Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
5HnWIsZYYh.exe

Overview

General Information

Sample name:5HnWIsZYYh.exe
renamed because original name is a hash value
Original sample name:1806d372d84e9b6a570e6db0c34f97fb9c4b7bfa42184c5733de1cd4452e47a5.exe
Analysis ID:1528056
MD5:811a2d6558eede86732a34dc1743fd8f
SHA1:e171afad9bc2294b03e5f6b22257655bda918a75
SHA256:1806d372d84e9b6a570e6db0c34f97fb9c4b7bfa42184c5733de1cd4452e47a5
Tags:exeuser-adrian__luca
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 5HnWIsZYYh.exe (PID: 5704 cmdline: "C:\Users\user\Desktop\5HnWIsZYYh.exe" MD5: 811A2D6558EEDE86732A34DC1743FD8F)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 5HnWIsZYYh.exeReversingLabs: Detection: 18%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 81.0% probability
Source: 5HnWIsZYYh.exeJoe Sandbox ML: detected
Source: 5HnWIsZYYh.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0042200C0_2_0042200C
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0041A2170_2_0041A217
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004122160_2_00412216
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0042435D0_2_0042435D
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004033C00_2_004033C0
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004125E80_2_004125E8
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044663B0_2_0044663B
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004096A00_2_004096A0
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004138010_2_00413801
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0042096F0_2_0042096F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004129D00_2_004129D0
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004119E30_2_004119E3
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0041C9AE0_2_0041C9AE
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0047EA6F0_2_0047EA6F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0040FA100_2_0040FA10
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044EB5F0_2_0044EB5F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00423C810_2_00423C81
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00411E780_2_00411E78
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00442E0C0_2_00442E0C
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00420EC00_2_00420EC0
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044CF170_2_0044CF17
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00444FD20_2_00444FD2
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: String function: 004115D7 appears 36 times
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: String function: 00416C70 appears 39 times
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: String function: 00445AE0 appears 65 times
Source: 5HnWIsZYYh.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCommand line argument: #v0_2_0040D6B0
Source: 5HnWIsZYYh.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 5HnWIsZYYh.exeReversingLabs: Detection: 18%
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeFile read: C:\Users\user\Desktop\5HnWIsZYYh.exeJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
Source: 5HnWIsZYYh.exeStatic PE information: real checksum: 0xa961f should be: 0xae8bf
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-86774
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeAPI coverage: 1.9 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeAPI call chain: ExitProcess graph end nodegraph_0-85987
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeAPI call chain: ExitProcess graph end nodegraph_0-85620
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
Source: 5HnWIsZYYh.exeBinary or memory string: Shell_TrayWnd
Source: 5HnWIsZYYh.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
Source: 5HnWIsZYYh.exeBinary or memory string: WIN_XP
Source: 5HnWIsZYYh.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
Source: 5HnWIsZYYh.exeBinary or memory string: WIN_XPe
Source: 5HnWIsZYYh.exeBinary or memory string: WIN_VISTA
Source: 5HnWIsZYYh.exeBinary or memory string: WIN_7
Source: 5HnWIsZYYh.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
Source: C:\Users\user\Desktop\5HnWIsZYYh.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
2
Command and Scripting Interpreter
2
Valid Accounts
2
Valid Accounts
2
Valid Accounts
21
Input Capture
2
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts2
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
LSASS Memory2
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
Access Token Manipulation
21
Access Token Manipulation
Security Account Manager2
Process Discovery
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Process Injection
1
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync2
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem6
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
5HnWIsZYYh.exe18%ReversingLabs
5HnWIsZYYh.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528056
Start date and time:2024-10-07 14:55:06 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 21s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:5HnWIsZYYh.exe
renamed because original name is a hash value
Original Sample Name:1806d372d84e9b6a570e6db0c34f97fb9c4b7bfa42184c5733de1cd4452e47a5.exe
Detection:MAL
Classification:mal56.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 23
  • Number of non-executed functions: 341
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • VT rate limit hit for: 5HnWIsZYYh.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.698031188816057
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:5HnWIsZYYh.exe
File size:707'338 bytes
MD5:811a2d6558eede86732a34dc1743fd8f
SHA1:e171afad9bc2294b03e5f6b22257655bda918a75
SHA256:1806d372d84e9b6a570e6db0c34f97fb9c4b7bfa42184c5733de1cd4452e47a5
SHA512:d4051076b39e35d8afa9cc94171f38b119a40707b625e49bf5375d3f12fe30e733b7fe5919e11568e1bf80497ecf996303272770785eecbffd593a8e3928d3b8
SSDEEP:12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCzZ/2:uRmJkcoQricOIQxiZY1iaCzZ/2
TLSH:B6E4AF22F5C69036C2B323B19E7EF76A963D79360336D29727C82D315EA05416B39723
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
Icon Hash:1733312925935517
Entrypoint:0x4165c1
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
Instruction
call 00007FDEF4930F4Bh
jmp 00007FDEF4927DBEh
int3
int3
int3
int3
int3
push ebp
mov ebp, esp
push edi
push esi
mov esi, dword ptr [ebp+0Ch]
mov ecx, dword ptr [ebp+10h]
mov edi, dword ptr [ebp+08h]
mov eax, ecx
mov edx, ecx
add eax, esi
cmp edi, esi
jbe 00007FDEF4927F3Ah
cmp edi, eax
jc 00007FDEF49280D6h
cmp ecx, 00000080h
jc 00007FDEF4927F4Eh
cmp dword ptr [004A9724h], 00000000h
je 00007FDEF4927F45h
push edi
push esi
and edi, 0Fh
and esi, 0Fh
cmp edi, esi
pop esi
pop edi
jne 00007FDEF4927F37h
jmp 00007FDEF4928312h
test edi, 00000003h
jne 00007FDEF4927F46h
shr ecx, 02h
and edx, 03h
cmp ecx, 08h
jc 00007FDEF4927F5Bh
rep movsd
jmp dword ptr [00416740h+edx*4]
mov eax, edi
mov edx, 00000003h
sub ecx, 04h
jc 00007FDEF4927F3Eh
and eax, 03h
add ecx, eax
jmp dword ptr [00416654h+eax*4]
jmp dword ptr [00416750h+ecx*4]
nop
jmp dword ptr [004166D4h+ecx*4]
nop
inc cx
add byte ptr [eax-4BFFBE9Ah], dl
inc cx
add byte ptr [ebx], ah
ror dword ptr [edx-75F877FAh], 1
inc esi
add dword ptr [eax+468A0147h], ecx
add al, cl
jmp 00007FDEF6DA0737h
add esi, 03h
add edi, 03h
cmp ecx, 08h
jc 00007FDEF4927EFEh
rep movsd
jmp dword ptr [00000000h+edx*4]
Programming Language:
  • [ C ] VS2010 SP1 build 40219
  • [C++] VS2010 SP1 build 40219
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2010 SP1 build 40219
  • [RES] VS2010 SP1 build 40219
  • [LNK] VS2010 SP1 build 40219
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
DLLImport
WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
Language of compilation systemCountry where language is spokenMap
EnglishGreat Britain
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:08:55:56
Start date:07/10/2024
Path:C:\Users\user\Desktop\5HnWIsZYYh.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\5HnWIsZYYh.exe"
Imagebase:0x400000
File size:707'338 bytes
MD5 hash:811A2D6558EEDE86732A34DC1743FD8F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:1.3%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:8.2%
    Total number of Nodes:1128
    Total number of Limit Nodes:21
    execution_graph 85543 425ba2 85548 40e360 85543->85548 85545 425bb4 85564 41130a 51 API calls __cinit 85545->85564 85547 425bbe 85565 4115d7 85548->85565 85552 40e421 _wcsncat 85579 413a9e 85552->85579 85555 4115d7 52 API calls 85556 40e45e _wcscpy 85555->85556 85582 40bc70 85556->85582 85560 40e4a9 85560->85545 85561 401c90 52 API calls 85563 40e4a1 _wcscat _wcslen _wcsncpy 85561->85563 85562 4115d7 52 API calls 85562->85563 85563->85560 85563->85561 85563->85562 85564->85547 85568 4115e1 _malloc 85565->85568 85567 40e3ec GetModuleFileNameW 85576 413a0e 85567->85576 85568->85567 85571 4115fd std::exception::exception 85568->85571 85601 4135bb 85568->85601 85569 41163b 85616 4180af 46 API calls std::exception::operator= 85569->85616 85571->85569 85615 41130a 51 API calls __cinit 85571->85615 85572 411645 85617 418105 RaiseException 85572->85617 85575 411656 85624 413801 85576->85624 85654 419efd 85579->85654 85583 4115d7 52 API calls 85582->85583 85584 40bc98 85583->85584 85585 4115d7 52 API calls 85584->85585 85586 40bca6 85585->85586 85587 40e4c0 85586->85587 85666 403350 85587->85666 85589 40e4cb RegOpenKeyExW 85590 427190 RegQueryValueExW 85589->85590 85591 40e4eb 85589->85591 85592 4271b0 85590->85592 85593 42721a RegCloseKey 85590->85593 85591->85563 85594 4115d7 52 API calls 85592->85594 85593->85563 85595 4271cb 85594->85595 85673 43652f 52 API calls 85595->85673 85597 4271d8 RegQueryValueExW 85598 4271f7 85597->85598 85600 42720e 85597->85600 85674 402160 85598->85674 85600->85593 85602 413638 _malloc 85601->85602 85608 4135c9 _malloc 85601->85608 85623 417f77 46 API calls __getptd_noexit 85602->85623 85605 4135f7 RtlAllocateHeap 85605->85608 85614 413630 85605->85614 85607 413624 85621 417f77 46 API calls __getptd_noexit 85607->85621 85608->85605 85608->85607 85611 413622 85608->85611 85612 4135d4 85608->85612 85622 417f77 46 API calls __getptd_noexit 85611->85622 85612->85608 85618 418901 46 API calls __NMSG_WRITE 85612->85618 85619 418752 46 API calls 7 library calls 85612->85619 85620 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 85612->85620 85614->85568 85615->85569 85616->85572 85617->85575 85618->85612 85619->85612 85621->85611 85622->85614 85623->85614 85626 41389e 85624->85626 85631 41381a 85624->85631 85625 4139e8 85651 417f77 46 API calls __getptd_noexit 85625->85651 85626->85625 85628 413a00 85626->85628 85653 417f77 46 API calls __getptd_noexit 85628->85653 85629 4139ed 85652 417f25 10 API calls __cftof_l 85629->85652 85631->85626 85638 41388a 85631->85638 85646 419e30 46 API calls 2 library calls 85631->85646 85634 41396c 85634->85626 85636 413967 85634->85636 85639 41397a 85634->85639 85635 413929 85635->85626 85637 413945 85635->85637 85648 419e30 46 API calls 2 library calls 85635->85648 85636->85552 85637->85626 85637->85636 85642 41395b 85637->85642 85638->85626 85645 413909 85638->85645 85647 419e30 46 API calls 2 library calls 85638->85647 85650 419e30 46 API calls 2 library calls 85639->85650 85649 419e30 46 API calls 2 library calls 85642->85649 85645->85634 85645->85635 85646->85638 85647->85645 85648->85637 85649->85636 85650->85636 85651->85629 85652->85636 85653->85636 85655 419f13 85654->85655 85656 419f0e 85654->85656 85663 417f77 46 API calls __getptd_noexit 85655->85663 85656->85655 85662 419f2b 85656->85662 85660 40e454 85660->85555 85661 419f18 85664 417f25 10 API calls __cftof_l 85661->85664 85662->85660 85665 417f77 46 API calls __getptd_noexit 85662->85665 85663->85661 85664->85660 85665->85661 85667 403367 85666->85667 85668 403358 85666->85668 85669 4115d7 52 API calls 85667->85669 85668->85589 85670 403370 85669->85670 85671 4115d7 52 API calls 85670->85671 85672 40339e 85671->85672 85672->85589 85673->85597 85675 426daa 85674->85675 85676 40216b _wcslen 85674->85676 85689 40c600 85675->85689 85679 402180 85676->85679 85680 40219e 85676->85680 85678 426db5 85678->85600 85687 403bd0 52 API calls moneypunct 85679->85687 85688 4013a0 52 API calls 85680->85688 85683 402187 _memmove 85683->85600 85684 4021a5 85685 426db7 85684->85685 85686 4115d7 52 API calls 85684->85686 85686->85683 85687->85683 85688->85684 85690 40c619 85689->85690 85691 40c60a 85689->85691 85690->85678 85691->85690 85694 4026f0 85691->85694 85693 426d7a _memmove 85693->85678 85695 426873 85694->85695 85696 4026ff 85694->85696 85701 4013a0 52 API calls 85695->85701 85696->85693 85698 42687b 85699 4115d7 52 API calls 85698->85699 85700 42689e _memmove 85699->85700 85700->85693 85701->85698 85702 416454 85739 416c70 85702->85739 85704 416460 GetStartupInfoW 85705 416474 85704->85705 85740 419d5a HeapCreate 85705->85740 85707 4164cd 85708 4164d8 85707->85708 85823 41642b 46 API calls 3 library calls 85707->85823 85741 417c20 GetModuleHandleW 85708->85741 85711 4164de 85712 4164e9 __RTC_Initialize 85711->85712 85824 41642b 46 API calls 3 library calls 85711->85824 85760 41aaa1 GetStartupInfoW 85712->85760 85716 416503 GetCommandLineW 85773 41f584 GetEnvironmentStringsW 85716->85773 85719 416513 85779 41f4d6 GetModuleFileNameW 85719->85779 85722 41651d 85723 416528 85722->85723 85826 411924 46 API calls 3 library calls 85722->85826 85783 41f2a4 85723->85783 85726 41652e 85727 416539 85726->85727 85827 411924 46 API calls 3 library calls 85726->85827 85797 411703 85727->85797 85730 416541 85732 41654c __wwincmdln 85730->85732 85828 411924 46 API calls 3 library calls 85730->85828 85801 40d6b0 85732->85801 85735 41657c 85830 411906 46 API calls _doexit 85735->85830 85738 416581 __fcloseall 85739->85704 85740->85707 85742 417c34 85741->85742 85743 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 85741->85743 85831 4178ff 49 API calls _free 85742->85831 85747 417c87 TlsAlloc 85743->85747 85746 417c39 85746->85711 85748 417cd5 TlsSetValue 85747->85748 85749 417d96 85747->85749 85748->85749 85750 417ce6 __init_pointers 85748->85750 85749->85711 85832 418151 InitializeCriticalSectionAndSpinCount 85750->85832 85752 417d91 85840 4178ff 49 API calls _free 85752->85840 85754 417d2a 85754->85752 85833 416b49 85754->85833 85757 417d76 85839 41793c 46 API calls 4 library calls 85757->85839 85759 417d7e GetCurrentThreadId 85759->85749 85761 416b49 __calloc_crt 46 API calls 85760->85761 85763 41aabf 85761->85763 85762 4164f7 85762->85716 85825 411924 46 API calls 3 library calls 85762->85825 85763->85762 85765 416b49 __calloc_crt 46 API calls 85763->85765 85767 41ac34 85763->85767 85772 41abb4 85763->85772 85764 41ac6a GetStdHandle 85764->85767 85765->85763 85766 41acce SetHandleCount 85766->85762 85767->85764 85767->85766 85768 41ac7c GetFileType 85767->85768 85771 41aca2 InitializeCriticalSectionAndSpinCount 85767->85771 85768->85767 85769 41abe0 GetFileType 85770 41abeb InitializeCriticalSectionAndSpinCount 85769->85770 85769->85772 85770->85762 85770->85772 85771->85762 85771->85767 85772->85767 85772->85769 85772->85770 85774 41f595 85773->85774 85775 41f599 85773->85775 85774->85719 85850 416b04 85775->85850 85777 41f5bb _memmove 85778 41f5c2 FreeEnvironmentStringsW 85777->85778 85778->85719 85780 41f50b _wparse_cmdline 85779->85780 85781 416b04 __malloc_crt 46 API calls 85780->85781 85782 41f54e _wparse_cmdline 85780->85782 85781->85782 85782->85722 85784 41f2bc _wcslen 85783->85784 85788 41f2b4 85783->85788 85785 416b49 __calloc_crt 46 API calls 85784->85785 85790 41f2e0 _wcslen 85785->85790 85786 41f336 85857 413748 85786->85857 85788->85726 85789 416b49 __calloc_crt 46 API calls 85789->85790 85790->85786 85790->85788 85790->85789 85791 41f35c 85790->85791 85794 41f373 85790->85794 85856 41ef12 46 API calls 2 library calls 85790->85856 85792 413748 _free 46 API calls 85791->85792 85792->85788 85863 417ed3 85794->85863 85796 41f37f 85796->85726 85798 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 85797->85798 85800 411750 __IsNonwritableInCurrentImage 85798->85800 85882 41130a 51 API calls __cinit 85798->85882 85800->85730 85802 42e2f3 85801->85802 85803 40d6cc 85801->85803 85883 408f40 85803->85883 85805 40d707 85887 40ebb0 85805->85887 85808 40d737 85890 411951 85808->85890 85813 40d751 85902 40f4e0 SystemParametersInfoW SystemParametersInfoW 85813->85902 85815 40d75f 85903 40d590 GetCurrentDirectoryW 85815->85903 85817 40d767 SystemParametersInfoW 85818 40d78d 85817->85818 85819 408f40 VariantClear 85818->85819 85820 40d79d 85819->85820 85821 408f40 VariantClear 85820->85821 85822 40d7a6 85821->85822 85822->85735 85829 4118da 46 API calls _doexit 85822->85829 85823->85708 85824->85712 85829->85735 85830->85738 85831->85746 85832->85754 85835 416b52 85833->85835 85836 416b8f 85835->85836 85837 416b70 Sleep 85835->85837 85841 41f677 85835->85841 85836->85752 85836->85757 85838 416b85 85837->85838 85838->85835 85838->85836 85839->85759 85840->85749 85842 41f683 85841->85842 85843 41f69e _malloc 85841->85843 85842->85843 85844 41f68f 85842->85844 85846 41f6b1 HeapAlloc 85843->85846 85848 41f6d8 85843->85848 85849 417f77 46 API calls __getptd_noexit 85844->85849 85846->85843 85846->85848 85847 41f694 85847->85835 85848->85835 85849->85847 85853 416b0d 85850->85853 85851 4135bb _malloc 45 API calls 85851->85853 85852 416b43 85852->85777 85853->85851 85853->85852 85854 416b24 Sleep 85853->85854 85855 416b39 85854->85855 85855->85852 85855->85853 85856->85790 85858 41377c _free 85857->85858 85859 413753 RtlFreeHeap 85857->85859 85858->85788 85859->85858 85860 413768 85859->85860 85866 417f77 46 API calls __getptd_noexit 85860->85866 85862 41376e GetLastError 85862->85858 85867 417daa 85863->85867 85866->85862 85868 417dc9 __crtGetStringTypeA_stat __call_reportfault 85867->85868 85869 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 85868->85869 85871 417eb5 __call_reportfault 85869->85871 85873 41a208 85871->85873 85872 417ed1 GetCurrentProcess TerminateProcess 85872->85796 85874 41a210 85873->85874 85875 41a212 IsDebuggerPresent 85873->85875 85874->85872 85881 41fe19 85875->85881 85878 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 85879 421ff0 __call_reportfault 85878->85879 85880 421ff8 GetCurrentProcess TerminateProcess 85878->85880 85879->85880 85880->85872 85881->85878 85882->85800 85884 408f48 moneypunct 85883->85884 85885 4265c7 VariantClear 85884->85885 85886 408f55 moneypunct 85884->85886 85885->85886 85886->85805 85945 40ebd0 85887->85945 85949 4182cb 85890->85949 85892 41195e 85956 4181f2 LeaveCriticalSection 85892->85956 85894 40d748 85895 4119b0 85894->85895 85896 4119d6 85895->85896 85897 4119bc 85895->85897 85896->85813 85897->85896 85991 417f77 46 API calls __getptd_noexit 85897->85991 85899 4119c6 85992 417f25 10 API calls __cftof_l 85899->85992 85901 4119d1 85901->85813 85902->85815 85993 401f20 85903->85993 85905 40d5b6 IsDebuggerPresent 85906 40d5c4 85905->85906 85907 42e1bb MessageBoxA 85905->85907 85908 42e1d4 85906->85908 85909 40d5e3 85906->85909 85907->85908 86081 403a50 52 API calls 3 library calls 85908->86081 86063 40f520 85909->86063 85912 40d5f5 85913 40d5fd GetFullPathNameW 85912->85913 85917 42e1fd 85912->85917 86075 401460 101 API calls _wcscat 85913->86075 85915 40d63b 85916 40d643 85915->85916 85915->85917 85918 40d64c 85916->85918 85919 42e24d 85916->85919 85920 42e231 SetCurrentDirectoryW 85917->85920 86076 410390 16 API calls 85918->86076 86082 432fee 6 API calls 85919->86082 85920->85919 85923 42e252 85923->85918 85925 42e25a GetModuleFileNameW 85923->85925 85924 40d651 86077 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 85924->86077 85927 42e274 85925->85927 85928 42e2cb GetForegroundWindow ShellExecuteW 85925->85928 86083 401b10 85927->86083 85932 40d688 85928->85932 85929 40d656 85931 40d669 85929->85931 86078 40e0c0 74 API calls __crtGetStringTypeA_stat 85929->86078 86079 4091e0 304 API calls moneypunct 85931->86079 85936 40d692 SetCurrentDirectoryW 85932->85936 85936->85817 85938 40d675 85938->85932 86080 401000 Shell_NotifyIconW __crtGetStringTypeA_stat 85938->86080 85939 42e28d 86090 40d200 52 API calls 2 library calls 85939->86090 85942 42e299 GetForegroundWindow ShellExecuteW 85943 42e2c6 85942->85943 85943->85932 85944 40ec00 LoadLibraryA GetProcAddress 85944->85808 85946 40d72e 85945->85946 85947 40ebd6 LoadLibraryA 85945->85947 85946->85808 85946->85944 85947->85946 85948 40ebe7 GetProcAddress 85947->85948 85948->85946 85950 4182e0 85949->85950 85951 4182f3 EnterCriticalSection 85949->85951 85957 418209 85950->85957 85951->85892 85953 4182e6 85953->85951 85984 411924 46 API calls 3 library calls 85953->85984 85956->85894 85958 418215 __fcloseall 85957->85958 85959 418225 85958->85959 85960 41823d 85958->85960 85985 418901 46 API calls __NMSG_WRITE 85959->85985 85963 416b04 __malloc_crt 45 API calls 85960->85963 85968 41824b __fcloseall 85960->85968 85962 41822a 85986 418752 46 API calls 7 library calls 85962->85986 85965 418256 85963->85965 85966 41825d 85965->85966 85967 41826c 85965->85967 85988 417f77 46 API calls __getptd_noexit 85966->85988 85971 4182cb __lock 45 API calls 85967->85971 85968->85953 85969 418231 85987 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 85969->85987 85973 418273 85971->85973 85975 4182a6 85973->85975 85976 41827b InitializeCriticalSectionAndSpinCount 85973->85976 85979 413748 _free 45 API calls 85975->85979 85977 418297 85976->85977 85978 41828b 85976->85978 85990 4182c2 LeaveCriticalSection _doexit 85977->85990 85980 413748 _free 45 API calls 85978->85980 85979->85977 85982 418291 85980->85982 85989 417f77 46 API calls __getptd_noexit 85982->85989 85985->85962 85986->85969 85988->85968 85989->85977 85990->85968 85991->85899 85992->85901 86091 40e6e0 85993->86091 85997 401f41 GetModuleFileNameW 86109 410100 85997->86109 85999 401f5c 86121 410960 85999->86121 86002 401b10 52 API calls 86003 401f81 86002->86003 86124 401980 86003->86124 86005 401f8e 86006 408f40 VariantClear 86005->86006 86007 401f9d 86006->86007 86008 401b10 52 API calls 86007->86008 86009 401fb4 86008->86009 86010 401980 53 API calls 86009->86010 86011 401fc3 86010->86011 86012 401b10 52 API calls 86011->86012 86013 401fd2 86012->86013 86132 40c2c0 86013->86132 86015 401fe1 86016 40bc70 52 API calls 86015->86016 86017 401ff3 86016->86017 86150 401a10 86017->86150 86019 401ffe 86157 4114ab 86019->86157 86022 428b05 86024 401a10 52 API calls 86022->86024 86023 402017 86025 4114ab __wcsicoll 58 API calls 86023->86025 86026 428b18 86024->86026 86027 402022 86025->86027 86029 401a10 52 API calls 86026->86029 86027->86026 86028 40202d 86027->86028 86030 4114ab __wcsicoll 58 API calls 86028->86030 86031 428b33 86029->86031 86032 402038 86030->86032 86034 428b3b GetModuleFileNameW 86031->86034 86033 402043 86032->86033 86032->86034 86036 4114ab __wcsicoll 58 API calls 86033->86036 86035 401a10 52 API calls 86034->86035 86038 428b6c 86035->86038 86037 40204e 86036->86037 86039 402092 86037->86039 86043 401a10 52 API calls 86037->86043 86048 428b90 _wcscpy 86037->86048 86169 40e0a0 52 API calls 86038->86169 86042 4020a3 86039->86042 86039->86048 86041 428b7a 86044 401a10 52 API calls 86041->86044 86045 428bc6 86042->86045 86165 40e830 53 API calls 86042->86165 86046 402073 _wcscpy 86043->86046 86047 428b88 86044->86047 86053 401a10 52 API calls 86046->86053 86047->86048 86050 401a10 52 API calls 86048->86050 86058 4020d0 86050->86058 86051 4020bb 86166 40cf00 53 API calls 86051->86166 86053->86039 86054 4020c6 86055 408f40 VariantClear 86054->86055 86055->86058 86056 402110 86060 408f40 VariantClear 86056->86060 86058->86056 86061 401a10 52 API calls 86058->86061 86167 40cf00 53 API calls 86058->86167 86168 40e6a0 53 API calls 86058->86168 86062 402120 moneypunct 86060->86062 86061->86058 86062->85905 86064 4295c9 __crtGetStringTypeA_stat 86063->86064 86065 40f53c 86063->86065 86068 4295d9 GetOpenFileNameW 86064->86068 86797 410120 86065->86797 86067 40f545 86801 4102b0 SHGetMalloc 86067->86801 86068->86065 86070 40f562 86068->86070 86070->85912 86071 40f54c 86806 410190 GetFullPathNameW 86071->86806 86073 40f559 86817 40f570 86073->86817 86075->85915 86076->85924 86077->85929 86078->85931 86079->85938 86080->85932 86081->85917 86082->85923 86084 401b16 _wcslen 86083->86084 86085 4115d7 52 API calls 86084->86085 86088 401b63 86084->86088 86086 401b4b _memmove 86085->86086 86087 4115d7 52 API calls 86086->86087 86087->86088 86089 40d200 52 API calls 2 library calls 86088->86089 86089->85939 86090->85942 86092 40bc70 52 API calls 86091->86092 86093 401f31 86092->86093 86094 402560 86093->86094 86095 40256d __write_nolock 86094->86095 86096 402160 52 API calls 86095->86096 86098 402593 86096->86098 86106 4025bd 86098->86106 86170 401c90 86098->86170 86099 4026f0 52 API calls 86099->86106 86100 4026db 86100->85997 86101 401b10 52 API calls 86103 4026d1 86101->86103 86102 401b10 52 API calls 86102->86106 86174 40d7c0 52 API calls 2 library calls 86103->86174 86106->86099 86106->86102 86107 4026a7 86106->86107 86108 401c90 52 API calls 86106->86108 86173 40d7c0 52 API calls 2 library calls 86106->86173 86107->86100 86107->86101 86108->86106 86175 40f760 86109->86175 86112 410118 86112->85999 86114 42805d 86115 42806a 86114->86115 86231 431e58 86114->86231 86116 413748 _free 46 API calls 86115->86116 86118 428078 86116->86118 86119 431e58 82 API calls 86118->86119 86120 428084 86119->86120 86120->85999 86122 4115d7 52 API calls 86121->86122 86123 401f74 86122->86123 86123->86002 86125 4019a3 86124->86125 86129 401985 86124->86129 86126 4019b8 86125->86126 86125->86129 86786 403e10 53 API calls 86126->86786 86128 40199f 86128->86005 86129->86128 86785 403e10 53 API calls 86129->86785 86131 4019c4 86131->86005 86133 40c2c7 86132->86133 86134 40c30e 86132->86134 86137 40c2d3 86133->86137 86138 426c79 86133->86138 86135 40c315 86134->86135 86136 426c2b 86134->86136 86139 40c321 86135->86139 86140 426c5a 86135->86140 86142 426c4b 86136->86142 86143 426c2e 86136->86143 86787 403ea0 52 API calls __cinit 86137->86787 86792 4534e3 52 API calls 86138->86792 86788 403ea0 52 API calls __cinit 86139->86788 86791 4534e3 52 API calls 86140->86791 86790 4534e3 52 API calls 86142->86790 86149 40c2de 86143->86149 86789 4534e3 52 API calls 86143->86789 86149->86015 86149->86149 86151 401a30 86150->86151 86152 401a17 86150->86152 86153 402160 52 API calls 86151->86153 86154 401a2d 86152->86154 86793 403c30 52 API calls _memmove 86152->86793 86156 401a3d 86153->86156 86154->86019 86156->86019 86158 411523 86157->86158 86159 4114ba 86157->86159 86796 4113a8 58 API calls 4 library calls 86158->86796 86164 40200c 86159->86164 86794 417f77 46 API calls __getptd_noexit 86159->86794 86162 4114c6 86795 417f25 10 API calls __cftof_l 86162->86795 86164->86022 86164->86023 86165->86051 86166->86054 86167->86058 86168->86058 86169->86041 86171 4026f0 52 API calls 86170->86171 86172 401c97 86171->86172 86172->86098 86173->86106 86174->86100 86235 40f6f0 86175->86235 86177 40f77b _strcat moneypunct 86243 40f850 86177->86243 86182 427c2a 86272 414d04 86182->86272 86184 40f7fc 86184->86182 86186 40f804 86184->86186 86259 414a46 86186->86259 86190 40f80e 86190->86112 86194 4528bd 86190->86194 86191 427c59 86278 414fe2 86191->86278 86193 427c79 86195 4150d1 _fseek 81 API calls 86194->86195 86196 452930 86195->86196 86778 452719 86196->86778 86199 452948 86199->86114 86200 414d04 __fread_nolock 61 API calls 86201 452966 86200->86201 86202 414d04 __fread_nolock 61 API calls 86201->86202 86203 452976 86202->86203 86204 414d04 __fread_nolock 61 API calls 86203->86204 86205 45298f 86204->86205 86206 414d04 __fread_nolock 61 API calls 86205->86206 86207 4529aa 86206->86207 86208 4150d1 _fseek 81 API calls 86207->86208 86209 4529c4 86208->86209 86210 4135bb _malloc 46 API calls 86209->86210 86211 4529cf 86210->86211 86212 4135bb _malloc 46 API calls 86211->86212 86213 4529db 86212->86213 86214 414d04 __fread_nolock 61 API calls 86213->86214 86215 4529ec 86214->86215 86216 44afef GetSystemTimeAsFileTime 86215->86216 86217 452a00 86216->86217 86218 452a36 86217->86218 86219 452a13 86217->86219 86221 452aa5 86218->86221 86222 452a3c 86218->86222 86220 413748 _free 46 API calls 86219->86220 86223 452a1c 86220->86223 86225 413748 _free 46 API calls 86221->86225 86784 44b1a9 117 API calls __fcloseall 86222->86784 86226 413748 _free 46 API calls 86223->86226 86228 452aa3 86225->86228 86229 452a25 86226->86229 86227 452a9d 86230 413748 _free 46 API calls 86227->86230 86228->86114 86229->86114 86230->86228 86232 431e64 86231->86232 86233 431e6a 86231->86233 86234 414a46 __fcloseall 82 API calls 86232->86234 86233->86115 86234->86233 86236 425de2 86235->86236 86237 40f6fc _wcslen 86235->86237 86236->86177 86238 40f710 WideCharToMultiByte 86237->86238 86239 40f756 86238->86239 86240 40f728 86238->86240 86239->86177 86241 4115d7 52 API calls 86240->86241 86242 40f735 WideCharToMultiByte 86241->86242 86242->86177 86244 40f85d __crtGetStringTypeA_stat _strlen 86243->86244 86246 40f7ab 86244->86246 86291 414db8 86244->86291 86247 4149c2 86246->86247 86306 414904 86247->86306 86249 40f7e9 86249->86182 86250 40f5c0 86249->86250 86254 40f5cd _strcat __write_nolock _memmove 86250->86254 86251 414d04 __fread_nolock 61 API calls 86251->86254 86253 425d11 86255 4150d1 _fseek 81 API calls 86253->86255 86254->86251 86254->86253 86258 40f691 __tzset_nolock 86254->86258 86394 4150d1 86254->86394 86256 425d33 86255->86256 86257 414d04 __fread_nolock 61 API calls 86256->86257 86257->86258 86258->86184 86260 414a52 __fcloseall 86259->86260 86261 414a64 86260->86261 86262 414a79 86260->86262 86534 417f77 46 API calls __getptd_noexit 86261->86534 86264 415471 __lock_file 47 API calls 86262->86264 86269 414a74 __fcloseall 86262->86269 86266 414a92 86264->86266 86265 414a69 86535 417f25 10 API calls __cftof_l 86265->86535 86518 4149d9 86266->86518 86269->86190 86603 414c76 86272->86603 86274 414d1c 86275 44afef 86274->86275 86771 442c5a 86275->86771 86277 44b00d 86277->86191 86279 414fee __fcloseall 86278->86279 86280 414ffa 86279->86280 86281 41500f 86279->86281 86775 417f77 46 API calls __getptd_noexit 86280->86775 86283 415471 __lock_file 47 API calls 86281->86283 86285 415017 86283->86285 86284 414fff 86776 417f25 10 API calls __cftof_l 86284->86776 86287 414e4e __ftell_nolock 51 API calls 86285->86287 86288 415024 86287->86288 86777 41503d LeaveCriticalSection LeaveCriticalSection _fseek 86288->86777 86290 41500a __fcloseall 86290->86193 86292 414dd6 86291->86292 86293 414deb 86291->86293 86302 417f77 46 API calls __getptd_noexit 86292->86302 86293->86292 86295 414df2 86293->86295 86304 41b91b 79 API calls 11 library calls 86295->86304 86296 414ddb 86303 417f25 10 API calls __cftof_l 86296->86303 86299 414e18 86300 414de6 86299->86300 86305 418f98 77 API calls 4 library calls 86299->86305 86300->86244 86302->86296 86303->86300 86304->86299 86305->86300 86309 414910 __fcloseall 86306->86309 86307 414923 86362 417f77 46 API calls __getptd_noexit 86307->86362 86309->86307 86311 414951 86309->86311 86310 414928 86363 417f25 10 API calls __cftof_l 86310->86363 86325 41d4d1 86311->86325 86314 414956 86315 41496a 86314->86315 86316 41495d 86314->86316 86317 414992 86315->86317 86318 414972 86315->86318 86364 417f77 46 API calls __getptd_noexit 86316->86364 86342 41d218 86317->86342 86365 417f77 46 API calls __getptd_noexit 86318->86365 86322 414933 __fcloseall @_EH4_CallFilterFunc@8 86322->86249 86326 41d4dd __fcloseall 86325->86326 86327 4182cb __lock 46 API calls 86326->86327 86328 41d4eb 86327->86328 86329 41d567 86328->86329 86337 418209 __mtinitlocknum 46 API calls 86328->86337 86340 41d560 86328->86340 86370 4154b2 47 API calls __lock 86328->86370 86371 415520 LeaveCriticalSection LeaveCriticalSection _doexit 86328->86371 86331 416b04 __malloc_crt 46 API calls 86329->86331 86333 41d56e 86331->86333 86332 41d5f0 __fcloseall 86332->86314 86334 41d57c InitializeCriticalSectionAndSpinCount 86333->86334 86333->86340 86335 41d59c 86334->86335 86336 41d5af EnterCriticalSection 86334->86336 86339 413748 _free 46 API calls 86335->86339 86336->86340 86337->86328 86339->86340 86367 41d5fb 86340->86367 86344 41d23a 86342->86344 86343 41d26c __wopenfile 86348 41d47a 86343->86348 86361 41d421 86343->86361 86378 41341f 58 API calls 3 library calls 86343->86378 86344->86343 86345 41d255 86344->86345 86376 417f77 46 API calls __getptd_noexit 86345->86376 86347 41d25a 86377 417f25 10 API calls __cftof_l 86347->86377 86381 417f77 46 API calls __getptd_noexit 86348->86381 86349 41d48c 86373 422bf9 86349->86373 86353 41d47f 86382 417f25 10 API calls __cftof_l 86353->86382 86355 41499d 86366 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 86355->86366 86357 41d41a 86357->86361 86379 41341f 58 API calls 3 library calls 86357->86379 86359 41d439 86359->86361 86380 41341f 58 API calls 3 library calls 86359->86380 86361->86348 86361->86349 86362->86310 86363->86322 86364->86322 86365->86322 86366->86322 86372 4181f2 LeaveCriticalSection 86367->86372 86369 41d602 86369->86332 86370->86328 86371->86328 86372->86369 86383 422b35 86373->86383 86375 422c14 86375->86355 86376->86347 86377->86355 86378->86357 86379->86359 86380->86361 86381->86353 86382->86355 86384 422b41 __fcloseall 86383->86384 86385 422b54 86384->86385 86388 422b8a 86384->86388 86386 417f77 __flsbuf 46 API calls 86385->86386 86387 422b59 86386->86387 86389 417f25 __cftof_l 10 API calls 86387->86389 86390 422400 __tsopen_nolock 109 API calls 86388->86390 86393 422b63 __fcloseall 86389->86393 86391 422ba4 86390->86391 86392 422bcb __wsopen_helper LeaveCriticalSection 86391->86392 86392->86393 86393->86375 86397 4150dd __fcloseall 86394->86397 86395 4150e9 86425 417f77 46 API calls __getptd_noexit 86395->86425 86397->86395 86398 41510f 86397->86398 86407 415471 86398->86407 86399 4150ee 86426 417f25 10 API calls __cftof_l 86399->86426 86406 4150f9 __fcloseall 86406->86254 86408 415483 86407->86408 86409 4154a5 EnterCriticalSection 86407->86409 86408->86409 86410 41548b 86408->86410 86412 415117 86409->86412 86411 4182cb __lock 46 API calls 86410->86411 86411->86412 86413 415047 86412->86413 86414 415067 86413->86414 86415 415057 86413->86415 86420 415079 86414->86420 86428 414e4e 86414->86428 86483 417f77 46 API calls __getptd_noexit 86415->86483 86419 41505c 86427 415143 LeaveCriticalSection LeaveCriticalSection _fseek 86419->86427 86445 41443c 86420->86445 86423 4150b9 86458 41e1f4 86423->86458 86425->86399 86426->86406 86427->86406 86429 414e61 86428->86429 86430 414e79 86428->86430 86484 417f77 46 API calls __getptd_noexit 86429->86484 86431 414139 __flsbuf 46 API calls 86430->86431 86434 414e80 86431->86434 86433 414e66 86485 417f25 10 API calls __cftof_l 86433->86485 86436 41e1f4 __write 51 API calls 86434->86436 86437 414e97 86436->86437 86438 414f09 86437->86438 86440 414ec9 86437->86440 86444 414e71 86437->86444 86486 417f77 46 API calls __getptd_noexit 86438->86486 86441 41e1f4 __write 51 API calls 86440->86441 86440->86444 86442 414f64 86441->86442 86443 41e1f4 __write 51 API calls 86442->86443 86442->86444 86443->86444 86444->86420 86446 414455 86445->86446 86450 414477 86445->86450 86447 414139 __flsbuf 46 API calls 86446->86447 86446->86450 86448 414470 86447->86448 86487 41b7b2 77 API calls 7 library calls 86448->86487 86451 414139 86450->86451 86452 414145 86451->86452 86453 41415a 86451->86453 86488 417f77 46 API calls __getptd_noexit 86452->86488 86453->86423 86455 41414a 86489 417f25 10 API calls __cftof_l 86455->86489 86457 414155 86457->86423 86459 41e200 __fcloseall 86458->86459 86460 41e223 86459->86460 86461 41e208 86459->86461 86463 41e22f 86460->86463 86467 41e269 86460->86467 86510 417f8a 46 API calls __getptd_noexit 86461->86510 86512 417f8a 46 API calls __getptd_noexit 86463->86512 86465 41e20d 86511 417f77 46 API calls __getptd_noexit 86465->86511 86466 41e234 86513 417f77 46 API calls __getptd_noexit 86466->86513 86490 41ae56 86467->86490 86471 41e23c 86514 417f25 10 API calls __cftof_l 86471->86514 86472 41e26f 86474 41e291 86472->86474 86475 41e27d 86472->86475 86515 417f77 46 API calls __getptd_noexit 86474->86515 86500 41e17f 86475->86500 86478 41e215 __fcloseall 86478->86419 86479 41e289 86517 41e2c0 LeaveCriticalSection __unlock_fhandle 86479->86517 86480 41e296 86516 417f8a 46 API calls __getptd_noexit 86480->86516 86483->86419 86484->86433 86485->86444 86486->86444 86487->86450 86488->86455 86489->86457 86491 41ae62 __fcloseall 86490->86491 86492 41aebc 86491->86492 86493 4182cb __lock 46 API calls 86491->86493 86494 41aec1 EnterCriticalSection 86492->86494 86495 41aede __fcloseall 86492->86495 86496 41ae8e 86493->86496 86494->86495 86495->86472 86497 41aeaa 86496->86497 86498 41ae97 InitializeCriticalSectionAndSpinCount 86496->86498 86499 41aeec ___lock_fhandle LeaveCriticalSection 86497->86499 86498->86497 86499->86492 86501 41aded __lseeki64_nolock 46 API calls 86500->86501 86502 41e18e 86501->86502 86503 41e1a4 SetFilePointer 86502->86503 86504 41e194 86502->86504 86506 41e1c3 86503->86506 86507 41e1bb GetLastError 86503->86507 86505 417f77 __flsbuf 46 API calls 86504->86505 86508 41e199 86505->86508 86506->86508 86509 417f9d __dosmaperr 46 API calls 86506->86509 86507->86506 86508->86479 86509->86508 86510->86465 86511->86478 86512->86466 86513->86471 86514->86478 86515->86480 86516->86479 86517->86478 86519 4149ea 86518->86519 86520 4149fe 86518->86520 86564 417f77 46 API calls __getptd_noexit 86519->86564 86521 4149fa 86520->86521 86523 41443c __flush 77 API calls 86520->86523 86536 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 86521->86536 86525 414a0a 86523->86525 86524 4149ef 86565 417f25 10 API calls __cftof_l 86524->86565 86537 41d8c2 86525->86537 86529 414139 __flsbuf 46 API calls 86530 414a18 86529->86530 86541 41d7fe 86530->86541 86532 414a1e 86532->86521 86533 413748 _free 46 API calls 86532->86533 86533->86521 86534->86265 86535->86269 86536->86269 86538 41d8d2 86537->86538 86540 414a12 86537->86540 86539 413748 _free 46 API calls 86538->86539 86538->86540 86539->86540 86540->86529 86542 41d80a __fcloseall 86541->86542 86543 41d812 86542->86543 86544 41d82d 86542->86544 86581 417f8a 46 API calls __getptd_noexit 86543->86581 86545 41d839 86544->86545 86551 41d873 86544->86551 86583 417f8a 46 API calls __getptd_noexit 86545->86583 86548 41d817 86582 417f77 46 API calls __getptd_noexit 86548->86582 86550 41d83e 86584 417f77 46 API calls __getptd_noexit 86550->86584 86553 41ae56 ___lock_fhandle 48 API calls 86551->86553 86555 41d879 86553->86555 86554 41d846 86585 417f25 10 API calls __cftof_l 86554->86585 86556 41d893 86555->86556 86557 41d887 86555->86557 86586 417f77 46 API calls __getptd_noexit 86556->86586 86566 41d762 86557->86566 86558 41d81f __fcloseall 86558->86532 86562 41d88d 86587 41d8ba LeaveCriticalSection __unlock_fhandle 86562->86587 86564->86524 86565->86521 86588 41aded 86566->86588 86568 41d7c8 86601 41ad67 47 API calls 2 library calls 86568->86601 86570 41d772 86570->86568 86571 41d7a6 86570->86571 86573 41aded __lseeki64_nolock 46 API calls 86570->86573 86571->86568 86574 41aded __lseeki64_nolock 46 API calls 86571->86574 86572 41d7d0 86575 41d7f2 86572->86575 86602 417f9d 46 API calls 3 library calls 86572->86602 86576 41d79d 86573->86576 86577 41d7b2 CloseHandle 86574->86577 86575->86562 86579 41aded __lseeki64_nolock 46 API calls 86576->86579 86577->86568 86580 41d7be GetLastError 86577->86580 86579->86571 86580->86568 86581->86548 86582->86558 86583->86550 86584->86554 86585->86558 86586->86562 86587->86558 86589 41ae12 86588->86589 86590 41adfa 86588->86590 86592 417f8a __set_osfhnd 46 API calls 86589->86592 86595 41ae51 86589->86595 86591 417f8a __set_osfhnd 46 API calls 86590->86591 86593 41adff 86591->86593 86594 41ae23 86592->86594 86596 417f77 __flsbuf 46 API calls 86593->86596 86597 417f77 __flsbuf 46 API calls 86594->86597 86595->86570 86598 41ae07 86596->86598 86599 41ae2b 86597->86599 86598->86570 86600 417f25 __cftof_l 10 API calls 86599->86600 86600->86598 86601->86572 86602->86575 86604 414c82 __fcloseall 86603->86604 86605 414cc3 86604->86605 86606 414c96 __crtGetStringTypeA_stat 86604->86606 86607 414cbb __fcloseall 86604->86607 86608 415471 __lock_file 47 API calls 86605->86608 86630 417f77 46 API calls __getptd_noexit 86606->86630 86607->86274 86609 414ccb 86608->86609 86616 414aba 86609->86616 86612 414cb0 86631 417f25 10 API calls __cftof_l 86612->86631 86617 414af2 86616->86617 86620 414ad8 __crtGetStringTypeA_stat 86616->86620 86632 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 86617->86632 86618 414ae2 86683 417f77 46 API calls __getptd_noexit 86618->86683 86620->86617 86620->86618 86623 414b2d 86620->86623 86623->86617 86624 414139 __flsbuf 46 API calls 86623->86624 86627 414c38 __crtGetStringTypeA_stat 86623->86627 86633 41dfcc 86623->86633 86663 41d8f3 86623->86663 86685 41e0c2 46 API calls 4 library calls 86623->86685 86624->86623 86686 417f77 46 API calls __getptd_noexit 86627->86686 86629 414ae7 86684 417f25 10 API calls __cftof_l 86629->86684 86630->86612 86631->86607 86632->86607 86634 41dfd8 __fcloseall 86633->86634 86635 41dfe0 86634->86635 86636 41dffb 86634->86636 86756 417f8a 46 API calls __getptd_noexit 86635->86756 86638 41e007 86636->86638 86642 41e041 86636->86642 86758 417f8a 46 API calls __getptd_noexit 86638->86758 86639 41dfe5 86757 417f77 46 API calls __getptd_noexit 86639->86757 86641 41e00c 86759 417f77 46 API calls __getptd_noexit 86641->86759 86645 41e063 86642->86645 86646 41e04e 86642->86646 86649 41ae56 ___lock_fhandle 48 API calls 86645->86649 86761 417f8a 46 API calls __getptd_noexit 86646->86761 86647 41e014 86760 417f25 10 API calls __cftof_l 86647->86760 86651 41e069 86649->86651 86650 41e053 86762 417f77 46 API calls __getptd_noexit 86650->86762 86652 41e077 86651->86652 86653 41e08b 86651->86653 86687 41da15 86652->86687 86763 417f77 46 API calls __getptd_noexit 86653->86763 86656 41dfed __fcloseall 86656->86623 86659 41e083 86765 41e0ba LeaveCriticalSection __unlock_fhandle 86659->86765 86660 41e090 86764 417f8a 46 API calls __getptd_noexit 86660->86764 86664 41d900 86663->86664 86665 41d915 86663->86665 86769 417f77 46 API calls __getptd_noexit 86664->86769 86669 41d94a 86665->86669 86677 41d910 86665->86677 86766 420603 86665->86766 86667 41d905 86770 417f25 10 API calls __cftof_l 86667->86770 86671 414139 __flsbuf 46 API calls 86669->86671 86672 41d95e 86671->86672 86673 41dfcc __read 59 API calls 86672->86673 86674 41d965 86673->86674 86675 414139 __flsbuf 46 API calls 86674->86675 86674->86677 86676 41d988 86675->86676 86676->86677 86678 414139 __flsbuf 46 API calls 86676->86678 86677->86623 86679 41d994 86678->86679 86679->86677 86680 414139 __flsbuf 46 API calls 86679->86680 86681 41d9a1 86680->86681 86682 414139 __flsbuf 46 API calls 86681->86682 86682->86677 86683->86629 86684->86617 86685->86623 86686->86629 86688 41da31 86687->86688 86689 41da4c 86687->86689 86691 417f8a __set_osfhnd 46 API calls 86688->86691 86690 41da5b 86689->86690 86692 41da7a 86689->86692 86693 417f8a __set_osfhnd 46 API calls 86690->86693 86694 41da36 86691->86694 86696 41da98 86692->86696 86707 41daac 86692->86707 86695 41da60 86693->86695 86697 417f77 __flsbuf 46 API calls 86694->86697 86699 417f77 __flsbuf 46 API calls 86695->86699 86700 417f8a __set_osfhnd 46 API calls 86696->86700 86708 41da3e 86697->86708 86698 41db02 86702 417f8a __set_osfhnd 46 API calls 86698->86702 86701 41da67 86699->86701 86703 41da9d 86700->86703 86704 417f25 __cftof_l 10 API calls 86701->86704 86705 41db07 86702->86705 86706 417f77 __flsbuf 46 API calls 86703->86706 86704->86708 86709 417f77 __flsbuf 46 API calls 86705->86709 86710 41daa4 86706->86710 86707->86698 86707->86708 86711 41dae1 86707->86711 86713 41db1b 86707->86713 86708->86659 86709->86710 86712 417f25 __cftof_l 10 API calls 86710->86712 86711->86698 86716 41daec ReadFile 86711->86716 86712->86708 86715 416b04 __malloc_crt 46 API calls 86713->86715 86717 41db31 86715->86717 86718 41dc17 86716->86718 86719 41df8f GetLastError 86716->86719 86722 41db59 86717->86722 86723 41db3b 86717->86723 86718->86719 86726 41dc2b 86718->86726 86720 41de16 86719->86720 86721 41df9c 86719->86721 86730 417f9d __dosmaperr 46 API calls 86720->86730 86750 41dd9b 86720->86750 86724 417f77 __flsbuf 46 API calls 86721->86724 86727 420494 __lseeki64_nolock 48 API calls 86722->86727 86725 417f77 __flsbuf 46 API calls 86723->86725 86728 41dfa1 86724->86728 86729 41db40 86725->86729 86735 41dc47 86726->86735 86736 41de5b 86726->86736 86726->86750 86731 41db67 86727->86731 86732 417f8a __set_osfhnd 46 API calls 86728->86732 86733 417f8a __set_osfhnd 46 API calls 86729->86733 86730->86750 86731->86716 86732->86750 86733->86708 86734 413748 _free 46 API calls 86734->86708 86737 41dcab ReadFile 86735->86737 86743 41dd28 86735->86743 86738 41ded0 ReadFile 86736->86738 86736->86750 86741 41dcc9 GetLastError 86737->86741 86746 41dcd3 86737->86746 86739 41deef GetLastError 86738->86739 86753 41def9 86738->86753 86739->86736 86739->86753 86740 41ddec MultiByteToWideChar 86742 41de10 GetLastError 86740->86742 86740->86750 86741->86735 86741->86746 86742->86720 86744 41dda3 86743->86744 86745 41dd96 86743->86745 86743->86750 86754 41dd60 86743->86754 86751 41ddda 86744->86751 86744->86754 86747 417f77 __flsbuf 46 API calls 86745->86747 86746->86735 86748 420494 __lseeki64_nolock 48 API calls 86746->86748 86747->86750 86748->86746 86749 420494 __lseeki64_nolock 48 API calls 86749->86753 86750->86708 86750->86734 86752 420494 __lseeki64_nolock 48 API calls 86751->86752 86755 41dde9 86752->86755 86753->86736 86753->86749 86754->86740 86755->86740 86756->86639 86757->86656 86758->86641 86759->86647 86760->86656 86761->86650 86762->86647 86763->86660 86764->86659 86765->86656 86767 416b04 __malloc_crt 46 API calls 86766->86767 86768 420618 86767->86768 86768->86669 86769->86667 86770->86677 86774 4148b3 GetSystemTimeAsFileTime __aulldiv 86771->86774 86773 442c6b 86773->86277 86774->86773 86775->86284 86776->86290 86777->86290 86783 45272f __tzset_nolock _wcscpy 86778->86783 86779 414d04 61 API calls __fread_nolock 86779->86783 86780 44afef GetSystemTimeAsFileTime 86780->86783 86781 4528a4 86781->86199 86781->86200 86782 4150d1 81 API calls _fseek 86782->86783 86783->86779 86783->86780 86783->86781 86783->86782 86784->86227 86785->86128 86786->86131 86787->86149 86788->86149 86789->86149 86790->86140 86791->86149 86792->86149 86793->86154 86794->86162 86795->86164 86796->86164 86844 410160 86797->86844 86799 41012f GetFullPathNameW 86800 410147 moneypunct 86799->86800 86800->86067 86802 4102cb SHGetDesktopFolder 86801->86802 86805 410333 _wcsncpy 86801->86805 86803 4102e0 _wcsncpy 86802->86803 86802->86805 86804 41031c SHGetPathFromIDListW 86803->86804 86803->86805 86804->86805 86805->86071 86807 4101bb 86806->86807 86814 425f4a 86806->86814 86808 410160 52 API calls 86807->86808 86810 4101c7 86808->86810 86809 4114ab __wcsicoll 58 API calls 86809->86814 86848 410200 52 API calls 2 library calls 86810->86848 86812 4101d6 86849 410200 52 API calls 2 library calls 86812->86849 86813 425f6e 86813->86073 86814->86809 86814->86813 86816 4101e9 86816->86073 86818 40f760 128 API calls 86817->86818 86819 40f584 86818->86819 86820 429335 86819->86820 86821 40f58c 86819->86821 86824 4528bd 118 API calls 86820->86824 86822 40f598 86821->86822 86823 429358 86821->86823 86855 4033c0 113 API calls 7 library calls 86822->86855 86850 434034 GetModuleHandleW LoadStringW GetModuleHandleW LoadStringW 86823->86850 86826 42934b 86824->86826 86829 429369 86826->86829 86830 431e58 82 API calls 86826->86830 86828 40f5b4 86828->86070 86831 4115d7 52 API calls 86829->86831 86830->86823 86843 4293c5 moneypunct 86831->86843 86832 42959c 86833 413748 _free 46 API calls 86832->86833 86834 4295a5 86833->86834 86835 431e58 82 API calls 86834->86835 86836 4295b1 86835->86836 86840 401b10 52 API calls 86840->86843 86843->86832 86843->86840 86856 444af8 52 API calls _memmove 86843->86856 86857 44c7dd 64 API calls 3 library calls 86843->86857 86858 44b41c 52 API calls 86843->86858 86859 402780 52 API calls 2 library calls 86843->86859 86860 4022d0 52 API calls moneypunct 86843->86860 86845 410167 _wcslen 86844->86845 86846 4115d7 52 API calls 86845->86846 86847 41017e _wcscpy 86846->86847 86847->86799 86848->86812 86849->86816 86851 4340aa MessageBoxW 86850->86851 86852 434088 86850->86852 86851->86829 86861 413abe 81 API calls 8 library calls 86852->86861 86854 4340a6 86854->86829 86855->86828 86856->86843 86857->86843 86858->86843 86859->86843 86860->86843 86861->86854 86862 425b2b 86867 40f000 86862->86867 86866 425b3a 86868 4115d7 52 API calls 86867->86868 86869 40f007 86868->86869 86870 4276ea 86869->86870 86876 40f030 86869->86876 86875 41130a 51 API calls __cinit 86875->86866 86877 40f039 86876->86877 86878 40f01a 86876->86878 86906 41130a 51 API calls __cinit 86877->86906 86880 40e500 86878->86880 86881 40bc70 52 API calls 86880->86881 86882 40e515 GetVersionExW 86881->86882 86883 402160 52 API calls 86882->86883 86884 40e557 86883->86884 86907 40e660 86884->86907 86889 427674 86894 4276c6 GetSystemInfo 86889->86894 86892 40e5e0 86896 4276d5 GetSystemInfo 86892->86896 86921 40efd0 86892->86921 86893 40e5cd GetCurrentProcess 86928 40ef20 LoadLibraryA GetProcAddress 86893->86928 86894->86896 86899 40e629 86925 40ef90 86899->86925 86902 40e641 FreeLibrary 86903 40e644 86902->86903 86904 40e653 FreeLibrary 86903->86904 86905 40e656 86903->86905 86904->86905 86905->86875 86906->86878 86908 40e667 86907->86908 86909 42761d 86908->86909 86910 40c600 52 API calls 86908->86910 86911 40e55c 86910->86911 86912 40e680 86911->86912 86913 40e687 86912->86913 86914 427616 86913->86914 86915 40c600 52 API calls 86913->86915 86916 40e566 86915->86916 86916->86889 86917 40ef60 86916->86917 86918 40e5c8 86917->86918 86919 40ef66 LoadLibraryA 86917->86919 86918->86892 86918->86893 86919->86918 86920 40ef77 GetProcAddress 86919->86920 86920->86918 86922 40e620 86921->86922 86923 40efd6 LoadLibraryA 86921->86923 86922->86894 86922->86899 86923->86922 86924 40efe7 GetProcAddress 86923->86924 86924->86922 86929 40efb0 LoadLibraryA GetProcAddress 86925->86929 86927 40e632 GetNativeSystemInfo 86927->86902 86927->86903 86928->86892 86929->86927 86930 425b5e 86935 40c7f0 86930->86935 86934 425b6d 86970 40db10 52 API calls 86935->86970 86937 40c82a 86971 410ab0 6 API calls 86937->86971 86939 40c86d 86940 40bc70 52 API calls 86939->86940 86941 40c877 86940->86941 86942 40bc70 52 API calls 86941->86942 86943 40c881 86942->86943 86944 40bc70 52 API calls 86943->86944 86945 40c88b 86944->86945 86946 40bc70 52 API calls 86945->86946 86947 40c8d1 86946->86947 86948 40bc70 52 API calls 86947->86948 86949 40c991 86948->86949 86972 40d2c0 52 API calls 86949->86972 86951 40c99b 86973 40d0d0 53 API calls 86951->86973 86953 40c9c1 86954 40bc70 52 API calls 86953->86954 86955 40c9cb 86954->86955 86974 40e310 53 API calls 86955->86974 86957 40ca28 86958 408f40 VariantClear 86957->86958 86959 40ca30 86958->86959 86960 408f40 VariantClear 86959->86960 86961 40ca38 GetStdHandle 86960->86961 86962 429630 86961->86962 86963 40ca87 86961->86963 86962->86963 86964 429639 86962->86964 86969 41130a 51 API calls __cinit 86963->86969 86975 4432c0 57 API calls 86964->86975 86966 429641 86976 44b6ab CreateThread 86966->86976 86968 42964f CloseHandle 86968->86963 86969->86934 86970->86937 86971->86939 86972->86951 86973->86953 86974->86957 86975->86966 86976->86968 86977 44b5cb 58 API calls 86976->86977 86978 425b6f 86983 40dc90 86978->86983 86982 425b7e 86984 40bc70 52 API calls 86983->86984 86985 40dd03 86984->86985 86992 40f210 86985->86992 86987 426a97 86989 40dd96 86989->86987 86990 40ddb7 86989->86990 86995 40dc00 52 API calls 2 library calls 86989->86995 86991 41130a 51 API calls __cinit 86990->86991 86991->86982 86996 40f250 RegOpenKeyExW 86992->86996 86994 40f230 86994->86989 86995->86989 86997 425e17 86996->86997 86998 40f275 RegQueryValueExW 86996->86998 86997->86994 86999 40f2c3 RegCloseKey 86998->86999 87000 40f298 86998->87000 86999->86994 87001 40f2a9 RegCloseKey 87000->87001 87002 425e1d 87000->87002 87001->86994

    Control-flow Graph

    APIs
    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
      • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
      • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
    • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
    • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
      • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
    • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
    • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
      • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
      • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
      • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
      • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
      • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
      • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
    Strings
    • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
    • runas, xrefs: 0042E2AD, 0042E2DC
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
    • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
    • API String ID: 2495805114-3383388033
    • Opcode ID: e632c6ee4617dbfd75e0ed3d3f087477aad7453696fc977a02cf57d713d1418d
    • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
    • Opcode Fuzzy Hash: e632c6ee4617dbfd75e0ed3d3f087477aad7453696fc977a02cf57d713d1418d
    • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 284 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 293 40e582-40e583 284->293 294 427674-427679 284->294 297 40e585-40e596 293->297 298 40e5ba-40e5cb call 40ef60 293->298 295 427683-427686 294->295 296 42767b-427681 294->296 300 427693-427696 295->300 301 427688-427691 295->301 299 4276b4-4276be 296->299 302 427625-427629 297->302 303 40e59c-40e59f 297->303 311 40e5ec-40e60c 298->311 312 40e5cd-40e5e6 GetCurrentProcess call 40ef20 298->312 313 4276c6-4276ca GetSystemInfo 299->313 300->299 310 427698-4276a8 300->310 301->299 306 427636-427640 302->306 307 42762b-427631 302->307 308 40e5a5-40e5ae 303->308 309 427654-427657 303->309 306->298 307->298 315 40e5b4 308->315 316 427645-42764f 308->316 309->298 314 42765d-42766f 309->314 317 4276b0 310->317 318 4276aa-4276ae 310->318 320 40e612-40e623 call 40efd0 311->320 321 4276d5-4276df GetSystemInfo 311->321 312->311 327 40e5e8 312->327 313->321 314->298 315->298 316->298 317->299 318->299 320->313 326 40e629-40e63f call 40ef90 GetNativeSystemInfo 320->326 330 40e641-40e642 FreeLibrary 326->330 331 40e644-40e651 326->331 327->311 330->331 332 40e653-40e654 FreeLibrary 331->332 333 40e656-40e65d 331->333 332->333
    APIs
    • GetVersionExW.KERNEL32(?), ref: 0040E52A
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
    • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
    • FreeLibrary.KERNEL32(?), ref: 0040E642
    • FreeLibrary.KERNEL32(?), ref: 0040E654
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
    • String ID: 0SH$#v
    • API String ID: 3363477735-2448020801
    • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
    • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
    • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
    • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 440 40ebd0-40ebd4 441 40ebf6 440->441 442 40ebd6-40ebe5 LoadLibraryA 440->442 442->441 443 40ebe7-40ebf3 GetProcAddress 442->443 443->441
    APIs
    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: IsThemeActive$uxtheme.dll
    • API String ID: 2574300362-3542929980
    • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
    • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
    • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
    • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768

    Control-flow Graph

    APIs
    • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0040D779
    • FreeLibrary.KERNEL32(?), ref: 0040D78E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: FreeInfoLibraryParametersSystem
    • String ID: #v
    • API String ID: 3403648963-554117064
    • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
    • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
    • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
    • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A

    Control-flow Graph

    APIs
    • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • __wcsicoll.LIBCMT ref: 00402007
    • __wcsicoll.LIBCMT ref: 0040201D
    • __wcsicoll.LIBCMT ref: 00402033
      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
    • __wcsicoll.LIBCMT ref: 00402049
    • _wcscpy.LIBCMT ref: 0040207C
    • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
    • API String ID: 3948761352-1609664196
    • Opcode ID: fb742eb3e3b9472f662d9eb0d9266b7c596f0002b12228fde03e2c1a898d0588
    • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
    • Opcode Fuzzy Hash: fb742eb3e3b9472f662d9eb0d9266b7c596f0002b12228fde03e2c1a898d0588
    • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

    Control-flow Graph

    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
    • __wsplitpath.LIBCMT ref: 0040E41C
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcsncat.LIBCMT ref: 0040E433
    • __wmakepath.LIBCMT ref: 0040E44F
      • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
    • _wcscpy.LIBCMT ref: 0040E487
      • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
    • _wcscat.LIBCMT ref: 00427541
    • _wcslen.LIBCMT ref: 00427551
    • _wcslen.LIBCMT ref: 00427562
    • _wcscat.LIBCMT ref: 0042757C
    • _wcsncpy.LIBCMT ref: 004275BC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
    • String ID: Include$\
    • API String ID: 3173733714-3429789819
    • Opcode ID: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
    • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
    • Opcode Fuzzy Hash: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
    • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

    Control-flow Graph

    APIs
    • _fseek.LIBCMT ref: 0045292B
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
    • __fread_nolock.LIBCMT ref: 00452961
    • __fread_nolock.LIBCMT ref: 00452971
    • __fread_nolock.LIBCMT ref: 0045298A
    • __fread_nolock.LIBCMT ref: 004529A5
    • _fseek.LIBCMT ref: 004529BF
    • _malloc.LIBCMT ref: 004529CA
    • _malloc.LIBCMT ref: 004529D6
    • __fread_nolock.LIBCMT ref: 004529E7
    • _free.LIBCMT ref: 00452A17
    • _free.LIBCMT ref: 00452A20
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
    • String ID:
    • API String ID: 1255752989-0
    • Opcode ID: 52745d9ddfa852e4416d88c1eae67d516b86c928f00ce23e67f23089e82d0498
    • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
    • Opcode Fuzzy Hash: 52745d9ddfa852e4416d88c1eae67d516b86c928f00ce23e67f23089e82d0498
    • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __fread_nolock$_fseek_wcscpy
    • String ID: FILE
    • API String ID: 3888824918-3121273764
    • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
    • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
    • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
    • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 334 40f5c0-40f5cf call 422240 337 40f5d0-40f5e8 334->337 337->337 338 40f5ea-40f613 call 413650 call 410e60 337->338 343 40f614-40f633 call 414d04 338->343 346 40f691 343->346 347 40f635-40f63c 343->347 348 40f696-40f69c 346->348 349 40f660-40f674 call 4150d1 347->349 350 40f63e 347->350 354 40f679-40f67c 349->354 351 40f640 350->351 353 40f642-40f650 351->353 355 40f652-40f655 353->355 356 40f67e-40f68c 353->356 354->343 357 40f65b-40f65e 355->357 358 425d1e-425d3e call 4150d1 call 414d04 355->358 359 40f68e-40f68f 356->359 360 40f69f-40f6ad 356->360 357->349 357->351 370 425d43-425d5f call 414d30 358->370 359->355 361 40f6b4-40f6c2 360->361 362 40f6af-40f6b2 360->362 364 425d16 361->364 365 40f6c8-40f6d6 361->365 362->355 364->358 367 425d05-425d0b 365->367 368 40f6dc-40f6df 365->368 367->353 371 425d11 367->371 368->355 370->348 371->364
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __fread_nolock_fseek_memmove_strcat
    • String ID: AU3!$EA06
    • API String ID: 1268643489-2658333250
    • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
    • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
    • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
    • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

    Control-flow Graph

    APIs
    • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
    • LoadStringW.USER32(00000000), ref: 00434060
    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
    • LoadStringW.USER32(00000000), ref: 00434078
    • _wprintf.LIBCMT ref: 004340A1
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
    Strings
    • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: HandleLoadModuleString$Message_wprintf
    • String ID: %s (%d) : ==> %s: %s %s
    • API String ID: 3648134473-3128320259
    • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
    • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
    • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
    • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 379 4115d7-4115df 380 4115ee-4115f9 call 4135bb 379->380 383 4115e1-4115ec call 411988 380->383 384 4115fb-4115fc 380->384 383->380 387 4115fd-41160e 383->387 388 411610-41163b call 417fc0 call 41130a 387->388 389 41163c-411656 call 4180af call 418105 387->389 388->389
    APIs
    • _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
    • std::exception::exception.LIBCMT ref: 00411626
    • std::exception::exception.LIBCMT ref: 00411640
    • __CxxThrowException@8.LIBCMT ref: 00411651
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
    • String ID: ,*H$4*H$@fI
    • API String ID: 615853336-1459471987
    • Opcode ID: 4c3234da221406e919e60ca1662c01636fb1b8f8df4bcb261aa51e1772e486af
    • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
    • Opcode Fuzzy Hash: 4c3234da221406e919e60ca1662c01636fb1b8f8df4bcb261aa51e1772e486af
    • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

    Control-flow Graph

    APIs
    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
    • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: QueryValue$CloseOpen
    • String ID: Include$Software\AutoIt v3\AutoIt
    • API String ID: 1586453840-614718249
    • Opcode ID: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
    • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
    • Opcode Fuzzy Hash: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
    • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 415 40f250-40f26f RegOpenKeyExW 416 425e17-425e1c 415->416 417 40f275-40f296 RegQueryValueExW 415->417 418 40f2c3-40f2d6 RegCloseKey 417->418 419 40f298-40f2a3 417->419 420 40f2a9-40f2c2 RegCloseKey 419->420 421 425e1d-425e1f 419->421
    APIs
    • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
    • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
    • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
    • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Close$OpenQueryValue
    • String ID: Control Panel\Mouse
    • API String ID: 1607946009-824357125
    • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
    • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
    • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
    • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 422 4102b0-4102c5 SHGetMalloc 423 4102cb-4102da SHGetDesktopFolder 422->423 424 425dfd-425e0e call 433244 422->424 425 4102e0-41031a call 412fba 423->425 426 41036b-410379 423->426 434 410360-410368 425->434 435 41031c-410331 SHGetPathFromIDListW 425->435 426->424 432 41037f-410384 426->432 434->426 436 410351-41035d 435->436 437 410333-41034a call 412fba 435->437 436->434 437->436
    APIs
    • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
    • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
    • _wcsncpy.LIBCMT ref: 004102ED
    • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
    • _wcsncpy.LIBCMT ref: 00410340
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcsncpy$DesktopFolderFromListMallocPath
    • String ID:
    • API String ID: 3170942423-0
    • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
    • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
    • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
    • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 470 40f520-40f536 471 4295c9-429623 call 412f40 GetOpenFileNameW 470->471 472 40f53c-40f55d call 410120 call 4102b0 call 410190 call 40f570 470->472 471->472 478 429629-42962b 471->478 480 40f562-40f567 472->480 478->480
    APIs
    • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
      • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
      • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
      • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
      • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
    • String ID: X$pWH
    • API String ID: 85490731-941433119
    • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
    • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
    • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
    • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __filbuf__getptd_noexit__read_memcpy_s
    • String ID:
    • API String ID: 1794320848-0
    • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
    • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
    • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
    • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
    APIs
      • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
    • _free.LIBCMT ref: 004295A0
      • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
      • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
      • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
      • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
      • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
      • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
    • String ID: >>>AUTOIT SCRIPT<<<
    • API String ID: 3938964917-2806939583
    • Opcode ID: 628e12c02d6b77f7c54ecd80edae857502b5a869d6297a69f49c9c1b9f9d0509
    • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
    • Opcode Fuzzy Hash: 628e12c02d6b77f7c54ecd80edae857502b5a869d6297a69f49c9c1b9f9d0509
    • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
    Strings
    • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _strcat
    • String ID: >>>AUTOIT NO CMDEXECUTE<<<
    • API String ID: 1765576173-2684727018
    • Opcode ID: 1bd97a3dce65a00afcf485fde8a2c6e70bcd6b34d19cfa92a7d30b549991c499
    • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
    • Opcode Fuzzy Hash: 1bd97a3dce65a00afcf485fde8a2c6e70bcd6b34d19cfa92a7d30b549991c499
    • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
    APIs
      • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
    • _strcat.LIBCMT ref: 0040F786
      • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
      • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
    • String ID:
    • API String ID: 3199840319-0
    • Opcode ID: 634418af37c1c68810c62f7400feb38cb070ac88e3ba5bbcf78631f4d2240eed
    • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
    • Opcode Fuzzy Hash: 634418af37c1c68810c62f7400feb38cb070ac88e3ba5bbcf78631f4d2240eed
    • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
    APIs
      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
    • __lock_file.LIBCMT ref: 00414A8D
      • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
    • __fclose_nolock.LIBCMT ref: 00414A98
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
    • String ID:
    • API String ID: 2800547568-0
    • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
    • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
    • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
    • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
    APIs
    • __lock_file.LIBCMT ref: 00415012
    • __ftell_nolock.LIBCMT ref: 0041501F
      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __ftell_nolock__getptd_noexit__lock_file
    • String ID:
    • API String ID: 2999321469-0
    • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
    • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
    • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
    • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __lock_file
    • String ID:
    • API String ID: 3031932315-0
    • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
    • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
    • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
    • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wfsopen
    • String ID:
    • API String ID: 197181222-0
    • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
    • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
    • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
    • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
    APIs
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
    • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
    • GetKeyState.USER32(00000011), ref: 0047C92D
    • GetKeyState.USER32(00000009), ref: 0047C936
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
    • GetKeyState.USER32(00000010), ref: 0047C953
    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
    • _wcsncpy.LIBCMT ref: 0047CA29
    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
    • SendMessageW.USER32 ref: 0047CA7F
    • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
    • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,00000000), ref: 0047CB9B
    • ImageList_BeginDrag.COMCTL32(00000000,00000000,000000F8,000000F0), ref: 0047CBAC
    • SetCapture.USER32(?), ref: 0047CBB6
    • ClientToScreen.USER32(?,?), ref: 0047CC17
    • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
    • ReleaseCapture.USER32 ref: 0047CC3A
    • GetCursorPos.USER32(?), ref: 0047CC72
    • ScreenToClient.USER32(?,?), ref: 0047CC80
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
    • SendMessageW.USER32 ref: 0047CD12
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
    • SendMessageW.USER32 ref: 0047CD80
    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
    • GetCursorPos.USER32(?), ref: 0047CDC8
    • ScreenToClient.USER32(?,?), ref: 0047CDD6
    • GetParent.USER32(00000000), ref: 0047CDF7
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
    • SendMessageW.USER32 ref: 0047CE93
    • ClientToScreen.USER32(?,?), ref: 0047CEEE
    • TrackPopupMenuEx.USER32(?,00000000,?,?,00991C68,00000000,?,?,?,?), ref: 0047CF1C
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
    • SendMessageW.USER32 ref: 0047CF6B
    • ClientToScreen.USER32(?,?), ref: 0047CFB5
    • TrackPopupMenuEx.USER32(?,00000080,?,?,00991C68,00000000,?,?,?,?), ref: 0047CFE6
    • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
    • String ID: @GUI_DRAGID$F
    • API String ID: 3100379633-4164748364
    • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
    • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
    • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
    • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
    APIs
    • GetForegroundWindow.USER32 ref: 00434420
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
    • IsIconic.USER32(?), ref: 0043444F
    • ShowWindow.USER32(?,00000009), ref: 0043445C
    • SetForegroundWindow.USER32(?), ref: 0043446A
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
    • GetCurrentThreadId.KERNEL32 ref: 00434485
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
    • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
    • SetForegroundWindow.USER32(00000000), ref: 004344B7
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
    • keybd_event.USER32(00000012,00000000), ref: 004344CF
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
    • keybd_event.USER32(00000012,00000000), ref: 004344E6
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
    • keybd_event.USER32(00000012,00000000), ref: 004344FD
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
    • keybd_event.USER32(00000012,00000000), ref: 00434514
    • SetForegroundWindow.USER32(00000000), ref: 0043451E
    • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
    • String ID: Shell_TrayWnd
    • API String ID: 2889586943-2988720461
    • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
    • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
    • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
    • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
    APIs
    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
    • CloseHandle.KERNEL32(?), ref: 004463A0
    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
    • GetProcessWindowStation.USER32 ref: 004463D1
    • SetProcessWindowStation.USER32(00000000), ref: 004463DB
    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
    • _wcslen.LIBCMT ref: 00446498
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • _wcsncpy.LIBCMT ref: 004464C0
    • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
    • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
    • UnloadUserProfile.USERENV(?,?), ref: 00446555
    • CloseWindowStation.USER32(00000000), ref: 0044656C
    • CloseDesktop.USER32(?), ref: 0044657A
    • SetProcessWindowStation.USER32(?), ref: 00446588
    • CloseHandle.KERNEL32(?), ref: 00446592
    • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
    • String ID: $@OH$default$winsta0
    • API String ID: 3324942560-3791954436
    • Opcode ID: 89825d2e99e48f8c37bf3d83f8858ac9df3d567d964e8e83b7294b14b974461b
    • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
    • Opcode Fuzzy Hash: 89825d2e99e48f8c37bf3d83f8858ac9df3d567d964e8e83b7294b14b974461b
    • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
    APIs
    • _wcslen.LIBCMT ref: 004096C1
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • _memmove.LIBCMT ref: 0040970C
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
    • _memmove.LIBCMT ref: 00409D96
    • _memmove.LIBCMT ref: 0040A6C4
    • _memmove.LIBCMT ref: 004297E5
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
    • String ID:
    • API String ID: 2383988440-0
    • Opcode ID: fb06dff430aaf1c01c4dd638e2cd008a516aee1ecac5eeb13fb9f8f8e87c0f5d
    • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
    • Opcode Fuzzy Hash: fb06dff430aaf1c01c4dd638e2cd008a516aee1ecac5eeb13fb9f8f8e87c0f5d
    • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B
    APIs
      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
      • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
      • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
      • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
    • _wcscat.LIBCMT ref: 0044BD94
    • _wcscat.LIBCMT ref: 0044BDBD
    • __wsplitpath.LIBCMT ref: 0044BDEA
    • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
    • _wcscpy.LIBCMT ref: 0044BE71
    • _wcscat.LIBCMT ref: 0044BE83
    • _wcscat.LIBCMT ref: 0044BE95
    • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
    • DeleteFileW.KERNEL32(?), ref: 0044BED3
    • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
    • DeleteFileW.KERNEL32(?), ref: 0044BF15
    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
    • FindClose.KERNEL32(00000000), ref: 0044BF33
    • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
    • FindClose.KERNEL32(00000000), ref: 0044BF7C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
    • String ID: \*.*
    • API String ID: 2188072990-1173974218
    • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
    • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
    • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
    • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
    • FindClose.KERNEL32(00000000), ref: 00478924
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
    • __swprintf.LIBCMT ref: 004789D3
    • __swprintf.LIBCMT ref: 00478A1D
    • __swprintf.LIBCMT ref: 00478A4B
    • __swprintf.LIBCMT ref: 00478A79
      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
    • __swprintf.LIBCMT ref: 00478AA7
    • __swprintf.LIBCMT ref: 00478AD5
    • __swprintf.LIBCMT ref: 00478B03
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
    • API String ID: 999945258-2428617273
    • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
    • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
    • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
    • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
    APIs
      • Part of subcall function 00443D19: _wcslen.LIBCMT ref: 00443D34
    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00464F2A
    • GetLastError.KERNEL32 ref: 00464F40
    • GetCurrentThread.KERNEL32 ref: 00464F54
    • OpenThreadToken.ADVAPI32(00000000), ref: 00464F5B
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00464F6C
    • OpenProcessToken.ADVAPI32(00000000), ref: 00464F73
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
    • String ID: SeDebugPrivilege
    • API String ID: 1312810259-2896544425
    • Opcode ID: 4ccb8eda33b7606bc70f55622b8c9345a385014adf55ef82b2f5723e997a33b0
    • Instruction ID: 6ee098d93b5c3ece286c9d7df0f89eb4f2932b8b97d60c134c5a8e1830bdbe8f
    • Opcode Fuzzy Hash: 4ccb8eda33b7606bc70f55622b8c9345a385014adf55ef82b2f5723e997a33b0
    • Instruction Fuzzy Hash: E1519372204301AFE710EF64DC85F6BB7E8AB84705F10491EFA44DB2C1D7B5E8058BAA
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
    • __wsplitpath.LIBCMT ref: 00403492
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcscpy.LIBCMT ref: 004034A7
    • _wcscat.LIBCMT ref: 004034BC
    • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
    • _wcscpy.LIBCMT ref: 004035A0
    • _wcslen.LIBCMT ref: 00403623
    • _wcslen.LIBCMT ref: 0040367D
    Strings
    • Unterminated string, xrefs: 00428348
    • _, xrefs: 0040371C
    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
    • Error opening the file, xrefs: 00428231
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
    • API String ID: 3393021363-188983378
    • Opcode ID: 6b3644d94f60e3389549cdcbb24d3edc2ae264c6f6f73721fbab812a4248d270
    • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
    • Opcode Fuzzy Hash: 6b3644d94f60e3389549cdcbb24d3edc2ae264c6f6f73721fbab812a4248d270
    • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
    • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
    • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
    • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
    • FindClose.KERNEL32(00000000), ref: 00431B20
    • FindClose.KERNEL32(00000000), ref: 00431B34
    • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
    • FindClose.KERNEL32(00000000), ref: 00431BCD
    • FindClose.KERNEL32(00000000), ref: 00431BDB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
    • String ID: *.*
    • API String ID: 1409584000-438819550
    • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
    • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
    • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
    • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
    APIs
    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
    • __swprintf.LIBCMT ref: 00431C2E
    • _wcslen.LIBCMT ref: 00431C3A
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
    • String ID: :$\$\??\%s
    • API String ID: 2192556992-3457252023
    • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
    • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
    • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
    • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
    APIs
    • GetLocalTime.KERNEL32(?), ref: 004722A2
    • __swprintf.LIBCMT ref: 004722B9
    • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
    • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
    • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
    • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
    • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
    • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
    • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
    • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
    • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: FolderPath$LocalTime__swprintf
    • String ID: %.3d
    • API String ID: 3337348382-986655627
    • Opcode ID: 48c07388412e252f080c16643772a7d18a3b55828c11779c89d55816a2428872
    • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
    • Opcode Fuzzy Hash: 48c07388412e252f080c16643772a7d18a3b55828c11779c89d55816a2428872
    • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
    • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
    • FindClose.KERNEL32(00000000), ref: 0044291C
    • FindClose.KERNEL32(00000000), ref: 00442930
    • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
    • FindClose.KERNEL32(00000000), ref: 004429D4
      • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
    • FindClose.KERNEL32(00000000), ref: 004429E2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
    • String ID: *.*
    • API String ID: 2640511053-438819550
    • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
    • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
    • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
    • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
    APIs
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
    • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
    • GetLastError.KERNEL32 ref: 00433414
    • ExitWindowsEx.USER32(?,00000000), ref: 00433437
    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
    • String ID: SeShutdownPrivilege
    • API String ID: 2938487562-3733053543
    • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
    • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
    • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
    • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
    APIs
      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
      • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
      • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
    • GetLengthSid.ADVAPI32(?), ref: 004461D0
    • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
    • GetLengthSid.ADVAPI32(?), ref: 00446241
    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
    • CopySid.ADVAPI32(00000000), ref: 00446271
    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
    • String ID:
    • API String ID: 1255039815-0
    • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
    • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
    • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
    • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
    APIs
    • __swprintf.LIBCMT ref: 00433073
    • __swprintf.LIBCMT ref: 00433085
    • __wcsicoll.LIBCMT ref: 00433092
    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
    • LoadResource.KERNEL32(?,00000000), ref: 004330BD
    • LockResource.KERNEL32(00000000), ref: 004330CA
    • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
    • LoadResource.KERNEL32(?,00000000), ref: 00433105
    • SizeofResource.KERNEL32(?,00000000), ref: 00433114
    • LockResource.KERNEL32(?), ref: 00433120
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
    • String ID:
    • API String ID: 1158019794-0
    • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
    • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
    • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
    • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
    • String ID:
    • API String ID: 1737998785-0
    • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
    • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
    • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
    • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D627
    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
    • GetLastError.KERNEL32 ref: 0045D6BF
    • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Error$Mode$DiskFreeLastSpace
    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
    • API String ID: 4194297153-14809454
    • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
    • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
    • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
    • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove$_strncmp
    • String ID: @oH$\$^$h
    • API String ID: 2175499884-3701065813
    • Opcode ID: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
    • Instruction ID: 796dcd1322dc9123c5f4e5533c800aedaabe8dca19c5b95ba0af32eff2573e22
    • Opcode Fuzzy Hash: 988809b36a944a9929e300e154a4cfc85b4d4f50dea7e6e4a67b5f519bc2876c
    • Instruction Fuzzy Hash: 4242E170E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD856AB351D7399946CF55
    APIs
    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
    • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
    • bind.WSOCK32(00000000,?,00000010), ref: 00465356
    • WSAGetLastError.WSOCK32(00000000), ref: 00465363
    • closesocket.WSOCK32(00000000,00000000), ref: 00465377
    • listen.WSOCK32(00000000,00000005), ref: 00465381
    • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
    • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorLast$closesocket$bindlistensocket
    • String ID:
    • API String ID: 540024437-0
    • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
    • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
    • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
    • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID: ERCP$VUUU$VUUU$VUUU$XjH
    • API String ID: 0-2872873767
    • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
    • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
    • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
    • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
    APIs
    • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
    • __wsplitpath.LIBCMT ref: 00475644
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcscat.LIBCMT ref: 00475657
    • __wcsicoll.LIBCMT ref: 0047567B
    • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
    • CloseHandle.KERNEL32(00000000), ref: 004756BA
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
    • String ID:
    • API String ID: 2547909840-0
    • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
    • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
    • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
    • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
    • Sleep.KERNEL32(0000000A), ref: 0045250B
    • FindNextFileW.KERNEL32(?,?), ref: 004525E9
    • FindClose.KERNEL32(?), ref: 004525FF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
    • String ID: *.*$\VH
    • API String ID: 2786137511-2657498754
    • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
    • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
    • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
    • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 00421FC1
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
    • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
    • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
    • TerminateProcess.KERNEL32(00000000), ref: 00422004
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID: pqI
    • API String ID: 2579439406-2459173057
    • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
    • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
    • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
    • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
    APIs
    • OleInitialize.OLE32(00000000), ref: 0046CF63
    • _wcslen.LIBCMT ref: 0046CF75
    • CreateBindCtx.OLE32(00000000,?), ref: 0046D01F
    • MkParseDisplayName.OLE32(?,?,?,?), ref: 0046D065
      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
    • CLSIDFromProgID.OLE32(00000000,?,?), ref: 0046D10B
    • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0046D125
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$Copy$ActiveBindClearCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcslen
    • String ID:
    • API String ID: 2728119192-0
    • Opcode ID: ef839d374f24c2b4802c94ddfd6fcc219cbb0d6a077378fc64215d2d3e59a905
    • Instruction ID: 654cbfa1d8fefa06abeba6563afdd6e3d5f820db169d2b444807b365abf91408
    • Opcode Fuzzy Hash: ef839d374f24c2b4802c94ddfd6fcc219cbb0d6a077378fc64215d2d3e59a905
    • Instruction Fuzzy Hash: 3D815E71604301ABD700EF65DC85F6BB3E8BF88704F10491EF64597291E775E905CB6A
    APIs
    • __wcsicoll.LIBCMT ref: 00433349
    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
    • __wcsicoll.LIBCMT ref: 00433375
    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsicollmouse_event
    • String ID: DOWN
    • API String ID: 1033544147-711622031
    • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
    • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
    • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
    • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
    APIs
    • GetKeyboardState.USER32(?), ref: 0044C3D2
    • SetKeyboardState.USER32(00000080), ref: 0044C3F6
    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
    • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: KeyboardMessagePostState$InputSend
    • String ID:
    • API String ID: 3031425849-0
    • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
    • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
    • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
    • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
    APIs
      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
    • WSAGetLastError.WSOCK32(00000000), ref: 00476692
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorLastinet_addrsocket
    • String ID:
    • API String ID: 4170576061-0
    • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
    • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
    • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
    • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
    APIs
      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
    • IsWindowVisible.USER32 ref: 0047A368
    • IsWindowEnabled.USER32 ref: 0047A378
    • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
    • IsIconic.USER32 ref: 0047A393
    • IsZoomed.USER32 ref: 0047A3A1
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$EnabledForegroundIconicVisibleZoomed
    • String ID:
    • API String ID: 292994002-0
    • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
    • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
    • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
    • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
    APIs
      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
    • CoInitialize.OLE32(00000000), ref: 00478442
    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
    • CoUninitialize.OLE32 ref: 0047863C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_wcslen
    • String ID: .lnk
    • API String ID: 886957087-24824748
    • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
    • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
    • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
    • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
    APIs
    • OpenClipboard.USER32(?), ref: 0046DCE7
    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
    • GetClipboardData.USER32(0000000D), ref: 0046DD01
    • CloseClipboard.USER32 ref: 0046DD0D
    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
    • CloseClipboard.USER32 ref: 0046DD41
    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
    • GetClipboardData.USER32(00000001), ref: 0046DD8D
    • CloseClipboard.USER32 ref: 0046DD99
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
    • String ID:
    • API String ID: 15083398-0
    • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
    • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
    • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
    • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNext
    • String ID:
    • API String ID: 3541575487-0
    • Opcode ID: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
    • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
    • Opcode Fuzzy Hash: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
    • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
    APIs
    • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
    • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
    • FindClose.KERNEL32(00000000), ref: 004339EB
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: FileFind$AttributesCloseFirst
    • String ID:
    • API String ID: 48322524-0
    • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
    • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
    • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
    • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
    APIs
    • __time64.LIBCMT ref: 00442E1E
      • Part of subcall function 004148B3: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,00430E3E,00000000,?,?,00441E36,?,00000001), ref: 004148BE
      • Part of subcall function 004148B3: __aulldiv.LIBCMT ref: 004148DE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Time$FileSystem__aulldiv__time64
    • String ID: @uJ
    • API String ID: 2893107130-1268412911
    • Opcode ID: f8baac42c5f25f74c7dd853c159356035b8e1d829a17ed988ba9b2caf3e3cd55
    • Instruction ID: d38707ff02ce459d0d249ce09c4ef886a5fe37698b82f7f0427e65daa233e585
    • Opcode Fuzzy Hash: f8baac42c5f25f74c7dd853c159356035b8e1d829a17ed988ba9b2caf3e3cd55
    • Instruction Fuzzy Hash: CB21A2335605108BF320CF37CC01652B7E7EBE5310F358A69E4A5973D1DAB96906CB98
    APIs
    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
    • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Internet$AvailableDataErrorFileLastQueryRead
    • String ID:
    • API String ID: 901099227-0
    • Opcode ID: 2766dd017a35a582f281a5a962d2d1cd72be87eede06af1684fc2a386cf4a680
    • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
    • Opcode Fuzzy Hash: 2766dd017a35a582f281a5a962d2d1cd72be87eede06af1684fc2a386cf4a680
    • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DEB4
    • FindClose.KERNEL32(00000000), ref: 0045DEF0
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: fa8284a9ded648ffea22647615070995beef9130508a8479dbfd4b77e5f7619d
    • Instruction ID: 87eaadf29b8e191e1ea341be1384c57ecbaef0316c3fc1e5a02930af3baeb018
    • Opcode Fuzzy Hash: fa8284a9ded648ffea22647615070995beef9130508a8479dbfd4b77e5f7619d
    • Instruction Fuzzy Hash: 5C11E5726002049FD310EF6ADC49A5AF7E9FF84325F10C92EF998DB281DB74E8448B94
    APIs
    • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Proc
    • String ID:
    • API String ID: 2346855178-0
    • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
    • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
    • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
    • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
    APIs
    • BlockInput.USER32(00000001), ref: 0045A38B
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: BlockInput
    • String ID:
    • API String ID: 3456056419-0
    • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
    • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
    • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
    • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
    APIs
    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: LogonUser
    • String ID:
    • API String ID: 1244722697-0
    • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
    • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
    • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
    • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
    APIs
    • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: NameUser
    • String ID:
    • API String ID: 2645101109-0
    • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
    • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
    • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
    • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
    • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
    • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
    • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID: N@
    • API String ID: 0-1509896676
    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
    • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
    • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
    • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
    • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
    • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
    • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
    • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
    • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
    • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
    • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
    • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
    • Instruction ID: 1be110723fa64262e89d0aec0a1a20255c1bae91910aebb39a61821022ff9223
    • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
    • Instruction Fuzzy Hash: 55B1B533D0A6B3058736836D05582BFFE626E91B8031FC396CDD03F399C62AAD9295D4
    APIs
    • DeleteObject.GDI32(?), ref: 0045953B
    • DeleteObject.GDI32(?), ref: 00459551
    • DestroyWindow.USER32(?), ref: 00459563
    • GetDesktopWindow.USER32 ref: 00459581
    • GetWindowRect.USER32(00000000), ref: 00459588
    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
    • GetClientRect.USER32(00000000,?), ref: 004596F8
    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
    • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
    • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
    • GlobalLock.KERNEL32(00000000), ref: 0045978F
    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
    • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
    • CloseHandle.KERNEL32(00000000), ref: 004597AC
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
    • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
    • GlobalFree.KERNEL32(00000000), ref: 004597E2
    • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
    • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
    • ShowWindow.USER32(?,00000004), ref: 00459865
    • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
    • GetStockObject.GDI32(00000011), ref: 004598CD
    • SelectObject.GDI32(00000000,00000000), ref: 004598D5
    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
    • DeleteDC.GDI32(00000000), ref: 004598F8
    • _wcslen.LIBCMT ref: 00459916
    • _wcscpy.LIBCMT ref: 0045993A
    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
    • GetDC.USER32(00000000), ref: 004599FC
    • SelectObject.GDI32(00000000,?), ref: 00459A0C
    • SelectObject.GDI32(00000000,00000007), ref: 00459A37
    • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
    • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
    • String ID: $AutoIt v3$DISPLAY$static
    • API String ID: 4040870279-2373415609
    • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
    • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
    • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
    • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
    APIs
    • GetSysColor.USER32(00000012), ref: 0044181E
    • SetTextColor.GDI32(?,?), ref: 00441826
    • GetSysColorBrush.USER32(0000000F), ref: 0044183D
    • GetSysColor.USER32(0000000F), ref: 00441849
    • SetBkColor.GDI32(?,?), ref: 00441864
    • SelectObject.GDI32(?,?), ref: 00441874
    • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
    • GetSysColor.USER32(00000010), ref: 004418B2
    • CreateSolidBrush.GDI32(00000000), ref: 004418B9
    • FrameRect.USER32(?,?,00000000), ref: 004418CA
    • DeleteObject.GDI32(?), ref: 004418D5
    • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
    • FillRect.USER32(?,?,?), ref: 00441970
      • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
      • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
      • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
      • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
      • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
      • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
      • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
      • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
      • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
      • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
      • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
      • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
      • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
    • String ID:
    • API String ID: 69173610-0
    • Opcode ID: 67e9ead5c942165e280b43d4d1bf61f8269e9ac583cd994716fd3aef5842f8a2
    • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
    • Opcode Fuzzy Hash: 67e9ead5c942165e280b43d4d1bf61f8269e9ac583cd994716fd3aef5842f8a2
    • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
    APIs
    • DestroyWindow.USER32(?), ref: 004590F2
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
    • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
    • GetClientRect.USER32(00000000,?), ref: 0045924E
    • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
    • GetStockObject.GDI32(00000011), ref: 004592AC
    • SelectObject.GDI32(00000000,00000000), ref: 004592B4
    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
    • DeleteDC.GDI32(00000000), ref: 004592D6
    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
    • GetStockObject.GDI32(00000011), ref: 004593D3
    • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
    • API String ID: 2910397461-517079104
    • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
    • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
    • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
    • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #NoAutoIt3Execute$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#requireadmin$Cannot parse #include$Unterminated group of comments
    • API String ID: 1038674560-3360698832
    • Opcode ID: d3b13d2d210588f42260a91b167181014f2011d22ca391bd0a5c30519b55ecdb
    • Instruction ID: 9c7d50a5cd0ee83047e92bfb3361563e61671b380f2e7b4b5fccf758bfaba57c
    • Opcode Fuzzy Hash: d3b13d2d210588f42260a91b167181014f2011d22ca391bd0a5c30519b55ecdb
    • Instruction Fuzzy Hash: B5610670701621B7D711AE219C42FAF335C9F50705F50442BFE05AA286FB7DEE8686AE
    APIs
    • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
    • SetCursor.USER32(00000000), ref: 0043075B
    • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
    • SetCursor.USER32(00000000), ref: 00430773
    • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
    • SetCursor.USER32(00000000), ref: 0043078B
    • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
    • SetCursor.USER32(00000000), ref: 004307A3
    • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
    • SetCursor.USER32(00000000), ref: 004307BB
    • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
    • SetCursor.USER32(00000000), ref: 004307D3
    • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
    • SetCursor.USER32(00000000), ref: 004307EB
    • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
    • SetCursor.USER32(00000000), ref: 00430803
    • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
    • SetCursor.USER32(00000000), ref: 0043081B
    • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
    • SetCursor.USER32(00000000), ref: 00430833
    • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
    • SetCursor.USER32(00000000), ref: 0043084B
    • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
    • SetCursor.USER32(00000000), ref: 00430863
    • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
    • SetCursor.USER32(00000000), ref: 0043087B
    • SetCursor.USER32(00000000), ref: 00430887
    • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
    • SetCursor.USER32(00000000), ref: 0043089F
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Cursor$Load
    • String ID:
    • API String ID: 1675784387-0
    • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
    • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
    • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
    • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
    APIs
    • GetSysColor.USER32(0000000E), ref: 00430913
    • SetTextColor.GDI32(?,00000000), ref: 0043091B
    • GetSysColor.USER32(00000012), ref: 00430933
    • SetTextColor.GDI32(?,?), ref: 0043093B
    • GetSysColorBrush.USER32(0000000F), ref: 0043094E
    • GetSysColor.USER32(0000000F), ref: 00430959
    • CreateSolidBrush.GDI32(?), ref: 00430962
    • GetSysColor.USER32(00000011), ref: 00430979
    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
    • SelectObject.GDI32(?,00000000), ref: 0043099C
    • SetBkColor.GDI32(?,?), ref: 004309A6
    • SelectObject.GDI32(?,?), ref: 004309B4
    • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
    • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
    • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
    • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
    • DrawFocusRect.USER32(?,?), ref: 00430A91
    • GetSysColor.USER32(00000011), ref: 00430A9F
    • SetTextColor.GDI32(?,00000000), ref: 00430AA7
    • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
    • SelectObject.GDI32(?,?), ref: 00430AD0
    • DeleteObject.GDI32(00000105), ref: 00430ADC
    • SelectObject.GDI32(?,?), ref: 00430AE3
    • DeleteObject.GDI32(?), ref: 00430AE9
    • SetTextColor.GDI32(?,?), ref: 00430AF0
    • SetBkColor.GDI32(?,?), ref: 00430AFB
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
    • String ID:
    • API String ID: 1582027408-0
    • Opcode ID: 01477bbfb5fd2d7e2e48adeaaca7c0b8a7ab70b0676868411687b74f3ea9e298
    • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
    • Opcode Fuzzy Hash: 01477bbfb5fd2d7e2e48adeaaca7c0b8a7ab70b0676868411687b74f3ea9e298
    • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
    APIs
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
    • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CloseConnectCreateRegistry
    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
    • API String ID: 3217815495-966354055
    • Opcode ID: e3f7a3a4c399bdd3170a18b4acf64230a3e96664a900d08813bdecec8633954b
    • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
    • Opcode Fuzzy Hash: e3f7a3a4c399bdd3170a18b4acf64230a3e96664a900d08813bdecec8633954b
    • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
    APIs
    • GetCursorPos.USER32(?), ref: 004566AE
    • GetDesktopWindow.USER32 ref: 004566C3
    • GetWindowRect.USER32(00000000), ref: 004566CA
    • GetWindowLongW.USER32(?,000000F0), ref: 00456722
    • GetWindowLongW.USER32(?,000000F0), ref: 00456735
    • DestroyWindow.USER32(?), ref: 00456746
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
    • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
    • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
    • IsWindowVisible.USER32(?), ref: 0045682C
    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
    • GetWindowRect.USER32(?,?), ref: 00456873
    • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
    • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
    • CopyRect.USER32(?,?), ref: 004568BE
    • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
    • String ID: ($,$tooltips_class32
    • API String ID: 225202481-3320066284
    • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
    • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
    • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
    • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
    APIs
    • _wcslen.LIBCMT ref: 00454EB0
    • _wcslen.LIBCMT ref: 00454EC3
    • __wcsicoll.LIBCMT ref: 00454ED0
    • _wcslen.LIBCMT ref: 00454EE4
    • __wcsicoll.LIBCMT ref: 00454EF1
    • _wcslen.LIBCMT ref: 00454F05
    • __wcsicoll.LIBCMT ref: 00454F12
      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00454F48
    • LoadLibraryExW.KERNEL32(?,00000000,00000032), ref: 00454F5B
    • LoadImageW.USER32(?,00000000,?,00000001,?,?), ref: 00454F9B
    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00454FE5
    • LoadImageW.USER32(?,00000000,?,00000001,?,?), ref: 00455016
    • FreeLibrary.KERNEL32(?,?), ref: 00455023
    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0045507D
    • DestroyIcon.USER32(?), ref: 0045508B
    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 004550A8
    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 004550B4
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 004550D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
    • String ID: .dll$.exe$.icl$#v
    • API String ID: 2511167534-1852478350
    • Opcode ID: b375f9f1c060e8dc6bc6b77497d5ee60ef8e4d255dc939bc4899f3b4511c0762
    • Instruction ID: 15f67b2365a9f585a2e114aae537e2d642ac99032f03718e2682cba1ccb7e1e2
    • Opcode Fuzzy Hash: b375f9f1c060e8dc6bc6b77497d5ee60ef8e4d255dc939bc4899f3b4511c0762
    • Instruction Fuzzy Hash: 1C71B571500704BAEB10DF64DD95BFF73A8AF44B06F00881EFE45D6182E7B9A988C769
    APIs
    • OpenClipboard.USER32(?), ref: 0046DCE7
    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
    • GetClipboardData.USER32(0000000D), ref: 0046DD01
    • CloseClipboard.USER32 ref: 0046DD0D
    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
    • CloseClipboard.USER32 ref: 0046DD41
    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
    • GetClipboardData.USER32(00000001), ref: 0046DD8D
    • CloseClipboard.USER32 ref: 0046DD99
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
    • String ID:
    • API String ID: 15083398-0
    • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
    • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
    • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
    • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • GetWindowRect.USER32(?,?), ref: 00471CF7
    • GetClientRect.USER32(?,?), ref: 00471D05
    • GetSystemMetrics.USER32(00000007), ref: 00471D0D
    • GetSystemMetrics.USER32(00000008), ref: 00471D20
    • GetSystemMetrics.USER32(00000004), ref: 00471D42
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
    • GetSystemMetrics.USER32(00000007), ref: 00471D79
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
    • GetSystemMetrics.USER32(00000008), ref: 00471DAB
    • GetSystemMetrics.USER32(00000004), ref: 00471DCF
    • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
    • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
    • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00471E35
    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
    • GetClientRect.USER32(?,?), ref: 00471E8A
    • GetStockObject.GDI32(00000011), ref: 00471EA6
    • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
    • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
    • String ID: @$AutoIt v3 GUI
    • API String ID: 867697134-3359773793
    • Opcode ID: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
    • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
    • Opcode Fuzzy Hash: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
    • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcscat$FileInfoVersion$QuerySizeValue__wcsicoll_wcscpy_wcslen_wcsncpy
    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
    • API String ID: 1503153545-1459072770
    • Opcode ID: 60551edd16376cfcbf39acec3743fb597867e7ad07f568616362420fa8265653
    • Instruction ID: bf9a9138137c8e48d15734b0b0bf1383f69a7efb75f9ce998fc77f2ad016157b
    • Opcode Fuzzy Hash: 60551edd16376cfcbf39acec3743fb597867e7ad07f568616362420fa8265653
    • Instruction Fuzzy Hash: D551F672A402043BD610BB269C43EFFB36C9F49715F10055FFE09A6242EA7DEA5183AD
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsicoll$__wcsnicmp
    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
    • API String ID: 790654849-32604322
    • Opcode ID: fda3356f9a514e75ac50708b2e0f549657cc7649cef593225b85309bc7d45243
    • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
    • Opcode Fuzzy Hash: fda3356f9a514e75ac50708b2e0f549657cc7649cef593225b85309bc7d45243
    • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 132bb78e4814032672bcefea7924c76711b66464c0ffe455d11a6fd9663ecfe9
    • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
    • Opcode Fuzzy Hash: 132bb78e4814032672bcefea7924c76711b66464c0ffe455d11a6fd9663ecfe9
    • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
    APIs
      • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
    • _fseek.LIBCMT ref: 00452B3B
    • __wsplitpath.LIBCMT ref: 00452B9B
    • _wcscpy.LIBCMT ref: 00452BB0
    • _wcscat.LIBCMT ref: 00452BC5
    • __wsplitpath.LIBCMT ref: 00452BEF
    • _wcscat.LIBCMT ref: 00452C07
    • _wcscat.LIBCMT ref: 00452C1C
    • __fread_nolock.LIBCMT ref: 00452C53
    • __fread_nolock.LIBCMT ref: 00452C64
    • __fread_nolock.LIBCMT ref: 00452C83
    • __fread_nolock.LIBCMT ref: 00452C94
    • __fread_nolock.LIBCMT ref: 00452CB5
    • __fread_nolock.LIBCMT ref: 00452CC6
    • __fread_nolock.LIBCMT ref: 00452CD7
    • __fread_nolock.LIBCMT ref: 00452CE8
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
    • __fread_nolock.LIBCMT ref: 00452D78
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
    • String ID:
    • API String ID: 2054058615-0
    • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
    • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
    • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
    • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
    APIs
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window
    • String ID: 0
    • API String ID: 2353593579-4108050209
    • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
    • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
    • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
    • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
    APIs
    • GetSysColor.USER32(0000000F), ref: 0044A05E
    • GetClientRect.USER32(?,?), ref: 0044A0D1
    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
    • GetWindowDC.USER32(?), ref: 0044A0F6
    • GetPixel.GDI32(00000000,?,?), ref: 0044A108
    • ReleaseDC.USER32(?,?), ref: 0044A11B
    • GetSysColor.USER32(0000000F), ref: 0044A131
    • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
    • GetSysColor.USER32(0000000F), ref: 0044A14F
    • GetSysColor.USER32(00000005), ref: 0044A15B
    • GetWindowDC.USER32(?), ref: 0044A1BE
    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
    • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
    • ReleaseDC.USER32(?,00000000), ref: 0044A229
    • SetBkColor.GDI32(?,00000000), ref: 0044A24C
    • GetSysColor.USER32(00000008), ref: 0044A265
    • SetTextColor.GDI32(?,00000000), ref: 0044A270
    • SetBkMode.GDI32(?,00000001), ref: 0044A282
    • GetStockObject.GDI32(00000005), ref: 0044A28A
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
    • String ID:
    • API String ID: 1744303182-0
    • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
    • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
    • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
    • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
    • __mtterm.LIBCMT ref: 00417C34
      • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
      • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
    • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
    • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
    • __init_pointers.LIBCMT ref: 00417CE6
    • __calloc_crt.LIBCMT ref: 00417D54
    • GetCurrentThreadId.KERNEL32 ref: 00417D80
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
    • API String ID: 4163708885-3819984048
    • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
    • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
    • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
    • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID: >>>AUTOIT SCRIPT<<<$\
    • API String ID: 0-1896584978
    • Opcode ID: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
    • Instruction ID: daa296ce3da71eb1ea4b2d74bac6de3536c6b190185545f0361092b1072d42a3
    • Opcode Fuzzy Hash: 0f644335f765ba1f090fa429f6a047d8548bdb555fde32e118ce45ae114b4fa6
    • Instruction Fuzzy Hash: 4081B9B1900204ABCB20EB61CD85FDB73ED9F54304F40859EF505AB142EA39EA85CB99
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • GetForegroundWindow.USER32(?,?,?,?,?,?,?), ref: 0046EE79
    • GetForegroundWindow.USER32(?,?,?,?,?,?), ref: 0046F265
    • IsWindow.USER32(?), ref: 0046F29A
    • GetDesktopWindow.USER32 ref: 0046F356
    • EnumChildWindows.USER32(00000000), ref: 0046F35D
    • EnumWindows.USER32(0046130D,?), ref: 0046F365
      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop_memmove
    • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
    • API String ID: 329138477-1919597938
    • Opcode ID: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
    • Instruction ID: 15289122aec5319afe5b60ce0d71565fabc5791e0031d8771947120ab82528ab
    • Opcode Fuzzy Hash: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
    • Instruction Fuzzy Hash: 83F10B714143019BDB00FF61D885AAFB3A4BF85308F44496FF94567282E779E909CBA7
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsicoll$IconLoad
    • String ID: blank$info$question$stop$warning
    • API String ID: 2485277191-404129466
    • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
    • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
    • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
    • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
    APIs
    • LoadIconW.USER32(?,00000063), ref: 0045464C
    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
    • SetWindowTextW.USER32(?,?), ref: 00454678
    • GetDlgItem.USER32(?,000003EA), ref: 00454690
    • SetWindowTextW.USER32(00000000,?), ref: 00454697
    • GetDlgItem.USER32(?,000003E9), ref: 004546A8
    • SetWindowTextW.USER32(00000000,?), ref: 004546AF
    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
    • GetWindowRect.USER32(?,?), ref: 004546F5
    • SetWindowTextW.USER32(?,?), ref: 00454765
    • GetDesktopWindow.USER32 ref: 0045476F
    • GetWindowRect.USER32(00000000), ref: 00454776
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
    • GetClientRect.USER32(?,?), ref: 004547D2
    • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
    • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
    • String ID:
    • API String ID: 3869813825-0
    • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
    • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
    • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
    • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
    APIs
    • _wcslen.LIBCMT ref: 00464B28
    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
    • _wcslen.LIBCMT ref: 00464C28
    • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
    • _wcslen.LIBCMT ref: 00464CBA
    • _wcslen.LIBCMT ref: 00464CD0
    • _wcslen.LIBCMT ref: 00464CEF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcslen$Directory$CurrentSystem
    • String ID: D
    • API String ID: 1914653954-2746444292
    • Opcode ID: db4a824bce24d25818fab6367d638cb23397f974d7059867a4bb37184fd70cb2
    • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
    • Opcode Fuzzy Hash: db4a824bce24d25818fab6367d638cb23397f974d7059867a4bb37184fd70cb2
    • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
    APIs
    • _wcsncpy.LIBCMT ref: 0045CE39
    • __wsplitpath.LIBCMT ref: 0045CE78
    • _wcscat.LIBCMT ref: 0045CE8B
    • _wcscat.LIBCMT ref: 0045CE9E
    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
    • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
    • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
    • _wcscpy.LIBCMT ref: 0045CF61
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
    • String ID: *.*
    • API String ID: 1153243558-438819550
    • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
    • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
    • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
    • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
    APIs
    • DragQueryPoint.SHELL32(?,?), ref: 00470EC0
      • Part of subcall function 00441672: ClientToScreen.USER32(00000000,?), ref: 0044169A
      • Part of subcall function 00441672: GetWindowRect.USER32(?,?), ref: 00441722
      • Part of subcall function 00441672: PtInRect.USER32(?,?,?), ref: 00441734
    • SendMessageW.USER32 ref: 00470F32
    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00470F3B
    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00470F65
    • _wcscat.LIBCMT ref: 00470FA2
    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00470FB7
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00470FC9
    • SendMessageW.USER32(?,000000B1,?,?), ref: 00470FD7
    • SendMessageW.USER32(?,000000B1,?,?), ref: 00470FF4
    • DragFinish.SHELL32(?), ref: 00470FFA
    • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 004710E2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
    • API String ID: 4085615965-3440237614
    • Opcode ID: d46f0dc6a402942f8e7c2c56388383e1fbb47624789ac98c9c2308d24ef9fef1
    • Instruction ID: 4ea733558c9692989c64ea5f36e42be92b13a76634dc251051ad4f24abf1ae27
    • Opcode Fuzzy Hash: d46f0dc6a402942f8e7c2c56388383e1fbb47624789ac98c9c2308d24ef9fef1
    • Instruction Fuzzy Hash: 076190716043019FD310EF65CC85E9FB7A8FFC9704F104A2EF59497291DB74AA098BAA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsicoll
    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
    • API String ID: 3832890014-4202584635
    • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
    • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
    • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
    • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
    APIs
    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
    • GetFocus.USER32 ref: 0046A0DD
    • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessagePost$CtrlFocus
    • String ID: 0
    • API String ID: 1534620443-4108050209
    • Opcode ID: 5bdeef9738118ee5c9c38733562ec940b83ad32b40f05922a010845f715a3b7f
    • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
    • Opcode Fuzzy Hash: 5bdeef9738118ee5c9c38733562ec940b83ad32b40f05922a010845f715a3b7f
    • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
    APIs
    • DestroyWindow.USER32(?), ref: 004558E3
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,00000000), ref: 0045592C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$CreateDestroy
    • String ID: ,$tooltips_class32
    • API String ID: 1109047481-3856767331
    • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
    • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
    • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
    • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
    APIs
    • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
    • GetMenuItemCount.USER32(?), ref: 00468C45
    • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
    • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
    • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
    • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
    • GetMenuItemCount.USER32 ref: 00468CFD
    • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
    • GetCursorPos.USER32(?), ref: 00468D3F
    • SetForegroundWindow.USER32(?), ref: 00468D49
    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
    • String ID: 0
    • API String ID: 1441871840-4108050209
    • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
    • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
    • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
    • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
    APIs
    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
    • __swprintf.LIBCMT ref: 00460915
    • __swprintf.LIBCMT ref: 0046092D
    • _wprintf.LIBCMT ref: 004609E1
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
    • API String ID: 3631882475-2268648507
    • Opcode ID: fa3f6862133619af0c8d91bc8d1f7a2e71e3d76ca5879c2374ca29fe6f13d18d
    • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
    • Opcode Fuzzy Hash: fa3f6862133619af0c8d91bc8d1f7a2e71e3d76ca5879c2374ca29fe6f13d18d
    • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
    APIs
    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
    • SendMessageW.USER32 ref: 00471740
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
    • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
    • SendMessageW.USER32 ref: 0047184F
    • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
    • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
    • String ID:
    • API String ID: 4116747274-0
    • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
    • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
    • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
    • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
    APIs
    • GetClassNameW.USER32(?,?,00000100), ref: 00461678
    • _wcslen.LIBCMT ref: 00461683
    • __swprintf.LIBCMT ref: 00461721
    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
    • GetClassNameW.USER32(?,?,00000400), ref: 00461811
    • GetDlgCtrlID.USER32(?), ref: 00461869
    • GetWindowRect.USER32(?,?), ref: 004618A4
    • GetParent.USER32(?), ref: 004618C3
    • ScreenToClient.USER32(00000000), ref: 004618CA
    • GetClassNameW.USER32(?,?,00000100), ref: 00461941
    • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
    • String ID: %s%u
    • API String ID: 1899580136-679674701
    • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
    • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
    • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
    • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
    APIs
    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
    • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: InfoItemMenu$Sleep
    • String ID: 0
    • API String ID: 1196289194-4108050209
    • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
    • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
    • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
    • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
    APIs
    • GetDC.USER32(00000000), ref: 0043143E
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
    • CreateCompatibleDC.GDI32(00000000), ref: 00431459
    • SelectObject.GDI32(00000000,?), ref: 00431466
    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
    • String ID: (
    • API String ID: 3300687185-3887548279
    • Opcode ID: 1a3f62e8fb17afda8d6fcc23eed94a387a48bc8ee2b3109f4c6c0d9ae14dcc08
    • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
    • Opcode Fuzzy Hash: 1a3f62e8fb17afda8d6fcc23eed94a387a48bc8ee2b3109f4c6c0d9ae14dcc08
    • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
    APIs
      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
    • GetDriveTypeW.KERNEL32 ref: 0045DB32
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
    • API String ID: 1976180769-4113822522
    • Opcode ID: 0f6c8a3de1c9442f7f3474ab6782275dee6e5c09c811d69c53e3fb1fd536eda6
    • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
    • Opcode Fuzzy Hash: 0f6c8a3de1c9442f7f3474ab6782275dee6e5c09c811d69c53e3fb1fd536eda6
    • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcslen$_wcsncpy$LocalTime__fassign
    • String ID:
    • API String ID: 461458858-0
    • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
    • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
    • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
    • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
    • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
    • GlobalLock.KERNEL32(00000000), ref: 004300F6
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
    • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
    • CloseHandle.KERNEL32(00000000), ref: 00430113
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
    • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
    • GlobalFree.KERNEL32(00000000), ref: 00430150
    • GetObjectW.GDI32(?,00000018,?), ref: 00430177
    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
    • DeleteObject.GDI32(?), ref: 004301D0
    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
    • String ID:
    • API String ID: 3969911579-0
    • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
    • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
    • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
    • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
    • String ID: 0
    • API String ID: 956284711-4108050209
    • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
    • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
    • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
    • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
    • String ID: 0.0.0.0
    • API String ID: 1965227024-3771769585
    • Opcode ID: 26b12fbff4d00c82a0a207e3059eddb61ab54a01c3bbbcf423605757ca3fe1a5
    • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
    • Opcode Fuzzy Hash: 26b12fbff4d00c82a0a207e3059eddb61ab54a01c3bbbcf423605757ca3fe1a5
    • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: SendString$_memmove_wcslen
    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
    • API String ID: 369157077-1007645807
    • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
    • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
    • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
    • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
    APIs
    • GetParent.USER32 ref: 00445BF8
    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
    • __wcsicoll.LIBCMT ref: 00445C33
    • __wcsicoll.LIBCMT ref: 00445C4F
    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsicoll$ClassMessageNameParentSend
    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
    • API String ID: 3125838495-3381328864
    • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
    • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
    • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
    • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
    APIs
    • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
    • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
    • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
    • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
    • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
    • SendMessageW.USER32(?,00000402,?), ref: 00449399
    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$CharNext
    • String ID:
    • API String ID: 1350042424-0
    • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
    • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
    • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
    • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
    APIs
      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
    • GetDriveTypeW.KERNEL32(?), ref: 004787B9
    • _wcscpy.LIBCMT ref: 004787E5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
    • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
    • API String ID: 3052893215-2127371420
    • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
    • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
    • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
    • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
    APIs
    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
    • __swprintf.LIBCMT ref: 0045E7F7
    • _wprintf.LIBCMT ref: 0045E8B3
    • _wprintf.LIBCMT ref: 0045E8D7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
    • API String ID: 2295938435-2354261254
    • Opcode ID: 44e01960a33580a095bbf2e3e13559187395cafc70d58b6b713acd2f3f366ced
    • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
    • Opcode Fuzzy Hash: 44e01960a33580a095bbf2e3e13559187395cafc70d58b6b713acd2f3f366ced
    • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __swprintf_wcscpy$__i64tow__itow
    • String ID: %.15g$0x%p$False$True
    • API String ID: 3038501623-2263619337
    • Opcode ID: 9558fb29f32284a54d229eda63eecd6038d83cdafd4a91f3ef0076e5298f973b
    • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
    • Opcode Fuzzy Hash: 9558fb29f32284a54d229eda63eecd6038d83cdafd4a91f3ef0076e5298f973b
    • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
    APIs
    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
    • __swprintf.LIBCMT ref: 0045E5F6
    • _wprintf.LIBCMT ref: 0045E6A3
    • _wprintf.LIBCMT ref: 0045E6C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
    • API String ID: 2295938435-8599901
    • Opcode ID: 97ebc5a5c228c2a30bddf96a7da616a93a1f5c8b5e746e323a0bc296dbc3a2d1
    • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
    • Opcode Fuzzy Hash: 97ebc5a5c228c2a30bddf96a7da616a93a1f5c8b5e746e323a0bc296dbc3a2d1
    • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
    APIs
    • timeGetTime.WINMM ref: 00443B67
      • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
    • Sleep.KERNEL32(0000000A), ref: 00443B9F
    • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
    • SetActiveWindow.USER32(?), ref: 00443BEC
    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
    • Sleep.KERNEL32(000000FA), ref: 00443C2D
    • IsWindow.USER32(?), ref: 00443C3A
    • EndDialog.USER32(?,00000000), ref: 00443C4C
      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
    • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
    • String ID: BUTTON
    • API String ID: 1834419854-3405671355
    • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
    • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
    • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
    • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
    • LoadStringW.USER32(00000000), ref: 00454040
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • _wprintf.LIBCMT ref: 00454074
    • __swprintf.LIBCMT ref: 004540A3
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
    • API String ID: 455036304-4153970271
    • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
    • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
    • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
    • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 004104C3
    • RegisterClassExW.USER32(00000030), ref: 004104ED
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
    • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
    • LoadIconW.USER32(00000000,000000A9), ref: 00410542
    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,00000000), ref: 00410552
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
    • API String ID: 2914291525-1005189915
    • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
    • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
    • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
    • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99
    APIs
    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
    • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
    • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
    • _memmove.LIBCMT ref: 00467EB8
    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
    • _memmove.LIBCMT ref: 00467F6C
    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
    • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
    • String ID:
    • API String ID: 2170234536-0
    • Opcode ID: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
    • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
    • Opcode Fuzzy Hash: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
    • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
    APIs
    • GetKeyboardState.USER32(?), ref: 00453CE0
    • SetKeyboardState.USER32(?), ref: 00453D3B
    • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
    • GetKeyState.USER32(000000A0), ref: 00453D75
    • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
    • GetKeyState.USER32(000000A1), ref: 00453DB5
    • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
    • GetKeyState.USER32(00000011), ref: 00453DEF
    • GetAsyncKeyState.USER32(00000012), ref: 00453E18
    • GetKeyState.USER32(00000012), ref: 00453E26
    • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
    • GetKeyState.USER32(0000005B), ref: 00453E5D
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
    • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
    • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
    • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
    APIs
    • GetDlgItem.USER32(?,00000001), ref: 004357DB
    • GetWindowRect.USER32(00000000,?), ref: 004357ED
    • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
    • GetDlgItem.USER32(?,00000002), ref: 0043586A
    • GetWindowRect.USER32(00000000,?), ref: 0043587C
    • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
    • GetDlgItem.USER32(?,000003E9), ref: 004358DC
    • GetWindowRect.USER32(00000000,?), ref: 004358EE
    • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
    • GetDlgItem.USER32(?,000003EA), ref: 00435941
    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$ItemMoveRect$Invalidate
    • String ID:
    • API String ID: 3096461208-0
    • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
    • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
    • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
    • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
    APIs
    • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
    • DeleteObject.GDI32(?), ref: 0047151E
    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
    • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
    • DeleteObject.GDI32(?), ref: 004715EA
    • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
    • String ID:
    • API String ID: 3218148540-0
    • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
    • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
    • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
    • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
    • String ID:
    • API String ID: 136442275-0
    • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
    • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
    • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
    • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
    APIs
    • _wcsncpy.LIBCMT ref: 00467490
    • _wcsncpy.LIBCMT ref: 004674BC
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • _wcstok.LIBCMT ref: 004674FF
      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
    • _wcstok.LIBCMT ref: 004675B2
    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
    • _wcslen.LIBCMT ref: 00467793
    • _wcscpy.LIBCMT ref: 00467641
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • _wcslen.LIBCMT ref: 004677BD
    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
    • String ID: X
    • API String ID: 3104067586-3081909835
    • Opcode ID: b68abb8f803176e9b7dbe847da29e758ec7e9b5067a266dcb368a43c8e18a4a8
    • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
    • Opcode Fuzzy Hash: b68abb8f803176e9b7dbe847da29e758ec7e9b5067a266dcb368a43c8e18a4a8
    • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
    APIs
    • OleInitialize.OLE32(00000000), ref: 0046CBC7
    • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
    • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
    • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
    • _wcslen.LIBCMT ref: 0046CDB0
    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
    • CoTaskMemFree.OLE32(?), ref: 0046CE42
    • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
      • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
      • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
      • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
    Strings
    • NULL Pointer assignment, xrefs: 0046CEA6
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
    • String ID: NULL Pointer assignment
    • API String ID: 440038798-2785691316
    • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
    • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
    • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
    • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
    APIs
    • GetClassNameW.USER32(?,?,00000400), ref: 00461056
    • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
    • _wcslen.LIBCMT ref: 004610A3
    • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
    • GetClassNameW.USER32(?,?,00000400), ref: 00461124
    • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
    • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
    • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
    • GetWindowRect.USER32(?,?), ref: 00461248
      • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
    • String ID: ThumbnailClass
    • API String ID: 4136854206-1241985126
    • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
    • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
    • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
    • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
    APIs
    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
    • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
    • GetClientRect.USER32(?,?), ref: 00471A1A
    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
    • DestroyIcon.USER32(?), ref: 00471AF4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
    • String ID: 2
    • API String ID: 1331449709-450215437
    • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
    • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
    • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
    • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
    APIs
    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
    • __swprintf.LIBCMT ref: 00460915
    • __swprintf.LIBCMT ref: 0046092D
    • _wprintf.LIBCMT ref: 004609E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
    • API String ID: 3054410614-2561132961
    • Opcode ID: 525672c6318f03bf5c80d6cc28fa1f1d99bb47d67e8ddb41e80830938e70613e
    • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
    • Opcode Fuzzy Hash: 525672c6318f03bf5c80d6cc28fa1f1d99bb47d67e8ddb41e80830938e70613e
    • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
    • CLSIDFromString.OLE32(?,?), ref: 004587B3
    • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
    • RegCloseKey.ADVAPI32(?), ref: 004587C5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
    • API String ID: 600699880-22481851
    • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
    • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
    • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
    • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: DestroyWindow
    • String ID: static
    • API String ID: 3375834691-2160076837
    • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
    • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
    • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
    • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D959
    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$DriveType
    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
    • API String ID: 2907320926-3566645568
    • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
    • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
    • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
    • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 0041039B
    • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
    • LoadIconW.USER32(?,00000063), ref: 004103C0
    • LoadIconW.USER32(?,000000A4), ref: 004103D3
    • LoadIconW.USER32(?,000000A2), ref: 004103E6
    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
    • RegisterClassExW.USER32(?), ref: 0041045D
      • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
      • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
      • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
      • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
      • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
      • Part of subcall function 00410490: LoadIconW.USER32(00000000,000000A9), ref: 00410542
      • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,00000000), ref: 00410552
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
    • String ID: #$0$AutoIt v3
    • API String ID: 423443420-4155596026
    • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
    • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
    • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
    • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
    APIs
      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
    • DestroyAcceleratorTable.USER32(?), ref: 0047094A
    • ImageList_Destroy.COMCTL32(?), ref: 004709AD
    • ImageList_Destroy.COMCTL32(?), ref: 004709C5
    • ImageList_Destroy.COMCTL32(?), ref: 004709D5
    • DeleteObject.GDI32(?), ref: 00470A04
    • DestroyIcon.USER32(?), ref: 00470A1C
    • DeleteObject.GDI32(?), ref: 00470A34
    • DestroyWindow.USER32(?), ref: 00470A4C
    • DestroyIcon.USER32(?), ref: 00470A73
    • DestroyIcon.USER32(?), ref: 00470A81
    • KillTimer.USER32(00000000,00000000), ref: 00470B00
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
    • String ID:
    • API String ID: 1237572874-0
    • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
    • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
    • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
    • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
    APIs
    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
    • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
    • VariantInit.OLEAUT32(?), ref: 004793E1
    • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
    • VariantCopy.OLEAUT32(?,?), ref: 00479461
    • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
    • VariantClear.OLEAUT32(?), ref: 00479489
    • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
    • VariantClear.OLEAUT32(?), ref: 004794CA
    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
    • String ID:
    • API String ID: 2706829360-0
    • Opcode ID: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
    • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
    • Opcode Fuzzy Hash: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
    • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
    APIs
    • GetKeyboardState.USER32(?), ref: 0044480E
    • GetAsyncKeyState.USER32(000000A0), ref: 00444899
    • GetKeyState.USER32(000000A0), ref: 004448AA
    • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
    • GetKeyState.USER32(000000A1), ref: 004448D9
    • GetAsyncKeyState.USER32(00000011), ref: 004448F5
    • GetKeyState.USER32(00000011), ref: 00444903
    • GetAsyncKeyState.USER32(00000012), ref: 0044491F
    • GetKeyState.USER32(00000012), ref: 0044492D
    • GetAsyncKeyState.USER32(0000005B), ref: 00444949
    • GetKeyState.USER32(0000005B), ref: 00444958
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
    • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
    • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
    • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: InitVariant$_malloc_wcscpy_wcslen
    • String ID:
    • API String ID: 3413494760-0
    • Opcode ID: 2a8305ef8d4776459e33b90f77451cd3990213b7daaf01a0e2fad0b7a80df6fc
    • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
    • Opcode Fuzzy Hash: 2a8305ef8d4776459e33b90f77451cd3990213b7daaf01a0e2fad0b7a80df6fc
    • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _strncmp
    • String ID: '$DEFINE$\$`$h$h
    • API String ID: 909875538-3708680428
    • Opcode ID: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
    • Instruction ID: 816ce89e9d314c50cae2ff635e2dae77420ade2a81b985ada7b38a9c48760da0
    • Opcode Fuzzy Hash: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
    • Instruction Fuzzy Hash: C502B470A042498FEF14CF69C9906AEBBF2FF85304F2481AED8459B341D7399946CB55
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressProc_free_malloc$_strcat_strlen
    • String ID: AU3_FreeVar
    • API String ID: 2634073740-771828931
    • Opcode ID: 541c90b565702ce7dbf644f146bde85b045e57c542551da08e129f5016a5b795
    • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
    • Opcode Fuzzy Hash: 541c90b565702ce7dbf644f146bde85b045e57c542551da08e129f5016a5b795
    • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
    APIs
    • CoInitialize.OLE32 ref: 0046C63A
    • CoUninitialize.OLE32 ref: 0046C645
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
      • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
    • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
    • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
    • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
    • IIDFromString.OLE32(?,?), ref: 0046C705
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
    • API String ID: 2294789929-1287834457
    • Opcode ID: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
    • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
    • Opcode Fuzzy Hash: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
    • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
    APIs
      • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
      • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
    • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
    • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
    • ImageList_EndDrag.COMCTL32 ref: 00471169
    • ReleaseCapture.USER32 ref: 0047116F
    • SetWindowTextW.USER32(?,00000000), ref: 00471206
    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
    • String ID: @GUI_DRAGFILE$@GUI_DROPID
    • API String ID: 2483343779-2107944366
    • Opcode ID: 038dcd04e55ec5c438f21b4de5b1dce7b91b6dae1b9492eacb09f34ba24fe95b
    • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
    • Opcode Fuzzy Hash: 038dcd04e55ec5c438f21b4de5b1dce7b91b6dae1b9492eacb09f34ba24fe95b
    • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
    APIs
    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
    • _wcslen.LIBCMT ref: 00450720
    • _wcscat.LIBCMT ref: 00450733
    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
    • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$Window_wcscat_wcslen
    • String ID: -----$SysListView32
    • API String ID: 4008455318-3975388722
    • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
    • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
    • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
    • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
    APIs
    • EnumProcesses.PSAPI(?,00000800,?,?,00443D49,?,?,?,004A8178), ref: 00433DBB
    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,004A8178), ref: 00433E19
    • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00433E2C
    • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104), ref: 00433E43
    • __wsplitpath.LIBCMT ref: 00433E6D
    • _wcscat.LIBCMT ref: 00433E80
    • __wcsicoll.LIBCMT ref: 00433E90
    • CloseHandle.KERNEL32(00000000), ref: 00433EC8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: EnumProcess$BaseCloseHandleModuleModulesNameOpenProcesses__wcsicoll__wsplitpath_wcscat
    • String ID: I=D
    • API String ID: 2903788889-2605949546
    • Opcode ID: e2a61d30099513a4b86aa9445ff639564bac9cad2a304c62a227ff9d1443cd16
    • Instruction ID: 36098e5712afd53b5e3c4de91d69c0015cf2cbbc5c01d2287a97767e02e0faf1
    • Opcode Fuzzy Hash: e2a61d30099513a4b86aa9445ff639564bac9cad2a304c62a227ff9d1443cd16
    • Instruction Fuzzy Hash: 05319376600108AFDB11CFA4CD85EEF73B9AF8C701F10419AFA0987250DB75AB85CBA4
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
    • GetDlgCtrlID.USER32(00000000), ref: 00469C84
    • GetParent.USER32 ref: 00469C98
    • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
    • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
    • GetParent.USER32 ref: 00469CBC
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 2360848162-1403004172
    • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
    • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
    • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
    • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469E71
    • GetDlgCtrlID.USER32(00000000), ref: 00469E82
    • GetParent.USER32 ref: 00469E96
    • SendMessageW.USER32(00000000,?,00000111), ref: 00469E9D
    • GetDlgCtrlID.USER32(00000000), ref: 00469EA3
    • GetParent.USER32 ref: 00469EBA
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469EC1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 2360848162-1403004172
    • Opcode ID: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
    • Instruction ID: 3a0c9dd1fa5fd4c1d1a647422213a645dfa1e4764d365342f395b6f430504e68
    • Opcode Fuzzy Hash: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
    • Instruction Fuzzy Hash: D121F7716001187BDB00ABA9CC85BBF77ACEB85310F00855FFA44EB2D5D6B8DC4587A5
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
    • String ID:
    • API String ID: 262282135-0
    • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
    • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
    • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
    • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
    APIs
    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
    • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
    • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID:
    • API String ID: 312131281-0
    • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
    • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
    • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
    • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
    APIs
      • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
    • SendMessageW.USER32(769523D0,00001001,00000000,?), ref: 00448E16
    • SendMessageW.USER32(769523D0,00001026,00000000,?), ref: 00448E25
      • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$BrushCreateDeleteObjectSolid
    • String ID:
    • API String ID: 3771399671-0
    • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
    • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
    • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
    • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00434643
    • GetForegroundWindow.USER32(00000000), ref: 00434655
    • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
    • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
    • String ID:
    • API String ID: 2156557900-0
    • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
    • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
    • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
    • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
    • API String ID: 0-1603158881
    • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
    • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
    • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
    • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
    APIs
    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
    • DestroyWindow.USER32(?), ref: 00426F50
    • UnregisterHotKey.USER32(?), ref: 00426F77
    • FreeLibrary.KERNEL32(?), ref: 0042701F
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
    • String ID: close all$#v
    • API String ID: 4174999648-3101823635
    • Opcode ID: bff2fcf0380ed1109d9e97093e2b24a73880c514d234ccde4525561dc618a34d
    • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
    • Opcode Fuzzy Hash: bff2fcf0380ed1109d9e97093e2b24a73880c514d234ccde4525561dc618a34d
    • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
    APIs
    • CreateMenu.USER32 ref: 00448603
    • SetMenu.USER32(?,00000000), ref: 00448613
    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
    • IsMenu.USER32(?), ref: 004486AB
    • CreatePopupMenu.USER32 ref: 004486B5
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
    • DrawMenuBar.USER32 ref: 004486F5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Menu$CreateItem$DrawInfoInsertPopup
    • String ID: 0
    • API String ID: 161812096-4108050209
    • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
    • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
    • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
    • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 204a62f87721512235ad49b95d856cee8e1f5862e003688d905bed4d5cc31dde
    • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
    • Opcode Fuzzy Hash: 204a62f87721512235ad49b95d856cee8e1f5862e003688d905bed4d5cc31dde
    • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
    • Instruction ID: d12da5a9263b129e99c802cec43d72d92cc496201e336192e500ad81068e5f87
    • Opcode Fuzzy Hash: b2351d13dc7e01734d52893050a6426585663f8e33c7fb02d488baa67b0c7faf
    • Instruction Fuzzy Hash: D7519C70600305ABEB20DF69CC81F9B77A8AB08715F50462AFE05DB3C1E7B5E8588B58
    APIs
      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
    • lstrcmpiW.KERNEL32(?,?), ref: 00453900
    • MoveFileW.KERNEL32(?,?), ref: 00453932
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: File$AttributesFullMoveNamePathlstrcmpi
    • String ID:
    • API String ID: 978794511-0
    • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
    • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
    • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
    • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
    • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
    • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
    • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
    APIs
      • Part of subcall function 00445AA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00445AC7
      • Part of subcall function 00445AA7: GetCurrentThreadId.KERNEL32 ref: 00445ACE
      • Part of subcall function 00445AA7: AttachThreadInput.USER32(00000000), ref: 00445AD5
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445E6F
    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00445E88
    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445E96
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445E9C
    • PostMessageW.USER32(00000000,00000100,00000027,00000000), ref: 00445EBD
    • Sleep.KERNEL32(00000000), ref: 00445ECB
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445ED1
    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00445EE6
    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445EEE
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
    • String ID:
    • API String ID: 2014098862-0
    • Opcode ID: 5ca03ddf5c5627d7609a553b695717aade5f72ce3845e2189486292beca2fa90
    • Instruction ID: 3cb45b36699f005c3339592b7719367c9fd6f04972b18b3a4454280c1561912d
    • Opcode Fuzzy Hash: 5ca03ddf5c5627d7609a553b695717aade5f72ce3845e2189486292beca2fa90
    • Instruction Fuzzy Hash: 44115671390300BBF6209B959D8AF5A775DEB98B11F20490DFB80AB1C1C5F5A4418B7C
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID:
    • API String ID: 1473721057-0
    • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
    • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
    • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
    • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove$_memcmp
    • String ID: '$\$h
    • API String ID: 2205784470-1303700344
    • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
    • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
    • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
    • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
    APIs
    • VariantInit.OLEAUT32(00000000), ref: 0045EA56
    • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
    • VariantClear.OLEAUT32 ref: 0045EA6D
    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
    • __swprintf.LIBCMT ref: 0045EC33
    • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
    Strings
    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$InitTime$ClearCopySystem__swprintf
    • String ID: %4d%02d%02d%02d%02d%02d
    • API String ID: 2441338619-1568723262
    • Opcode ID: c249b4bb22c479881ec575d2075add2cc07daae690d7195f66b3f0f4b7776076
    • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
    • Opcode Fuzzy Hash: c249b4bb22c479881ec575d2075add2cc07daae690d7195f66b3f0f4b7776076
    • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
    APIs
    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
    • Sleep.KERNEL32(0000000A), ref: 0042C67F
    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Interlocked$DecrementIncrement$Sleep
    • String ID: @COM_EVENTOBJ
    • API String ID: 327565842-2228938565
    • Opcode ID: 997b95c1e3285604d7d07a7155651dd6665a5d9619594153496ea208ffa7f47c
    • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
    • Opcode Fuzzy Hash: 997b95c1e3285604d7d07a7155651dd6665a5d9619594153496ea208ffa7f47c
    • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
    APIs
    • VariantClear.OLEAUT32(?), ref: 0047031B
    • VariantClear.OLEAUT32(?), ref: 0047044F
    • VariantInit.OLEAUT32(?), ref: 004704A3
    • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
    • VariantClear.OLEAUT32(?), ref: 00470516
      • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
    • VariantCopy.OLEAUT32(?,?), ref: 0047057A
      • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
    • VariantClear.OLEAUT32(00000000), ref: 0047060D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$Clear$Copy$CallDispFuncInit
    • String ID: H
    • API String ID: 3613100350-2852464175
    • Opcode ID: bacfc3834c1e1f64d6a980e869512a64616dd68ff0230e80b28a17780798d585
    • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
    • Opcode Fuzzy Hash: bacfc3834c1e1f64d6a980e869512a64616dd68ff0230e80b28a17780798d585
    • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
    APIs
    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
    • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
    • String ID:
    • API String ID: 1291720006-3916222277
    • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
    • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
    • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
    • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
    APIs
    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
    • IsMenu.USER32(?), ref: 0045FC5F
    • CreatePopupMenu.USER32 ref: 0045FC97
    • GetMenuItemCount.USER32(?), ref: 0045FCFD
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Menu$Item$CountCreateInfoInsertPopup
    • String ID: 0$2
    • API String ID: 93392585-3793063076
    • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
    • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
    • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
    • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
    APIs
    • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
    • KillTimer.USER32(?,00000001,?), ref: 004011B9
    • PostQuitMessage.USER32(00000000), ref: 004011CB
    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
    • CreatePopupMenu.USER32 ref: 00401204
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
    • String ID: TaskbarCreated
    • API String ID: 129472671-2362178303
    • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
    • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
    • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
    • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E
    APIs
    • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
    • VariantClear.OLEAUT32(?), ref: 00435320
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
    • VariantClear.OLEAUT32(?), ref: 004353B3
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
    • String ID: crts
    • API String ID: 586820018-3724388283
    • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
    • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
    • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
    • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
    APIs
      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
    • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
    • _wcscat.LIBCMT ref: 0044BCAF
    • _wcslen.LIBCMT ref: 0044BCBB
    • _wcslen.LIBCMT ref: 0044BCD1
    • SHFileOperationW.SHELL32(?), ref: 0044BD17
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
    • String ID: \*.*
    • API String ID: 2326526234-1173974218
    • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
    • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
    • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
    • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
    APIs
      • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
    • _wcslen.LIBCMT ref: 004335F2
    • GetFileAttributesW.KERNEL32(?), ref: 0043361C
    • GetLastError.KERNEL32 ref: 0043362B
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
    • _wcsrchr.LIBCMT ref: 00433666
      • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
    • String ID: \
    • API String ID: 321622961-2967466578
    • Opcode ID: 526c1cfc3a43b05f59396125bad82ada4ca6822ef6053a482ff07b87bd9873bd
    • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
    • Opcode Fuzzy Hash: 526c1cfc3a43b05f59396125bad82ada4ca6822ef6053a482ff07b87bd9873bd
    • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
    • API String ID: 1038674560-2734436370
    • Opcode ID: efa81754a5abe8513f160bb6911180a265eadee6fd6379dbf0aa142365742102
    • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
    • Opcode Fuzzy Hash: efa81754a5abe8513f160bb6911180a265eadee6fd6379dbf0aa142365742102
    • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
    • __lock.LIBCMT ref: 00417981
      • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
      • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
      • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
    • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
    • __lock.LIBCMT ref: 004179A2
    • ___addlocaleref.LIBCMT ref: 004179C0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
    • String ID: KERNEL32.DLL$pI
    • API String ID: 637971194-197072765
    • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
    • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
    • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
    • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove$_malloc
    • String ID:
    • API String ID: 1938898002-0
    • Opcode ID: 1bed212381ad3185792968c85b8b0abedda8a146b74a926c962dbafdbe4d9c2e
    • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
    • Opcode Fuzzy Hash: 1bed212381ad3185792968c85b8b0abedda8a146b74a926c962dbafdbe4d9c2e
    • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
    APIs
      • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
    • SendMessageW.USER32(769523D0,00001001,00000000,?), ref: 00448E16
    • SendMessageW.USER32(769523D0,00001026,00000000,?), ref: 00448E25
      • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$BrushCreateDeleteObjectSolid
    • String ID:
    • API String ID: 3771399671-0
    • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
    • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
    • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
    • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
    APIs
    • SysAllocString.OLEAUT32(00000000), ref: 00434EE8
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00434F0B
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00434F37
    • SysAllocString.OLEAUT32(00000000), ref: 00434F3E
    • SysAllocString.OLEAUT32(?), ref: 00434F64
    • SysFreeString.OLEAUT32(?), ref: 00434F6D
    • StringFromGUID2.OLE32(?,?,00000028), ref: 00434FA8
    • SysAllocString.OLEAUT32(?), ref: 00434FB6
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
    • String ID:
    • API String ID: 3761583154-0
    • Opcode ID: 5e4403ef6ed37e1d137cb97d7d4a89a2378753c8b4a47dbacee134994b78d1de
    • Instruction ID: 62a2b3f98caf240b0b87dceec1cde1b3ad41479520e9ab1bd59fe61f77259947
    • Opcode Fuzzy Hash: 5e4403ef6ed37e1d137cb97d7d4a89a2378753c8b4a47dbacee134994b78d1de
    • Instruction Fuzzy Hash: A631A5327001186BC710AB99EC49FEFB7A8EB8C731F14427BFA09D7290DA759844C7A4
    APIs
    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
    • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
    • _memmove.LIBCMT ref: 0044B555
    • _memmove.LIBCMT ref: 0044B578
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
    • String ID:
    • API String ID: 2737351978-0
    • Opcode ID: 5789a2044f73980f16ba12a49533b714abcc400cabe2e4c88e4fa865c8451c83
    • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
    • Opcode Fuzzy Hash: 5789a2044f73980f16ba12a49533b714abcc400cabe2e4c88e4fa865c8451c83
    • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 0041523A
    • __calloc_crt.LIBCMT ref: 00415246
    • __getptd.LIBCMT ref: 00415253
    • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
    • _free.LIBCMT ref: 0041529E
    • __dosmaperr.LIBCMT ref: 004152A9
      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
    • String ID:
    • API String ID: 3638380555-0
    • Opcode ID: 1654a222b4646c9f69efac9ffde4207e0fedfcb173d1918ac66127d2e2137f4d
    • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
    • Opcode Fuzzy Hash: 1654a222b4646c9f69efac9ffde4207e0fedfcb173d1918ac66127d2e2137f4d
    • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
    APIs
    • VariantInit.OLEAUT32(?), ref: 0046C96E
      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$Copy$ClearErrorInitLast
    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
    • API String ID: 3207048006-625585964
    • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
    • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
    • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
    • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
    APIs
    • WSAStartup.WSOCK32(00000101,?), ref: 00465559
      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
    • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
    • gethostbyname.WSOCK32(?), ref: 004655A6
    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
    • _memmove.LIBCMT ref: 004656CA
    • GlobalFree.KERNEL32(00000000), ref: 0046575C
    • WSACleanup.WSOCK32 ref: 00465762
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
    • String ID:
    • API String ID: 2945290962-0
    • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
    • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
    • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
    • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
    APIs
    • GetSystemMetrics.USER32(0000000F), ref: 00440527
    • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
    • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
    • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
    • String ID:
    • API String ID: 1457242333-0
    • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
    • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
    • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
    • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ConnectRegistry_memmove_wcslen
    • String ID:
    • API String ID: 15295421-0
    • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
    • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
    • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
    • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • _wcstok.LIBCMT ref: 004675B2
      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
    • _wcscpy.LIBCMT ref: 00467641
    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
    • _wcslen.LIBCMT ref: 00467793
    • _wcslen.LIBCMT ref: 004677BD
      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
    • String ID: X
    • API String ID: 780548581-3081909835
    • Opcode ID: 5378e8049ee2a95257be1467db38ea41a0f606468867fb51d90dd075906198f3
    • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
    • Opcode Fuzzy Hash: 5378e8049ee2a95257be1467db38ea41a0f606468867fb51d90dd075906198f3
    • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
    APIs
      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
    • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
    • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
    • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
    • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
    • CloseFigure.GDI32(?), ref: 0044751F
    • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
    • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
    • String ID:
    • API String ID: 4082120231-0
    • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
    • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
    • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
    • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
    • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
    • RegCloseKey.ADVAPI32(?), ref: 0046B49D
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
    • String ID:
    • API String ID: 2027346449-0
    • Opcode ID: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
    • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
    • Opcode Fuzzy Hash: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
    • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
    • GetMenu.USER32 ref: 0047A703
    • GetMenuItemCount.USER32(00000000), ref: 0047A74F
    • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
    • _wcslen.LIBCMT ref: 0047A79E
    • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
    • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
    • String ID:
    • API String ID: 3257027151-0
    • Opcode ID: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
    • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
    • Opcode Fuzzy Hash: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
    • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
    APIs
    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
    • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorLastselect
    • String ID:
    • API String ID: 215497628-0
    • Opcode ID: c4f514985c7b7d4e5508c77535d48de0581ad36333c8bb2771713ca7b92eb0a9
    • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
    • Opcode Fuzzy Hash: c4f514985c7b7d4e5508c77535d48de0581ad36333c8bb2771713ca7b92eb0a9
    • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
    APIs
    • GetParent.USER32(?), ref: 0044443B
    • GetKeyboardState.USER32(?), ref: 00444450
    • SetKeyboardState.USER32(?), ref: 004444A4
    • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
    • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
    • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
    • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
    • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
    APIs
    • GetParent.USER32(?), ref: 00444633
    • GetKeyboardState.USER32(?), ref: 00444648
    • SetKeyboardState.USER32(?), ref: 0044469C
    • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
    • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
    • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
    • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
    • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __snwprintf__wcsicoll_wcscpy
    • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
    • API String ID: 1729044348-3025626884
    • Opcode ID: 599cccbd760059ba6f53ae3639d1d80998b6b1e729bf9cd2c9905b8b1e7a15cb
    • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
    • Opcode Fuzzy Hash: 599cccbd760059ba6f53ae3639d1d80998b6b1e729bf9cd2c9905b8b1e7a15cb
    • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
    APIs
    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
    • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
    • DeleteObject.GDI32(?), ref: 00455736
    • DeleteObject.GDI32(?), ref: 00455744
    • DestroyIcon.USER32(?), ref: 00455752
    • DestroyWindow.USER32(?), ref: 00455760
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
    • String ID:
    • API String ID: 2354583917-0
    • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
    • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
    • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
    • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
    APIs
    • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
    • GetProcAddress.KERNEL32(?,?), ref: 004648F7
    • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
    • GetProcAddress.KERNEL32(?,?), ref: 0046495A
    • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressProc$Library$FreeLoad
    • String ID: #v
    • API String ID: 2449869053-554117064
    • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
    • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
    • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
    • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
    • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
    • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
    • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
    APIs
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
    • EnableWindow.USER32(?,00000000), ref: 00448B5C
    • EnableWindow.USER32(?,00000001), ref: 00448B72
    • ShowWindow.USER32(?,00000000), ref: 00448BE8
    • ShowWindow.USER32(?,00000004), ref: 00448BF4
    • EnableWindow.USER32(?,00000001), ref: 00448C09
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$Enable$Show$MessageMoveSend
    • String ID:
    • API String ID: 896007046-0
    • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
    • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
    • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
    • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
    APIs
    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
    • GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
    • GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
    • SendMessageW.USER32(00991C68,000000F1,00000000,00000000), ref: 00440E6E
    • SendMessageW.USER32(00991C68,000000F1,00000001,00000000), ref: 00440E9A
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID:
    • API String ID: 312131281-0
    • Opcode ID: 8e011b54ce9cde448a93fe9bb8036a6d541319eb6c66cabd8f3e8fc2f85cf438
    • Instruction ID: 2c169baf4234265a3f6c05f50e500cf46f5ce099e15a3d3a23704bf731ec4cbe
    • Opcode Fuzzy Hash: 8e011b54ce9cde448a93fe9bb8036a6d541319eb6c66cabd8f3e8fc2f85cf438
    • Instruction Fuzzy Hash: 944189342402119FE720CF58DDC4F2A77A1FF9A710F6049A9E2119B3A1CB74ACA2CB58
    APIs
    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
    • GetFocus.USER32 ref: 00448ACF
    • EnableWindow.USER32(?,00000000), ref: 00448B5C
    • EnableWindow.USER32(?,00000001), ref: 00448B72
    • ShowWindow.USER32(?,00000000), ref: 00448BE8
    • ShowWindow.USER32(?,00000004), ref: 00448BF4
    • EnableWindow.USER32(?,00000001), ref: 00448C09
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$Enable$Show$FocusMessageSend
    • String ID:
    • API String ID: 3429747543-0
    • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
    • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
    • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
    • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
    APIs
      • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
      • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
      • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
    • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
    • String ID:
    • API String ID: 3300667738-0
    • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
    • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
    • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
    • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D459
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
    • __swprintf.LIBCMT ref: 0045D4E9
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume__swprintf
    • String ID: %lu$\VH
    • API String ID: 3164766367-2432546070
    • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
    • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
    • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
    • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
    APIs
    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: Msctls_Progress32
    • API String ID: 3850602802-3636473452
    • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
    • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
    • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
    • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00433EFD
    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00433F0D
    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00433F38
    • __wsplitpath.LIBCMT ref: 00433F63
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcscat.LIBCMT ref: 00433F76
    • __wcsicoll.LIBCMT ref: 00433F86
    • CloseHandle.KERNEL32(00000000), ref: 00433FBF
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
    • String ID:
    • API String ID: 2547909840-0
    • Opcode ID: 182a9fd14032e8e93bb148eed081eedfbc5356b8f5808f875ed41f9760706005
    • Instruction ID: e17d583989bb1df9e9dd6b28cd90faaf4a95b78209a4298828de810110d6b8cb
    • Opcode Fuzzy Hash: 182a9fd14032e8e93bb148eed081eedfbc5356b8f5808f875ed41f9760706005
    • Instruction Fuzzy Hash: 9621EAB2800109ABC721DF50DC84FEEB7B8AB48300F5045DEF60997240EB799B84CFA4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
    • String ID:
    • API String ID: 3985565216-0
    • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
    • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
    • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
    • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
    APIs
    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,004A8178), ref: 00433E19
    • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00433E2C
    • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104), ref: 00433E43
    • __wsplitpath.LIBCMT ref: 00433E6D
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcscat.LIBCMT ref: 00433E80
    • __wcsicoll.LIBCMT ref: 00433E90
    • CloseHandle.KERNEL32(00000000), ref: 00433EC8
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Process$BaseCloseEnumHandleModuleModulesNameOpen__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
    • String ID:
    • API String ID: 135935984-0
    • Opcode ID: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
    • Instruction ID: 66738fc5919b7c3a3c7c4a311c48fd84e22d6c2a66b6279363cc5d51ef299119
    • Opcode Fuzzy Hash: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
    • Instruction Fuzzy Hash: 832180B6500118AFDB11CF90CD85EEEB379EB8C700F10459AFA0997150DA75AA85CBA4
    APIs
    • _malloc.LIBCMT ref: 0041F707
      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
    • _free.LIBCMT ref: 0041F71A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AllocateHeap_free_malloc
    • String ID: [B
    • API String ID: 1020059152-632041663
    • Opcode ID: fb2c2a04e00756f7c045e2cf33d68372e445ba8eb1714cf227669b285e538727
    • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
    • Opcode Fuzzy Hash: fb2c2a04e00756f7c045e2cf33d68372e445ba8eb1714cf227669b285e538727
    • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 00413DA4
    • __calloc_crt.LIBCMT ref: 00413DB0
    • __getptd.LIBCMT ref: 00413DBD
    • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
    • _free.LIBCMT ref: 00413E07
    • __dosmaperr.LIBCMT ref: 00413E12
      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
    • String ID:
    • API String ID: 155776804-0
    • Opcode ID: 747485f25b08bc58b9deeabd238d5495aef4e1f104f4def88fecd2e8df7ea77c
    • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
    • Opcode Fuzzy Hash: 747485f25b08bc58b9deeabd238d5495aef4e1f104f4def88fecd2e8df7ea77c
    • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
    APIs
      • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
      • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
    • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
    • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
    • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
    • String ID:
    • API String ID: 1957940570-0
    • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
    • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
    • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
    • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
    APIs
    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
    • ShowWindow.USER32(?,00000000), ref: 004105E4
    • ShowWindow.USER32(?,00000000), ref: 004105EE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$CreateShow
    • String ID: AutoIt v3$edit
    • API String ID: 1584632944-3779509399
    • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
    • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
    • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
    • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 00413D20
      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
    • ___fls_getvalue@4.LIBCMT ref: 00413D2B
      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
    • ___fls_setvalue@8.LIBCMT ref: 00413D3E
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
    • ExitThread.KERNEL32 ref: 00413D4E
    • GetCurrentThreadId.KERNEL32 ref: 00413D54
    • __freefls@4.LIBCMT ref: 00413D74
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
    • String ID:
    • API String ID: 259663610-0
    • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
    • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
    • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
    • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
    APIs
    • GetClientRect.USER32(?,?), ref: 004302E6
    • GetWindowRect.USER32(00000000,?), ref: 00430316
    • GetClientRect.USER32(?,?), ref: 00430364
    • GetSystemMetrics.USER32(0000000F), ref: 004303B1
    • GetWindowRect.USER32(?,?), ref: 004303C3
    • ScreenToClient.USER32(?,?), ref: 004303EC
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Rect$Client$Window$MetricsScreenSystem
    • String ID:
    • API String ID: 3220332590-0
    • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
    • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
    • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
    • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _malloc_wcslen$_strcat_wcscpy
    • String ID:
    • API String ID: 1612042205-0
    • Opcode ID: cff60bc2eb5d88776962a9065ec2abd3768e1b0cbbaf35bf9109d33c4ae81b56
    • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
    • Opcode Fuzzy Hash: cff60bc2eb5d88776962a9065ec2abd3768e1b0cbbaf35bf9109d33c4ae81b56
    • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove_strncmp
    • String ID: >$U$\
    • API String ID: 2666721431-237099441
    • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
    • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
    • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
    • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
    APIs
    • GetKeyboardState.USER32(?), ref: 0044C570
    • SetKeyboardState.USER32(00000080), ref: 0044C594
    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
    • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$InputSend
    • String ID:
    • API String ID: 2221674350-0
    • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
    • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
    • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
    • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcscpy$_wcscat
    • String ID:
    • API String ID: 2037614760-0
    • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
    • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
    • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
    • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
    APIs
    • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
    • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
    • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
    • VariantCopy.OLEAUT32(?,?), ref: 00451C27
    • VariantClear.OLEAUT32(?), ref: 00451CA1
    • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$Copy$AllocClearErrorLastString
    • String ID:
    • API String ID: 960795272-0
    • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
    • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
    • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
    • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
    APIs
    • BeginPaint.USER32(00000000,?), ref: 00447BDF
    • GetWindowRect.USER32(?,?), ref: 00447C5D
    • ScreenToClient.USER32(?,?), ref: 00447C7B
    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
    • EndPaint.USER32(?,?), ref: 00447D13
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
    • String ID:
    • API String ID: 4189319755-0
    • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
    • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
    • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
    • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
    APIs
    • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
    • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
    • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
    • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
    • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$LongWindow$InvalidateRect
    • String ID:
    • API String ID: 1976402638-0
    • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
    • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
    • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
    • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
    APIs
    • ShowWindow.USER32(?,00000000), ref: 00440A8A
    • EnableWindow.USER32(?,00000000), ref: 00440AAF
    • ShowWindow.USER32(?,00000000), ref: 00440B18
    • ShowWindow.USER32(?,00000004), ref: 00440B2B
    • EnableWindow.USER32(?,00000001), ref: 00440B50
    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$Show$Enable$MessageSend
    • String ID:
    • API String ID: 642888154-0
    • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
    • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
    • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
    • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$Copy$ClearErrorLast
    • String ID: NULL Pointer assignment$Not an Object type
    • API String ID: 2487901850-572801152
    • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
    • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
    • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
    • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
    APIs
    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
    • EnableWindow.USER32(?,00000000), ref: 00448B5C
    • EnableWindow.USER32(?,00000001), ref: 00448B72
    • ShowWindow.USER32(?,00000000), ref: 00448BE8
    • ShowWindow.USER32(?,00000004), ref: 00448BF4
    • EnableWindow.USER32(?,00000001), ref: 00448C09
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$Enable$Show$MessageSend
    • String ID:
    • API String ID: 1871949834-0
    • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
    • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
    • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
    • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
    • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
    • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
    • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
    APIs
    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
    • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
    • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
    • SendMessageW.USER32 ref: 00471AE3
    • DestroyIcon.USER32(?), ref: 00471AF4
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
    • String ID:
    • API String ID: 3611059338-0
    • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
    • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
    • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
    • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: DestroyWindow$DeleteObject$IconMove
    • String ID:
    • API String ID: 1640429340-0
    • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
    • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
    • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
    • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
    APIs
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • _wcslen.LIBCMT ref: 004438CD
    • _wcslen.LIBCMT ref: 004438E6
    • _wcstok.LIBCMT ref: 004438F8
    • _wcslen.LIBCMT ref: 0044390C
    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
    • _wcstok.LIBCMT ref: 00443931
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
    • String ID:
    • API String ID: 3632110297-0
    • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
    • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
    • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
    • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Destroy$DeleteMenuObject$IconWindow
    • String ID:
    • API String ID: 752480666-0
    • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
    • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
    • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
    • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
    APIs
    • GetCurrentProcess.KERNEL32(0000000A,?), ref: 00436EC9
    • OpenProcessToken.ADVAPI32(00000000), ref: 00436ED0
    • CreateEnvironmentBlock.USERENV(?,?,00000001), ref: 00436EE0
    • CloseHandle.KERNEL32(?), ref: 00436EED
    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 00436F23
    • DestroyEnvironmentBlock.USERENV(?), ref: 00436F36
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
    • String ID:
    • API String ID: 1413079979-0
    • Opcode ID: c9cc6947404163de0e4cba86d071e92e41844a234d0bab68a120be017310f46c
    • Instruction ID: dd31e3d5ef53dadf09d6f4902918c4fef8fb0ebcc20249036383472598af8dfc
    • Opcode Fuzzy Hash: c9cc6947404163de0e4cba86d071e92e41844a234d0bab68a120be017310f46c
    • Instruction Fuzzy Hash: 10214C7620020AABDB14CF69DD59EEB37ADEB8D310F15851AFD05A3250C775EC12CB64
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconImageList_
    • String ID:
    • API String ID: 3275902921-0
    • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
    • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
    • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
    • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconImageList_
    • String ID:
    • API String ID: 3275902921-0
    • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
    • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
    • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
    • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
    APIs
    • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: PerformanceQuery$CounterSleep$Frequency
    • String ID:
    • API String ID: 2833360925-0
    • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
    • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
    • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
    • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
    APIs
    • SendMessageW.USER32 ref: 004555C7
    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
    • DeleteObject.GDI32(?), ref: 00455736
    • DeleteObject.GDI32(?), ref: 00455744
    • DestroyIcon.USER32(?), ref: 00455752
    • DestroyWindow.USER32(?), ref: 00455760
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: DeleteDestroyMessageObjectSend$IconWindow
    • String ID:
    • API String ID: 3691411573-0
    • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
    • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
    • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
    • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
    APIs
      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
    • LineTo.GDI32(?,?,?), ref: 004472AC
    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
    • LineTo.GDI32(?,?,?), ref: 004472C6
    • EndPath.GDI32(?), ref: 004472D6
    • StrokePath.GDI32(?), ref: 004472E4
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
    • String ID:
    • API String ID: 372113273-0
    • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
    • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
    • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
    • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
    APIs
    • GetDC.USER32(00000000), ref: 0044CC6D
    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CapsDevice$Release
    • String ID:
    • API String ID: 1035833867-0
    • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
    • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
    • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
    • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
    APIs
    • __getptd.LIBCMT ref: 0041708E
      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
    • __amsg_exit.LIBCMT ref: 004170AE
    • __lock.LIBCMT ref: 004170BE
    • InterlockedDecrement.KERNEL32(?), ref: 004170DB
    • _free.LIBCMT ref: 004170EE
    • InterlockedIncrement.KERNEL32(00992D90), ref: 00417106
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
    • String ID:
    • API String ID: 3470314060-0
    • Opcode ID: 0ee54f674d42c8e19835d178a2d8f84e1f10baa1ba857576d2c295ded9b9a03e
    • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
    • Opcode Fuzzy Hash: 0ee54f674d42c8e19835d178a2d8f84e1f10baa1ba857576d2c295ded9b9a03e
    • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
    APIs
    • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
    • EnterCriticalSection.KERNEL32(?), ref: 0044B666
    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
      • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
    • String ID:
    • API String ID: 3495660284-0
    • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
    • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
    • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
    • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
    APIs
    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Virtual
    • String ID:
    • API String ID: 4278518827-0
    • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
    • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
    • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
    • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 004151C0
      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
    • ___fls_getvalue@4.LIBCMT ref: 004151CB
      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
    • ___fls_setvalue@8.LIBCMT ref: 004151DD
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
    • ExitThread.KERNEL32 ref: 004151ED
    • __freefls@4.LIBCMT ref: 00415209
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
    • String ID:
    • API String ID: 442100245-0
    • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
    • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
    • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
    • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
    APIs
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
    • _wcslen.LIBCMT ref: 0045F94A
    • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
    • String ID: 0
    • API String ID: 621800784-4108050209
    • Opcode ID: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
    • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
    • Opcode Fuzzy Hash: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
    • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SetErrorMode.KERNEL32 ref: 004781CE
    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
    • SetErrorMode.KERNEL32(?), ref: 00478270
    • SetErrorMode.KERNEL32(?), ref: 00478340
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$AttributesFile_memmove_wcslen
    • String ID: \VH
    • API String ID: 3884216118-234962358
    • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
    • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
    • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
    • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
    APIs
    • LoadLibraryA.KERNEL32(?), ref: 00434B10
    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
    • FreeLibrary.KERNEL32(?), ref: 00434B9F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Library$AddressFreeLoadProc
    • String ID: AU3_GetPluginDetails$#v
    • API String ID: 145871493-3662034293
    • Opcode ID: f586b1f7d9e7c2531e2d8d22b6f03db77309e2df70eb2dd3a2418b3d6835b531
    • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
    • Opcode Fuzzy Hash: f586b1f7d9e7c2531e2d8d22b6f03db77309e2df70eb2dd3a2418b3d6835b531
    • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
    APIs
    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
    • IsMenu.USER32(?), ref: 0044854D
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
    • DrawMenuBar.USER32 ref: 004485AF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Menu$Item$DrawInfoInsert
    • String ID: 0
    • API String ID: 3076010158-4108050209
    • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
    • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
    • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
    • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
    • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 1589278365-1403004172
    • Opcode ID: bfed425d001c9fa422ddebf872dbe37176c28e343ac168301da98a19cfb76962
    • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
    • Opcode Fuzzy Hash: bfed425d001c9fa422ddebf872dbe37176c28e343ac168301da98a19cfb76962
    • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Handle
    • String ID: nul
    • API String ID: 2519475695-2873401336
    • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
    • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
    • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
    • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
    APIs
    • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Handle
    • String ID: nul
    • API String ID: 2519475695-2873401336
    • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
    • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
    • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
    • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
    APIs
    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • _wcsncpy.LIBCMT ref: 00401C41
    • _wcscpy.LIBCMT ref: 00401C5D
    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
    • String ID: Line:
    • API String ID: 1874344091-1585850449
    • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
    • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
    • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
    • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID: SysAnimate32
    • API String ID: 0-1011021900
    • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
    • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
    • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
    • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
      • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
      • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
      • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
    • GetFocus.USER32 ref: 0046157B
      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
    • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
    • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
    • __swprintf.LIBCMT ref: 00461608
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
    • String ID: %s%d
    • API String ID: 2645982514-1110647743
    • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
    • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
    • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
    • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
    • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
    • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
    • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
    APIs
    • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
    • CloseHandle.KERNEL32(00000000), ref: 00475A4D
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Process$CloseCountersCurrentHandleOpen
    • String ID:
    • API String ID: 3488606520-0
    • Opcode ID: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
    • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
    • Opcode Fuzzy Hash: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
    • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ConnectRegistry_memmove_wcslen
    • String ID:
    • API String ID: 15295421-0
    • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
    • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
    • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
    • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
    APIs
    • GetCursorPos.USER32(?), ref: 004563A6
    • ScreenToClient.USER32(?,?), ref: 004563C3
    • GetAsyncKeyState.USER32(?), ref: 00456400
    • GetAsyncKeyState.USER32(?), ref: 00456410
    • GetWindowLongW.USER32(?,000000F0), ref: 00456466
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AsyncState$ClientCursorLongScreenWindow
    • String ID:
    • API String ID: 3539004672-0
    • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
    • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
    • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
    • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
    APIs
    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
    • Sleep.KERNEL32(0000000A), ref: 0047D455
    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Interlocked$DecrementIncrement$Sleep
    • String ID:
    • API String ID: 327565842-0
    • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
    • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
    • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
    • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
    APIs
    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: PrivateProfile$SectionWrite$String
    • String ID:
    • API String ID: 2832842796-0
    • Opcode ID: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
    • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
    • Opcode Fuzzy Hash: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
    • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
    APIs
    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
    • RegCloseKey.ADVAPI32(?), ref: 00441CFE
    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Enum$CloseDeleteOpen
    • String ID:
    • API String ID: 2095303065-0
    • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
    • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
    • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
    • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
    APIs
    • GetWindowRect.USER32(?,?), ref: 00436A24
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: RectWindow
    • String ID:
    • API String ID: 861336768-0
    • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
    • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
    • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
    • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
    APIs
    • SendMessageW.USER32 ref: 00449598
      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
    • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
    • _wcslen.LIBCMT ref: 0044960D
    • _wcslen.LIBCMT ref: 0044961A
    • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$_wcslen$_wcspbrk
    • String ID:
    • API String ID: 1856069659-0
    • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
    • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
    • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
    • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
    APIs
    • GetCursorPos.USER32(?), ref: 004478E2
    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
    • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
    • GetCursorPos.USER32(00000000), ref: 0044796A
    • TrackPopupMenuEx.USER32(?,00000000,00000000,?,?,00000000), ref: 00447991
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CursorMenuPopupTrack$Proc
    • String ID:
    • API String ID: 1300944170-0
    • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
    • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
    • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
    • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
    APIs
    • GetClientRect.USER32(?,?), ref: 004479CC
    • GetCursorPos.USER32(?), ref: 004479D7
    • ScreenToClient.USER32(?,?), ref: 004479F3
    • WindowFromPoint.USER32(?,?), ref: 00447A34
    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Client$CursorFromPointProcRectScreenWindow
    • String ID:
    • API String ID: 1822080540-0
    • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
    • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
    • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
    • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
    APIs
    • GetWindowRect.USER32(?,?), ref: 00447C5D
    • ScreenToClient.USER32(?,?), ref: 00447C7B
    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
    • EndPaint.USER32(?,?), ref: 00447D13
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ClientPaintRectRectangleScreenViewportWindow
    • String ID:
    • API String ID: 659298297-0
    • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
    • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
    • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
    • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
    APIs
    • EnableWindow.USER32(?,00000000), ref: 00448B5C
    • EnableWindow.USER32(?,00000001), ref: 00448B72
    • ShowWindow.USER32(?,00000000), ref: 00448BE8
    • ShowWindow.USER32(?,00000004), ref: 00448BF4
    • EnableWindow.USER32(?,00000001), ref: 00448C09
      • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
      • Part of subcall function 00440D98: SendMessageW.USER32(00991C68,000000F1,00000000,00000000), ref: 00440E6E
      • Part of subcall function 00440D98: SendMessageW.USER32(00991C68,000000F1,00000001,00000000), ref: 00440E9A
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$EnableMessageSend$LongShow
    • String ID:
    • API String ID: 142311417-0
    • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
    • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
    • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
    • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
    • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
    • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
    • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
    APIs
    • IsWindowVisible.USER32(?), ref: 00445879
    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
    • _wcslen.LIBCMT ref: 004458FB
    • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
    • String ID:
    • API String ID: 3087257052-0
    • Opcode ID: c25f6043a71b3d1fc860815aa8e13a3df3e462daacd53f78b782aaf91a245a98
    • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
    • Opcode Fuzzy Hash: c25f6043a71b3d1fc860815aa8e13a3df3e462daacd53f78b782aaf91a245a98
    • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
    APIs
    • IsWindow.USER32(00000000), ref: 00459F13
    • GetForegroundWindow.USER32 ref: 00459F2B
    • GetDC.USER32(00000000), ref: 00459F68
    • GetPixel.GDI32(00000000,?,00000003), ref: 00459F73
    • ReleaseDC.USER32(00000000,00000000), ref: 00459FAF
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$ForegroundPixelRelease
    • String ID:
    • API String ID: 4156661090-0
    • Opcode ID: 5afad29d2f6628ba852ec2f0e1202929834638e908bc6ef215a28b5977bea177
    • Instruction ID: 6b7338dff4dfdecd0952657b1ab2c92c8f9a91c38a36cf82f76c1914ab5c2144
    • Opcode Fuzzy Hash: 5afad29d2f6628ba852ec2f0e1202929834638e908bc6ef215a28b5977bea177
    • Instruction Fuzzy Hash: 22215076A00101ABD714EFA5CD89A5EF7A9FF88311F14856AED0997742DB74EC00CB94
    APIs
      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
    • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
    • connect.WSOCK32(00000000,?,00000010), ref: 00465446
    • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
    • closesocket.WSOCK32(00000000,00000000), ref: 00465481
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorLast$closesocketconnectinet_addrsocket
    • String ID:
    • API String ID: 245547762-0
    • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
    • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
    • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
    • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
    APIs
    • DeleteObject.GDI32(00000000), ref: 004471D8
    • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
    • SelectObject.GDI32(?,00000000), ref: 00447228
    • BeginPath.GDI32(?), ref: 0044723D
    • SelectObject.GDI32(?,00000000), ref: 00447266
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Object$Select$BeginCreateDeletePath
    • String ID:
    • API String ID: 2338827641-0
    • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
    • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
    • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
    • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
    APIs
    • Sleep.KERNEL32(00000000), ref: 00434598
    • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
    • Sleep.KERNEL32(00000000), ref: 004345D4
    • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CounterPerformanceQuerySleep
    • String ID:
    • API String ID: 2875609808-0
    • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
    • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
    • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
    • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
    APIs
    • GetDlgItem.USER32(?,000003E9), ref: 00460C17
    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
    • MessageBeep.USER32(00000000), ref: 00460C46
    • KillTimer.USER32(?,0000040A), ref: 00460C68
    • EndDialog.USER32(?,00000001), ref: 00460C83
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: BeepDialogItemKillMessageTextTimerWindow
    • String ID:
    • API String ID: 3741023627-0
    • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
    • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
    • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
    • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$Icon
    • String ID:
    • API String ID: 4023252218-0
    • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
    • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
    • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
    • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
    APIs
    • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
    • DeleteObject.GDI32(?), ref: 00455736
    • DeleteObject.GDI32(?), ref: 00455744
    • DestroyIcon.USER32(?), ref: 00455752
    • DestroyWindow.USER32(?), ref: 00455760
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: DeleteDestroyObject$IconMessageSendWindow
    • String ID:
    • API String ID: 1489400265-0
    • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
    • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
    • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
    • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
    APIs
      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
    • DestroyWindow.USER32(?), ref: 00455728
    • DeleteObject.GDI32(?), ref: 00455736
    • DeleteObject.GDI32(?), ref: 00455744
    • DestroyIcon.USER32(?), ref: 00455752
    • DestroyWindow.USER32(?), ref: 00455760
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
    • String ID:
    • API String ID: 1042038666-0
    • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
    • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
    • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
    • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Path$ObjectStroke$DeleteFillSelect
    • String ID:
    • API String ID: 2625713937-0
    • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
    • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
    • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
    • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
    APIs
    • __getptd.LIBCMT ref: 0041780F
      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
    • __getptd.LIBCMT ref: 00417826
    • __amsg_exit.LIBCMT ref: 00417834
    • __lock.LIBCMT ref: 00417844
    • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
    • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
    • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
    • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
    APIs
      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
    • ___set_flsgetvalue.LIBCMT ref: 00413D20
      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
    • ___fls_getvalue@4.LIBCMT ref: 00413D2B
      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
    • ___fls_setvalue@8.LIBCMT ref: 00413D3E
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
    • ExitThread.KERNEL32 ref: 00413D4E
    • GetCurrentThreadId.KERNEL32 ref: 00413D54
    • __freefls@4.LIBCMT ref: 00413D74
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
    • String ID:
    • API String ID: 2403457894-0
    • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
    • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
    • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
    • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
    APIs
      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
    • ___set_flsgetvalue.LIBCMT ref: 004151C0
      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
    • ___fls_getvalue@4.LIBCMT ref: 004151CB
      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
    • ___fls_setvalue@8.LIBCMT ref: 004151DD
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
    • ExitThread.KERNEL32 ref: 004151ED
    • __freefls@4.LIBCMT ref: 00415209
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
    • String ID:
    • API String ID: 4247068974-0
    • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
    • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
    • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
    • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID: #v
    • API String ID: 0-554117064
    • Opcode ID: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
    • Instruction ID: 8c99b1ef877cebc7a747b8a97cc81d83a07aa3771b44d3adc2ea031a64448d8d
    • Opcode Fuzzy Hash: afcf258d4bd88d8ea756dbb23f6f5e28355c73968809c2117334dc7dbfffea7a
    • Instruction Fuzzy Hash: CEF18C716043019FC700DF29C884A5AB7E5FF88318F14C95EF9998B392D7B9E945CB86
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID: )$U$\
    • API String ID: 0-3705770531
    • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
    • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
    • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
    • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
    APIs
      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
    • CoInitialize.OLE32(00000000), ref: 0046E505
    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
    • CoUninitialize.OLE32 ref: 0046E53D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_wcslen
    • String ID: .lnk
    • API String ID: 886957087-24824748
    • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
    • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
    • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
    • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \
    • API String ID: 4104443479-2967466578
    • Opcode ID: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
    • Instruction ID: 90b25fc4546a2c21e21e7939c456fa175a28996bec6c3309f7edcf8d77039fcb
    • Opcode Fuzzy Hash: 236e1e21dc65edc907fd0526d8e82b29cd887e6a6cae6abce2d2318f267918b8
    • Instruction Fuzzy Hash: 8AB1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \
    • API String ID: 4104443479-2967466578
    • Opcode ID: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
    • Instruction ID: 47d8400a167da4587eb122393216330e55bf30386b581c043e0675457d4a745f
    • Opcode Fuzzy Hash: aaea77048b6460e77790bc9063151364371e311f89c51572a31744d174c5d814
    • Instruction Fuzzy Hash: F1B1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED451AB381D7795946CB1A
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \
    • API String ID: 4104443479-2967466578
    • Opcode ID: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
    • Instruction ID: 4d1558bed40bbae7f26d93592334ac0d2c658ca85fbb7fec499742c135aa7d63
    • Opcode Fuzzy Hash: 51371dbcd6d614fdce5bfd4d2520a50a5cfc61004088100711ab8bbb78939718
    • Instruction Fuzzy Hash: E5A1C270D04289CFEF15CFA9C8807AEBBB2BF55308F28419ED441AB381D7795946CB1A
    Strings
    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
    • API String ID: 708495834-557222456
    • Opcode ID: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
    • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
    • Opcode Fuzzy Hash: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
    • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
    APIs
      • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
      • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
      • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
      • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
      • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
    • String ID: @
    • API String ID: 4150878124-2766056989
    • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
    • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
    • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
    • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \$^$h
    • API String ID: 4104443479-3224561352
    • Opcode ID: 3ad0d7372450da1a089cce05d5b76b63ad7fbddfe74fa277bcae2c6c581cef2a
    • Instruction ID: e23fcb8882e096e74594c4078241bb4ea8d91210f71a07bc2928ab6795bd9baf
    • Opcode Fuzzy Hash: 3ad0d7372450da1a089cce05d5b76b63ad7fbddfe74fa277bcae2c6c581cef2a
    • Instruction Fuzzy Hash: FA519370E002099FDF18CFA5C980AAEB7F2BF89304F28826AD405AB355D7795E45CB55
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \$]$h
    • API String ID: 4104443479-3262404753
    • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
    • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
    • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
    • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
    APIs
    • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • CloseHandle.KERNEL32(?), ref: 00457E09
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CloseExecuteHandleShell_wcscpy_wcslen
    • String ID: <$@
    • API String ID: 2417854910-1426351568
    • Opcode ID: 514557f22d0f6e93a977befcff9d0e90bbfb1ee23c4dfd548d9af5fe2b3cdb46
    • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
    • Opcode Fuzzy Hash: 514557f22d0f6e93a977befcff9d0e90bbfb1ee23c4dfd548d9af5fe2b3cdb46
    • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
    APIs
    • GetCurrentProcess.KERNEL32(00000000,?,00000067,000000FF), ref: 004753C7
    • TerminateProcess.KERNEL32(00000000), ref: 004753CE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Process$CurrentTerminate
    • String ID: #v
    • API String ID: 2429186680-554117064
    • Opcode ID: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
    • Instruction ID: dddcdfafc98398d1c0f0a19edd80e49036cf45bbfca44c020541658de01b6296
    • Opcode Fuzzy Hash: 0f578ce52da9f9b4c714c296b9d78fbd636f242c945bc8d5a468c0e4c8bdb3ba
    • Instruction Fuzzy Hash: 2C519D71604301AFC710DF65C881BABB7E5EF88308F14891EF9598B382D7B9D945CB96
    APIs
    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
    • String ID:
    • API String ID: 3705125965-3916222277
    • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
    • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
    • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
    • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
    APIs
    • GetMenuItemInfoW.USER32 ref: 0045FAC4
    • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
    • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Menu$Delete$InfoItem
    • String ID: 0
    • API String ID: 135850232-4108050209
    • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
    • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
    • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
    • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
    APIs
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
    • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$Long
    • String ID: SysTreeView32
    • API String ID: 847901565-1698111956
    • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
    • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
    • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
    • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
    APIs
    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$Window
    • String ID: SysMonthCal32
    • API String ID: 2326795674-1439706946
    • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
    • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
    • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
    • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
    APIs
    • DestroyWindow.USER32(00000000), ref: 00450A2F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: DestroyWindow
    • String ID: msctls_updown32
    • API String ID: 3375834691-2298589950
    • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
    • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
    • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
    • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: $<
    • API String ID: 4104443479-428540627
    • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
    • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
    • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
    • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$DiskFreeSpace
    • String ID: \VH
    • API String ID: 1682464887-234962358
    • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
    • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
    • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
    • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$DiskFreeSpace
    • String ID: \VH
    • API String ID: 1682464887-234962358
    • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
    • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
    • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
    • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$DiskFreeSpace
    • String ID: \VH
    • API String ID: 1682464887-234962358
    • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
    • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
    • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
    • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume
    • String ID: \VH
    • API String ID: 2507767853-234962358
    • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
    • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
    • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
    • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume
    • String ID: \VH
    • API String ID: 2507767853-234962358
    • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
    • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
    • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
    • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
    APIs
    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: msctls_trackbar32
    • API String ID: 3850602802-1010561917
    • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
    • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
    • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
    • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • CLSIDFromString.OLE32(?,00000000), ref: 00435236
    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
    • String ID: crts
    • API String ID: 943502515-3724388283
    • Opcode ID: 76b53f11df1b297ac8e01e380144ea637ce00521cfee33948bcff3e5c6b4c5c1
    • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
    • Opcode Fuzzy Hash: 76b53f11df1b297ac8e01e380144ea637ce00521cfee33948bcff3e5c6b4c5c1
    • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
    • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
    • SetErrorMode.KERNEL32(?), ref: 0045D35C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorMode$LabelVolume
    • String ID: \VH
    • API String ID: 2006950084-234962358
    • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
    • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
    • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
    • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • GetMenuItemInfoW.USER32 ref: 00449727
    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
    • DrawMenuBar.USER32 ref: 00449761
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Menu$InfoItem$Draw_malloc
    • String ID: 0
    • API String ID: 772068139-4108050209
    • Opcode ID: b17500183e70cec1536be144fcd2483edb44611556915e693b2a76687dd0afc4
    • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
    • Opcode Fuzzy Hash: b17500183e70cec1536be144fcd2483edb44611556915e693b2a76687dd0afc4
    • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcslen$_wcscpy
    • String ID: 3, 3, 8, 1
    • API String ID: 3469035223-357260408
    • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
    • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
    • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
    • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpCloseHandle
    • API String ID: 2574300362-3530519716
    • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
    • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
    • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
    • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpCreateFile
    • API String ID: 2574300362-275556492
    • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
    • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
    • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
    • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpSendEcho
    • API String ID: 2574300362-58917771
    • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
    • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
    • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
    • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
    APIs
    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: RegDeleteKeyExW$advapi32.dll
    • API String ID: 2574300362-4033151799
    • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
    • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
    • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
    • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetSystemWow64DirectoryW$kernel32.dll
    • API String ID: 2574300362-1816364905
    • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
    • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
    • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
    • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430E8D
    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00430E9F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetModuleHandleExW$kernel32.dll
    • API String ID: 2574300362-199464113
    • Opcode ID: 264f8e721adbed0a0a4958d5ac8267ac8e19a3b8732fd2a865be9a36fa944cb5
    • Instruction ID: 757376e69a8637ab8385673bd519a3d20b1bca35ee4978b7889da1ae4d413b5b
    • Opcode Fuzzy Hash: 264f8e721adbed0a0a4958d5ac8267ac8e19a3b8732fd2a865be9a36fa944cb5
    • Instruction Fuzzy Hash: 4AE01271540706DFD7105F65D91964B77D8DF18762F104C2AFD85E2650D7B8E48087AC
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
    • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
    • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
    • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
    APIs
    • VariantInit.OLEAUT32(?), ref: 0047950F
    • SysAllocString.OLEAUT32(00000000), ref: 004795D8
    • VariantCopy.OLEAUT32(?,?), ref: 0047960F
    • VariantClear.OLEAUT32(?), ref: 00479650
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$AllocClearCopyInitString
    • String ID:
    • API String ID: 2808897238-0
    • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
    • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
    • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
    • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
    APIs
    • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
    • __itow.LIBCMT ref: 004699CD
      • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
    • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
    • __itow.LIBCMT ref: 00469A97
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$__itow
    • String ID:
    • API String ID: 3379773720-0
    • Opcode ID: c3a956d33284f2c9f3f86cb058cc2767b53d45f45b0f3b019056d4494472ccb7
    • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
    • Opcode Fuzzy Hash: c3a956d33284f2c9f3f86cb058cc2767b53d45f45b0f3b019056d4494472ccb7
    • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
    APIs
    • GetWindowRect.USER32(?,?), ref: 00449A4A
    • ScreenToClient.USER32(?,?), ref: 00449A80
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$ClientMoveRectScreen
    • String ID:
    • API String ID: 3880355969-0
    • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
    • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
    • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
    • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
    • String ID:
    • API String ID: 2782032738-0
    • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
    • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
    • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
    • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
    APIs
    • ClientToScreen.USER32(00000000,?), ref: 0044169A
    • GetWindowRect.USER32(?,?), ref: 00441722
    • PtInRect.USER32(?,?,?), ref: 00441734
    • MessageBeep.USER32(00000000), ref: 004417AD
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Rect$BeepClientMessageScreenWindow
    • String ID:
    • API String ID: 1352109105-0
    • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
    • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
    • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
    • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
    APIs
    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
    • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
    • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CreateHardLink$DeleteErrorFileLast
    • String ID:
    • API String ID: 3321077145-0
    • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
    • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
    • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
    • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
    • __isleadbyte_l.LIBCMT ref: 004208A6
    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
    • String ID:
    • API String ID: 3058430110-0
    • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
    • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
    • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
    • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
    APIs
    • GetParent.USER32(?), ref: 004503C8
    • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
    • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
    • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Proc$Parent
    • String ID:
    • API String ID: 2351499541-0
    • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
    • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
    • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
    • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
    APIs
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
    • TranslateMessage.USER32(?), ref: 00442B01
    • DispatchMessageW.USER32(?), ref: 00442B0B
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Message$Peek$DispatchTranslate
    • String ID:
    • API String ID: 1795658109-0
    • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
    • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
    • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
    • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
    APIs
    • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
    • GetCaretPos.USER32(?), ref: 004743B2
    • ClientToScreen.USER32(00000000,?), ref: 004743E8
    • GetForegroundWindow.USER32 ref: 004743EE
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
    • String ID:
    • API String ID: 2759813231-0
    • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
    • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
    • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
    • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
    APIs
      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
    • _wcslen.LIBCMT ref: 00449519
    • _wcslen.LIBCMT ref: 00449526
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend_wcslen$_wcspbrk
    • String ID:
    • API String ID: 2886238975-0
    • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
    • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
    • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
    • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __setmode$DebugOutputString_fprintf
    • String ID:
    • API String ID: 1792727568-0
    • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
    • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
    • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
    • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
    APIs
      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
    • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$Long$AttributesLayered
    • String ID:
    • API String ID: 2169480361-0
    • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
    • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
    • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
    • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
    APIs
      • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
      • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
      • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
    • lstrlenW.KERNEL32(?), ref: 00434CF6
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
    • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: lstrcmpilstrcpylstrlen$_malloc
    • String ID: cdecl
    • API String ID: 3850814276-3896280584
    • Opcode ID: 818b11212cfde82049dda77138f98929de94c0963b7dd4b784d4e9916be89644
    • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
    • Opcode Fuzzy Hash: 818b11212cfde82049dda77138f98929de94c0963b7dd4b784d4e9916be89644
    • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
    APIs
      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
    • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
    • _memmove.LIBCMT ref: 0046D475
    • inet_ntoa.WSOCK32(?), ref: 0046D481
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
    • String ID:
    • API String ID: 2502553879-0
    • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
    • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
    • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
    • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
    APIs
    • SendMessageW.USER32 ref: 00448C69
    • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID:
    • API String ID: 312131281-0
    • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
    • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
    • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
    • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
    APIs
    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
    • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
    • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorLastacceptselect
    • String ID:
    • API String ID: 385091864-0
    • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
    • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
    • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
    • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
    APIs
    • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
    • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
    • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
    • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
    APIs
    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00430242
    • GetStockObject.GDI32(00000011), ref: 00430258
    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
    • ShowWindow.USER32(00000000,00000000), ref: 0043027D
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Window$CreateMessageObjectSendShowStock
    • String ID:
    • API String ID: 1358664141-0
    • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
    • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
    • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
    • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00443CA6
    • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
    • CloseHandle.KERNEL32(00000000), ref: 00443CF9
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
    • String ID:
    • API String ID: 2880819207-0
    • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
    • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
    • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
    • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
    APIs
    • GetWindowRect.USER32(?,?), ref: 00430BA2
    • ScreenToClient.USER32(?,?), ref: 00430BC1
    • ScreenToClient.USER32(?,?), ref: 00430BE2
    • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ClientRectScreen$InvalidateWindow
    • String ID:
    • API String ID: 357397906-0
    • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
    • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
    • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
    • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
    APIs
    • __wsplitpath.LIBCMT ref: 0043392E
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • __wsplitpath.LIBCMT ref: 00433950
    • __wcsicoll.LIBCMT ref: 00433974
    • __wcsicoll.LIBCMT ref: 0043398A
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
    • String ID:
    • API String ID: 1187119602-0
    • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
    • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
    • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
    • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
    • Instruction ID: fa6d01852bb983edeafff486d0019367465e9530caf48e469f9bea5953271079
    • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
    • Instruction Fuzzy Hash: FE11727250005DFBCF125E85EC41CEE3F22BB28394B9A8416FE1858131C73AC9B1AB85
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _wcslen$_malloc_wcscat_wcscpy
    • String ID:
    • API String ID: 1597257046-0
    • Opcode ID: e84782c9ce3e64a79064aa2773422545b6e0e3fd375b973334bdb2b18397f17e
    • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
    • Opcode Fuzzy Hash: e84782c9ce3e64a79064aa2773422545b6e0e3fd375b973334bdb2b18397f17e
    • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
    APIs
    • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
    • __malloc_crt.LIBCMT ref: 0041F5B6
    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: EnvironmentStrings$Free__malloc_crt
    • String ID:
    • API String ID: 237123855-0
    • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
    • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
    • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
    • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: DeleteDestroyObject$IconWindow
    • String ID:
    • API String ID: 3349847261-0
    • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
    • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
    • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
    • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
    • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
    • String ID:
    • API String ID: 2223660684-0
    • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
    • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
    • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
    • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
    APIs
      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
    • LineTo.GDI32(?,?,?), ref: 00447326
    • EndPath.GDI32(?), ref: 00447336
    • StrokePath.GDI32(?), ref: 00447344
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
    • String ID:
    • API String ID: 2783949968-0
    • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
    • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
    • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
    • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
    APIs
    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
    • GetCurrentThreadId.KERNEL32 ref: 004364A3
    • AttachThreadInput.USER32(00000000), ref: 004364AA
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
    • String ID:
    • API String ID: 2710830443-0
    • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
    • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
    • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
    • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
    APIs
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
      • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
      • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
    • String ID:
    • API String ID: 146765662-0
    • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
    • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
    • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
    • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
    APIs
    • GetDesktopWindow.USER32 ref: 00472B63
    • GetDC.USER32(00000000), ref: 00472B6C
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
    • ReleaseDC.USER32(00000000,?), ref: 00472B99
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
    • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
    • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
    • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
    APIs
    • GetDesktopWindow.USER32 ref: 00472BB2
    • GetDC.USER32(00000000), ref: 00472BBB
    • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
    • ReleaseDC.USER32(00000000,?), ref: 00472BE8
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
    • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
    • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
    • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
    APIs
    • __getptd_noexit.LIBCMT ref: 00415150
      • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
      • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
      • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
      • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
      • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
    • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
    • __freeptd.LIBCMT ref: 0041516B
    • ExitThread.KERNEL32 ref: 00415173
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
    • String ID:
    • API String ID: 1454798553-0
    • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
    • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
    • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
    • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _strncmp
    • String ID: Q\E
    • API String ID: 909875538-2189900498
    • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
    • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
    • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
    • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: U$\
    • API String ID: 4104443479-100911408
    • Opcode ID: 835b85672203460d32fbae7ee09f86de6f9ff03da8fa91cdddc3cb8863709e71
    • Instruction ID: 856fd8c118fd9d88a35ce60e305a75550171e0483a96a15f1a05c3eab080688b
    • Opcode Fuzzy Hash: 835b85672203460d32fbae7ee09f86de6f9ff03da8fa91cdddc3cb8863709e71
    • Instruction Fuzzy Hash: D2C1B070E002499FEF14CF69C4907AEFBF2AF85304F2881AED451A7341D739A946CB55
    APIs
    • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
    • String ID: AutoIt3GUI$Container
    • API String ID: 2652923123-3941886329
    • Opcode ID: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
    • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
    • Opcode Fuzzy Hash: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
    • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove_strncmp
    • String ID: U$\
    • API String ID: 2666721431-100911408
    • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
    • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
    • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
    • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
    APIs
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • __wcsnicmp.LIBCMT ref: 00467288
    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Connection__wcsnicmp_wcscpy_wcslen
    • String ID: LPT
    • API String ID: 3035604524-1350329615
    • Opcode ID: 8e2456e5c24cdd82ea1ba0c33fa18974f5c0f42ceb987109207d96c422488140
    • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
    • Opcode Fuzzy Hash: 8e2456e5c24cdd82ea1ba0c33fa18974f5c0f42ceb987109207d96c422488140
    • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \$h
    • API String ID: 4104443479-677774858
    • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
    • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
    • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
    • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memcmp
    • String ID: &
    • API String ID: 2931989736-1010288
    • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
    • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
    • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
    • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \
    • API String ID: 4104443479-2967466578
    • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
    • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
    • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
    • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
    APIs
    • _wcslen.LIBCMT ref: 00466825
    • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CrackInternet_wcslen
    • String ID: |
    • API String ID: 596671847-2343686810
    • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
    • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
    • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
    • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
    APIs
    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: '
    • API String ID: 3850602802-1997036262
    • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
    • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
    • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
    • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: Error:
    • API String ID: 4104443479-232661952
    • Opcode ID: d24672fe7a816a5076cfec2a9dae66f9baa693b8fe05e9c221c070e3fa950dbd
    • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
    • Opcode Fuzzy Hash: d24672fe7a816a5076cfec2a9dae66f9baa693b8fe05e9c221c070e3fa950dbd
    • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
    APIs
    • _strlen.LIBCMT ref: 0040F858
      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
    • _sprintf.LIBCMT ref: 0040F9AE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove$_sprintf_strlen
    • String ID: %02X
    • API String ID: 1921645428-436463671
    • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
    • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
    • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
    • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
    APIs
    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: Combobox
    • API String ID: 3850602802-2096851135
    • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
    • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
    • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
    • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
    APIs
    • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: LengthMessageSendTextWindow
    • String ID: edit
    • API String ID: 2978978980-2167791130
    • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
    • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
    • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
    • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
    APIs
    • Sleep.KERNEL32(00000000), ref: 00476CB0
    • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: GlobalMemorySleepStatus
    • String ID: @
    • API String ID: 2783356886-2766056989
    • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
    • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
    • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
    • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: htonsinet_addr
    • String ID: 255.255.255.255
    • API String ID: 3832099526-2422070025
    • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
    • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
    • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
    • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
    APIs
    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: InternetOpen
    • String ID: <local>
    • API String ID: 2038078732-4266983199
    • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
    • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
    • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
    • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469F45
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 547829025-1403004172
    • Opcode ID: 7c603411a5222602cdcfe3af15c4e08234e094dc848fc6b68a26e5d012d1898d
    • Instruction ID: 9c74662f9608889423dda9af8a150397af45232da82e66dff643b54ec21f234b
    • Opcode Fuzzy Hash: 7c603411a5222602cdcfe3af15c4e08234e094dc848fc6b68a26e5d012d1898d
    • Instruction Fuzzy Hash: 34012531600154A7CB00BE698C45A9F775D9B86330F10826FF918AB3C2DA789D8583A6
    APIs
    • SafeArrayCreateVector.OLEAUT32(00000013,00000000), ref: 0044CE78
    • _memmove.LIBCMT ref: 0044CE9F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: ArrayCreateSafeVector_memmove
    • String ID: crts
    • API String ID: 564309351-3724388283
    • Opcode ID: 7e754992b260b6e72dbf0ba7770114a121c02481734c5380321d1baa9379aa27
    • Instruction ID: ae18a0e6088bde325f2b8f87e65bbb2aaade0ee39655e70765b31d945e00dc0b
    • Opcode Fuzzy Hash: 7e754992b260b6e72dbf0ba7770114a121c02481734c5380321d1baa9379aa27
    • Instruction Fuzzy Hash: 7B0122B390010CABD700DF5AEC41E9B77A8EB84300F00412BFA08D7241EB31EA52C7E0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: __fread_nolock_memmove
    • String ID: EA06
    • API String ID: 1988441806-3962188686
    • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
    • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
    • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
    • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: u,D
    • API String ID: 4104443479-3858472334
    • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
    • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
    • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
    • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
    APIs
    • _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • _memmove.LIBCMT ref: 00401B57
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
    • String ID: @EXITCODE
    • API String ID: 2734553683-3436989551
    • Opcode ID: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
    • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
    • Opcode Fuzzy Hash: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
    • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: _memmove
    • String ID: Error:
    • API String ID: 4104443479-232661952
    • Opcode ID: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
    • Instruction ID: e6e9f2aa443a554b8bda50df2a041f2c42dbd20d32390c21629c974d0e28b4a3
    • Opcode Fuzzy Hash: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
    • Instruction Fuzzy Hash: 2101EFB6200115ABC704DF49D981D6AF7A9FF88710708855AF819CB302D774FD20CBA4
    APIs
    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • wsprintfW.USER32 ref: 0045612A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: MessageSend_mallocwsprintf
    • String ID: %d/%02d/%02d
    • API String ID: 1262938277-328681919
    • Opcode ID: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
    • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
    • Opcode Fuzzy Hash: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
    • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
    APIs
    • InternetCloseHandle.WININET(?), ref: 00442663
    • InternetCloseHandle.WININET ref: 00442668
      • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: CloseHandleInternet$ObjectSingleWait
    • String ID: aeB
    • API String ID: 857135153-906807131
    • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
    • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
    • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
    • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
    • PostMessageW.USER32(00000000), ref: 00441C05
      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
    • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
    • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
    • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
    • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
    • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
    • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
    APIs
    • GetTempPathW.KERNEL32(00000104,?), ref: 00431E34
    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00431E4C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Temp$FileNamePath
    • String ID: aut
    • API String ID: 3285503233-3010740371
    • Opcode ID: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
    • Instruction ID: 5bfe3c05d54daaccf8cad0b894ff223c4051d717a215ac0b7ff4b7edb98d8c84
    • Opcode Fuzzy Hash: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
    • Instruction Fuzzy Hash: A8D05EB95403086BD324EB90ED4EFA9777CE744700F508AE9BE14461D1AAF06A54CBE9
    APIs
    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
      • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3376101506.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3376087266.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376145406.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376161691.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376174595.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376281193.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3376309914.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_5HnWIsZYYh.jbxd
    Similarity
    • API ID: Message_doexit
    • String ID: AutoIt$Error allocating memory.
    • API String ID: 1993061046-4017498283
    • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
    • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
    • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
    • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D