209151432556095313
        • Opcode Fuzzy Hash: 80004ca7e0b1466990b8ff36011275c93eb82909a1c63f402eb41f174ce28d50
        • Instruction Fuzzy Hash: 7351B1F1A01344AFD750DF29D888FD67BA4BB58314F5A85BFE1089B2A1C3759880CB59

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1409 402c12-402c1a CountClipboardFormats 1410 402c40 1409->1410 1411 402c1c-402c28 IsClipboardFormatAvailable 1409->1411 1414 402c42-402c83 call 4010e0 1410->1414 1412 402c39-402c3e 1411->1412 1413 402c2a-402c30 IsClipboardFormatAvailable 1411->1413 1412->1414 1413->1412 1416 402c32-402c37 1413->1416 1418 402c90-402c95 1414->1418 1419 402c85-402c8a call 401220 1414->1419 1416->1414 1421 402cb3-402d04 call 403690 1418->1421 1422 402c97-402cae call 4704d0 1418->1422 1419->1418 1428 401483-4014d9 GetTickCount call 403740 KiUserCallbackDispatcher 1421->1428 1429 402d0a-402d21 call 402f30 1421->1429 1422->1421 1438 4014db-4014e4 GetTickCount 1428->1438 1429->1428 1435 402d27-402d31 1429->1435 1435->1428 1439 4014e6 1438->1439 1440 4014eb-4014f6 1438->1440 1439->1440 1441 401527-4015b2 GetFocus call 479cb0 call 45c3d0 1440->1441 1442 4014f8-401521 call 4031f0 1440->1442 1458 4015b4-4015c3 TranslateAcceleratorW 1441->1458 1459 4015c9-4015eb 1441->1459 1442->1428 1442->1441 1458->1428 1458->1459 1462 401605-401644 call 4012e0 1459->1462 1463 4015ed-4015f0 1459->1463 1472 401646-401649 1462->1472 1473 40164f-401666 call 469740 1462->1473 1463->1462 1464 4015f2-4015f5 1463->1464 1464->1462 1466 4015f7-4015fa 1464->1466 1466->1462 1468 4015fc-4015ff 1466->1468 1468->1462 1472->1473 1473->1428
        APIs
        • GetTickCount.KERNEL32 ref: 00401489
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,-00000311), ref: 004014D0
        • GetTickCount.KERNEL32 ref: 004014DB
        • CountClipboardFormats.USER32 ref: 00402C12
        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00402C24
        • IsClipboardFormatAvailable.USER32(0000000F), ref: 00402C2C
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: ClipboardCount$AvailableFormatTick$CallbackDispatcherFormatsUser
        • String ID:
        • API String ID: 2843769501-0
        • Opcode ID: 582fbeb2324a0f424ad923fefbc8c478643c1a00a9ed1dd558caa431d1f5aa3b
        • Instruction ID: 79a482513744a66b89baae91f33c315c8f0136cf10c27d4fffad67caa3995654
        • Opcode Fuzzy Hash: 582fbeb2324a0f424ad923fefbc8c478643c1a00a9ed1dd558caa431d1f5aa3b
        • Instruction Fuzzy Hash: 2A61CF71604300ABEB209F69C884B6F76E4AB95704F04453EF856A73F1D7B8DC84CB9A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1476 401819-40182d 1477 40185f-40188c PeekMessageW 1476->1477 1478 40182f-401836 1476->1478 1482 401892-40189d GetTickCount 1477->1482 1483 4014eb-4014f6 1477->1483 1478->1477 1480 401838-40183f 1478->1480 1480->1477 1481 401841-401856 1480->1481 1481->1477 1492 401858 1481->1492 1484 4018a4-4018be Sleep 1482->1484 1485 40189f 1482->1485 1486 401527-4015b2 GetFocus call 479cb0 call 45c3d0 1483->1486 1487 4014f8-401521 call 4031f0 1483->1487 1497 401483-4014d9 GetTickCount call 403740 KiUserCallbackDispatcher 1484->1497 1485->1484 1515 4015b4-4015c3 TranslateAcceleratorW 1486->1515 1516 4015c9-4015eb 1486->1516 1487->1486 1487->1497 1492->1477 1509 4014db-4014e4 GetTickCount 1497->1509 1509->1483 1511 4014e6 1509->1511 1511->1483 1515->1497 1515->1516 1519 401605-401644 call 4012e0 1516->1519 1520 4015ed-4015f0 1516->1520 1529 401646-401649 1519->1529 1530 40164f-401661 call 469740 1519->1530 1520->1519 1521 4015f2-4015f5 1520->1521 1521->1519 1523 4015f7-4015fa 1521->1523 1523->1519 1525 4015fc-4015ff 1523->1525 1525->1519 1529->1530 1532 401666 1530->1532 1532->1497
        APIs
        • GetTickCount.KERNEL32 ref: 00401489
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,-00000311), ref: 004014D0
        • GetTickCount.KERNEL32 ref: 004014DB
        • GetFocus.USER32 ref: 00401575
        • PeekMessageW.USER32(?,00000000,00000000,-00000311,00000001), ref: 00401884
        • GetTickCount.KERNEL32 ref: 00401892
        • Sleep.KERNEL32(00000000), ref: 004018B3
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick$CallbackDispatcherFocusMessagePeekSleepUser
        • String ID:
        • API String ID: 1365517912-0
        • Opcode ID: 406ba5298a6b984f0ce048ab9604d59f19c091fe306b0bee4b6d501d948e1a47
        • Instruction ID: 4abdc034f09e4808e0c250cafc60b8b502eb2413becf17a73983d5d1e7fca53b
        • Opcode Fuzzy Hash: 406ba5298a6b984f0ce048ab9604d59f19c091fe306b0bee4b6d501d948e1a47
        • Instruction Fuzzy Hash: B651D071A043409FDB20DB68C884B6F7AE4AB95704F08467EE856A73F1D378DC85CB5A
        APIs
        • GlobalUnlock.KERNEL32(00000000), ref: 004013AF
        • CloseClipboard.USER32 ref: 004013BB
        • SetTimer.USER32(00010474,00000009,0000000A), ref: 00401464
        • GetTickCount.KERNEL32 ref: 00401489
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,-00000311), ref: 004014D0
        • GetTickCount.KERNEL32 ref: 004014DB
        • GetFocus.USER32 ref: 00401575
          • Part of subcall function 00403180: joyGetPosEx.WINMM ref: 004031AF
        • TranslateAcceleratorW.USER32(00000000,?,?), ref: 004015BB
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick$AcceleratorCallbackClipboardCloseDispatcherFocusGlobalTimerTranslateUnlockUser
        • String ID:
        • API String ID: 1474087974-0
        • Opcode ID: 1d304d67ba44700013980c86b29f0903b661311ef2b09cfb9ec1732c33dce7e6
        • Instruction ID: dab53dfb54af43acb549e6a6b9bd86adfab31d3e2b780215a040be2c35964d6e
        • Opcode Fuzzy Hash: 1d304d67ba44700013980c86b29f0903b661311ef2b09cfb9ec1732c33dce7e6
        • Instruction Fuzzy Hash: 5C61C171504340AFDB219F68C884B6BBAE4AB95304F08453FF895A73F1D7789C85CB9A
        APIs
        • GetTickCount.KERNEL32 ref: 00401489
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,-00000311), ref: 004014D0
        • GetTickCount.KERNEL32 ref: 004014DB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick$CallbackDispatcherUser
        • String ID: call
        • API String ID: 1502404630-3431870270
        • Opcode ID: b5044d497141f041c23598e6564c4a29b7f3b4f700211081432b5bc21f2d6e87
        • Instruction ID: 936dcfecd109e37cb26727d748c5f94842e48f458149c002fc0bb43ef13e323f
        • Opcode Fuzzy Hash: b5044d497141f041c23598e6564c4a29b7f3b4f700211081432b5bc21f2d6e87
        • Instruction Fuzzy Hash: 516171715043409BD7219F58C885BAFB7E4AB89704F04493FF895A73A1D778EC84CB9A
        APIs
        • GetModuleFileNameW.KERNEL32(00000000,?,00000800,00000000,00000000,?,00000001,00403DC2,004CB680,?), ref: 00415F2E
          • Part of subcall function 00475E20: _wcschr.LIBCMT ref: 00475E77
          • Part of subcall function 00475E20: _wcsncpy.LIBCMT ref: 00475ED6
          • Part of subcall function 00475E20: _wcschr.LIBCMT ref: 00475EE5
          • Part of subcall function 00475E20: FindFirstFileW.KERNELBASE(00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00475F0E
          • Part of subcall function 00475E20: FindClose.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00475F26
          • Part of subcall function 00475E20: _wcschr.LIBCMT ref: 00475F49
          • Part of subcall function 00475E20: FindFirstFileW.KERNELBASE(00000001,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00475F60
          • Part of subcall function 00475E20: FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00475F6C
        • _wcsrchr.LIBCMT ref: 00415FC9
        • GetModuleFileNameW.KERNEL32(00000000,?,000007FE,?,?,?,?,?,004CB680,?), ref: 00416062
        • _wcsrchr.LIBCMT ref: 004160BA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: FileFind$_wcschr$CloseFirstModuleName_wcsrchr$_wcsncpy
        • String ID: %s\%s$Out of memory.
        • API String ID: 2025279223-1641153398
        • Opcode ID: 7431edfec019cd6c7eefd4292d97425795d6c8a4bae83cecb88eebbf023d11a6
        • Instruction ID: 06683767833a9047cc34e19a5231d722de0976728f627d3b0ab9350e03abb36c
        • Opcode Fuzzy Hash: 7431edfec019cd6c7eefd4292d97425795d6c8a4bae83cecb88eebbf023d11a6
        • Instruction Fuzzy Hash: 8451F77260474297D720DF659C01AEB7394EF85310F084A2EFD598B2C1EB78DA49C7AA
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Initialize_memset
        • String ID: No tray mem$Tray$h(J$h(J
        • API String ID: 2068092829-3999171079
        • Opcode ID: 48f9d55ea92cc5ae58083f0c02d8cb7cbd1bfbb0b45715f21bf00ed7ca16c016
        • Instruction ID: b56ada80f6144cee3a17cc1abe520f9245099593bfbc1133d4f9dd6cf55cae86
        • Opcode Fuzzy Hash: 48f9d55ea92cc5ae58083f0c02d8cb7cbd1bfbb0b45715f21bf00ed7ca16c016
        • Instruction Fuzzy Hash: 395135B5A55340DED380DF5BEDC2E55BAA8F719704B98863FE08C83622DB7800448F9E
        APIs
        • SetTimer.USER32(00010474,00000009,0000000A), ref: 00401464
        • GetTickCount.KERNEL32 ref: 00401489
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,-00000311), ref: 004014D0
        • GetTickCount.KERNEL32 ref: 004014DB
        • GetFocus.USER32 ref: 00401575
          • Part of subcall function 00403180: joyGetPosEx.WINMM ref: 004031AF
        • TranslateAcceleratorW.USER32(00000000,?,?), ref: 004015BB
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick$AcceleratorCallbackDispatcherFocusTimerTranslateUser
        • String ID:
        • API String ID: 3005849476-0
        • Opcode ID: 6abb7a606a1b618ad8cc8af84c5eb0c3413edc20e7beb17ae4f30f0044ea6eba
        • Instruction ID: 8ce2eff84ab1787fe6e3b090b022fc03378ce36282eee567718d2ea6fa9fc6b9
        • Opcode Fuzzy Hash: 6abb7a606a1b618ad8cc8af84c5eb0c3413edc20e7beb17ae4f30f0044ea6eba
        • Instruction Fuzzy Hash: 3751C171604340ABDB219F688884B6B7AE4AB95704F08053FF895A73F1D7789C84CB9A
        APIs
          • Part of subcall function 00403690: _free.LIBCMT ref: 004036A6
          • Part of subcall function 00403690: _free.LIBCMT ref: 004036CC
        • GetTickCount.KERNEL32 ref: 00401489
        • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,-00000311), ref: 004014D0
        • GetTickCount.KERNEL32 ref: 004014DB
        • GetFocus.USER32 ref: 00401575
        • TranslateAcceleratorW.USER32(00000000,?,?), ref: 004015BB
          • Part of subcall function 00402F30: GetTickCount.KERNEL32 ref: 00402F30
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick$_free$AcceleratorCallbackDispatcherFocusTranslateUser
        • String ID:
        • API String ID: 3134410435-0
        • Opcode ID: f10a78642695cafb8c8182a6abaa212a986084d7210fc689cd31068a90e4b44e
        • Instruction ID: 32b5fadb59443b2bf0d2d21808a46e6269a3527016376128013db6482dabb7b0
        • Opcode Fuzzy Hash: f10a78642695cafb8c8182a6abaa212a986084d7210fc689cd31068a90e4b44e
        • Instruction Fuzzy Hash: 99519F71504340ABDB209F688884B6FB6E4AB85704F08453FF896A73F1D778DC85CB9A
        APIs
        • _malloc.LIBCMT ref: 0048F85F
          • Part of subcall function 0048E5E4: __FF_MSGBANNER.LIBCMT ref: 0048E5FD
          • Part of subcall function 0048E5E4: __NMSG_WRITE.LIBCMT ref: 0048E604
          • Part of subcall function 0048E5E4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048E629
        • _free.LIBCMT ref: 0048F872
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AllocateHeap_free_malloc
        • String ID:
        • API String ID: 1020059152-0
        • Opcode ID: a6170a0832faeaaa591ec81267bb34bc049d766c89069b3f315b6c1a31ef2751
        • Instruction ID: ee740fa54578e2a6296a374bae593a9e431df336c3911e3be1354f24f2d184c8
        • Opcode Fuzzy Hash: a6170a0832faeaaa591ec81267bb34bc049d766c89069b3f315b6c1a31ef2751
        • Instruction Fuzzy Hash: C0117332504616BBCF213B76AC09A5E3F94AF453A4B20483BF8499A251EF7CCC95879D
        APIs
        • SetForegroundWindow.USER32(00000000), ref: 00478C02
        • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,0040ED23,?), ref: 00478C28
        • GetWindow.USER32(?,00000004), ref: 00478C41
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$Foreground
        • String ID:
        • API String ID: 62970417-0
        • Opcode ID: 8415ebe144c8125dbd582510cbdb9eac345e0193f200378f9f17de8807946a43
        • Instruction ID: dcfb9c93a73a2feb003cf9096b0e030cd481b7a5d1015952508711dcc7d46514
        • Opcode Fuzzy Hash: 8415ebe144c8125dbd582510cbdb9eac345e0193f200378f9f17de8807946a43
        • Instruction Fuzzy Hash: E5E0E5322402209FD7517724BC097CD3F50A782395F054029F208A6250E7742CC147B9
        APIs
        • CloseHandle.KERNELBASE(?,?,?,?,0049EC18,000000FF), ref: 004157DA
        • _free.LIBCMT ref: 004157F5
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CloseHandle_free
        • String ID:
        • API String ID: 3521661170-0
        • Opcode ID: df2691370dde45b664a82cc35c023007d3ad4f56c59f09f3c9ab0fdaf517c21e
        • Instruction ID: f5a1fa194dd3bccebd4cb409fe62b83a178cfadaab077aa4d9e68bea1c075ab7
        • Opcode Fuzzy Hash: df2691370dde45b664a82cc35c023007d3ad4f56c59f09f3c9ab0fdaf517c21e
        • Instruction Fuzzy Hash: 8A118B71501B40DBD720DF18C945B8BB7E8FB48720F548A1EE4A687BD0D378A880CB89
        APIs
        • _malloc.LIBCMT ref: 0047286D
          • Part of subcall function 0048E5E4: __FF_MSGBANNER.LIBCMT ref: 0048E5FD
          • Part of subcall function 0048E5E4: __NMSG_WRITE.LIBCMT ref: 0048E604
          • Part of subcall function 0048E5E4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048E629
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AllocateHeap_malloc
        • String ID:
        • API String ID: 501242067-0
        • Opcode ID: c8ae4e35087f73d529d1eb07b802ca095ff404ff4bb0c1a7bb043b08582ffc85
        • Instruction ID: e30a703e7a980ded1aa989708a7bbd7e4624779a5ea03348e14dadd61fb044ed
        • Opcode Fuzzy Hash: c8ae4e35087f73d529d1eb07b802ca095ff404ff4bb0c1a7bb043b08582ffc85
        • Instruction Fuzzy Hash: D3F05E716006028FEB64DB7AD990B2BB3E6BFD0314B15863EE44E83B44E735E841CB05
        APIs
          • Part of subcall function 00490341: _malloc.LIBCMT ref: 0049035B
        • _malloc.LIBCMT ref: 0047246D
          • Part of subcall function 0048E5E4: __FF_MSGBANNER.LIBCMT ref: 0048E5FD
          • Part of subcall function 0048E5E4: __NMSG_WRITE.LIBCMT ref: 0048E604
          • Part of subcall function 0048E5E4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048E629
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _malloc$AllocateHeap
        • String ID:
        • API String ID: 680241177-0
        • Opcode ID: 52fa1ef240c4a8bb1a767a30037fef8fb5be9130bb29d3ad4314d547b749558d
        • Instruction ID: 32b1ca6a9c854aad1a7ff2ad83778b20a69e15e38335e9fe848e2c2ae8c76622
        • Opcode Fuzzy Hash: 52fa1ef240c4a8bb1a767a30037fef8fb5be9130bb29d3ad4314d547b749558d
        • Instruction Fuzzy Hash: 4BE09BB19006115FD7A0AB66BD027C775D09B00758F00853BFC8986301E7BCD8808BC6
        APIs
        • __wcsnicmp.LIBCMT ref: 0040E72E
        • __wcsnicmp.LIBCMT ref: 0040E74A
        • __wcsicoll.LIBCMT ref: 0040E77F
        • PostMessageW.USER32(00000000,00000102,00000001,00000000), ref: 0040E823
        • GetAsyncKeyState.USER32(000000A0), ref: 0040E8CC
        • GetAsyncKeyState.USER32(000000A1), ref: 0040E8DF
        • GetAsyncKeyState.USER32(000000A2), ref: 0040E8F3
        • GetAsyncKeyState.USER32(000000A3), ref: 0040E907
        • GetAsyncKeyState.USER32(000000A4), ref: 0040E91B
        • GetAsyncKeyState.USER32(000000A5), ref: 0040E92F
        • GetAsyncKeyState.USER32(0000005B), ref: 0040E940
        • GetAsyncKeyState.USER32(0000005C), ref: 0040E951
        • GetTickCount.KERNEL32 ref: 0040E9ED
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040EA12
        • GetTickCount.KERNEL32 ref: 0040EA3C
        • __wcsnicmp.LIBCMT ref: 0040EA68
        • __wcsnicmp.LIBCMT ref: 0040EA9E
          • Part of subcall function 0048EDA7: __wcsnicmp_l.LIBCMT ref: 0048EE3A
        • __fassign.LIBCMT ref: 0040EAB5
        • PostMessageW.USER32(?,00000102,?,00000000), ref: 0040EB0B
        • PostMessageW.USER32(?,00000102,00000000,00000000), ref: 0040EB1E
        • __itow.LIBCMT ref: 0040EB5D
        • _free.LIBCMT ref: 0040EDF9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AsyncState$Message__wcsnicmp$Post$CountTick$Peek__fassign__itow__wcsicoll__wcsnicmp_l_free
        • String ID: ASC $BlockInput$Down$R$Temp$W[$jjj$jjj$u2j$user32$@+$D$&
        • API String ID: 4094163869-1995836086
        • Opcode ID: 736017ab9851048b77c7189e0c710120cb2576245f70ec95b1a331980f3087b8
        • Instruction ID: 2281774c7c454032c348bef192ed07ac38e961d3da1bada98a71c26249f15680
        • Opcode Fuzzy Hash: 736017ab9851048b77c7189e0c710120cb2576245f70ec95b1a331980f3087b8
        • Instruction Fuzzy Hash: D8224771E04248ABEB20EB71DC41BAE3BB1AB45304F14483AE941773C2D678A955CB6E
        APIs
        • __wcsnicmp.LIBCMT ref: 0040E021
        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0040E0D3
        • AttachThreadInput.USER32(00001D00,00000000,00000001), ref: 0040E0FF
        • GetKeyboardLayout.USER32(00000000), ref: 0040E111
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Thread$AttachInputKeyboardLayoutProcessWindow__wcsnicmp
        • String ID: BlockInput$Click$Down$W[$^+!#{}$jjj$jjj$u2j$user32${Blind}${Click$->$@+$D$&
        • API String ID: 1856766819-133462133
        • Opcode ID: c7f2926fb57ef9f50b73015b70c67cd341fa40d0372b07f822cda65d3bd30a6c
        • Instruction ID: e20cf5ae9c183c6ee17abaf55a69111d0397c9fc3987c5a299b79d89282bf35c
        • Opcode Fuzzy Hash: c7f2926fb57ef9f50b73015b70c67cd341fa40d0372b07f822cda65d3bd30a6c
        • Instruction Fuzzy Hash: FB123471904245ABDB20DFA5DC45BAE3FB0AF15304F18447AE800BB3D2E3799995C7AE
        APIs
        • GetKeyboardLayout.USER32(00000000), ref: 0040E111
        • GetTickCount.KERNEL32 ref: 0040E17A
        • GetCurrentThreadId.KERNEL32 ref: 0040E1B1
        • GetAsyncKeyState.USER32(0000005B), ref: 0040E1E8
        • GetAsyncKeyState.USER32(0000005C), ref: 0040E1F6
        • GetForegroundWindow.USER32(?,02D53388,?), ref: 0040E255
        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040E26D
        • GetGUIThreadInfo.USER32 ref: 0040E283
        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0040E2A2
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Thread$Window$AsyncProcessState$CountCurrentForegroundInfoKeyboardLayoutTick
        • String ID: 0$BlockInput$Click$W[$^+!#{}$jjj$jjj$u2j$user32$->$@+$D$&
        • API String ID: 129495084-2023929695
        • Opcode ID: f44c7b8bd1be0d983c15274f5d1f2684d05acd607c06dc1612f13f616f2c6b7d
        • Instruction ID: 419eab7ce2967ea793ce4a15263c936d1881dedd841ae0817866ba0127be755f
        • Opcode Fuzzy Hash: f44c7b8bd1be0d983c15274f5d1f2684d05acd607c06dc1612f13f616f2c6b7d
        • Instruction Fuzzy Hash: 91028971904244ABDB20DB65EC45BAE3FB4AF15304F18447BE800BB3D2E7799994CB6E
        APIs
        • FindResourceW.KERNEL32(00000000,>AUTOHOTKEY SCRIPT<,0000000A,00000000,?,0042EB7E,00000000,00000000,0049EEAB,000000FF,00416DDD,00000000,-00000005,?,0042EB7E,00000000), ref: 0041714E
        • FindResourceW.KERNEL32(00000000,>AHK WITH ICON<,0000000A), ref: 0041715E
        • SizeofResource.KERNEL32(00000000,00000000,?,0042EB7E,00000000,00000000,0049EEAB,000000FF,00416DDD,00000000,-00000005,?,0042EB7E,00000000), ref: 0041716E
        • LoadResource.KERNEL32(00000000,00000000,?,0042EB7E,00000000,00000000,0049EEAB,000000FF,00416DDD,00000000,-00000005,?,0042EB7E,00000000), ref: 00417185
        • LockResource.KERNEL32(00000000,?,0042EB7E,00000000,00000000,0049EEAB,000000FF,00416DDD,00000000,-00000005,?,0042EB7E,00000000), ref: 00417194
        • __wcsnicmp.LIBCMT ref: 00417270
        • _memmove.LIBCMT ref: 00417326
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Resource$Find$LoadLockSizeof__wcsnicmp_memmove
        • String ID: #CommentFlag$%s up::$%s::$8L$7j$>AHK WITH ICON<$>AUTOHOTKEY SCRIPT<$@h@uJ$Functions cannot contain functions.$Get$Missing "{"$Not a valid method, class or property definition.$Not a valid property getter/setter.$PhdzJ$QhTzJ$RQUC$RQh(zJ$Set$U_B$VVVjgU0C$h8uJ$if not GetKeyState("%s")$jjj${Blind}%s%s{%s DownR}${Blind}{%s Up}${RCtrl up}$S"
        • API String ID: 2376650586-2012877966
        • Opcode ID: fc305ad2d6cb575203174f9fe85d50d56ef12545aea3f89f706bd9c120419466
        • Instruction ID: c3ea55567d26fb2407ac7b8641f70a228fd4f2a28ea5d3462899dacf533bdf0b
        • Opcode Fuzzy Hash: fc305ad2d6cb575203174f9fe85d50d56ef12545aea3f89f706bd9c120419466
        • Instruction Fuzzy Hash: 4232C07060C3419AD730DF24C881BEBB7E5AF95304F14492FF98987391E7789985CB9A
        APIs
        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0040E0D3
        • AttachThreadInput.USER32(00001D00,00000000,00000001), ref: 0040E0FF
        • GetKeyboardLayout.USER32(00000000), ref: 0040E111
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Thread$AttachInputKeyboardLayoutProcessWindow
        • String ID: BlockInput$Click$W[$^+!#{}$jjj$jjj$u2j$user32$->$@+$D$&
        • API String ID: 1208206634-2117555299
        • Opcode ID: adb9e63cd6895b66f2fb4f9b271f213cdfb018240a1f363d16a3d72e19d9bad0
        • Instruction ID: 32cc453ddc04cf7ab4c8c3d5656cc687bd1b4f3d370065143ec83fde251556ed
        • Opcode Fuzzy Hash: adb9e63cd6895b66f2fb4f9b271f213cdfb018240a1f363d16a3d72e19d9bad0
        • Instruction Fuzzy Hash: 59F13671904244ABDB21DBA5EC45BEE3FB0AF15308F18447AE840BB3D2D3795994C7AE
        APIs
        • _wcschr.LIBCMT ref: 0041EABF
        • __snwprintf.LIBCMT ref: 0041EAF2
          • Part of subcall function 004140C0: __fassign.LIBCMT ref: 004140EB
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __fassign__snwprintf_wcschr
        • String ID: %s.%s$, :=*)$, =)$A label must not point to a function.$Blank parameter$ByRef$Duplicate declaration.$Duplicate function definition.$Duplicate parameter.$Expected ":="$Function name too long.$Invalid function declaration.$Missing ")"$Missing close-quote$Missing comma$Out of memory.$Parameter default required.$Parameters of hotkey functions must be optional.$Too many params.$Unsupported parameter default.$false$this$true$value
        • API String ID: 1314477730-1825772190
        • Opcode ID: 2674169c7ecc8dcc19114037b217eab099799b5cd30b2cb32452b9f40eea8873
        • Instruction ID: 56bfafe0a29c89f58416f922bfa0ad3b72a75432c4f71ac572f414c38c9c0280
        • Opcode Fuzzy Hash: 2674169c7ecc8dcc19114037b217eab099799b5cd30b2cb32452b9f40eea8873
        • Instruction Fuzzy Hash: 93520475604301ABC720DF25D841AABB3A1EF94314F14893FE9498B392E73DDD86C79A
        APIs
        • GetModuleHandleW.KERNEL32(user32,BlockInput), ref: 0040E3DD
        • GetProcAddress.KERNEL32(00000000), ref: 0040E3E4
        • GetTickCount.KERNEL32 ref: 0040E42F
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040E454
        • GetTickCount.KERNEL32 ref: 0040E47E
        • _wcschr.LIBCMT ref: 0040E49C
        • _free.LIBCMT ref: 0040EDF9
        • GetKeyState.USER32(00000014), ref: 0040EFCE
        • GetKeyState.USER32(00000014), ref: 0040EFD6
          • Part of subcall function 004117F0: GetKeyState.USER32(00000000), ref: 004117FB
          • Part of subcall function 004117F0: GetKeyState.USER32(00000000), ref: 0041182A
          • Part of subcall function 004117F0: GetForegroundWindow.USER32(00000000), ref: 00411864
          • Part of subcall function 004117F0: GetWindowThreadProcessId.USER32(00000000), ref: 0041186B
          • Part of subcall function 004117F0: GetKeyState.USER32(00000014), ref: 004118AE
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: State$CountTickWindow$AddressForegroundHandleMessageModulePeekProcProcessThread_free_wcschr
        • String ID: BlockInput$Click$W[$^+!#{}$jjj$jjj$u2j$user32$@+$D$&
        • API String ID: 777000476-3088515670
        • Opcode ID: 360ff2a0dd51e44a7ef34f43e5dc86873268d327217e08d2768d0a9aede49575
        • Instruction ID: 07450953de2a4aef884f2e39c70f428d73c5906c148b341d1901e7ef592f138f
        • Opcode Fuzzy Hash: 360ff2a0dd51e44a7ef34f43e5dc86873268d327217e08d2768d0a9aede49575
        • Instruction Fuzzy Hash: 77E14571904248ABDB21DBA5EC45BEE3FB0AF15304F18447AE840BB3D2D3795994C7AE
        APIs
          • Part of subcall function 00408B70: CreateThread.KERNEL32(00000000,00002000,00408E80,00000000,00000000,004C83F0), ref: 00408BCA
          • Part of subcall function 00408B70: SetThreadPriority.KERNEL32(00000000,0000000F,?,00000000,00000000,00416D11,004CB680,?,?,00000000,004CB680,00416BD9,004CB680,0042EB7E), ref: 00408BE0
          • Part of subcall function 00408B70: PostThreadMessageW.USER32(00000000,00000417,?,00000000), ref: 00408C04
          • Part of subcall function 00408B70: Sleep.KERNEL32(0000000A,?,00000000,00000000,00416D11,004CB680,?,?,00000000,004CB680,00416BD9,004CB680,0042EB7E), ref: 00408C10
          • Part of subcall function 00408B70: GetTickCount.KERNEL32 ref: 00408C27
          • Part of subcall function 00408B70: PeekMessageW.USER32(?,00000000,00000417,00000417,00000001), ref: 00408C4A
        • Shell_NotifyIconW.SHELL32(00000002,004CB8F6), ref: 00415C09
        • IsWindow.USER32(00000000), ref: 00415C27
        • DestroyWindow.USER32(00000000,?,?,?,00000000,00000000), ref: 00415C34
        • DeleteObject.GDI32(00000000), ref: 00415C42
        • DeleteObject.GDI32(00000000), ref: 00415C4C
        • DeleteObject.GDI32(00000000), ref: 00415C56
        • DeleteObject.GDI32(00000000), ref: 00415C7D
        • DestroyCursor.USER32(00000000), ref: 00415C81
        • IsWindow.USER32(00000000), ref: 00415C8B
        • DestroyWindow.USER32(00000000,?,?,?,?,00000000,00000000), ref: 00415C99
        • DeleteObject.GDI32(00000000), ref: 00415CA7
        • DeleteObject.GDI32(00000000), ref: 00415CB1
        • DeleteObject.GDI32(00000000), ref: 00415CBB
        • DeleteObject.GDI32(?), ref: 00415D12
        • DestroyCursor.USER32(00000000), ref: 00415D2D
        • DestroyCursor.USER32(00000000), ref: 00415D36
        • IsWindow.USER32(00000000), ref: 00415D67
        • DestroyWindow.USER32(00000000,?,?,?,00000000,00000000), ref: 00415D74
        • DeleteObject.GDI32(00000000), ref: 00415D8F
        • ChangeClipboardChain.USER32(00010474,00000000), ref: 00415DD6
        • mciSendStringW.WINMM(status AHK_PlayMe mode,?,00000208,00000000), ref: 00415E03
        • mciSendStringW.WINMM(close AHK_PlayMe,00000000,00000000,00000000), ref: 00415E18
        • RtlDeleteCriticalSection.NTDLL(004C83D8), ref: 00415E1F
        • OleUninitialize.OLE32(?,?,?,00000000,00000000), ref: 00415E25
        • _free.LIBCMT ref: 00415E5B
        • _free.LIBCMT ref: 00415E97
          • Part of subcall function 0048F817: HeapFree.KERNEL32(00000000,00000000,?,00492183,00000000,?,0048E46A), ref: 0048F82D
          • Part of subcall function 0048F817: GetLastError.KERNEL32(00000000,?,00492183,00000000,?,0048E46A), ref: 0048F83F
        • _free.LIBCMT ref: 00415ED6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Delete$Object$DestroyWindow$CursorThread_free$MessageSendString$ChainChangeClipboardCountCreateCriticalErrorFreeHeapIconLastNotifyPeekPostPrioritySectionShell_SleepTickUninitialize
        • String ID: close AHK_PlayMe$status AHK_PlayMe mode
        • API String ID: 2053152309-1474590089
        • Opcode ID: e101fe866ce5ffce2b3bb0e16337543c2239cbe9cdf6e48220e1e1f0cbb6b058
        • Instruction ID: 573535fc50cdc2d3bf74edd2cd24ba6684edd0aa5feb5a0429812acd8d0e3010
        • Opcode Fuzzy Hash: e101fe866ce5ffce2b3bb0e16337543c2239cbe9cdf6e48220e1e1f0cbb6b058
        • Instruction Fuzzy Hash: DC916E71A00700DBD760DF69EC89FD777A8AB84744F18452EE849D7291EB38E880CB9D
        APIs
        • _free.LIBCMT ref: 0040EDF9
        • GetKeyState.USER32(00000014), ref: 0040EFCE
        • GetKeyState.USER32(00000014), ref: 0040EFD6
        • GetForegroundWindow.USER32(00000000), ref: 0040F011
        • GetWindowThreadProcessId.USER32(00000000), ref: 0040F018
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: StateWindow$ForegroundProcessThread_free
        • String ID: BlockInput$W[$jjj$jjj$u2j$user32$@+$D$&
        • API String ID: 1488558992-1238252293
        • Opcode ID: e23aab4bbba0159d227d7ad57c2e12daa7ee0b4cbe9fd3a81b84f71b643b18ac
        • Instruction ID: 7263535a4e82a06121bab8244f7260a3ffe82b5fa588864750cc112e695ba9d0
        • Opcode Fuzzy Hash: e23aab4bbba0159d227d7ad57c2e12daa7ee0b4cbe9fd3a81b84f71b643b18ac
        • Instruction Fuzzy Hash: AA513970D04244EBEB60DBA0EC46FAE3FB0AB55304F14457AE504A63D2D3795894CB6E
        APIs
        • GetTickCount.KERNEL32 ref: 0040E42F
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040E454
        • GetTickCount.KERNEL32 ref: 0040E47E
        • _wcschr.LIBCMT ref: 0040E49C
        • _free.LIBCMT ref: 0040EDF9
        • GetKeyState.USER32(00000014), ref: 0040EFCE
        • GetKeyState.USER32(00000014), ref: 0040EFD6
        • GetForegroundWindow.USER32(00000000), ref: 0040F011
        • GetWindowThreadProcessId.USER32(00000000), ref: 0040F018
        • AttachThreadInput.USER32(00001D00,?,00000000), ref: 0040F053
        • GetModuleHandleW.KERNEL32(user32,BlockInput), ref: 0040F07E
        • GetProcAddress.KERNEL32(00000000), ref: 0040F085
        • GetForegroundWindow.USER32(00000000), ref: 0040F0AD
          • Part of subcall function 004113B0: SendInput.USER32(00000000,00000000,0000001C,00000000,FFFFFFFF,00000000), ref: 00411410
          • Part of subcall function 004113B0: GetForegroundWindow.USER32(?,?,00000000,FFFFFFFF,00000000), ref: 00411453
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$Foreground$CountInputStateThreadTick$AddressAttachHandleMessageModulePeekProcProcessSend_free_wcschr
        • String ID: BlockInput$W[$jjj$jjj$u2j$user32$@+$D$&
        • API String ID: 1020621991-1238252293
        • Opcode ID: a28e992f44717d855e527840fe48a82c4ee98747223d265655bc73ece0124d22
        • Instruction ID: cce426c752d8a9c5bbddf39c20b054f3e6192ef199ae3b67313394aeff9147ad
        • Opcode Fuzzy Hash: a28e992f44717d855e527840fe48a82c4ee98747223d265655bc73ece0124d22
        • Instruction Fuzzy Hash: 13515871D04244EBEB60DBA4EC46FEE3FB0AB55304F14417AE504A63E2D3796884CB6E
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 0040FA7E
        • GetKeyboardState.USER32(?), ref: 0040FB46
        • SetKeyboardState.USER32(?), ref: 0040FBE5
        • PostMessageW.USER32(00000000,00000100,00000000,00000000), ref: 0040FC11
        • PostMessageW.USER32(00000000,00000101,00000000,00000000), ref: 0040FC4E
        • GetModuleHandleW.KERNEL32(user32,BlockInput), ref: 0040FCA2
        • GetProcAddress.KERNEL32(00000000), ref: 0040FCA9
        • GetForegroundWindow.USER32 ref: 0040FD1B
        • GetAsyncKeyState.USER32 ref: 0040FD4B
        • keybd_event.USER32(00000000,00000000,?,00000000), ref: 0040FE16
        • GetAsyncKeyState.USER32(?), ref: 0040FE61
        • keybd_event.USER32(00000000,00000000,00000002,00000000), ref: 0040FF41
        • GetAsyncKeyState.USER32(?), ref: 0040FF7C
        • GetModuleHandleW.KERNEL32(user32,BlockInput), ref: 0040FFF5
        • GetProcAddress.KERNEL32(00000000), ref: 0040FFFC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: State$Async$AddressHandleKeyboardMessageModulePostProckeybd_event$CurrentForegroundThreadWindow
        • String ID: BlockInput$user32
        • API String ID: 1080742973-2744593370
        • Opcode ID: 3a191d049d892c591aab057385ee6816a806cf1b18531144576c57363d399800
        • Instruction ID: 19af0156ef4d3ee55dd79d0de02a96223c75fa260b3d02e2b480c2a537c268fd
        • Opcode Fuzzy Hash: 3a191d049d892c591aab057385ee6816a806cf1b18531144576c57363d399800
        • Instruction Fuzzy Hash: 9602B4B05083859BE721DF24D845BAB7BA0AB85304F18447FF885977D1C27CD98DCB9A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll$Clipboard$DataFormatName__wcsnicmp
        • String ID: Embed Source$Link Source$MSDEVColumnSelect$MSDEVLineSelect$Native$ObjectLink$OwnerLink
        • API String ID: 3127108255-1844231336
        • Opcode ID: c59ea5932d2f9fd590aa3d472bde3bb0c09371a1cd6ab20d2e6f52498aac1370
        • Instruction ID: 40afb35734437f51cce28a62eae329c8a5fedfd2c87ff76572df3eb0ecf2feed
        • Opcode Fuzzy Hash: c59ea5932d2f9fd590aa3d472bde3bb0c09371a1cd6ab20d2e6f52498aac1370
        • Instruction Fuzzy Hash: 0711A2B090030177D720F7669E42B2F72986FA0B05F440A3EBE94D12C1FBBCD619D66A
        APIs
        • EmptyClipboard.USER32 ref: 00404354
        • GlobalUnlock.KERNEL32(00000000), ref: 0040436B
        • CloseClipboard.USER32 ref: 00404374
        • GlobalUnlock.KERNEL32(?), ref: 004043AB
        • GlobalFree.KERNEL32(00000000), ref: 004043BD
        • GlobalUnlock.KERNEL32 ref: 004043D3
        • CloseClipboard.USER32 ref: 004043D8
          • Part of subcall function 00404430: GlobalUnlock.KERNEL32(00000000), ref: 0040444C
          • Part of subcall function 00404430: CloseClipboard.USER32 ref: 00404451
          • Part of subcall function 00404430: GlobalUnlock.KERNEL32(00000000), ref: 00404465
          • Part of subcall function 00404430: GlobalFree.KERNEL32(00000000), ref: 00404475
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Global$Unlock$Clipboard$Close$Free$Empty
        • String ID: Can't open clipboard for writing.$EmptyClipboard$SetClipboardData
        • API String ID: 1414016178-2690908087
        • Opcode ID: 83b58129dcf8664e3942b4f36190da09b0bd03338c258276e0b262cccb66cf6b
        • Instruction ID: a04d12cdcd0b7c149a22fd1595c8d6b142b5c66e65721eb3e5eb9c19c67f0655
        • Opcode Fuzzy Hash: 83b58129dcf8664e3942b4f36190da09b0bd03338c258276e0b262cccb66cf6b
        • Instruction Fuzzy Hash: 60316DB26017019FC7309F66D8C451BFBE4FF91315324893FE68692AA0C638A884CF58
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsnicmp
        • String ID: Duplicate class definition.$Full class name is too long.$Invalid class name.$Missing class name.$Out of memory.$Syntax error in class definition.$This class definition is nested too deep.$__Class$extends
        • API String ID: 1038674560-3763243221
        • Opcode ID: 00c0cb11bcef65f8551863bc886cd4a89573a265b7bccfaa25a0166f9e76213f
        • Instruction ID: 36c95c0af802dabb45c062092ea4adadaaec72f0e587411c51847d6f48675fd7
        • Opcode Fuzzy Hash: 00c0cb11bcef65f8551863bc886cd4a89573a265b7bccfaa25a0166f9e76213f
        • Instruction Fuzzy Hash: D5E1FE71A042009FC724DF19C481AABB7E1FF99354F44846FF8498B351D379D98ACB9A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: $$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$Error text not found (please report)$LF)$NO_START_OPT)$UCP)$UTF16)$no error
        • API String ID: 0-3688278424
        • Opcode ID: 3b4a83e86fa2fb5aaf46a8627bd972145f0f9de074951579b44a443c28ac94e3
        • Instruction ID: 3afafb0e86b34d4732ae4b56aef0687cf5cd5a6577105fa0171d1c03f56fc13a
        • Opcode Fuzzy Hash: 3b4a83e86fa2fb5aaf46a8627bd972145f0f9de074951579b44a443c28ac94e3
        • Instruction Fuzzy Hash: 2C62C2719083818BC724AF14C8507AFB7E1FF94B05F544D2EE8DA87390EB789A45CB56
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: @
        • API String ID: 0-2766056989
        • Opcode ID: 7e33d07b0cff1c6508bc9d9b811f6324bc2d25ff61fb4e588c4f091380a5daf8
        • Instruction ID: 9e72cf68064eff00ee00a8f7ecf91c6e7178858ef4326cc978418c4762071aa7
        • Opcode Fuzzy Hash: 7e33d07b0cff1c6508bc9d9b811f6324bc2d25ff61fb4e588c4f091380a5daf8
        • Instruction Fuzzy Hash: FCA1D3706483048FE718DB28D895BABB7E0AB95345F14452FF48683390D7BCE9C5CB9A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _wcsncpy$__wcsicoll_memset
        • String ID: & $ Up$@
        • API String ID: 2925817191-3870727058
        • Opcode ID: 54dabcecbfd578eda620c0f7b08743fadaaacbcf08f6edcc699776a1eaf22716
        • Instruction ID: 6661d5ffd3155fde33c7b8d727157ac261c7b2c2d09e36201dffd45d78757b15
        • Opcode Fuzzy Hash: 54dabcecbfd578eda620c0f7b08743fadaaacbcf08f6edcc699776a1eaf22716
        • Instruction Fuzzy Hash: 6491B021408380C6D730DB6495D17FBB7E1AF92300F548A6FE8C5A72C2E3799949D3AB
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _wcsncpy$_memset
        • String ID: & $ Up
        • API String ID: 4291556967-3258026345
        • Opcode ID: 63c79895643a8a16f689f70669fb381062f42340de29809e076359d3d70f7121
        • Instruction ID: 947f94153c870f6ff94ed1283692d9d6279b5c0da207c1724ac29def42cf6510
        • Opcode Fuzzy Hash: 63c79895643a8a16f689f70669fb381062f42340de29809e076359d3d70f7121
        • Instruction Fuzzy Hash: 7471F33120824096DB258A2489D17B7B7A1EF93704F28447FD8C5BB3D1E77E984993DE
        APIs
        • GetKeyboardLayout.USER32(00000000), ref: 004127CC
        • _memset.LIBCMT ref: 004127ED
        • ToUnicodeEx.USER32(0000006E,00000000,-00000018,-00000028,00000002,00000000,00000000), ref: 0041280E
        • ToUnicodeEx.USER32(00000000,00000000,-00000018,-00000028,00000002,00000000,00000000), ref: 0041282F
        • ToUnicodeEx.USER32(0000006E,00000000,-00000018,-0000001C,00000002,00000000,00000000), ref: 0041284C
        • ToUnicodeEx.USER32(00000000,00000000,-00000018,-0000001C,00000002,00000000,00000000), ref: 0041288B
        • MapVirtualKeyExW.USER32(?,00000002,00000000), ref: 004128B6
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Unicode$KeyboardLayoutVirtual_memset
        • String ID:
        • API String ID: 2910491412-0
        • Opcode ID: ce7b39d258641fe2b47f719185425a085e8cc06234974a81520d28679617c035
        • Instruction ID: a706856350bfed917a84ac3aec72d48d71a636a738e6a86ccf74fbd421833a48
        • Opcode Fuzzy Hash: ce7b39d258641fe2b47f719185425a085e8cc06234974a81520d28679617c035
        • Instruction Fuzzy Hash: E131F4326813007AD324DB61DD06FEB7BA8EBC5F14F40491EB644960C1D2B9D519C7BA
        APIs
        • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00408EAB
        • SetWindowsHookExW.USER32(0000000D,Function_000047F0,00400000,00000000), ref: 00408F13
        • UnhookWindowsHookEx.USER32(00000000), ref: 00408F2C
        • SetWindowsHookExW.USER32(0000000E,Function_00004960,00400000,00000000), ref: 00408F6F
        • UnhookWindowsHookEx.USER32(00000000), ref: 00408F83
        • PostThreadMessageW.USER32(00001D00,00000417,00000000,00000000), ref: 00408FB0
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: HookWindows$MessageUnhook$PostThread
        • String ID:
        • API String ID: 378849449-0
        • Opcode ID: 593f39acc818ad3f908b9cd3770af1f3038bf207bc47d0d186d406c0620ede82
        • Instruction ID: d4dc985ba7ae6a070033fca38dd1124495fbfbd0803b4979b57f43c5751ebb3f
        • Opcode Fuzzy Hash: 593f39acc818ad3f908b9cd3770af1f3038bf207bc47d0d186d406c0620ede82
        • Instruction Fuzzy Hash: 9831AF70254302AAE7209B34EE49BA73B95AB90748F14003EF680E63D1DB78D845CB9E
        APIs
        • GetKeyState.USER32(00000000), ref: 004117FB
        • GetKeyState.USER32(00000000), ref: 0041182A
        • GetForegroundWindow.USER32(00000000), ref: 00411864
        • GetWindowThreadProcessId.USER32(00000000), ref: 0041186B
        • GetKeyState.USER32(00000014), ref: 004118AE
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: State$Window$ForegroundProcessThread
        • String ID:
        • API String ID: 2921243749-0
        • Opcode ID: 9e04f788196a158cfe603d2f009003d629b4f62b7f8bb45ff84fdd8e8f849608
        • Instruction ID: ba167a81eb12e829cb67a72ffc559882dcaf5e7072fd548d71ecb31c6a883af0
        • Opcode Fuzzy Hash: 9e04f788196a158cfe603d2f009003d629b4f62b7f8bb45ff84fdd8e8f849608
        • Instruction Fuzzy Hash: 33215B31A8031576EA307744AC43FAA76646B52B99F144136F748392F2D7FA34C4467E
        APIs
        • IsDebuggerPresent.KERNEL32 ref: 0049983A
        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0049984F
        • UnhandledExceptionFilter.KERNEL32(004A27C4), ref: 0049985A
        • GetCurrentProcess.KERNEL32(C0000409), ref: 00499876
        • TerminateProcess.KERNEL32(00000000), ref: 0049987D
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
        • String ID:
        • API String ID: 2579439406-0
        • Opcode ID: 729c42f4b80c22c6941f823498b30a394449165d934a0126fecac05377793948
        • Instruction ID: d8fc70a5dfd7a516f87603d7b1e726f00fb65d0f949e943e378fc2c4c8ebacc8
        • Opcode Fuzzy Hash: 729c42f4b80c22c6941f823498b30a394449165d934a0126fecac05377793948
        • Instruction Fuzzy Hash: 9421CDB48182049FDB81DF29FD49AA43BB4FF98311F10417AE40A862A1EBB459818F1D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
        • API String ID: 0-1546025612
        • Opcode ID: d9d671fb3959ed80564cee6bdc1e129625b9e9f10f259aedf6daf1ee1e581451
        • Instruction ID: c8d810c1db611b5a8436fcc59964c228980774c9aae12cbb1566b64d3d25f312
        • Opcode Fuzzy Hash: d9d671fb3959ed80564cee6bdc1e129625b9e9f10f259aedf6daf1ee1e581451
        • Instruction Fuzzy Hash: DC828E71A053418BDB24EF18C4807AEB7E1FB94314F148E2FE999873D0D7399885CB5A
        APIs
        • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,0040ED23,?), ref: 00476364
        • IsIconic.USER32(00000000), ref: 00476371
        • GetWindowRect.USER32(00000000,?), ref: 00476387
        • ClientToScreen.USER32 ref: 004763A5
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$ClientForegroundIconicRectScreen
        • String ID:
        • API String ID: 4031265896-0
        • Opcode ID: 7c63bf72ad617980b51b0adafd7ef1f09d2bbf20327d0e8a7218cb5049628913
        • Instruction ID: 349e6bd27320aafe0b75f938d2e8bf42d6feae546cb692c440e23face523bd5b
        • Opcode Fuzzy Hash: 7c63bf72ad617980b51b0adafd7ef1f09d2bbf20327d0e8a7218cb5049628913
        • Instruction Fuzzy Hash: CAF01D70509B12AFD714DF14D844AAB7BADAF85354F458429E84A81210EB38C959CBAA
        APIs
          • Part of subcall function 00472450: _malloc.LIBCMT ref: 0047246D
        • SetCurrentDirectoryW.KERNEL32(02D60048,?,?,00000068), ref: 00416EA2
        • GetSystemTimeAsFileTime.KERNEL32(?,00000000,004A296C,000000FF,?,00000001,ErrorLevel,?,00000003,?,00000000,?,?,?,?,00000068), ref: 00416F26
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Time$CurrentDirectoryFileSystem_malloc
        • String ID: ErrorLevel
        • API String ID: 469155842-220487136
        • Opcode ID: cbeb643617cabfd42b02e794f98e7a71917d6e35559efd6b4262dace711c1aae
        • Instruction ID: 0f37075953a49e467974e7ed1f7043cc7085fddd668eb0913d6d8755411bbf8e
        • Opcode Fuzzy Hash: cbeb643617cabfd42b02e794f98e7a71917d6e35559efd6b4262dace711c1aae
        • Instruction Fuzzy Hash: 97518F75600206AFD714DF25E8C0AABB7A8FB49318F55826EF91487341D739EC92CB98
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Version__snwprintf
        • String ID: %u.%u.%u$10.0.19045
        • API String ID: 444779968-4060445884
        • Opcode ID: 8ab00cea65283b22f22046c8ff0d648fffeb17610fabc904fe6ae44aedc90cef
        • Instruction ID: e00fc1e8c1641297295b80037f7914b437863e2211aaf2f2cff3d796b0923d98
        • Opcode Fuzzy Hash: 8ab00cea65283b22f22046c8ff0d648fffeb17610fabc904fe6ae44aedc90cef
        • Instruction Fuzzy Hash: 61017CB1A44280AFD794CF99FCC1E6237E1A348301B94807EE50DC63A2C67959818B1D
        APIs
        • PostMessageW.USER32(00010474,00000415,00000001,00000000), ref: 004164A4
        • SetClipboardViewer.USER32(00010474), ref: 004164B7
        • ChangeClipboardChain.USER32(00010474,?), ref: 004164F9
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Clipboard$ChainChangeMessagePostViewer
        • String ID:
        • API String ID: 1822368796-0
        • Opcode ID: 66b4ad8778a9a1db10b4afb89228252d001779af1dd83b2b98434eda50504213
        • Instruction ID: d8ff7ec2e551a96c7b77d71ddde57276ed414ea606c34775e691784866d8f61e
        • Opcode Fuzzy Hash: 66b4ad8778a9a1db10b4afb89228252d001779af1dd83b2b98434eda50504213
        • Instruction Fuzzy Hash: E8015E31241380BAD7A1CB78AE88FD63FA46746740F088569E94987670CA39E884CB1D
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick
        • String ID:
        • API String ID: 536389180-0
        • Opcode ID: cfd2e3bf3eabfd15022235e6bdf9fab750d431d43ff95fef80e580cb5191b4d2
        • Instruction ID: 0fb791346265a37c5128e108407b8eb3261145f3a9e5794297c54ff1ba5d0346
        • Opcode Fuzzy Hash: cfd2e3bf3eabfd15022235e6bdf9fab750d431d43ff95fef80e580cb5191b4d2
        • Instruction Fuzzy Hash: C911C83257151187E358CF3ADC41A56B3E2E7D4309B24CBBDE4A7872D5DE396A018B8C
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a1585e58c7cf54ef47287d4eed4ba6f1d05a63060bcb48af9938aaaabb4020bf
        • Instruction ID: 5e7a7f5ad6d7931b19fa867d9c5d20d8756386c508df5d3f354a98d1f6e4ffaa
        • Opcode Fuzzy Hash: a1585e58c7cf54ef47287d4eed4ba6f1d05a63060bcb48af9938aaaabb4020bf
        • Instruction Fuzzy Hash: 8C112B3267151187E314CF3ACC81956B7E2DBD4308724CBADE4F3872D5DE39AA058B88
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: ACos$ASin$ATan$Abs$Asc$BitAnd$BitNot$BitOr$BitShiftLeft$BitShiftRight$BitXOr$Ceil$Chr$Cos$Deref$Exp$Floor$HTML$Log$Mod$Pow$Round$Sin$Sqrt$Tan
        • API String ID: 3832890014-879508146
        • Opcode ID: af2c0924fc3936ccb5dd6ca8df4ff7d29303f4fe0b42cab857bb7c334cce8d90
        • Instruction ID: 68cc772c1238f872cd2fbcec7dcd17903a62d9cb844cc40126864c921891a254
        • Opcode Fuzzy Hash: af2c0924fc3936ccb5dd6ca8df4ff7d29303f4fe0b42cab857bb7c334cce8d90
        • Instruction Fuzzy Hash: 55517E69B4161022EF11316E9C03BDB10499BB2B4FFCA446AFC14D5381F78DDA4552AE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: Alnum$Alpha$Date$Digit$Float$Integer$Lower$Number$Space$Time$Upper$Xdigit
        • API String ID: 3832890014-3813714638
        • Opcode ID: 04873228175a9e8c1a658eaa0f2afd770dd6a2d0a9db765441ecb1732053cf28
        • Instruction ID: c2ab21fa1fdb1b4f8c81e168adc2d11181d82e4672b8973730798e9422747b7d
        • Opcode Fuzzy Hash: 04873228175a9e8c1a658eaa0f2afd770dd6a2d0a9db765441ecb1732053cf28
        • Instruction Fuzzy Hash: 2B214F61B45A1172EF21316A5C03BDF20895BB2B0FF95446BFC14D4381F79CDA9582AE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsnicmp
        • String ID: #$#CommentFlag$%s up::$%s::$8L$7j$@h@uJ$Not a valid method, class or property definition.$PhdzJ$QhTzJ$RQUC$RQh(zJ$Static$U_B$VVVjgU0C$if not GetKeyState("%s")$jjj${${Blind}%s%s{%s DownR}${Blind}{%s Up}${RCtrl up}
        • API String ID: 1038674560-2171338969
        • Opcode ID: 3081d9ea4413a6217d71e8dbe8b6073d65776151c1c03ee9f2727b5993e9c2c9
        • Instruction ID: 441201033f6a3a1350c648a3acfd3bce6ac2facf40a55ec189a8e6d0c819e3aa
        • Opcode Fuzzy Hash: 3081d9ea4413a6217d71e8dbe8b6073d65776151c1c03ee9f2727b5993e9c2c9
        • Instruction Fuzzy Hash: CBC1E37150C341AAD730DB258C82BEBB7E4AB95304F54491FF88986281E77C99C5C79A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll$__wcsicmp_l
        • String ID: LEFT$MIDDLE$RIGHT$WheelDown$WheelLeft$WheelRight$WheelUp
        • API String ID: 3172861507-1318937625
        • Opcode ID: e21ada1a1e61427941babd0435947afa2e7378f49440bdf815d8dc6560d8c262
        • Instruction ID: 64cc6021fdaaa39da6a2d72903648126ad92cf644a6d4e7d96c691918c9642a3
        • Opcode Fuzzy Hash: e21ada1a1e61427941babd0435947afa2e7378f49440bdf815d8dc6560d8c262
        • Instruction Fuzzy Hash: 0631C845E85A1531EB1135BB5E03B6F10885F7274BF99047BB814E02C2FADDE619C1BE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll$_wcsncpy
        • String ID: *pP$AStr$Char$Double$Float$Int$Int64$Ptr$Short$Str$WStr
        • API String ID: 1630244902-313837492
        • Opcode ID: 99b0fb43c867ffb57cedeb89ca7049ef4b427b6b1a9d086fde8bb78176b2e565
        • Instruction ID: a7267d39c62d36cad4a64dec825c099bd02f46d96d18b05dc80f342fef3adc16
        • Opcode Fuzzy Hash: 99b0fb43c867ffb57cedeb89ca7049ef4b427b6b1a9d086fde8bb78176b2e565
        • Instruction Fuzzy Hash: 8D6104B2A0030456EB20DF55DCC16AF7394EB92366F55882FED4886240E77EE54CC3AB
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll$ConnectRegistry_wcsncpy
        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
        • API String ID: 2753222686-909552448
        • Opcode ID: 98ab23052f0ac6f54c0bcea04685c804547d1a8a7878becb29e49e3847af84ab
        • Instruction ID: da5925f4d64a95f1df938f9c08d8f1a745735a2b2e3fe7bb7e79b7cffbd62cde
        • Opcode Fuzzy Hash: 98ab23052f0ac6f54c0bcea04685c804547d1a8a7878becb29e49e3847af84ab
        • Instruction Fuzzy Hash: 8B51697660430156D720FAA5AD41BFB73E8DFD6714F19082FED5483280F7ADD98883AA
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsnicmp_wcsncpy$Window__wcsicoll__wcstoi64__wcstoui64wcstoxq
        • String ID: ahk_$class$exe$group$pid
        • API String ID: 3421470534-2955265324
        • Opcode ID: b0c4b57e3fc4c8c5a5aa184d85b41cea0fa485d9634ec29ebd804c68306f1738
        • Instruction ID: ee763a9c4c256411da002b77102d4154a26e7c03c3a4695fb81d6ced18f52335
        • Opcode Fuzzy Hash: b0c4b57e3fc4c8c5a5aa184d85b41cea0fa485d9634ec29ebd804c68306f1738
        • Instruction Fuzzy Hash: EAC1B071A043019AD734AB2588457EBB3E4EF94304F14882FE88ED6391F77C9999C79B
        APIs
        • GetModuleHandleW.KERNEL32(user32,?,?,?,?), ref: 00446D77
        • GetModuleHandleW.KERNEL32(kernel32,?,?), ref: 00446D83
        • GetModuleHandleW.KERNEL32(comctl32,?,?), ref: 00446D8F
        • GetModuleHandleW.KERNEL32(gdi32,?,?), ref: 00446D9B
        • _wcsncpy.LIBCMT ref: 00446DB7
        • _wcsrchr.LIBCMT ref: 00446DD0
        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000104,00000000,00000000,?,?,?,?,?), ref: 00446DFD
        • GetProcAddress.KERNEL32(00000000,?), ref: 00446E1F
        • GetProcAddress.KERNEL32(?,?), ref: 00446E6F
        • WideCharToMultiByte.KERNEL32(00000000,00000000,-00000002,000000FF,?,00000104,00000000,00000000,?,?,?,?,?), ref: 00446E9D
        • GetModuleHandleW.KERNEL32(?,?,?,?,?,?), ref: 00446EAB
        • LoadLibraryW.KERNEL32(?,?,?,?,?,?), ref: 00446EC6
        • GetProcAddress.KERNEL32(00000000,?), ref: 00446EFF
        • GetProcAddress.KERNEL32(00000000,?), ref: 00446F28
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: HandleModule$AddressProc$ByteCharMultiWide$LibraryLoad_wcsncpy_wcsrchr
        • String ID: DllCall$comctl32$gdi32$kernel32$user32
        • API String ID: 1361463379-1793033601
        • Opcode ID: 7f5eb50748650a62448da724b9d3fab7abe0ee911d914b5b0ea1ca5a0fc573a1
        • Instruction ID: b4e82e5e6cd7f76ba01e2bf84d453eb5072c2814fdd91ea8be92f7fe32ca0d2f
        • Opcode Fuzzy Hash: 7f5eb50748650a62448da724b9d3fab7abe0ee911d914b5b0ea1ca5a0fc573a1
        • Instruction Fuzzy Hash: 95515B726003015BE7709B24ECC4FEBB399EFE5720F55452EE84883290EB79EC05879A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: #CommentFlag$%s up::$%s::$8L$7j$@h@uJ$PhdzJ$QhTzJ$RQUC$RQh(zJ$U_B$VVVjgU0C$if not GetKeyState("%s")$jjj${Blind}%s%s{%s DownR}${Blind}{%s Up}${RCtrl up}
        • API String ID: 0-3133094735
        • Opcode ID: 5d0592b49ed5bf5a4cea8630f20316b52dcf55d223470bc146f1705642b559b4
        • Instruction ID: 9f6ab86343d5349b545780647feca12cbe3b15fba69d940df38b80b20c01b4ff
        • Opcode Fuzzy Hash: 5d0592b49ed5bf5a4cea8630f20316b52dcf55d223470bc146f1705642b559b4
        • Instruction Fuzzy Hash: 9791C57050C340AAD730DB258C81BEBBBE5AB95308F144A1FF98956282E77C9985C79B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: #CommentFlag$%s up::$%s::$8L$7j$@h@uJ$PhdzJ$QhTzJ$RQUC$RQh(zJ$U_B$VVVjgU0C$if not GetKeyState("%s")$jjj${Blind}%s%s{%s DownR}${Blind}{%s Up}${RCtrl up}
        • API String ID: 0-3133094735
        • Opcode ID: b2aef3fabb4ea0ecdfb7354dbf273fe89365c370e6b6e230d54375a232eb0154
        • Instruction ID: 98df58378b6ccabfa6df9cd5c606697006b919acdc29393ecbbd8668d04efcff
        • Opcode Fuzzy Hash: b2aef3fabb4ea0ecdfb7354dbf273fe89365c370e6b6e230d54375a232eb0154
        • Instruction Fuzzy Hash: A391C57050C340AAD730DB158C81BEFBBE5BB95308F044A1FF98956281E7BC9A85C79B
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: #CommentFlag$%s up::$%s::$8L$7j$@h@uJ$PhdzJ$QhTzJ$RQUC$RQh(zJ$U_B$VVVjgU0C$if not GetKeyState("%s")$jjj${Blind}%s%s{%s DownR}${Blind}{%s Up}${RCtrl up}
        • API String ID: 0-3133094735
        • Opcode ID: 0ecdafadeb6e890d18534bf61b00b86f070050ac9bd058276c06745550d1c6c8
        • Instruction ID: 7039620e9154d78382589d3c16c4627863d17b4fe39edcbb0498f893b0a503c6
        • Opcode Fuzzy Hash: 0ecdafadeb6e890d18534bf61b00b86f070050ac9bd058276c06745550d1c6c8
        • Instruction Fuzzy Hash: D991C57050C340AAD730DB158C81BEFBBE5BB95708F044A1FF98956281E77C9A85C79B
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: ABORT$CANCEL$CONTINUE$IGNORE$RETRY$TRYAGAIN$Timeout$YES
        • API String ID: 3832890014-2481266411
        • Opcode ID: 1606a0465edefb23138e74e08145d1dcf461a6c23cc8207651ea4eab9d602deb
        • Instruction ID: 4ef4746d7623dea02e5f5548a088ccd578ba0102cd7f1b6651b906707c4f1643
        • Opcode Fuzzy Hash: 1606a0465edefb23138e74e08145d1dcf461a6c23cc8207651ea4eab9d602deb
        • Instruction Fuzzy Hash: E2217FE7E45A10A2DB3120AADC277CF22549BB274AFCB44A6FC14C53C1F79CC641419E
        APIs
        • __wcsicoll.LIBCMT ref: 00465E8C
        • SendMessageW.USER32(00000001,00000472,00000000,00000000), ref: 00465EC6
        • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00465F1B
        • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00465F37
        • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00465F4F
        • SendMessageW.USER32(?,00000408,00000000,00000000), ref: 00465F85
        • SendMessageW.USER32(?,00001001,00000000,00000030), ref: 00465FB4
        • GetWindowLongW.USER32(?,000000F0), ref: 00466001
        • SendMessageW.USER32(?,00001005,00000000,00000029), ref: 0046601A
        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 004660A7
        • __wcsicoll.LIBCMT ref: 004660D6
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: MessageSend$__wcsicoll$LongWindow
        • String ID: Submit$Text
        • API String ID: 4045105239-2749448349
        • Opcode ID: dbef05369f8632e3da9aa748d9432f4d6a9be649fe733933dc08647be2cd7d21
        • Instruction ID: 8545eb14abcb01ed10bc1c945d208ce2a2e1fe72f8fb45bcf0a842bf7d5841e0
        • Opcode Fuzzy Hash: dbef05369f8632e3da9aa748d9432f4d6a9be649fe733933dc08647be2cd7d21
        • Instruction Fuzzy Hash: FBD177317043406BE720EB39DC81F67B794AB41719F10866FF980AB2C1E769EC0587AE
        APIs
        • CreateThread.KERNEL32(00000000,00002000,00408E80,00000000,00000000,004C83F0), ref: 00408BCA
        • SetThreadPriority.KERNEL32(00000000,0000000F,?,00000000,00000000,00416D11,004CB680,?,?,00000000,004CB680,00416BD9,004CB680,0042EB7E), ref: 00408BE0
        • PostThreadMessageW.USER32(00000000,00000417,?,00000000), ref: 00408C04
        • Sleep.KERNEL32(0000000A,?,00000000,00000000,00416D11,004CB680,?,?,00000000,004CB680,00416BD9,004CB680,0042EB7E), ref: 00408C10
        • GetTickCount.KERNEL32 ref: 00408C27
        • PeekMessageW.USER32(?,00000000,00000417,00000417,00000001), ref: 00408C4A
        • CreateMutexW.KERNEL32(00000000,00000000,AHK Keybd), ref: 00408CC5
        • GetExitCodeThread.KERNEL32(00000000,?), ref: 00408CDA
        • GetTickCount.KERNEL32 ref: 00408CEA
        • Sleep.KERNEL32(00000000), ref: 00408CF7
        • CloseHandle.KERNEL32(00000000), ref: 00408D0F
        • CloseHandle.KERNEL32(00000000), ref: 00408D2F
        • CreateMutexW.KERNEL32(00000000,00000000,AHK Mouse), ref: 00408D54
        • CloseHandle.KERNEL32(00000000), ref: 00408D6B
        Strings
        • AHK Keybd, xrefs: 00408CBC
        • Warning: The keyboard and/or mouse hook could not be activated; some parts of the script will not function., xrefs: 00408D8F
        • AHK Mouse, xrefs: 00408D4B
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Thread$CloseCreateHandle$CountMessageMutexSleepTick$CodeExitPeekPostPriority
        • String ID: AHK Keybd$AHK Mouse$Warning: The keyboard and/or mouse hook could not be activated; some parts of the script will not function.
        • API String ID: 493082617-3816831916
        • Opcode ID: 3bd6de20004faae8477686e44910dc1a73012024b8a434bdc737eed31a73c914
        • Instruction ID: 0343f43e6a66d9ff13f8978a718bdf5a10246bf3f4a9087bd3f62b95664e5f23
        • Opcode Fuzzy Hash: 3bd6de20004faae8477686e44910dc1a73012024b8a434bdc737eed31a73c914
        • Instruction Fuzzy Hash: 1A512670149340BAE7109B709E49B6B7FA46B52304F04457FF9C0A62D2CBBC9D45CB6D
        APIs
        • GetTickCount.KERNEL32 ref: 0040F1E8
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040F20B
        • GetTickCount.KERNEL32 ref: 0040F235
        • GetAsyncKeyState.USER32(000000A0), ref: 0040F294
        • GetAsyncKeyState.USER32(000000A1), ref: 0040F2A7
        • GetAsyncKeyState.USER32(000000A2), ref: 0040F2BB
        • GetAsyncKeyState.USER32(000000A3), ref: 0040F2CF
        • GetAsyncKeyState.USER32(000000A4), ref: 0040F2E3
        • GetAsyncKeyState.USER32(000000A5), ref: 0040F2F7
        • GetAsyncKeyState.USER32(0000005B), ref: 0040F308
        • GetAsyncKeyState.USER32(0000005C), ref: 0040F319
        • GetAsyncKeyState.USER32(000000A0), ref: 0040F42A
        • GetAsyncKeyState.USER32(000000A1), ref: 0040F43D
        • GetAsyncKeyState.USER32(000000A2), ref: 0040F451
        • GetAsyncKeyState.USER32(000000A3), ref: 0040F465
        • GetAsyncKeyState.USER32(000000A4), ref: 0040F479
        • GetAsyncKeyState.USER32(000000A5), ref: 0040F48D
        • GetAsyncKeyState.USER32(0000005B), ref: 0040F49E
        • GetAsyncKeyState.USER32(0000005C), ref: 0040F4AF
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AsyncState$CountTick$MessagePeek
        • String ID:
        • API String ID: 958976530-0
        • Opcode ID: 17d95b024d82edeb66fd0ad8e6685e753e44c3ece10960614a75f73a4fdde685
        • Instruction ID: 678b97c2816e21052bb4eb8decea27705799670bf23972517f9e43c9a5ed6496
        • Opcode Fuzzy Hash: 17d95b024d82edeb66fd0ad8e6685e753e44c3ece10960614a75f73a4fdde685
        • Instruction Fuzzy Hash: 449139352443846AF7609764CC51BFBBBA0AB91340F48547AEAC0677D2C6BC9C4DDB2A
        APIs
        • OpenProcess.KERNEL32(00000410,00000000,?,75C0A660,?,?,00000000), ref: 00450860
        • OpenProcess.KERNEL32(00001000,00000000,?), ref: 0045086F
        • GetModuleBaseNameW.PSAPI(00000000,00000000,?,00000104), ref: 00450895
        • GetModuleFileNameExW.PSAPI(00000000,00000000,?,00000104), ref: 0045089D
        • GetModuleHandleW.KERNEL32(psapi,GetProcessImageFileNameW), ref: 004508BF
        • GetProcAddress.KERNEL32(00000000), ref: 004508C6
        • _wcsrchr.LIBCMT ref: 00450908
        • _memmove.LIBCMT ref: 00450937
        • CloseHandle.KERNEL32(00000000), ref: 00450940
        • QueryDosDeviceW.KERNEL32(?,?,00000104), ref: 00450974
        • CloseHandle.KERNEL32(00000000), ref: 004509B1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: HandleModule$CloseNameOpenProcess$AddressBaseDeviceFileProcQuery_memmove_wcsrchr
        • String ID: :$GetProcessImageFileNameW$psapi
        • API String ID: 2203553739-2600028567
        • Opcode ID: 3cf6d31783b5fc6c362f622b527dda91f9ebf45a3cf2ada9a7df6361e63bb5fb
        • Instruction ID: f6a143e5b10e2b56b06ed940719faa87f7d95aac9a1b3d6d0759d15964ae0490
        • Opcode Fuzzy Hash: 3cf6d31783b5fc6c362f622b527dda91f9ebf45a3cf2ada9a7df6361e63bb5fb
        • Instruction Fuzzy Hash: AB415F7A6003016BD7206B55EC8AFAF7BA8EF91315F44043EFD0582242E7799C0D83A9
        APIs
        • SendMessageW.USER32(?,00000406,00000000,00000000), ref: 0045E343
        • SendMessageW.USER32(?,00000414,00000000,00000000), ref: 0045E35C
        • DestroyCursor.USER32(00000000), ref: 0045E363
        • IsWindow.USER32(00000000), ref: 0045E372
        • ShowWindow.USER32(00000000,00000000,?,004C9984,75295780,75C0FD10,00415CE1,?,?,?,?,?,00000000,00000000), ref: 0045E382
        • SetMenu.USER32(00000000,00000000), ref: 0045E38E
        • DestroyWindow.USER32(00000000,?,004C9984,75295780,75C0FD10,00415CE1,?,?,?,?,?,00000000,00000000), ref: 0045E3A8
        • DeleteObject.GDI32(?), ref: 0045E3EF
        • DeleteObject.GDI32(?), ref: 0045E403
        • DragFinish.SHELL32(?,?,004C9984,75295780,75C0FD10,00415CE1,?,?,?,?,?,00000000,00000000), ref: 0045E417
        • DestroyCursor.USER32(?), ref: 0045E44B
        • DeleteObject.GDI32(?), ref: 0045E453
        • _free.LIBCMT ref: 0045E463
        • DestroyCursor.USER32(?), ref: 0045E4CA
        • DestroyCursor.USER32(?), ref: 0045E4D1
        • DestroyAcceleratorTable.USER32(?), ref: 0045E4DB
        • _free.LIBCMT ref: 0045E4F4
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Destroy$Cursor$DeleteObjectWindow$MessageSend_free$AcceleratorDragFinishMenuShowTable
        • String ID:
        • API String ID: 3295956662-0
        • Opcode ID: 15914219919c3fc271030e3fc8bd32ed102c7a2421f719bb71ae49fa6f0676b1
        • Instruction ID: 4e482ea5853da6dcd444a14eb10b4efbb2b8a97f90b51c0869792c0c04dfdc23
        • Opcode Fuzzy Hash: 15914219919c3fc271030e3fc8bd32ed102c7a2421f719bb71ae49fa6f0676b1
        • Instruction Fuzzy Hash: CA618E75600205EFCB28DF26DC84B6B77A5BB45306F14852AED05D7342CB39EE49CB98
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: AltTab$AltTabAndMenu$AltTabMenu$AltTabMenuDismiss$Off$ShiftAltTab$Toggle
        • API String ID: 3832890014-1651597821
        • Opcode ID: 75b1283d0419d2757959b657879ef046d9c92409f2dd960ca5630ba211dbcaf8
        • Instruction ID: 8244b7f9918e4db5c9bf00d2c9746af0de9e2e8f9fa1be847a5d7a10b79fdbcf
        • Opcode Fuzzy Hash: 75b1283d0419d2757959b657879ef046d9c92409f2dd960ca5630ba211dbcaf8
        • Instruction Fuzzy Hash: 30112A46E51A1122EB12316A5E0379F11485FA370AF8988BBFC04E53C3F3ADDE05869E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: Default$Mouse$MouseMove$MouseMoveOff$Off$Send$SendAndMouse
        • API String ID: 3832890014-1032860029
        • Opcode ID: 9a35aa658242e09508977fcc8168e11ced12ff1a6705abf2c29d74188ced1d36
        • Instruction ID: 65a95563969e18ba644eab45cba9cd65494905ede79e14142dda424a467cb934
        • Opcode Fuzzy Hash: 9a35aa658242e09508977fcc8168e11ced12ff1a6705abf2c29d74188ced1d36
        • Instruction Fuzzy Hash: 7A111B5AB4161122EA21312A5D03BDF20489BB2B4FFD5456AF814953C1F78CDA5682AE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _wcschr$__wcsicoll$__wcsnicmp_memset
        • String ID: <>=/|^,:*&~!()[]{}+-?."$+$Invalid hotkey.$This line does not contain a recognized action.$f;$jjj$jjjjjj$new${
        • API String ID: 2998053517-785730939
        • Opcode ID: 051deeb598a264eb6263cf0b4725445e833a64bd77dfd4d80fb5aedfa8c5fc46
        • Instruction ID: 1bccd26137c71dd4d85cd5fcd6ee910d3ab475fc0be947cf7ab57f609bacf744
        • Opcode Fuzzy Hash: 051deeb598a264eb6263cf0b4725445e833a64bd77dfd4d80fb5aedfa8c5fc46
        • Instruction Fuzzy Hash: 19D103304483519ADB30AB14DC807FF77A1EB94304F54892FF8898B291E778A9C6C79E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: Active$Cannot jump from inside a function to outside.$Exist$Not$Parameter #1 invalid.$Parameter #2 must match an existing #If expression.$Parameter #3 must be blank in this case.$Target label does not exist.$Win
        • API String ID: 0-3185210005
        • Opcode ID: 8c9b2b4f9415f99bc5afd1717da7daf1f4a2e135d4e203911e5945011bad4820
        • Instruction ID: a7442a606026c86f753283fdc9e8bd6b5bc1d7e50670bbca61b0ace396aa5039
        • Opcode Fuzzy Hash: 8c9b2b4f9415f99bc5afd1717da7daf1f4a2e135d4e203911e5945011bad4820
        • Instruction Fuzzy Hash: E09128313003156BEF20EE21BA0177B73A0AF61756F94416BFC045B382E7ADDA59D3A9
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __snwprintf
        • String ID: %s.%.*s := %.*s, $.$Declaration too long.$Duplicate declaration.$Invalid class variable declaration.$Out of memory.$Unknown class var.$__Init$__Init()$base.__Init()$this
        • API String ID: 2391506597-244636269
        • Opcode ID: 7da9623ff9922b0ee89f000f1868ef30be01b98952a1bec5917df219c89ee41a
        • Instruction ID: cceb24ad266b05013d17e3db8aa80351596c2fcd2cc4fdab4b9ae1efb2622e7e
        • Opcode Fuzzy Hash: 7da9623ff9922b0ee89f000f1868ef30be01b98952a1bec5917df219c89ee41a
        • Instruction Fuzzy Hash: EAE1C1716043008BD724CF16E880AABB7E1FB95310F54443FE98987391E7799C8ADB6A
        APIs
        • LoadLibraryW.KERNEL32(advapi32,?,?), ref: 00451464
        • GetProcAddress.KERNEL32(00000000,CreateProcessWithLogonW), ref: 00451499
        • FreeLibrary.KERNEL32(00000000,?,?), ref: 004514A8
        • _memset.LIBCMT ref: 004514DA
        • CloseHandle.KERNEL32(?), ref: 00451580
        • GetLastError.KERNEL32 ref: 004515A2
        • FreeLibrary.KERNEL32(00000000), ref: 004515AF
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Library$Free$AddressCloseErrorHandleLastLoadProc_memset
        • String ID: CreateProcessWithLogonW$CreateProcessWithLogonW.$D$RunAs: Missing advapi32.dll.$advapi32
        • API String ID: 3715048715-4276146922
        • Opcode ID: 1e6d3707619064b05c36350986883b657f523eb9261464ab68fb3ee96fdb5ac7
        • Instruction ID: 7232bf4ff9f40dbd4949cef5ece41e82e43a138ca34f64742f54d80d75314a6a
        • Opcode Fuzzy Hash: 1e6d3707619064b05c36350986883b657f523eb9261464ab68fb3ee96fdb5ac7
        • Instruction Fuzzy Hash: 5B41AC32740301ABD7209E69D884B6B77E8EBC6752F14442AFD45DB3A1E778DC08CB69
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _wcsncpy
        • String ID: !$&$($*$+$.$:$<$This line does not contain a recognized action.${
        • API String ID: 1735881322-2314704674
        • Opcode ID: ea3e92cccc73e1cb271484d1dccc09d8b612db110462140913ee80cf403bac0b
        • Instruction ID: ff8445d123711dd903c0236ec517eedc3710f0d684b610833c144dcdde74547d
        • Opcode Fuzzy Hash: ea3e92cccc73e1cb271484d1dccc09d8b612db110462140913ee80cf403bac0b
        • Instruction Fuzzy Hash: 5B21D4326483045BC3209F2A99857AFBBE5EB89354F04092FF98583381D779D989C79A
        APIs
        • MessageBoxW.USER32(00010474,?,02D600C4,00010000), ref: 004169C4
        • IsWindow.USER32(00010474), ref: 004169D0
        • DestroyWindow.USER32(00010474), ref: 004169E8
        • _wcsncpy.LIBCMT ref: 00416A62
        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\Desktop), ref: 00416ABE
          • Part of subcall function 0041697E: IsWindow.USER32(00010474), ref: 00416CE9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$CurrentDestroyDirectoryMessage_wcsncpy
        • String ID: C:\Users\user\Desktop$Critical Error: %sThe program will exit.$h(J
        • API String ID: 572885112-1231693009
        • Opcode ID: e1371becd5507da7771f5bb96351f13dde8502810520f1b1bc2649959f7e931d
        • Instruction ID: ff8bdff87613d4a99746dc1e284ce4516edd202d7e64e69f0ef75c87fe8eced0
        • Opcode Fuzzy Hash: e1371becd5507da7771f5bb96351f13dde8502810520f1b1bc2649959f7e931d
        • Instruction Fuzzy Hash: 4EB1C475608380AFD721DF24D884B9B7BE4EF85304F05846EE8898B352D739EC85CB99
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __itow$CharUpper_vswprintf_s
        • String ID: %i-%i$%s%s%s%s%s%s$(no)$OFF$PART$TypeOff?LevelRunningName-------------------------------------------------------------------
        • API String ID: 1983134979-1635122839
        • Opcode ID: 5e81182c43b16c78c3d29e3182613885061e7ee7bdaeb70a9a85ca5852e4bc95
        • Instruction ID: 5b6559241df80dade5367e84df04c7fa0899e757775964b7440aada1ef5f842f
        • Opcode Fuzzy Hash: 5e81182c43b16c78c3d29e3182613885061e7ee7bdaeb70a9a85ca5852e4bc95
        • Instruction Fuzzy Hash: C381B061604302DAD724AB2889C0B7B72E4EF95314F148A7FE886E72D1E33CD945CB5E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll$__wcsicmp_l
        • String ID: LEFT$MIDDLE$RIGHT
        • API String ID: 3172861507-2526147550
        • Opcode ID: ab986c1e74efe1ca70174d92625c2cead7616409912a23aadc5b6c0d26a70239
        • Instruction ID: 88b626024d511dc7791950dfb02e00abc8424cdb40a48bcf3c3cb1a21d08616a
        • Opcode Fuzzy Hash: ab986c1e74efe1ca70174d92625c2cead7616409912a23aadc5b6c0d26a70239
        • Instruction Fuzzy Hash: 7CF07441E96A1531EA2531B75F03B5F10895E3274BF1A043BB824F02C6FADDE619C1BE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: Event$Input$Play$ThenEvent$ThenPlay
        • API String ID: 3832890014-2317936873
        • Opcode ID: a71caf467991a042f72ac4936ec1013690243ef9ffa5cdca54111d0f1e7e2115
        • Instruction ID: 5767100b6159477bd56551330f75fef67d6af3bc27923451b03da38c8d70b2cc
        • Opcode Fuzzy Hash: a71caf467991a042f72ac4936ec1013690243ef9ffa5cdca54111d0f1e7e2115
        • Instruction Fuzzy Hash: F1F09662A58A2162DA30316E3C02BDF12884FA635AF06446BFC4495381F28DDEC251EE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: Caret$Menu$Mouse$Pixel$ToolTip
        • API String ID: 3832890014-3728172800
        • Opcode ID: 3d84af40a28c2131eef0298cfb7eeee17b50e94b52e9f17a8b17a8c83d6da75e
        • Instruction ID: 825e044cc3f51bdd21075c8cddfdd5895910fc53f0a4d3e9dcca2cc1eb8164a6
        • Opcode Fuzzy Hash: 3d84af40a28c2131eef0298cfb7eeee17b50e94b52e9f17a8b17a8c83d6da75e
        • Instruction Fuzzy Hash: 48F05461B45A1562EF21311F5C027DF20885FA2B8EF94443BBC24D23C1F7CC9A85829E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_SZ
        • API String ID: 3832890014-2346799943
        • Opcode ID: 1971a59a6f560dec87ec26fbea2cdeec11d474524aa28fcfb70a903475b41d9b
        • Instruction ID: 1e440eca0961130b260a0fc360d4006edc23de6d070c69021ec3eb48cfda9fbf
        • Opcode Fuzzy Hash: 1971a59a6f560dec87ec26fbea2cdeec11d474524aa28fcfb70a903475b41d9b
        • Instruction Fuzzy Hash: 94F01C96B5161122DE11317E9C03BCF20481BB2B4EFDA456AF824D43C1F68D964582AE
        APIs
        • _memset.LIBCMT ref: 00406966
        • FindWindowW.USER32(#32771,00000000), ref: 00406980
        • _memset.LIBCMT ref: 00406AFD
        • FindWindowW.USER32(#32771,00000000), ref: 00406B17
          • Part of subcall function 004066B0: PostMessageW.USER32(00010474,00000400,?,?), ref: 0040677B
          • Part of subcall function 004066B0: PostMessageW.USER32(00010474,00000400,00000000,?), ref: 004067AF
          • Part of subcall function 004066B0: PostMessageW.USER32(00010474,00000401,?,?), ref: 004067CE
        • CallNextHookEx.USER32(?,?,?,?), ref: 00406C5E
        • PostMessageW.USER32(00010474,00000400,?,?), ref: 00406C8A
        • PostMessageW.USER32(00010474,00000400,?,?), ref: 00406CC2
        • PostMessageW.USER32(00010474,00000401,7FFFFFFF,?), ref: 00406CE0
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: MessagePost$FindWindow_memset$CallHookNext
        • String ID: #32771
        • API String ID: 2256871161-1822717788
        • Opcode ID: 1b61aef4875ed0b44f1c123ba81d7bcd4022f5152c4ba9108ad1d92a8ca8fa75
        • Instruction ID: db5b597440e8629846a541949411865f5a1f66555ff12f0bb9011c2da1324c66
        • Opcode Fuzzy Hash: 1b61aef4875ed0b44f1c123ba81d7bcd4022f5152c4ba9108ad1d92a8ca8fa75
        • Instruction Fuzzy Hash: C6D159B15042D5AFD755CF28AC50DA73FA4AB55300F0A807EE885A33E2E7388C65CB6D
        APIs
        • IsClipboardFormatAvailable.USER32(0000000D), ref: 00404069
        • IsClipboardFormatAvailable.USER32(0000000F), ref: 0040406F
        • GlobalUnlock.KERNEL32 ref: 004040E1
        • CloseClipboard.USER32 ref: 004040ED
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Clipboard$AvailableFormat$CloseGlobalUnlock
        • String ID: Can't open clipboard for reading.$GlobalLock
        • API String ID: 2237871793-2469064134
        • Opcode ID: eaf8b136073635c180834e7dc756c3b7e2cc3f79ba946f5eeaa381988cb0f440
        • Instruction ID: 2697e1f27b01395992a40d8142d233a661ba1cbbe5f151cd56d286fd4c57d795
        • Opcode Fuzzy Hash: eaf8b136073635c180834e7dc756c3b7e2cc3f79ba946f5eeaa381988cb0f440
        • Instruction Fuzzy Hash: 7D31C0F76002145BC6606FAABC8496A7750E7D5332329073BE618E72D1DB3A88858F5C
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsnicmp
        • String ID: #CommentFlag$8L$7j$@h@uJ$PhdzJ$U_B$jjj${Blind}{%s Up}
        • API String ID: 1038674560-1807711314
        • Opcode ID: f84f9b042091e5285dfe5222e976d392994398cd53302331ae747b19e40aafd3
        • Instruction ID: 46aff4331718307de7571a79cc5c9d00697843b2840c3672b2e12da970ba90ec
        • Opcode Fuzzy Hash: f84f9b042091e5285dfe5222e976d392994398cd53302331ae747b19e40aafd3
        • Instruction Fuzzy Hash: 8E41D27054C340ABD720DB148841BABB7E4BB94708F144A1FFD9957282E77C9A85C79B
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: UTF-16$UTF-16-RAW$UTF-8$UTF-8-RAW
        • API String ID: 3832890014-2787617770
        • Opcode ID: 53ca5d9494ee2e226ea3c9310f958d08f961b8a6f2ea70d43671d8a42b8869f2
        • Instruction ID: c9140faefcaa6d2b192469ff52bf28a745eb57966530b15fcae4591f978cf5c5
        • Opcode Fuzzy Hash: 53ca5d9494ee2e226ea3c9310f958d08f961b8a6f2ea70d43671d8a42b8869f2
        • Instruction Fuzzy Hash: 5F018853A5592176EA61302E3C02BEB118B0FA132EF1544A7FC14D9389F74DCDC151EE
        APIs
        • CharLowerW.USER32(?,?,?,?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000), ref: 00475647
        • CharUpperW.USER32(?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000,00000000,00000001), ref: 00475662
        • CharLowerW.USER32(?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000,00000000,00000001), ref: 0047568E
        • CharUpperW.USER32(?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000,00000000,00000001), ref: 004756A3
        • CharLowerW.USER32(?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000,00000000,00000001), ref: 004756DD
        • CharLowerW.USER32(00000000,?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000,00000000), ref: 004756EA
        • CharLowerW.USER32(?,?,?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000), ref: 00475704
        • CharLowerW.USER32(0000000C,?,?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000), ref: 00475712
        • CharLowerW.USER32(0000000C,?,?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000), ref: 0047572E
        • CharLowerW.USER32(00000000,?,?,?,?,?,?,?,000000FF,00000000,?,004CB614,?,?,00000000,00000000), ref: 0047573B
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Char$Lower$Upper
        • String ID:
        • API String ID: 3371602591-0
        • Opcode ID: 5f618f50fca21607c8b2137a2cc0f77c0037d4342607de38db727db0a982f59d
        • Instruction ID: 434089f71da02617a085b355f41240ba700e52b558d672bd20236b9d8e054b61
        • Opcode Fuzzy Hash: 5f618f50fca21607c8b2137a2cc0f77c0037d4342607de38db727db0a982f59d
        • Instruction Fuzzy Hash: 1741B4655006319BDB249F569C8057BB7E8AE84712F45881BFC89CA340E77CEC44DB79
        APIs
        • RtlEnterCriticalSection.NTDLL(004C83D8), ref: 00448D07
        • RtlLeaveCriticalSection.NTDLL(004C83D8), ref: 00448E6C
        • RtlLeaveCriticalSection.NTDLL(004C83D8), ref: 0044901C
        • _free.LIBCMT ref: 00449067
        • __wcsdup.LIBCMT ref: 00449091
        • RtlLeaveCriticalSection.NTDLL(004C83D8), ref: 004490D4
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CriticalSection$Leave$Enter__wcsdup_free
        • String ID: 0$Compile error %d at offset %d: %hs
        • API String ID: 2407865940-2351679343
        • Opcode ID: dd5f427df0049069a438dc7c6b393097bcf88615e132322635e6b6cf0484a6b7
        • Instruction ID: 930b76c191684513acaf86c92ecf0f1c086c6e117fb64f04bef9109d32b72422
        • Opcode Fuzzy Hash: dd5f427df0049069a438dc7c6b393097bcf88615e132322635e6b6cf0484a6b7
        • Instruction Fuzzy Hash: 60C1DEB1A14201CBE710DF28D880B6B73A1FB95354F144A6FE855C7390DB79ED45CB8A
        APIs
        • _malloc.LIBCMT ref: 0049035B
          • Part of subcall function 0048E5E4: __FF_MSGBANNER.LIBCMT ref: 0048E5FD
          • Part of subcall function 0048E5E4: __NMSG_WRITE.LIBCMT ref: 0048E604
          • Part of subcall function 0048E5E4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048E629
        • std::exception::exception.LIBCMT ref: 00490390
        • std::exception::exception.LIBCMT ref: 004903AA
        • __CxxThrowException@8.LIBCMT ref: 004903BB
        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004903D1
        • __isleadbyte_l.LIBCMT ref: 00490456
          • Part of subcall function 0048FE60: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0048FE6E
        • ___crtLCMapStringA.LIBCMT ref: 004904A3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Locale$UpdateUpdate::_std::exception::exception$AllocateException@8HeapStringThrow___crt__isleadbyte_l_malloc
        • String ID: bad allocation
        • API String ID: 914803512-2104205924
        • Opcode ID: 64427579cb39a93acecfc3c0233e4b8236428787aa1c71189280990ccf6a93fc
        • Instruction ID: 908601e70d8355069aac75cd3638733d7d6cda323c44587b13fe550ed1c67e71
        • Opcode Fuzzy Hash: 64427579cb39a93acecfc3c0233e4b8236428787aa1c71189280990ccf6a93fc
        • Instruction Fuzzy Hash: C541F631904209AFDF11DB95C846FEE7FB4AB01308F1440BAF6549B292D778DA45CB59
        APIs
        • GetModuleHandleW.KERNEL32(ntdll.dll,RtlGetVersion), ref: 004135BA
        • GetProcAddress.KERNEL32(00000000), ref: 004135C1
        • GetVersionExW.KERNEL32(004CC1C8), ref: 004135ED
        • __snwprintf.LIBCMT ref: 00413624
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AddressHandleModuleProcVersion__snwprintf
        • String ID: %u.%u.%u$10.0.19045$RtlGetVersion$ntdll.dll
        • API String ID: 3388246157-3673595452
        • Opcode ID: 0da8d2956fa97ca1708fcd1dc876d012a44a0b13b0be29a59da4c093dba4654b
        • Instruction ID: e8cc299db4483c1455bac73b08025263cfd3b9bca24d6ae4c7a2afb28490f39c
        • Opcode Fuzzy Hash: 0da8d2956fa97ca1708fcd1dc876d012a44a0b13b0be29a59da4c093dba4654b
        • Instruction Fuzzy Hash: 70316171504380AEDBA0CFA4BCC5FA53B91A319306F54847BE40DC6372C36949869B1E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll$__wcsicmp_l
        • String ID: Client$Relative$Screen$Window
        • API String ID: 3172861507-2312238187
        • Opcode ID: e2a4edf3c6aa74a1559075117603c9020029c8ce2a88a4f2168260c1d925f52f
        • Instruction ID: 7fbcb845be007ae7e561c96b738864855f40fdfebeac8a4e5b7e8dda46489857
        • Opcode Fuzzy Hash: e2a4edf3c6aa74a1559075117603c9020029c8ce2a88a4f2168260c1d925f52f
        • Instruction Fuzzy Hash: A1E0C061A41A1562DF3135274D027DF11845FA2786F9D047BBC24A2381F6CDCA8591AD
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: f822eb8a27b91fbd7d0ec8cdd5d0534b021af515708bd733caff7dc3aac58c42
        • Instruction ID: ad0f79891542a75db5d7deb29347dc39e2bff24aef783697542e4831415086d9
        • Opcode Fuzzy Hash: f822eb8a27b91fbd7d0ec8cdd5d0534b021af515708bd733caff7dc3aac58c42
        • Instruction Fuzzy Hash: 16811370A443558EE754CF68D850BA7BBA0EF55340F49807FD9805B3E1EB799808CBAE
        APIs
        • SendMessageW.USER32(?,0000019F,00000000,00000000), ref: 0046A04A
        • SendMessageW.USER32(?,00000198,00000000,80000000), ref: 0046A063
        • SendMessageW.USER32(00000000,0000100C,000000FF,00000001), ref: 0046A079
        • SendMessageW.USER32(?,0000100E,00000000,80000000), ref: 0046A096
        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 0046A0AC
        • SendMessageW.USER32(?,00001104,00000001,80000000), ref: 0046A0C5
        • SendMessageW.USER32(?,00000419,00000000,80000000), ref: 0046A0D8
        • GetWindowRect.USER32(?,80000000), ref: 0046A0F0
        • MapWindowPoints.USER32(?,00000000,00000002,00000002), ref: 0046A104
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: MessageSend$Window$PointsRect
        • String ID:
        • API String ID: 467674420-0
        • Opcode ID: eb22feae2a1becd22f2240dd078c2a58f57d95b8adca5b2d0767c6ff48e14292
        • Instruction ID: 0b9ef4317ac157e99500a880b0b2815499617cc97aaa45168541d238a87aa301
        • Opcode Fuzzy Hash: eb22feae2a1becd22f2240dd078c2a58f57d95b8adca5b2d0767c6ff48e14292
        • Instruction Fuzzy Hash: 5B31A275144305BFD324DF28CC85F66BBA8EF85710F208A1EF294A72D4E6B4E8458F56
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __fassign
        • String ID: W
        • API String ID: 3965848254-655174618
        • Opcode ID: bdc62b387c8a4ed71cb6132f66f275034b284cf609e09fef1a71e34a991cb2d4
        • Instruction ID: 98467bab6938b9cb7b8b858651425626cdb93c19329a4e1a31e9152d99ddd08a
        • Opcode Fuzzy Hash: bdc62b387c8a4ed71cb6132f66f275034b284cf609e09fef1a71e34a991cb2d4
        • Instruction Fuzzy Hash: CC51F4719083446BD210AB159C417AF77916B44704F18482EFE85673C2E3BC9EC987AF
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll_free
        • String ID: Extra$File$Line$Message$Unhandled exception.
        • API String ID: 654844999-2326927146
        • Opcode ID: 13542eee2a519d81a26ec7b9a2e2e2a56aeddede67921ed0c93282b4b89c1495
        • Instruction ID: 290aaac7ecc1ecf74ac2e57ba4e3ad10d93bda6b7ab414b8719e66229eb430a2
        • Opcode Fuzzy Hash: 13542eee2a519d81a26ec7b9a2e2e2a56aeddede67921ed0c93282b4b89c1495
        • Instruction Fuzzy Hash: CC61CF707042509BD720EF25E881B6BB3E0AF44708F85047EF9459B392E779ED49CB9A
        APIs
        • GetModuleHandleW.KERNEL32(user32,BlockInput), ref: 0041069C
        • GetProcAddress.KERNEL32(00000000), ref: 004106A3
        • _free.LIBCMT ref: 004107A3
        • GetModuleHandleW.KERNEL32(user32,BlockInput), ref: 004107EA
        • GetProcAddress.KERNEL32(00000000), ref: 004107F1
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AddressHandleModuleProc$_free
        • String ID: BlockInput$user32
        • API String ID: 3300373232-2744593370
        • Opcode ID: 97437cc6d7a812709a7108f97c36a6c459428b5b57a8e19e8d390ca2422b1d77
        • Instruction ID: e0ccbc9f6f46ca03d63a22985bb9806024d325cc1a1f24750a24b15c87d7f281
        • Opcode Fuzzy Hash: 97437cc6d7a812709a7108f97c36a6c459428b5b57a8e19e8d390ca2422b1d77
        • Instruction Fuzzy Hash: D251C6B05083459BD764DB68ED85FEB3BE4AB55308F04042EE449C63A1E7BD68C4CB6E
        APIs
        • GetForegroundWindow.USER32(?,?,?,0040993F,004C8138,004A2868,00000000,00000000,00000000,00000000), ref: 004791D1
        • IsWindowVisible.USER32(00000000), ref: 004791E6
          • Part of subcall function 00479E60: __wcsnicmp.LIBCMT ref: 00479F24
          • Part of subcall function 00479E60: __wcstoui64.LIBCMT ref: 00479FA3
        • IsWindow.USER32(h(J), ref: 004792DD
        • IsWindowVisible.USER32(h(J), ref: 004792F7
        • GetWindowLongW.USER32(h(J,000000F0), ref: 0047930B
        • EnumWindows.USER32(00479400,00000002), ref: 0047935D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$Visible$EnumForegroundLongWindows__wcsnicmp__wcstoui64
        • String ID: h(J
        • API String ID: 256079111-1926317486
        • Opcode ID: 8372e5fe9ffb59ec9d6f1a0c2255c5cb35508859f7abf82b63a228f8f623d0b2
        • Instruction ID: e1d6c57361b6b35bad80fe49a51cc315a9d31e845045a9c2ad672098b620f0ff
        • Opcode Fuzzy Hash: 8372e5fe9ffb59ec9d6f1a0c2255c5cb35508859f7abf82b63a228f8f623d0b2
        • Instruction Fuzzy Hash: 7A5184715443859AD730AFA588845EFB7E4FB8A310F44C96FD98C83341DB388D44CB5A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: Off$Permit$Toggle
        • API String ID: 3832890014-3346518450
        • Opcode ID: a39b79ec6661261ea0bf06ac198c9de98f2922ff782424500410dad90a1a9ea6
        • Instruction ID: 718048015fa9d3c42870beb7ce6b4272f45cd5199c2377c0753b08a3645a9edf
        • Opcode Fuzzy Hash: a39b79ec6661261ea0bf06ac198c9de98f2922ff782424500410dad90a1a9ea6
        • Instruction Fuzzy Hash: 13F03016A41A1122DF21722E9D037DF20456BA2B0AFD945ABFC14E53C2F38C9A9481EE
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 58f8d14f95e1cde6a18cc26c9583691a8c6474c946d0d9054ad784ce3b9667c9
        • Instruction ID: 6c8c29f90efb2d3fa3e706fd410d54596b94d096ad13d0aab54b0ed7465d0da0
        • Opcode Fuzzy Hash: 58f8d14f95e1cde6a18cc26c9583691a8c6474c946d0d9054ad784ce3b9667c9
        • Instruction Fuzzy Hash: 2931642639139439F73467208C13FF72B108B41B40F18943BA6C02B6C2DAAC5C4ADB7E
        APIs
        • GetAsyncKeyState.USER32(000000A0), ref: 00411F85
        • GetAsyncKeyState.USER32(000000A1), ref: 00411F98
        • GetAsyncKeyState.USER32(000000A2), ref: 00411FAC
        • GetAsyncKeyState.USER32(000000A3), ref: 00411FC0
        • GetAsyncKeyState.USER32(000000A4), ref: 00411FD4
        • GetAsyncKeyState.USER32(000000A5), ref: 00411FE8
        • GetAsyncKeyState.USER32(0000005B), ref: 00411FF9
        • GetAsyncKeyState.USER32(0000005C), ref: 0041200A
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AsyncState
        • String ID:
        • API String ID: 425341421-0
        • Opcode ID: 36f839e8a7cb0bf2915d48d6697862b81f9de39927d87465599e9836e1ef5a8d
        • Instruction ID: 6d093c2417f7701e0cd5e26cb692ffdc89f86409d9f39a2be7723610ef5fa323
        • Opcode Fuzzy Hash: 36f839e8a7cb0bf2915d48d6697862b81f9de39927d87465599e9836e1ef5a8d
        • Instruction Fuzzy Hash: E821D23579179839FB6153249E16BE72F519746340F08A02797C0472E24A9C4D8ADF2E
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _memset
        • String ID: +$f;$jjj$jjjjjj${
        • API String ID: 2102423945-2092782106
        • Opcode ID: 8591ba4d4534c8114856838d7693ff64addb3454dfb3421360211ace6b8c6f1e
        • Instruction ID: e584671669b7ff83cf5a2cd89a2dc1ae287febc4357a55dad9ab816a0b386b6d
        • Opcode Fuzzy Hash: 8591ba4d4534c8114856838d7693ff64addb3454dfb3421360211ace6b8c6f1e
        • Instruction Fuzzy Hash: B1A1E1704883519ADB249F14DCC07FF77A2BB84304F548A2FE88987291E778A9C5C79A
        APIs
        • SetTimer.USER32(00010474,00000009,0000000A,00000000), ref: 0041A907
        • KillTimer.USER32(00010474,00000009), ref: 0041A950
        • __wcstoi64.LIBCMT ref: 0041A9D4
        • __fassign.LIBCMT ref: 0041AA61
        • GetTickCount.KERNEL32 ref: 0041AA85
          • Part of subcall function 0048F7F6: __fassign.LIBCMT ref: 0048F7EC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Timer__fassign$CountKillTick__wcstoi64
        • String ID: Out of memory.
        • API String ID: 925375575-4087320997
        • Opcode ID: 91e5336781d648232a2b35ea4d22ea066ee71c14ceccb2b6ba9f1a4025183f56
        • Instruction ID: dd5314d01d76d51c6b5265c663f6748cd759b4615b4bbae570d8a437c9edbf03
        • Opcode Fuzzy Hash: 91e5336781d648232a2b35ea4d22ea066ee71c14ceccb2b6ba9f1a4025183f56
        • Instruction Fuzzy Hash: 568105F1A063409BDB349F2488857B77BA0AF15710F18496FE88A47691E37C89E4C79B
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _memmove_wcsncpy_wcsrchr
        • String ID: Function name too long.$Invalid method name.$Out of memory.
        • API String ID: 893447047-2619123988
        • Opcode ID: c561dc040d2535438362c3d40c102d15a08dd44f8b36dba510f26eb52acd7f10
        • Instruction ID: 98e7ef59aff27910a8f3f5f5b9d7a7b75bb5ec7680538b21cb54bbb268934d13
        • Opcode Fuzzy Hash: c561dc040d2535438362c3d40c102d15a08dd44f8b36dba510f26eb52acd7f10
        • Instruction Fuzzy Hash: 3D51D471B003159BD720AF65E881BABB3A4EBA4354F44452FEC0587351EB3DE905C7D8
        APIs
        • GetCursorPos.USER32(004C8428), ref: 00410E28
        • GetSystemMetrics.USER32(00000000), ref: 00410EA0
        • GetSystemMetrics.USER32(00000001), ref: 00410EA6
        • GetCursorPos.USER32(?), ref: 00410F05
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CursorMetricsSystem
        • String ID: d
        • API String ID: 3091566494-2564639436
        • Opcode ID: 6480701f30dd99d19a46a80e3db62b274a9215ca04b1bf12998483c0dd00df0b
        • Instruction ID: ed3c359637ac67d6bc50b8ec0c8a832aad732e8d8265091dba275c1bf011333d
        • Opcode Fuzzy Hash: 6480701f30dd99d19a46a80e3db62b274a9215ca04b1bf12998483c0dd00df0b
        • Instruction Fuzzy Hash: B651E3757043068BD724CF19D881BAA73E1BB88314F14493EEC45C7351D7B9D985CB5A
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: %.*s.Get%s$Duplicate declaration.$Missing "]"$Not a valid method, class or property definition.$Out of memory.
        • API String ID: 0-1119647260
        • Opcode ID: 04dab2056358fe66faecb1f22e6dc4592f23f1045219fb9803d22382cb34fec4
        • Instruction ID: 9df85317c144c4722d0e6b6ffd0388458f799c9893f6b8190ebd9bdda8b9a417
        • Opcode Fuzzy Hash: 04dab2056358fe66faecb1f22e6dc4592f23f1045219fb9803d22382cb34fec4
        • Instruction Fuzzy Hash: E8414C717002014BCB24AF599842AEB7390EF95364F48447FED0ACB351E67DE98AC399
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CharUpper$Sleep
        • String ID: %s%c${Raw}${Text}
        • API String ID: 3503790639-2444501380
        • Opcode ID: fbf741edc3641d48155f35eae00fd9fd32fc18d143f0019bfada63633a14d8a0
        • Instruction ID: 917f960083104bc397ef4f8caf8d5d426d5b013fab86d3b1f31d6eb963edcd53
        • Opcode Fuzzy Hash: fbf741edc3641d48155f35eae00fd9fd32fc18d143f0019bfada63633a14d8a0
        • Instruction Fuzzy Hash: AB518470604745CBD724DF2984817AB7BE1EF99314F048A2EE8C9A7391D778E844CB9D
        APIs
        • PMDtoOffset.LIBCMT ref: 0049D346
        • std::bad_exception::bad_exception.LIBCMT ref: 0049D370
        • __CxxThrowException@8.LIBCMT ref: 0049D37E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Exception@8OffsetThrowstd::bad_exception::bad_exception
        • String ID: Bad dynamic_cast!
        • API String ID: 1176828985-2956939130
        • Opcode ID: 8b027ac74a19929622023bc49e922f196e511c05953e3738131a0fac42775efa
        • Instruction ID: 748b0a2f7defa9f4ff01c5f091e664b3f52fbd5d702b37402c576a0a3d1f674e
        • Opcode Fuzzy Hash: 8b027ac74a19929622023bc49e922f196e511c05953e3738131a0fac42775efa
        • Instruction Fuzzy Hash: AA319076E002159FCF14DF64C985AAEBBA1AF08315F24447AE905E7341D73CED01CBA9
        APIs
        • GetTickCount.KERNEL32 ref: 0040A85B
          • Part of subcall function 00474FC0: _vswprintf_s.LIBCMT ref: 00474FD9
        • GetTickCount.KERNEL32 ref: 0040A871
        • GetTickCount.KERNEL32 ref: 0040A97E
        • PostMessageW.USER32(00010474,00000312,?,00000000), ref: 0040A99F
        Strings
        • %u hotkeys have been received in the last %ums.Do you want to continue?(see #MaxHotkeysPerInterval in the help file), xrefs: 0040A902
        • call, xrefs: 0040A8D3
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick$MessagePost_vswprintf_s
        • String ID: %u hotkeys have been received in the last %ums.Do you want to continue?(see #MaxHotkeysPerInterval in the help file)$call
        • API String ID: 134691662-3729902611
        • Opcode ID: 250bc4bde14d984e6bd72541bd2f430ae9791e690a61f7df2d23326516bf5930
        • Instruction ID: 44503fbf4cf607bc054a6e8e5fe55e840e039e5888080ebbb495ecae89f1c8a7
        • Opcode Fuzzy Hash: 250bc4bde14d984e6bd72541bd2f430ae9791e690a61f7df2d23326516bf5930
        • Instruction Fuzzy Hash: 194117B2B40380ABE750EF25EC45FAA3BA0B795714F14887FE88492391D7785854C7AF
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _wcschr$__wcsicoll__wcsnicmp_memset
        • String ID: <>=/|^,:*&~!()[]{}+-?."$Invalid hotkey.$This line does not contain a recognized action.$new
        • API String ID: 996272548-1323806148
        • Opcode ID: 28be1e0eabe21df6489d696d54f30e0506ae08e2e637760e26a5f3b879dd3b1a
        • Instruction ID: de032b20c3be496d8bba70ffacf315ba1e2037939c7924716e6fbbc53f8578df
        • Opcode Fuzzy Hash: 28be1e0eabe21df6489d696d54f30e0506ae08e2e637760e26a5f3b879dd3b1a
        • Instruction Fuzzy Hash: C821A26050439055DB31AA559C853FB3BA0EB62314F04881FF988CA282E77D9DCA87EE
        APIs
        • ActivateKeyboardLayout.USER32(00000000,00000000,00000000,00000000), ref: 00412550
        • GetKeyboardLayoutNameW.USER32(?), ref: 00412589
        • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,?), ref: 004125A6
        • LoadLibraryW.KERNEL32(?), ref: 004125D5
        • ActivateKeyboardLayout.USER32(00000000,00000000), ref: 004125E9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: KeyboardLayout$Activate$LibraryLoadNameOpen
        • String ID: Layout File
        • API String ID: 1064788448-1055935358
        • Opcode ID: 0c8a12bf97b8de8c858f3e6698a76f0d6a857518983ff47d20f150bb72c09261
        • Instruction ID: 701167beb9734922a8ac22fa13581dec1c878cccd808edc6ae7fdb824835c5ac
        • Opcode Fuzzy Hash: 0c8a12bf97b8de8c858f3e6698a76f0d6a857518983ff47d20f150bb72c09261
        • Instruction Fuzzy Hash: 5211C635204305BBD7209B60DD98BEBB7ADEB85350F40482EBA45C2240EF78D944C769
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID: FAST$RegEx$SLOW
        • API String ID: 0-3371325577
        • Opcode ID: e5a915cb33e6f733933f246fb6282c7175e4f60f81cf605de229b91e0d85ffd9
        • Instruction ID: 0d549c7df71747550527a2ce4317762e0bf6a0cf3d28413a1ad9a766a79611af
        • Opcode Fuzzy Hash: e5a915cb33e6f733933f246fb6282c7175e4f60f81cf605de229b91e0d85ffd9
        • Instruction Fuzzy Hash: 4FF0A4259C051115EF306269CC027AB21A49FE1B9AFDA896BF454C53C0F79CCDD4C14D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: Interrupt$NoTimers$Priority
        • API String ID: 3832890014-3223323590
        • Opcode ID: 8673d32b512bd9018793bb196c1d5b40ebd8ca30586ba1734df657dd330f6e22
        • Instruction ID: deab90e07f06a2fb7631efdf103cc1ef51e41efd49fef226b81528ec811e20cb
        • Opcode Fuzzy Hash: 8673d32b512bd9018793bb196c1d5b40ebd8ca30586ba1734df657dd330f6e22
        • Instruction Fuzzy Hash: 07E04F52A5162125DE21263ABC037DF20845BF2B0AF9E4666F824D13C5F78D8995819E
        APIs
        • _memset.LIBCMT ref: 00409D0B
        • UnregisterHotKey.USER32(00010474,?,00000028,?,00000001), ref: 00409DA1
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Unregister_memset
        • String ID:
        • API String ID: 2392160147-0
        • Opcode ID: 71481f1a92dca2b6df0f580d4b5466cc22b4f6be015d98d672facef3935109ae
        • Instruction ID: 5abdfaac0726ee4b9cdf7609084facb0a471603086785c9895faba6579550722
        • Opcode Fuzzy Hash: 71481f1a92dca2b6df0f580d4b5466cc22b4f6be015d98d672facef3935109ae
        • Instruction Fuzzy Hash: 0DE1B0616083859AEB35CF24D448B637BA19B52308F0844BFD481AA2D3D37DDD9AC79B
        APIs
        • __getptd.LIBCMT ref: 004917F4
          • Part of subcall function 00492192: __getptd_noexit.LIBCMT ref: 00492195
          • Part of subcall function 00492192: __amsg_exit.LIBCMT ref: 004921A2
        • __amsg_exit.LIBCMT ref: 00491814
        • __lock.LIBCMT ref: 00491824
        • InterlockedDecrement.KERNEL32(?), ref: 00491841
        • _free.LIBCMT ref: 00491854
        • InterlockedIncrement.KERNEL32(02D52CC8), ref: 0049186C
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
        • String ID:
        • API String ID: 3470314060-0
        • Opcode ID: 6b8c4c6a12391ff2560002c5849a4edf37db0201feb4090741f9a2b6356e4eae
        • Instruction ID: b1908060966f0b8c2e2ab703c7d8425b26ff1ac565111df06f7cf80e1be0a909
        • Opcode Fuzzy Hash: 6b8c4c6a12391ff2560002c5849a4edf37db0201feb4090741f9a2b6356e4eae
        • Instruction Fuzzy Hash: 8701C836D01612ABCF11FB559545B9E7BA0BB41714F05407FE410632A0C77C5C41EBDD
        APIs
        • __wcsicoll.LIBCMT ref: 0040BF38
        • GetKeyboardLayout.USER32(00000000), ref: 0040BF53
          • Part of subcall function 00474FC0: _vswprintf_s.LIBCMT ref: 00474FD9
        Strings
        • "%s" is not a valid key name., xrefs: 0040C0E0
        • "%s" is not allowed as a prefix key., xrefs: 0040BFB8
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: KeyboardLayout__wcsicoll_vswprintf_s
        • String ID: "%s" is not a valid key name.$"%s" is not allowed as a prefix key.
        • API String ID: 2348117768-1430096861
        • Opcode ID: 1f17666a0ad7f54cf2c06c22d451c5469985fbab6af3e785ad65dc5c7674e948
        • Instruction ID: 64c6b01aa91273d2a68f3b829937831e87006c8afaf3db699980f3c0890d8c78
        • Opcode Fuzzy Hash: 1f17666a0ad7f54cf2c06c22d451c5469985fbab6af3e785ad65dc5c7674e948
        • Instruction Fuzzy Hash: 8E7138762483449AD720DB589C82BEB7791CB91324F48053FED44AA3C2D7BD898DC79E
        APIs
        • RemoveMenu.USER32(?,?,00000000,?,?,?,0046BB7F,?,00000000,?,75295780,?,?,00415D51,004CB680,02D52F08), ref: 0046C0EE
        • SetMenuItemInfoW.USER32 ref: 0046C135
        • DeleteObject.GDI32(?), ref: 0046C147
        • DestroyCursor.USER32(?), ref: 0046C153
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Menu$CursorDeleteDestroyInfoItemObjectRemove
        • String ID: 0
        • API String ID: 2910511256-4108050209
        • Opcode ID: 5558a60aac1dc141a3314c62044822e0c655d7d40df7e901d0c715033f4807a4
        • Instruction ID: c791606492389fef6e98b19904fdee6728946873793a9211dad79ae17e51e458
        • Opcode Fuzzy Hash: 5558a60aac1dc141a3314c62044822e0c655d7d40df7e901d0c715033f4807a4
        • Instruction Fuzzy Hash: F8315AB16002409FC720DF59D8C4C6BBBE9BB49304B44467EE5898B312E735ED44CF9A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _wcschr
        • String ID: The following %s name contains an illegal character:"%-1.300s"$_$#@$function$variable
        • API String ID: 2691759472-3792156013
        • Opcode ID: ffe442df449ed096fe107588dac3167b16e697bdb5051459385bde7c9bc46997
        • Instruction ID: a0a417c059afc0ac3293277f9c025098adadd00e166d465fa293bc44acc0c666
        • Opcode Fuzzy Hash: ffe442df449ed096fe107588dac3167b16e697bdb5051459385bde7c9bc46997
        • Instruction Fuzzy Hash: 8D1127B3B4020412DB20A55AAC466FB7388C781330F4482BFFE0CD63C1FA699C0482EA
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsnicmp
        • String ID: Local$Static$b
        • API String ID: 1038674560-465266414
        • Opcode ID: f0f455a0364253a6a42cb3a302415e631f94708a6e2d5d239890e31b93c4f642
        • Instruction ID: 58851e46d5a556e24c7d3a65e7ed414f35c8b15ff18f5453d3a206166bf24b79
        • Opcode Fuzzy Hash: f0f455a0364253a6a42cb3a302415e631f94708a6e2d5d239890e31b93c4f642
        • Instruction Fuzzy Hash: 6101007168530646DB349A018881BFB73D0FFA5719F00052FF98986681F3AD8AD5879F
        APIs
        • GetKeyboardLayoutNameW.USER32(?), ref: 00412589
        • RegOpenKeyExW.ADVAPI32(80000002,?,00000000,00000001,?), ref: 004125A6
        • LoadLibraryW.KERNEL32(?), ref: 004125D5
        • ActivateKeyboardLayout.USER32(00000000,00000000), ref: 004125E9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: KeyboardLayout$ActivateLibraryLoadNameOpen
        • String ID: Layout File
        • API String ID: 2091964706-1055935358
        • Opcode ID: 755bbdc3a8cede16e218a21076dea3348f8babe478426d31cc078b6756582c3e
        • Instruction ID: 67538de4c5669415d5c44a24e28d0df87865b70f75d1a8e586fa7b95a526baf2
        • Opcode Fuzzy Hash: 755bbdc3a8cede16e218a21076dea3348f8babe478426d31cc078b6756582c3e
        • Instruction Fuzzy Hash: E6012432204301ABD7309B20DD98BFBB7A9FB85350F40482EFA45C3240EB789584C76A
        APIs
        • GetModuleHandleW.KERNEL32(user32,IsHungAppWindow,?,00478D1A), ref: 00479D46
        • GetProcAddress.KERNEL32(00000000), ref: 00479D4D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AddressHandleModuleProc
        • String ID: IsHungAppWindow$user32
        • API String ID: 1646373207-934392274
        • Opcode ID: 0c19b43b85725c5d609088598e8fa6e1f1508da7488f6668902b27b189480cdf
        • Instruction ID: 276b13bd05a28e6ee2473acc4558146c4282d12a31936c3694102e4cb7b666e8
        • Opcode Fuzzy Hash: 0c19b43b85725c5d609088598e8fa6e1f1508da7488f6668902b27b189480cdf
        • Instruction Fuzzy Hash: 1FF0B4727813126AE7605BB4BC4BFEA3A9C9B02701F248076F81AD55E1EB58DD405A1C
        APIs
        • GlobalAlloc.KERNEL32(00000002,00000000,0040427A), ref: 004042C1
        • GlobalLock.KERNEL32(00000000), ref: 004042E6
        • GlobalFree.KERNEL32(00000000), ref: 004042F7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Global$AllocFreeLock
        • String ID: GlobalAlloc$GlobalLock
        • API String ID: 1811133220-3672399903
        • Opcode ID: fe08613e736e5286204b3a8e8731af408fb1db42672314f6aa5a4fc8e99598f8
        • Instruction ID: afb7bffd47b95c731a87377180947e1ae491f5292c47d67ce45e39bca6dd865a
        • Opcode Fuzzy Hash: fe08613e736e5286204b3a8e8731af408fb1db42672314f6aa5a4fc8e99598f8
        • Instruction Fuzzy Hash: 12F03174701B019BC7109F76890AA17B7E8AF95705710887FB956D3690EB78E800DB58
        APIs
        • CloseHandle.KERNEL32(00000000), ref: 00408DD3
        • CreateMutexW.KERNEL32(00000000,00000000,AHK Keybd), ref: 00408DDE
        • GetLastError.KERNEL32 ref: 00408DE6
        • CloseHandle.KERNEL32(00000000), ref: 00408E0D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CloseHandle$CreateErrorLastMutex
        • String ID: AHK Keybd
        • API String ID: 2372642624-4057427925
        • Opcode ID: 9462ff5882db292f961f87749792a10c5ada91329fd983548eb66133f24145ad
        • Instruction ID: 715416118ac52e1394e1033a93bd061ea253aac25160f8f179083ba16beef835
        • Opcode Fuzzy Hash: 9462ff5882db292f961f87749792a10c5ada91329fd983548eb66133f24145ad
        • Instruction Fuzzy Hash: 3CF0A0733013206BDA5067B9EC8CF4B7B599BC97A2F118476F144D61D0CB388C408A6C
        APIs
        • CloseHandle.KERNEL32(00000000), ref: 00408E33
        • CreateMutexW.KERNEL32(00000000,00000000,AHK Mouse), ref: 00408E3E
        • GetLastError.KERNEL32 ref: 00408E46
        • CloseHandle.KERNEL32(00000000), ref: 00408E6D
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CloseHandle$CreateErrorLastMutex
        • String ID: AHK Mouse
        • API String ID: 2372642624-1022267635
        • Opcode ID: f6f128d3337663449afc55ca31192e9fd6c36ede98926b02002da0c7c562de47
        • Instruction ID: f273c53dedcae68dc19921a8992f06f11b69f37dea48f4da9fe1003213fefae9
        • Opcode Fuzzy Hash: f6f128d3337663449afc55ca31192e9fd6c36ede98926b02002da0c7c562de47
        • Instruction Fuzzy Hash: 48F0A073320320ABD71067B8EC8CF4F3B59ABC57A1F194036F544C6294CB388C408268
        APIs
        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00412503
        • GetGUIThreadInfo.USER32 ref: 00412515
        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0041252A
        • GetKeyboardLayout.USER32(00000000), ref: 0041252F
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Thread$ProcessWindow$InfoKeyboardLayout
        • String ID: 0
        • API String ID: 3571156007-4108050209
        • Opcode ID: 1e1fc4ae02988cd98a99443cdc5365ba4ebe2ef5ec976b69fa2e7ff7d994f47e
        • Instruction ID: 63159857cd3c982576378a14c26b1b25572732fcd22b20de5e0efd13b3cbf21d
        • Opcode Fuzzy Hash: 1e1fc4ae02988cd98a99443cdc5365ba4ebe2ef5ec976b69fa2e7ff7d994f47e
        • Instruction Fuzzy Hash: 16E0E572601221B7D3209B659D04BDB7FDCAF85790F040526F805E3190D774EC04CAF9
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: Off$Toggle
        • API String ID: 3832890014-498102744
        • Opcode ID: a4376d66a018ebfb6dc66cbc0347433af8c06d9d41e7e539805090aebaa1189a
        • Instruction ID: f9e48b36116ac5737066d35bfbcd4a0398cc7b688834ccdc27d4904e326b8ce8
        • Opcode Fuzzy Hash: a4376d66a018ebfb6dc66cbc0347433af8c06d9d41e7e539805090aebaa1189a
        • Instruction Fuzzy Hash: 9AE0DF03A4191122DA20353E8C0378F20446BA2B0AFD805B6F824E23C3F29D8E4081DE
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: Locale$Off
        • API String ID: 3832890014-2054679776
        • Opcode ID: fdcb75efe1ef803f17c9f6c152cd5e1ebf87243c562a32b77a4bc52e9b05d5a6
        • Instruction ID: b045184371c5d75b8ec0b69f8ecff4dcce29a4e13291825291cce78f46b969b8
        • Opcode Fuzzy Hash: fdcb75efe1ef803f17c9f6c152cd5e1ebf87243c562a32b77a4bc52e9b05d5a6
        • Instruction Fuzzy Hash: B2D05E5BA80A1122CF21307A5D03BCF10442FB2B0EFCA04A6F820D0282F28DD25486AE
        APIs
        • CallNextHookEx.USER32(00000000,?,?,?), ref: 0040F808
        • UnhookWindowsHookEx.USER32(00000000), ref: 0040F849
        • GetTickCount.KERNEL32 ref: 0040F89C
        • GetTickCount.KERNEL32 ref: 0040F9DF
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountHookTick$CallNextUnhookWindows
        • String ID:
        • API String ID: 2092930497-0
        • Opcode ID: 45bacffc7ed1776581887d01330ba344f648df055483ed06a9c86c1b9347f3da
        • Instruction ID: f1286bb7f4f0ff4a4feaa31a71e9e3a37f3b4b30d7c68654c4755a4ddce7f20d
        • Opcode Fuzzy Hash: 45bacffc7ed1776581887d01330ba344f648df055483ed06a9c86c1b9347f3da
        • Instruction Fuzzy Hash: CF71E471604602DBD328DB28E894B76B7E0FB94305F14853FD49AD7B90E739A858CB6C
        APIs
        • SendMessageW.USER32(00000000,00001304,00000000,00000000), ref: 0046975A
        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00469792
        • SendMessageW.USER32(?,0000130C,-00000001,00000000), ref: 004697D6
        • GetDlgCtrlID.USER32 ref: 004697F2
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: MessageSend$Ctrl
        • String ID:
        • API String ID: 4210937766-0
        • Opcode ID: 4ced7b0e40063aa2e479ac6204793705fcfa57503b5bd603f6d049eca268f2e3
        • Instruction ID: cf7bd77c8d4614a2e63cd773df05d1f7b3f81102a18c5147856aebe60ecdc637
        • Opcode Fuzzy Hash: 4ced7b0e40063aa2e479ac6204793705fcfa57503b5bd603f6d049eca268f2e3
        • Instruction Fuzzy Hash: 83311570214201AEE320AE2A8844F6BB7DC9B42705F14852FF545C72D2E6B9EC85CB9A
        APIs
        • __getptd.LIBCMT ref: 00491F75
          • Part of subcall function 00492192: __getptd_noexit.LIBCMT ref: 00492195
          • Part of subcall function 00492192: __amsg_exit.LIBCMT ref: 004921A2
        • __getptd.LIBCMT ref: 00491F8C
        • __amsg_exit.LIBCMT ref: 00491F9A
        • __lock.LIBCMT ref: 00491FAA
        • __updatetlocinfoEx_nolock.LIBCMT ref: 00491FBE
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
        • String ID:
        • API String ID: 938513278-0
        • Opcode ID: 7b5c7f0c9d9b604717c36fd8480da74caa0fae5ba2deeee895ce822d5cb29e49
        • Instruction ID: 65ed6d96ff80f4e324e4be8d254584be939dd2511ae01b36955dbcc39c0ce684
        • Opcode Fuzzy Hash: 7b5c7f0c9d9b604717c36fd8480da74caa0fae5ba2deeee895ce822d5cb29e49
        • Instruction Fuzzy Hash: 4BF0F632940715AEDF64B7665903B4E3BA06F00328F10413FF010972EADBAC08009B5D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick_wcsncpy
        • String ID: call
        • API String ID: 2317306155-3431870270
        • Opcode ID: 382181d5c0fc1d5ebe4e431c50307ade5e52df618429a38017b0800659f33e48
        • Instruction ID: bcd41d055f5edb5c21ec6749b2c1228166087750d1db6665263babfc6ba58c09
        • Opcode Fuzzy Hash: 382181d5c0fc1d5ebe4e431c50307ade5e52df618429a38017b0800659f33e48
        • Instruction Fuzzy Hash: 4D61A2706043409FC724DF25D880AABBFE4BF85305F04497EE8859B361D739EA45CB9A
        APIs
        • _wcsncpy.LIBCMT ref: 004033DF
          • Part of subcall function 00403590: SetCurrentDirectoryW.KERNEL32(C:\Users\user\Desktop,?,02D85D24,004033FF,00000000,00000000,?,?,?,?,00000000), ref: 004035F5
        • GetTickCount.KERNEL32 ref: 00403472
        • _free.LIBCMT ref: 00403513
          • Part of subcall function 0045C3D0: GetWindowLongW.USER32(00000000,000000F0), ref: 0045C410
          • Part of subcall function 0045C3D0: GetParent.USER32(00000000), ref: 0045C41A
          • Part of subcall function 00401290: GetDlgCtrlID.USER32 ref: 004012A1
          • Part of subcall function 00401290: GetParent.USER32 ref: 004012AC
          • Part of subcall function 00401290: GetDlgCtrlID.USER32(00000000), ref: 004012B9
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CtrlParent$CountCurrentDirectoryLongTickWindow_free_wcsncpy
        • String ID: call
        • API String ID: 331199522-3431870270
        • Opcode ID: 709248ccafc3994de630679cf627d1680b62fd451f329a2b7abb84de81598ea7
        • Instruction ID: a22a7019ee6e58a320fc687f70b56abfdc3ac284fbee3c53cdcf59aea3582c3c
        • Opcode Fuzzy Hash: 709248ccafc3994de630679cf627d1680b62fd451f329a2b7abb84de81598ea7
        • Instruction Fuzzy Hash: C35144B19043409FC324DF29D88099BBBE4BF85305F14497EE4899B362E735E905CB5A
        APIs
        • _fputws.LIBCMT ref: 0042F21A
        • OutputDebugStringW.KERNEL32(?,004CB680,00000000,This variable has not been assigned a value.,?,?,?,00000000), ref: 0042F234
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: DebugOutputString_fputws
        • String ID: Specifically: %s$%s (%d) : ==> Warning: %s
        • API String ID: 1480962609-1106449728
        • Opcode ID: ee02b9df6e7e10103ac2156e449da2afa51f6c24c230b4c3f575ea2b953231a2
        • Instruction ID: 2549a14dce2978934aae13759c7b544f9ece60ce3e48d637e4db6ec6c2415730
        • Opcode Fuzzy Hash: ee02b9df6e7e10103ac2156e449da2afa51f6c24c230b4c3f575ea2b953231a2
        • Instruction Fuzzy Hash: 3331E6B670431097D720EA51F885ABB73A9EBC5314F84887EEE4857241D77A6C08C2BA
        APIs
        Strings
        • A Goto/Gosub must not jump into a block that doesn't enclose it., xrefs: 00443862
        • h(J, xrefs: 004437CB
        • Target label does not exist., xrefs: 00443800
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: A Goto/Gosub must not jump into a block that doesn't enclose it.$Target label does not exist.$h(J
        • API String ID: 3832890014-3063140606
        • Opcode ID: 671fbc5e6e0793823bcf74c53c3fd360bcc875e67e6ad829e325c68f7b3c9aa0
        • Instruction ID: afd573a4d8055b0342ef6654cba37cc6cbaa70d07ad3bca525dd7f261e46e0f0
        • Opcode Fuzzy Hash: 671fbc5e6e0793823bcf74c53c3fd360bcc875e67e6ad829e325c68f7b3c9aa0
        • Instruction Fuzzy Hash: 9111B4B274030457EB20EE2AD801B67F3A4AB90F52F14842FF8459B380D729EE51C79C
        APIs
        • GetTickCount.KERNEL32 ref: 00411708
        • GetForegroundWindow.USER32(?,0040FFD1,00000000,00000000), ref: 00411754
        • GetWindowTextW.USER32(00000000,0000000C,00000064), ref: 00411781
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$CountForegroundTextTick
        • String ID: N/A
        • API String ID: 3416458291-2525114547
        • Opcode ID: c0db38a858e196bdb9c7617cc72d1ed12be8688fb3f38d063a0d90b12b133101
        • Instruction ID: 87116f4d8449f2232aad3b7576ef3395a5e279bfa921b186fd7b189b5147bac6
        • Opcode Fuzzy Hash: c0db38a858e196bdb9c7617cc72d1ed12be8688fb3f38d063a0d90b12b133101
        • Instruction Fuzzy Hash: 7E312736209600EFC758CB24E998E6ABBA4EB98300B09857EE546DB3B5D7349C41CB5D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsnicmp_wcschr
        • String ID: <>=/|^,:*&~!()[]{}+-?."'\;`$Class
        • API String ID: 2237432580-400929710
        • Opcode ID: 1320dabc2b37f9ebb01aecb97e2d9ded86b5111d4e4133e5c856865f63aac09d
        • Instruction ID: 584480d0d4f65814acdfae617e9ea43e74e2652c6ac03446d7358c2f24d28386
        • Opcode Fuzzy Hash: 1320dabc2b37f9ebb01aecb97e2d9ded86b5111d4e4133e5c856865f63aac09d
        • Instruction Fuzzy Hash: 7111E57260C7115A97209B2DAC425FB7BE1EF99311B184427E849C6284F329DDC5C295
        APIs
        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\Desktop,?,02D85D24,004033FF,00000000,00000000,?,?,?,?,00000000), ref: 004035F5
        • GetTickCount.KERNEL32 ref: 00403667
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountCurrentDirectoryTick
        • String ID: C:\Users\user\Desktop$e
        • API String ID: 2167818035-170270612
        • Opcode ID: 4ca84c085fba102bf18794f1e2baa4abcc6f630d6c85ef87b295c567aa225b29
        • Instruction ID: c5360f2c934a6d4f45fe079ad79f681bddc18af6940219d75f878b58c05ea7db
        • Opcode Fuzzy Hash: 4ca84c085fba102bf18794f1e2baa4abcc6f630d6c85ef87b295c567aa225b29
        • Instruction Fuzzy Hash: 44217A70804780AEE770CF25E808B96BFE4AB45315F08897FD09A663D1C7B95985CF48
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: IconNotifyShell__memset_wcsncpy
        • String ID: AutoHotkey
        • API String ID: 1481257660-348589305
        • Opcode ID: e1ee7b78e756c90cb0382a01a44cc7b320eee2e0cd31f8cf52b688655658436e
        • Instruction ID: 48202a1d6c1d34ffdc176eebde242b7c8320fc625ae2673eef0a5550acbc3080
        • Opcode Fuzzy Hash: e1ee7b78e756c90cb0382a01a44cc7b320eee2e0cd31f8cf52b688655658436e
        • Instruction Fuzzy Hash: 5C116DB0704701AFDB60DF39D848B97B7E8EB44304F41082EE55ED6340EB78E8408B58
        APIs
        • SetMenuItemInfoW.USER32 ref: 0046D0E3
        • DeleteObject.GDI32(00000000), ref: 0046D0F6
        • DestroyCursor.USER32(00000000), ref: 0046D110
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CursorDeleteDestroyInfoItemMenuObject
        • String ID: 0
        • API String ID: 392443887-4108050209
        • Opcode ID: 73d54b260c4c79a03620e5912fb9009d33d0792d368580d23bcc88033994dace
        • Instruction ID: 336f6b26ba9466bd8034efa99ef7d0e097b0287aad32d4f812c7b4900db83f52
        • Opcode Fuzzy Hash: 73d54b260c4c79a03620e5912fb9009d33d0792d368580d23bcc88033994dace
        • Instruction Fuzzy Hash: B7F049F0A013009FE324CF15D959B577BE4BB48705F800A1CE48A872A0E7B9E808CB5A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: WHILE$f9M
        • API String ID: 3832890014-1455158177
        • Opcode ID: 5944d45e376fb1b236d665223c981aeb336956c0416d0a9a909d5bd83e2fad44
        • Instruction ID: b8cd079e99b397ed4a95525c49edf1d0a4363da3c2a86212455b5ce4b0ad1eca
        • Opcode Fuzzy Hash: 5944d45e376fb1b236d665223c981aeb336956c0416d0a9a909d5bd83e2fad44
        • Instruction Fuzzy Hash: CAF082304493C1A1DB30EB658D457EF6A949F65709F04881BF84D81241F3BCC6E883AF
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 411e5fa529d4a49f5cedec46bd57b23e5c950b06fb7fa0808e5e3ce82bf5d9c5
        • Instruction ID: 3e8477417cb66a92acbb79513ef8c49a30ddc2e02c522e191bc91ce92ac62c3f
        • Opcode Fuzzy Hash: 411e5fa529d4a49f5cedec46bd57b23e5c950b06fb7fa0808e5e3ce82bf5d9c5
        • Instruction Fuzzy Hash: B68113323043219BC730DA58E980BABB3E1BF98314F89055EE99487352D779ED06C796
        APIs
        • GetForegroundWindow.USER32(?,?,?,?,00409918,004C8138,?,00000000,004A2868,004A2868,00000000,?,004C9F54,?,0040A4DA,?), ref: 00478FFF
        • IsWindowVisible.USER32(00000000), ref: 0047901B
        • GetForegroundWindow.USER32(?,?,?,?,00409918,004C8138,?,00000000,004A2868,004A2868,00000000,?,004C9F54,?,0040A4DA,?), ref: 0047904E
        • IsWindowVisible.USER32(00000000), ref: 004790BB
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$ForegroundVisible
        • String ID:
        • API String ID: 4078700383-0
        • Opcode ID: a15962ffc4fdf8c261fef46e7b44eb9c992f0563c12497c3e2bdb89a46e0e1d1
        • Instruction ID: be5417874b46d2e900e8e60a46a52fe3954e767fd9b36f4bc56dacc34b835fdf
        • Opcode Fuzzy Hash: a15962ffc4fdf8c261fef46e7b44eb9c992f0563c12497c3e2bdb89a46e0e1d1
        • Instruction Fuzzy Hash: B54159316583818BC734AF65D8804EFB7E5FB85310F44896EE68C87240EB395D85DB9A
        APIs
        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00497F91
        • __isleadbyte_l.LIBCMT ref: 00497FC4
        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,00000000,00000000,?,?,?,?,?,00000000), ref: 00497FF5
        • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,00000000,00000000,?,?,?,?,?,00000000), ref: 00498063
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
        • String ID:
        • API String ID: 3058430110-0
        • Opcode ID: f9f0a74a68442fb17fc924880cb736a3584c5514d0ea5f9996fdfb5190d9ab9a
        • Instruction ID: 85f262e6b6cd70b278b53554bc94b6c9b5be7d13d69a7986a37edb2bf50ffc9e
        • Opcode Fuzzy Hash: f9f0a74a68442fb17fc924880cb736a3584c5514d0ea5f9996fdfb5190d9ab9a
        • Instruction Fuzzy Hash: F631CE31A14245EFCF10DFA8C8809AE7FB1AF01310F15457EE4659B295E738CD40DB59
        APIs
        • IsMenu.USER32(?), ref: 0046CB84
        • GetMenu.USER32(?), ref: 0046CBB0
        • DestroyMenu.USER32(?,?,0046BB79,00000000,?,75295780,?,?,00415D51,004CB680,02D52F08,?,?,?,00000000,00000000), ref: 0046CBC4
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Menu$Destroy
        • String ID:
        • API String ID: 3525833831-0
        • Opcode ID: c69c7c87b924854fced0d1b54d5957574c4733be9ed597133ebfed67299dd459
        • Instruction ID: 29d3cc2235bc53f19bf3f2d0e3a333caba59038450d37c39a10bdf81806438a0
        • Opcode Fuzzy Hash: c69c7c87b924854fced0d1b54d5957574c4733be9ed597133ebfed67299dd459
        • Instruction Fuzzy Hash: 86315C727002108BCB218F65A8C5A37B3A4BB49B55B15816BD9889B701FB39FC01CB9A
        APIs
        • __itow.LIBCMT ref: 0040F575
        • GetTickCount.KERNEL32 ref: 0040F59F
        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 0040F5C2
        • GetTickCount.KERNEL32 ref: 0040F5EC
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick$MessagePeek__itow
        • String ID:
        • API String ID: 1851793280-0
        • Opcode ID: 7af147e230a6b2fdeb0ded77f4761003ad48306ca2e43fd4a6f489498431898b
        • Instruction ID: dcabcfd5a70de8219c44b2f110d2ab45efe91699bf03cbafe76cb8bfec93dd49
        • Opcode Fuzzy Hash: 7af147e230a6b2fdeb0ded77f4761003ad48306ca2e43fd4a6f489498431898b
        • Instruction Fuzzy Hash: A321F0B1900300ABD320EF54EC41F2A33A4AB84758F54093AF800676E1DB79E94EC75E
        APIs
        • GetWindowTextW.USER32(?,?,00007FFF), ref: 0047A2F7
        • GetWindowThreadProcessId.USER32(?,?), ref: 0047A31F
        • GetWindowThreadProcessId.USER32(?,?), ref: 0047A332
        • GetClassNameW.USER32(?,?,00000101), ref: 0047A378
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Window$ProcessThread$ClassNameText
        • String ID:
        • API String ID: 3420357866-0
        • Opcode ID: ca3f1a0ff5aaa800b5ac87fbb564b8035961a4004fc7b604e5060d363b083a9b
        • Instruction ID: a256e98da43684eadae96e9e3906f0bcb72ac40daa046eda8bd3ab0767564e45
        • Opcode Fuzzy Hash: ca3f1a0ff5aaa800b5ac87fbb564b8035961a4004fc7b604e5060d363b083a9b
        • Instruction Fuzzy Hash: 9411BE71200B419AD7349F78C840AEBB7EAEFC5744F14C91DE89E83280EB78B950C729
        APIs
        • GlobalUnlock.KERNEL32(00000000), ref: 0040444C
        • CloseClipboard.USER32 ref: 00404451
        • GlobalUnlock.KERNEL32(00000000), ref: 00404465
        • GlobalFree.KERNEL32(00000000), ref: 00404475
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: Global$Unlock$ClipboardCloseFree
        • String ID:
        • API String ID: 1156981608-0
        • Opcode ID: 55f8dc915af0cc11aeeba3268605394b168407b423672170b683a0e2f87bf1c5
        • Instruction ID: 0ba2b58eef9fc65e1470fbced79705329efee2976ed4ded7ff49ddd9df2e29d6
        • Opcode Fuzzy Hash: 55f8dc915af0cc11aeeba3268605394b168407b423672170b683a0e2f87bf1c5
        • Instruction Fuzzy Hash: F8011EB56007009BC320DF5AD884917F7E8BBD4711324C92FE69A93650C735A840CF18
        APIs
        • EnableMenuItem.USER32(00000000,0000FF81,00000003), ref: 0041651E
        • EnableMenuItem.USER32(00000000,0000FF7E,00000003), ref: 00416527
        • EnableMenuItem.USER32(00000000,0000FF7F,00000003), ref: 00416530
        • EnableMenuItem.USER32(00000000,0000FF80,00000003), ref: 00416539
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: EnableItemMenu
        • String ID:
        • API String ID: 1841910628-0
        • Opcode ID: a595932e3b60e682d82ce59cc7cb223dc68fe98ca3b4728472f73a0ad334fbc1
        • Instruction ID: 61b095ad3b4307dc13cb983632c3f906f5cdc8cc8124339673f1335f1e121de0
        • Opcode Fuzzy Hash: a595932e3b60e682d82ce59cc7cb223dc68fe98ca3b4728472f73a0ad334fbc1
        • Instruction Fuzzy Hash: 23D0025124E31739B53166625CC5C7F5D2DDF8BFE8B500179F208155C44E455C17B1B9
        APIs
        • __wcsicoll.LIBCMT ref: 0047A51E
        • EnumChildWindows.USER32(00000000,00479460,?), ref: 0047A6A3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: ChildEnumWindows__wcsicoll
        • String ID: %s%u
        • API String ID: 2617673624-679674701
        • Opcode ID: f463fe275bf8a4572d16169b3931c75fe4a66956c1ff49de5b715a7cef880024
        • Instruction ID: 2145d8b2f0f75c96de28c46e8ba0d58c0ff6f23de95557dc4b48e60136c6947e
        • Opcode Fuzzy Hash: f463fe275bf8a4572d16169b3931c75fe4a66956c1ff49de5b715a7cef880024
        • Instruction Fuzzy Hash: 72B1A6326001459ADB34EF15DC48BEF33A5EBA0354F48C12BDD4D8A240EB7ADB5AC756
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __fassign
        • String ID: ,
        • API String ID: 3965848254-605440088
        • Opcode ID: 3ee338104aeb64222ba0cab95f241a4613dc61bea76971bdc78b61f592cd58f0
        • Instruction ID: 6d3482a9b41fcbe21f9bb8b6c7e256a476d218e91ed5098b1dc149de876d789c
        • Opcode Fuzzy Hash: 3ee338104aeb64222ba0cab95f241a4613dc61bea76971bdc78b61f592cd58f0
        • Instruction Fuzzy Hash: CC51DD706042129FD7219F14D8457ABB3A1AF96314F24089AFC819B3D1E7BE9DC1C79A
        APIs
          • Part of subcall function 00403740: GetTickCount.KERNEL32 ref: 00403772
        • GetTickCount.KERNEL32 ref: 00402FF5
        • _wcsncpy.LIBCMT ref: 00403067
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CountTick$_wcsncpy
        • String ID: call
        • API String ID: 980906815-3431870270
        • Opcode ID: 53bb392afa135ee1194b065936956bbc5476679a8f323fad37052b3f571ac969
        • Instruction ID: 26510d32f66d864b8ff8a30b1efd452dd8727403e6a0465febcdee2b904ece66
        • Opcode Fuzzy Hash: 53bb392afa135ee1194b065936956bbc5476679a8f323fad37052b3f571ac969
        • Instruction Fuzzy Hash: 14510570600340ABD730DF21D845B677BEAAB44715F18897FD4856B2C2C37DAA89CB9D
        APIs
        • _malloc.LIBCMT ref: 0040CC73
          • Part of subcall function 0048E5E4: __FF_MSGBANNER.LIBCMT ref: 0048E5FD
          • Part of subcall function 0048E5E4: __NMSG_WRITE.LIBCMT ref: 0048E604
          • Part of subcall function 0048E5E4: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048E629
        Strings
        • Out of memory., xrefs: 0040CC89
        • Hotstring max abbreviation length is 40., xrefs: 0040CC45
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AllocateHeap_malloc
        • String ID: Hotstring max abbreviation length is 40.$Out of memory.
        • API String ID: 501242067-4290233147
        • Opcode ID: 357dc2e996c47a83d53b402d872358fea772b426763ac9559269af53f3dede4d
        • Instruction ID: 255e7b7c14ab69781cc6fefed85971779271d438c30205605aa06693934211ff
        • Opcode Fuzzy Hash: 357dc2e996c47a83d53b402d872358fea772b426763ac9559269af53f3dede4d
        • Instruction Fuzzy Hash: BB41EEB4608341DFE754DF29D991B577BA4FB88318F048A3EE84997390E738D801CB9A
        APIs
        • _wcsncpy.LIBCMT ref: 0040BA6B
          • Part of subcall function 0040BB90: _memset.LIBCMT ref: 0040BBA7
          • Part of subcall function 0040BED0: __wcsicoll.LIBCMT ref: 0040BF38
          • Part of subcall function 0040BED0: GetKeyboardLayout.USER32(00000000), ref: 0040BF53
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: KeyboardLayout__wcsicoll_memset_wcsncpy
        • String ID: & $~
        • API String ID: 3335490538-4238529414
        • Opcode ID: f8ace3ef135329801e518c4307a19096508fad37e2a3f7e0827c28de58f73333
        • Instruction ID: 06c28e48cc6029af3573de051e3dfbad91e46e14f1e138268048e8d9da15d24f
        • Opcode Fuzzy Hash: f8ace3ef135329801e518c4307a19096508fad37e2a3f7e0827c28de58f73333
        • Instruction Fuzzy Hash: 1B31F871A0030057D734AA568886ABBB3A5DB94354F44483BF959A73C1F378AC4487EE
        APIs
        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\Desktop), ref: 00470555
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CurrentDirectory
        • String ID: C:\Users\user\Desktop$call
        • API String ID: 1611563598-4215190852
        • Opcode ID: 19a9ce81df3e5e36f1172d57f217a743997489dee0dd50016f57be0a09426128
        • Instruction ID: de012821621fe4bde710f4487a769a2c30d3fe7214ddd5f8bd598abb8222d6ea
        • Opcode Fuzzy Hash: 19a9ce81df3e5e36f1172d57f217a743997489dee0dd50016f57be0a09426128
        • Instruction Fuzzy Hash: E34115B6A09342DFC304CF09D580A5ABBE1FB88710F148A6EE54997341D739E945CF9A
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _wcsncpy
        • String ID: Line#$--->
        • API String ID: 1735881322-1677359465
        • Opcode ID: 7469e59cf50a45d9494c4e2638ff44e7378f5fd4e9b5a8b21481b78e738ea412
        • Instruction ID: 4677688ef6f161da125eb7aec59aad22fa3200bad4705e183407ff55810b005d
        • Opcode Fuzzy Hash: 7469e59cf50a45d9494c4e2638ff44e7378f5fd4e9b5a8b21481b78e738ea412
        • Instruction Fuzzy Hash: AC21E1717043215FC718DE2AA885B7BB3D0EBC8304F54893EE946D3390D674AC16879A
        APIs
        • GetProcAddress.KERNEL32(00000000,KbdLayerDescriptor), ref: 00412680
        • FreeLibrary.KERNEL32(00000000), ref: 0041269C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: AddressFreeLibraryProc
        • String ID: KbdLayerDescriptor
        • API String ID: 3013587201-1890577838
        • Opcode ID: 1e691f56808ea49000a175790fc8d076c1df5f29933ba8fdb3024f74f730b529
        • Instruction ID: 3f0f4e9b5b737b15795ecbf412b88b79452801d27410b49359c67c677dcd76d0
        • Opcode Fuzzy Hash: 1e691f56808ea49000a175790fc8d076c1df5f29933ba8fdb3024f74f730b529
        • Instruction Fuzzy Hash: 9011A7F22002185ED7504F15BE84AB77394D741729B11023FE889C22B0EBBD9C71DA9D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _free
        • String ID: An object.$Invalid value.
        • API String ID: 269201875-731773362
        • Opcode ID: a945951f1c6860c4fa9040b510da745a5f04144bee75ea487b1e715dffa44e2b
        • Instruction ID: 1b510f46346e6163411d97bafcdbbb9321de97f5970c35468a7394235e2a2220
        • Opcode Fuzzy Hash: a945951f1c6860c4fa9040b510da745a5f04144bee75ea487b1e715dffa44e2b
        • Instruction Fuzzy Hash: E2114271514B914BC331DF28D409B93BBE0AF55310F148E5ED0DA8B791C7A8EA89CB95
        APIs
        • RegQueryValueExW.ADVAPI32(?,Layout File,00000000,00000000), ref: 004764E8
        • RegCloseKey.ADVAPI32(00000000,?,Layout File,00000000,00000000), ref: 004764F3
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: CloseQueryValue
        • String ID: Layout File
        • API String ID: 3356406503-1055935358
        • Opcode ID: 283aa44b2e4a0bd52e1eb999de257a25b4f0733e9a68302e06bd90041f956fd9
        • Instruction ID: c0c60fe8d70eb59c182edaad598c2538c79dd5ac0e2487fa5307a3b13190d96e
        • Opcode Fuzzy Hash: 283aa44b2e4a0bd52e1eb999de257a25b4f0733e9a68302e06bd90041f956fd9
        • Instruction Fuzzy Hash: 0001B9B0214E11AED764DF68E84475BB7E9EF58304F21892EE8CAC3294F77494409719
        APIs
        • _free.LIBCMT ref: 004036A6
          • Part of subcall function 0048F817: HeapFree.KERNEL32(00000000,00000000,?,00492183,00000000,?,0048E46A), ref: 0048F82D
          • Part of subcall function 0048F817: GetLastError.KERNEL32(00000000,?,00492183,00000000,?,0048E46A), ref: 0048F83F
        • _free.LIBCMT ref: 004036CC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: _free$ErrorFreeHeapLast
        • String ID: The thread has exited.
        • API String ID: 776569668-1941089863
        • Opcode ID: db1e1d3217f023595af862baa074a6954cd7a8d3763e8768d2f74ea327f167b6
        • Instruction ID: 630b08033cd11c8b3c0d9dec04751119e227ec774437920503bcaa727670cdfe
        • Opcode Fuzzy Hash: db1e1d3217f023595af862baa074a6954cd7a8d3763e8768d2f74ea327f167b6
        • Instruction Fuzzy Hash: 4311C6B1A01110ABD660AB50EC46F8B7368AF54318F1449BEF8456B382D77BBD848B9D
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: "AA$Message
        • API String ID: 3832890014-2494973457
        • Opcode ID: 631808301dbf1510cbac66e20afe869ce7af0c564d202944b38ca4fd1e63d663
        • Instruction ID: 73dbd0156621288da912c8510a9077957700ba06cab01ddfa00ffe7a6a5f55a4
        • Opcode Fuzzy Hash: 631808301dbf1510cbac66e20afe869ce7af0c564d202944b38ca4fd1e63d663
        • Instruction Fuzzy Hash: A6F0F4737062198F8310CE9DDC808ABF3D9EB84361B05862BE808C3301E725FC158BA4
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: __wcsicoll
        • String ID: OFF
        • API String ID: 3832890014-3172671433
        • Opcode ID: e413842f067e64bf069b4abda9f961285abca91130773984140e1b92cec57bb5
        • Instruction ID: d4db07e4ae565e32ae9c3defde31c84cd5b847541eadda2fbf584ef8b608312d
        • Opcode Fuzzy Hash: e413842f067e64bf069b4abda9f961285abca91130773984140e1b92cec57bb5
        • Instruction Fuzzy Hash: 7CE0EC61A4161062DE21661A8D167DB20847BA1F0AF8944AAF85896781F39C9D9092DA
        APIs
        • GlobalUnlock.KERNEL32(00000000), ref: 004044BF
        • CloseClipboard.USER32 ref: 004044CC
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2952166293.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.2951965681.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004A0000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004B1000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004C4000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004CF000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2952166293.00000000004E9000.00000040.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953838215.000000000064D000.00000080.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2953895486.000000000064E000.00000004.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_file.jbxd
        Similarity
        • API ID: ClipboardCloseGlobalUnlock
        • String ID: GlobalLock
        • API String ID: 3794156920-2848605275
        • Opcode ID: a9a8ec1e4b6b74c1a633a58a2fddec634c12b27f1feb90bdd7d15b11991af8cf
        • Instruction ID: f7920a2c3c1b1ac8c90089b1e249c8f4d0f16e24704bdbd2cb720652a9714cbb
        • Opcode Fuzzy Hash: a9a8ec1e4b6b74c1a633a58a2fddec634c12b27f1feb90bdd7d15b11991af8cf
        • Instruction Fuzzy Hash: BFE012741007019BE7709F56C44C756B6F4FF91305F64892EE58A527E0D7BC58C4CB59