Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vRMcwg3RuY.exe

Overview

General Information

Sample name:vRMcwg3RuY.exe
renamed because original name is a hash value
Original sample name:c36b4e43705b8990a9cb6850a48bea146dfed6bc34f6ad0530b0fcd269b1c523.exe
Analysis ID:1528938
MD5:8fcae5ef1914fb03302827ce631a72cc
SHA1:17dc43392ceca8d8c112ccc60e71489caa28cfa4
SHA256:c36b4e43705b8990a9cb6850a48bea146dfed6bc34f6ad0530b0fcd269b1c523
Tags:exeuser-adrian__luca
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • vRMcwg3RuY.exe (PID: 6908 cmdline: "C:\Users\user\Desktop\vRMcwg3RuY.exe" MD5: 8FCAE5EF1914FB03302827CE631A72CC)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: vRMcwg3RuY.exeReversingLabs: Detection: 15%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 89.8% probability
Source: vRMcwg3RuY.exeJoe Sandbox ML: detected
Source: vRMcwg3RuY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004422FE InternetQueryDataAvailable,InternetReadFile,0_2_004422FE
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0045A10F OpenClipboard,EmptyClipboard,CloseClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0045A10F
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0046DC80 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,0_2_0046DC80
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044C37A GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,SendInput,0_2_0044C37A
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0047C81C SendMessageW,DefDlgProcW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,SendMessageW,_wcsncpy,SendMessageW,SendMessageW,SendMessageW,InvalidateRect,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0047C81C
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00431BE8: GetFullPathNameW,__swprintf,_wcslen,CreateDirectoryW,CreateFileW,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00431BE8
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00446313 DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,_wcsncpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00446313
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0042200C0_2_0042200C
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0041A2170_2_0041A217
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004122160_2_00412216
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0042435D0_2_0042435D
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004033C00_2_004033C0
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044F4300_2_0044F430
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004125E80_2_004125E8
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044663B0_2_0044663B
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004096A00_2_004096A0
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004138010_2_00413801
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0042096F0_2_0042096F
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004129D00_2_004129D0
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004119E30_2_004119E3
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0041C9AE0_2_0041C9AE
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0047EA6F0_2_0047EA6F
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0040FA100_2_0040FA10
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044EB590_2_0044EB59
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00423C810_2_00423C81
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00411E780_2_00411E78
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00442E0C0_2_00442E0C
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00420EC00_2_00420EC0
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044CF170_2_0044CF17
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00444FD20_2_00444FD2
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: String function: 004115D7 appears 36 times
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: String function: 00416C70 appears 39 times
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: String function: 00445AE0 appears 65 times
Source: vRMcwg3RuY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044AF6C GetLastError,FormatMessageW,0_2_0044AF6C
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004333BE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,SetSystemPowerState,0_2_004333BE
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00464EAE OpenProcess,GetLastError,GetLastError,GetCurrentThread,OpenThreadToken,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,AdjustTokenPrivileges,GetLastError,OpenProcess,AdjustTokenPrivileges,CloseHandle,TerminateProcess,GetLastError,CloseHandle,0_2_00464EAE
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0045D619 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_0045D619
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004755C4 CreateToolhelp32Snapshot,Process32FirstW,__wsplitpath,_wcscat,__wcsicoll,Process32NextW,CloseHandle,0_2_004755C4
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0047839D CoInitialize,CoCreateInstance,CoUninitialize,0_2_0047839D
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0043305F __swprintf,__swprintf,__wcsicoll,FindResourceW,LoadResource,LockResource,FindResourceW,LoadResource,SizeofResource,LockResource,CreateIconFromResourceEx,0_2_0043305F
Source: vRMcwg3RuY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: vRMcwg3RuY.exeReversingLabs: Detection: 15%
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeFile read: C:\Users\user\Desktop\vRMcwg3RuY.exeJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
Source: vRMcwg3RuY.exeStatic PE information: real checksum: 0xa961f should be: 0xa54ad
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00462463 push edi; ret 0_2_00462465
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00416CB5 push ecx; ret 0_2_00416CC8
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0047A330 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_0047A330
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-84562
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeAPI coverage: 1.9 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00452492 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00452492
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00442886 FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00442886
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004788BD FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_004788BD
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004339B6 GetFileAttributesW,FindFirstFileW,FindClose,0_2_004339B6
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0045CAFA FindFirstFileW,FindNextFileW,FindClose,0_2_0045CAFA
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00431A86 FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00431A86
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044BD27 _wcscat,_wcscat,__wsplitpath,FindFirstFileW,CopyFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindClose,MoveFileW,FindNextFileW,FindClose,0_2_0044BD27
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0045DE8F FindFirstFileW,FindClose,0_2_0045DE8F
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0044BF8B _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0044BF8B
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeAPI call chain: ExitProcess graph end nodegraph_0-83773
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeAPI call chain: ExitProcess graph end nodegraph_0-83405
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0045A370 BlockInput,0_2_0045A370
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0040EBD0 LoadLibraryA,GetProcAddress,0_2_0040EBD0
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004238DA __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_004238DA
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0041F250 SetUnhandledExceptionFilter,0_2_0041F250
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0041A208 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0041A208
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00417DAA IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00417DAA
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00436CD7 LogonUserW,0_2_00436CD7
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0040D590 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetModuleFileNameW,GetForegroundWindow,ShellExecuteW,GetForegroundWindow,ShellExecuteW,0_2_0040D590
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00434418 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00434418
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0043333C __wcsicoll,mouse_event,__wcsicoll,mouse_event,0_2_0043333C
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00446124 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00446124
Source: vRMcwg3RuY.exeBinary or memory string: Shell_TrayWnd
Source: vRMcwg3RuY.exeBinary or memory string: JDASCRWINUPRWINDOWNLWINUPLWINDOWNSHIFTUPSHIFTDOWNALTUPALTDOWNCTRLUPCTRLDOWNMOUSE_XBUTTON2MOUSE_XBUTTON1MOUSE_MBUTTONMOUSE_RBUTTONMOUSE_LBUTTONLAUNCH_APP2LAUNCH_APP1LAUNCH_MEDIALAUNCH_MAILMEDIA_PLAY_PAUSEMEDIA_STOPMEDIA_PREVMEDIA_NEXTVOLUME_UPVOLUME_DOWNVOLUME_MUTEBROWSER_HOMEBROWSER_FAVORTIESBROWSER_SEARCHBROWSER_STOPBROWSER_REFRESHBROWSER_FORWARDBROWSER_BACKNUMPADENTERSLEEPRSHIFTLSHIFTRALTLALTRCTRLLCTRLAPPSKEYNUMPADDIVNUMPADDOTNUMPADSUBNUMPADADDNUMPADMULTNUMPAD9NUMPAD8NUMPAD7NUMPAD6NUMPAD5NUMPAD4NUMPAD3NUMPAD2NUMPAD1NUMPAD0CAPSLOCKPAUSEBREAKNUMLOCKSCROLLLOCKRWINLWINPRINTSCREENUPTABSPACERIGHTPGUPPGDNLEFTINSERTINSHOMEF12F11F10F9F8F7F6F5F4F3F2F1ESCAPEESCENTERENDDOWNDELETEDELBSBACKSPACEALTONOFF0%d%dShell_TrayWndExitScript Pausedblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004720DB GetLocalTime,__swprintf,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,0_2_004720DB
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00472C3F GetUserNameW,0_2_00472C3F
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0041E364 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,_strcpy_s,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,0_2_0041E364
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0040E500 GetVersionExW,GetCurrentProcess,GetNativeSystemInfo,FreeLibrary,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_0040E500
Source: vRMcwg3RuY.exeBinary or memory string: WIN_XP
Source: vRMcwg3RuY.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPWIN_2000InstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 8, 1USERPROFILEUSERDOMAINUSERDNSDOMAINDefaultGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYadvapi32.dllRegDeleteKeyExW+.-.+-\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]ISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXISTSEXPANDmsctls_statusbar321tooltips_class32AutoIt v3 GUI%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----&
Source: vRMcwg3RuY.exeBinary or memory string: WIN_XPe
Source: vRMcwg3RuY.exeBinary or memory string: WIN_VISTA
Source: vRMcwg3RuY.exeBinary or memory string: WIN_7
Source: vRMcwg3RuY.exeBinary or memory string: WIN_8
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_004652BE socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004652BE
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_00476619 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476619
Source: C:\Users\user\Desktop\vRMcwg3RuY.exeCode function: 0_2_0046CEF3 OleInitialize,_wcslen,CreateBindCtx,MkParseDisplayName,CLSIDFromProgID,GetActiveObject,0_2_0046CEF3
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
2
Native API
2
Valid Accounts
2
Valid Accounts
2
Valid Accounts
21
Input Capture
2
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
LSASS Memory2
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
Access Token Manipulation
21
Access Token Manipulation
Security Account Manager2
Process Discovery
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Process Injection
1
Process Injection
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
Obfuscated Files or Information
Cached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSync2
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem6
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
vRMcwg3RuY.exe16%ReversingLabs
vRMcwg3RuY.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528938
Start date and time:2024-10-08 13:47:05 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 22s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:vRMcwg3RuY.exe
renamed because original name is a hash value
Original Sample Name:c36b4e43705b8990a9cb6850a48bea146dfed6bc34f6ad0530b0fcd269b1c523.exe
Detection:MAL
Classification:mal56.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 23
  • Number of non-executed functions: 344
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • VT rate limit hit for: vRMcwg3RuY.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.549488770119611
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:vRMcwg3RuY.exe
File size:663'380 bytes
MD5:8fcae5ef1914fb03302827ce631a72cc
SHA1:17dc43392ceca8d8c112ccc60e71489caa28cfa4
SHA256:c36b4e43705b8990a9cb6850a48bea146dfed6bc34f6ad0530b0fcd269b1c523
SHA512:208949e76e82a694af5783fc78684fe72af5b1e7fe25889aef4a6c9190a2a0a19438a22a556a2ca6be84db50709e5d7afaff1b1b8d63949d4e1501330bd97781
SSDEEP:12288:ehkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcE4aCzH:uRmJkcoQricOIQxiZY1iaCzH
TLSH:C6E49E22F5C69036C2B323B19E7EF76A963D79360336D29727C82D315EA05416B29733
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................1b.......P.).....Q.......y.......i..........}....N.......d.......`.......m.......g.....Rich............PE..L..
Icon Hash:1733312925935517
Entrypoint:0x4165c1
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
DLL Characteristics:TERMINAL_SERVER_AWARE
Time Stamp:0x4F25BAEC [Sun Jan 29 21:32:28 2012 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:d3bf8a7746a8d1ee8f6e5960c3f69378
Instruction
call 00007FBDCD2B77EBh
jmp 00007FBDCD2AE65Eh
int3
int3
int3
int3
int3
push ebp
mov ebp, esp
push edi
push esi
mov esi, dword ptr [ebp+0Ch]
mov ecx, dword ptr [ebp+10h]
mov edi, dword ptr [ebp+08h]
mov eax, ecx
mov edx, ecx
add eax, esi
cmp edi, esi
jbe 00007FBDCD2AE7DAh
cmp edi, eax
jc 00007FBDCD2AE976h
cmp ecx, 00000080h
jc 00007FBDCD2AE7EEh
cmp dword ptr [004A9724h], 00000000h
je 00007FBDCD2AE7E5h
push edi
push esi
and edi, 0Fh
and esi, 0Fh
cmp edi, esi
pop esi
pop edi
jne 00007FBDCD2AE7D7h
jmp 00007FBDCD2AEBB2h
test edi, 00000003h
jne 00007FBDCD2AE7E6h
shr ecx, 02h
and edx, 03h
cmp ecx, 08h
jc 00007FBDCD2AE7FBh
rep movsd
jmp dword ptr [00416740h+edx*4]
mov eax, edi
mov edx, 00000003h
sub ecx, 04h
jc 00007FBDCD2AE7DEh
and eax, 03h
add ecx, eax
jmp dword ptr [00416654h+eax*4]
jmp dword ptr [00416750h+ecx*4]
nop
jmp dword ptr [004166D4h+ecx*4]
nop
inc cx
add byte ptr [eax-4BFFBE9Ah], dl
inc cx
add byte ptr [ebx], ah
ror dword ptr [edx-75F877FAh], 1
inc esi
add dword ptr [eax+468A0147h], ecx
add al, cl
jmp 00007FBDCF726FD7h
add esi, 03h
add edi, 03h
cmp ecx, 08h
jc 00007FBDCD2AE79Eh
rep movsd
jmp dword ptr [00000000h+edx*4]
Programming Language:
  • [ C ] VS2010 SP1 build 40219
  • [C++] VS2010 SP1 build 40219
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2010 SP1 build 40219
  • [RES] VS2010 SP1 build 40219
  • [LNK] VS2010 SP1 build 40219
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x8d41c0x154.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xab0000x9328.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x820000x844.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x8061c0x8080061ffce4768976fa0dd2a8f6a97b1417aFalse0.5583182605787937data6.684690148171278IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x820000xdfc00xe0000354bc5f2376b5e9a4a3ba38b682dff1False0.36085728236607145data4.799741132252136IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x900000x1a7580x68008033f5a38941b4685bc2299e78f31221False0.15324519230769232data2.1500715391677487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xab0000x93280x9400495451d7eb8326bd9fa2714869ea6de8False0.49002322635135137data5.541804843154628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xab5c80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
RT_ICON0xab6f00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
RT_ICON0xab8180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
RT_ICON0xab9400x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishGreat Britain0.48109756097560974
RT_ICON0xabfa80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishGreat Britain0.5672043010752689
RT_ICON0xac2900x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishGreat Britain0.6418918918918919
RT_ICON0xac3b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishGreat Britain0.7044243070362474
RT_ICON0xad2600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishGreat Britain0.8077617328519856
RT_ICON0xadb080x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishGreat Britain0.5903179190751445
RT_ICON0xae0700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.5503112033195021
RT_ICON0xb06180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.6050656660412758
RT_ICON0xb16c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.7553191489361702
RT_MENU0xb1b280x50dataEnglishGreat Britain0.9
RT_DIALOG0xb1b780xfcdataEnglishGreat Britain0.6507936507936508
RT_STRING0xb1c780x530dataEnglishGreat Britain0.33960843373493976
RT_STRING0xb21a80x690dataEnglishGreat Britain0.26964285714285713
RT_STRING0xb28380x4d0dataEnglishGreat Britain0.36363636363636365
RT_STRING0xb2d080x5fcdataEnglishGreat Britain0.3087467362924282
RT_STRING0xb33080x65cdataEnglishGreat Britain0.34336609336609336
RT_STRING0xb39680x388dataEnglishGreat Britain0.377212389380531
RT_STRING0xb3cf00x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.502906976744186
RT_GROUP_ICON0xb3e480x84dataEnglishGreat Britain0.6439393939393939
RT_GROUP_ICON0xb3ed00x14dataEnglishGreat Britain1.15
RT_GROUP_ICON0xb3ee80x14dataEnglishGreat Britain1.25
RT_GROUP_ICON0xb3f000x14dataEnglishGreat Britain1.25
RT_VERSION0xb3f180x19cdataEnglishGreat Britain0.5339805825242718
RT_MANIFEST0xb40b80x26cASCII text, with CRLF line terminatorsEnglishUnited States0.5145161290322581
DLLImport
WSOCK32.dll__WSAFDIsSet, setsockopt, ntohs, recvfrom, sendto, htons, select, listen, WSAStartup, bind, closesocket, connect, socket, send, WSACleanup, ioctlsocket, accept, WSAGetLastError, inet_addr, gethostbyname, gethostname, recv
VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
COMCTL32.dllImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_ReplaceIcon, ImageList_Create, InitCommonControlsEx, ImageList_Destroy
MPR.dllWNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W, WNetUseConnectionW
WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetQueryOptionW, InternetQueryDataAvailable
PSAPI.DLLEnumProcesses, GetModuleBaseNameW, GetProcessMemoryInfo, EnumProcessModules
USERENV.dllCreateEnvironmentBlock, DestroyEnvironmentBlock, UnloadUserProfile, LoadUserProfileW
KERNEL32.dllHeapAlloc, Sleep, GetCurrentThreadId, RaiseException, MulDiv, GetVersionExW, GetSystemInfo, InterlockedIncrement, InterlockedDecrement, WideCharToMultiByte, lstrcpyW, MultiByteToWideChar, lstrlenW, lstrcmpiW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, DeleteFileW, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, GetProcessHeap, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetLocalTime, CompareStringW, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, GetTempPathW, GetTempFileNameW, VirtualFree, FormatMessageW, GetExitCodeProcess, SetErrorMode, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, DeviceIoControl, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetCurrentThread, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, LoadLibraryExW, HeapFree, WaitForSingleObject, CreateThread, DuplicateHandle, GetLastError, CloseHandle, GetCurrentProcess, GetProcAddress, LoadLibraryA, FreeLibrary, GetModuleFileNameW, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, ExitProcess, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetTimeFormatW, GetDateFormatW, GetCommandLineW, GetStartupInfoW, IsProcessorFeaturePresent, HeapSize, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStringTypeW, HeapCreate, SetHandleCount, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, LCMapStringW, RtlUnwind, SetFilePointer, GetTimeZoneInformation, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetTickCount, HeapReAlloc, WriteConsoleW, SetEndOfFile, SetSystemPowerState, SetEnvironmentVariableA
USER32.dllGetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, ReleaseCapture, SetCapture, WindowFromPoint, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, SetWindowPos, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, TranslateMessage, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, GetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, MessageBoxW, DefWindowProcW, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, GetMenuItemID, DispatchMessageW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, PeekMessageW, UnregisterHotKey, CharLowerBuffW, keybd_event, MonitorFromRect, GetWindowThreadProcessId
GDI32.dllDeleteObject, AngleArc, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, GetDeviceCaps, MoveToEx, DeleteDC, GetPixel, CreateDCW, Ellipse, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, LineTo
COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
ADVAPI32.dllRegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegConnectRegistryW, CloseServiceHandle, UnlockServiceDatabase, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, InitializeSecurityDescriptor, InitializeAcl, GetLengthSid, CopySid, LogonUserW, LockServiceDatabase, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, GetAce, AddAce, SetSecurityDescriptorDacl, RegOpenKeyExW, RegQueryValueExW, AdjustTokenPrivileges, InitiateSystemShutdownExW, OpenSCManagerW, RegCloseKey
SHELL32.dllDragQueryPoint, ShellExecuteExW, SHGetFolderPathW, DragQueryFileW, SHEmptyRecycleBinW, SHBrowseForFolderW, SHFileOperationW, SHGetPathFromIDListW, SHGetDesktopFolder, SHGetMalloc, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
ole32.dllOleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CLSIDFromString, StringFromGUID2, CoInitialize, CoUninitialize, CoCreateInstance, CreateStreamOnHGlobal, CoTaskMemAlloc, CoTaskMemFree, ProgIDFromCLSID, OleInitialize, CreateBindCtx, CLSIDFromProgID, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket, OleUninitialize, IIDFromString
OLEAUT32.dllVariantChangeType, VariantCopyInd, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SysStringLen, SafeArrayAllocData, GetActiveObject, QueryPathOfRegTypeLib, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysAllocString, VariantCopy, VariantClear, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, SafeArrayAccessData, VariantInit
Language of compilation systemCountry where language is spokenMap
EnglishGreat Britain
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:07:47:59
Start date:08/10/2024
Path:C:\Users\user\Desktop\vRMcwg3RuY.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\vRMcwg3RuY.exe"
Imagebase:0x400000
File size:663'380 bytes
MD5 hash:8FCAE5EF1914FB03302827CE631A72CC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:1.4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:6.9%
    Total number of Nodes:1127
    Total number of Limit Nodes:21
    execution_graph 83328 425ba2 83333 40e360 83328->83333 83330 425bb4 83349 41130a 51 API calls __cinit 83330->83349 83332 425bbe 83350 4115d7 83333->83350 83337 40e421 _wcsncat 83364 413a9e 83337->83364 83340 4115d7 52 API calls 83341 40e45e _wcscpy 83340->83341 83367 40bc70 83341->83367 83345 40e4a9 83345->83330 83346 401c90 52 API calls 83348 40e4a1 _wcscat _wcslen _wcsncpy 83346->83348 83347 4115d7 52 API calls 83347->83348 83348->83345 83348->83346 83348->83347 83349->83332 83352 4115e1 _malloc 83350->83352 83353 40e3ec GetModuleFileNameW 83352->83353 83357 4115fd std::exception::exception 83352->83357 83386 4135bb 83352->83386 83361 413a0e 83353->83361 83354 41163b 83401 4180af 46 API calls std::exception::operator= 83354->83401 83356 411645 83402 418105 RaiseException 83356->83402 83357->83354 83400 41130a 51 API calls __cinit 83357->83400 83360 411656 83409 413801 83361->83409 83439 419efd 83364->83439 83368 4115d7 52 API calls 83367->83368 83369 40bc98 83368->83369 83370 4115d7 52 API calls 83369->83370 83371 40bca6 83370->83371 83372 40e4c0 83371->83372 83451 403350 83372->83451 83374 40e4cb RegOpenKeyExW 83375 427190 RegQueryValueExW 83374->83375 83376 40e4eb 83374->83376 83377 4271b0 83375->83377 83378 42721a RegCloseKey 83375->83378 83376->83348 83379 4115d7 52 API calls 83377->83379 83378->83348 83380 4271cb 83379->83380 83458 43652f 52 API calls 83380->83458 83382 4271d8 RegQueryValueExW 83383 42720e 83382->83383 83384 4271f7 83382->83384 83383->83378 83459 402160 83384->83459 83387 413638 _malloc 83386->83387 83389 4135c9 _malloc 83386->83389 83408 417f77 46 API calls __getptd_noexit 83387->83408 83388 4135d4 83388->83389 83403 418901 46 API calls 2 library calls 83388->83403 83404 418752 46 API calls 9 library calls 83388->83404 83405 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83388->83405 83389->83388 83392 4135f7 RtlAllocateHeap 83389->83392 83395 413624 83389->83395 83398 413622 83389->83398 83392->83389 83393 413630 83392->83393 83393->83352 83406 417f77 46 API calls __getptd_noexit 83395->83406 83407 417f77 46 API calls __getptd_noexit 83398->83407 83400->83354 83401->83356 83402->83360 83403->83388 83404->83388 83406->83398 83407->83393 83408->83393 83410 41389e 83409->83410 83417 41381a 83409->83417 83411 4139e8 83410->83411 83413 413a00 83410->83413 83436 417f77 46 API calls __getptd_noexit 83411->83436 83438 417f77 46 API calls __getptd_noexit 83413->83438 83414 4139ed 83437 417f25 10 API calls __snwprintf 83414->83437 83417->83410 83424 41388a 83417->83424 83431 419e30 46 API calls __snwprintf 83417->83431 83419 41396c 83419->83410 83420 413967 83419->83420 83422 41397a 83419->83422 83420->83337 83421 413929 83421->83410 83423 413945 83421->83423 83433 419e30 46 API calls __snwprintf 83421->83433 83435 419e30 46 API calls __snwprintf 83422->83435 83423->83410 83423->83420 83427 41395b 83423->83427 83424->83410 83430 413909 83424->83430 83432 419e30 46 API calls __snwprintf 83424->83432 83434 419e30 46 API calls __snwprintf 83427->83434 83430->83419 83430->83421 83431->83424 83432->83430 83433->83423 83434->83420 83435->83420 83436->83414 83437->83420 83438->83420 83440 419f13 83439->83440 83441 419f0e 83439->83441 83448 417f77 46 API calls __getptd_noexit 83440->83448 83441->83440 83444 419f2b 83441->83444 83443 419f18 83449 417f25 10 API calls __snwprintf 83443->83449 83447 40e454 83444->83447 83450 417f77 46 API calls __getptd_noexit 83444->83450 83447->83340 83448->83443 83449->83447 83450->83443 83452 403367 83451->83452 83453 403358 83451->83453 83454 4115d7 52 API calls 83452->83454 83453->83374 83455 403370 83454->83455 83456 4115d7 52 API calls 83455->83456 83457 40339e 83456->83457 83457->83374 83458->83382 83460 426daa 83459->83460 83461 40216b _wcslen 83459->83461 83474 40c600 83460->83474 83464 402180 83461->83464 83465 40219e 83461->83465 83463 426db5 83463->83383 83472 403bd0 52 API calls moneypunct 83464->83472 83473 4013a0 52 API calls 83465->83473 83468 402187 _memmove 83468->83383 83469 4021a5 83470 426db7 83469->83470 83471 4115d7 52 API calls 83469->83471 83471->83468 83472->83468 83473->83469 83475 40c619 83474->83475 83476 40c60a 83474->83476 83475->83463 83476->83475 83479 4026f0 83476->83479 83478 426d7a _memmove 83478->83463 83480 426873 83479->83480 83481 4026ff 83479->83481 83486 4013a0 52 API calls 83480->83486 83481->83478 83483 42687b 83484 4115d7 52 API calls 83483->83484 83485 42689e _memmove 83484->83485 83485->83478 83486->83483 83487 416454 83524 416c70 83487->83524 83489 416460 GetStartupInfoW 83490 416474 83489->83490 83525 419d5a HeapCreate 83490->83525 83492 4164cd 83493 4164d8 83492->83493 83609 41642b 46 API calls 3 library calls 83492->83609 83526 417c20 GetModuleHandleW 83493->83526 83496 4164de 83497 4164e9 __RTC_Initialize 83496->83497 83610 41642b 46 API calls 3 library calls 83496->83610 83545 41aaa1 GetStartupInfoW 83497->83545 83501 416503 GetCommandLineW 83558 41f584 GetEnvironmentStringsW 83501->83558 83504 416513 83564 41f4d6 GetModuleFileNameW 83504->83564 83507 41651d 83508 416528 83507->83508 83612 411924 46 API calls 3 library calls 83507->83612 83568 41f2a4 83508->83568 83511 41652e 83512 416539 83511->83512 83613 411924 46 API calls 3 library calls 83511->83613 83582 411703 83512->83582 83515 416541 83516 41654c __wwincmdln 83515->83516 83614 411924 46 API calls 3 library calls 83515->83614 83586 40d6b0 83516->83586 83520 41657c 83616 411906 46 API calls _doexit 83520->83616 83523 416581 __write 83524->83489 83525->83492 83527 417c34 83526->83527 83528 417c3d GetProcAddress GetProcAddress GetProcAddress GetProcAddress 83526->83528 83617 4178ff 49 API calls _free 83527->83617 83529 417c87 TlsAlloc 83528->83529 83533 417cd5 TlsSetValue 83529->83533 83534 417d96 83529->83534 83531 417c39 83531->83496 83533->83534 83535 417ce6 __init_pointers 83533->83535 83534->83496 83618 418151 InitializeCriticalSectionAndSpinCount 83535->83618 83537 417d91 83626 4178ff 49 API calls _free 83537->83626 83539 417d2a 83539->83537 83619 416b49 83539->83619 83542 417d76 83625 41793c 46 API calls 4 library calls 83542->83625 83544 417d7e GetCurrentThreadId 83544->83534 83546 416b49 __calloc_crt 46 API calls 83545->83546 83553 41aabf 83546->83553 83547 41ac6a GetStdHandle 83554 41ac34 83547->83554 83548 41acce SetHandleCount 83550 4164f7 83548->83550 83549 416b49 __calloc_crt 46 API calls 83549->83553 83550->83501 83611 411924 46 API calls 3 library calls 83550->83611 83551 41ac7c GetFileType 83551->83554 83552 41abb4 83552->83554 83555 41abe0 GetFileType 83552->83555 83556 41abeb InitializeCriticalSectionAndSpinCount 83552->83556 83553->83549 83553->83550 83553->83552 83553->83554 83554->83547 83554->83548 83554->83551 83557 41aca2 InitializeCriticalSectionAndSpinCount 83554->83557 83555->83552 83555->83556 83556->83550 83556->83552 83557->83550 83557->83554 83559 41f595 83558->83559 83560 41f599 83558->83560 83559->83504 83636 416b04 83560->83636 83562 41f5bb _memmove 83563 41f5c2 FreeEnvironmentStringsW 83562->83563 83563->83504 83565 41f50b _wparse_cmdline 83564->83565 83566 416b04 __malloc_crt 46 API calls 83565->83566 83567 41f54e _wparse_cmdline 83565->83567 83566->83567 83567->83507 83569 41f2b4 83568->83569 83570 41f2bc _wcslen 83568->83570 83569->83511 83571 416b49 __calloc_crt 46 API calls 83570->83571 83572 41f2e0 _wcslen 83571->83572 83572->83569 83573 41f336 83572->83573 83575 416b49 __calloc_crt 46 API calls 83572->83575 83576 41f35c 83572->83576 83579 41f373 83572->83579 83642 41ef12 46 API calls __snwprintf 83572->83642 83643 413748 83573->83643 83575->83572 83577 413748 _free 46 API calls 83576->83577 83577->83569 83649 417ed3 83579->83649 83581 41f37f 83581->83511 83583 411711 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 83582->83583 83585 411750 __IsNonwritableInCurrentImage 83583->83585 83668 41130a 51 API calls __cinit 83583->83668 83585->83515 83587 42e2f3 83586->83587 83588 40d6cc 83586->83588 83669 408f40 83588->83669 83590 40d707 83673 40ebb0 83590->83673 83593 40d737 83676 411951 83593->83676 83598 40d751 83688 40f4e0 SystemParametersInfoW SystemParametersInfoW 83598->83688 83600 40d75f 83689 40d590 GetCurrentDirectoryW 83600->83689 83602 40d767 SystemParametersInfoW 83603 40d794 83602->83603 83604 40d78d FreeLibrary 83602->83604 83605 408f40 VariantClear 83603->83605 83604->83603 83606 40d79d 83605->83606 83607 408f40 VariantClear 83606->83607 83608 40d7a6 83607->83608 83608->83520 83615 4118da 46 API calls _doexit 83608->83615 83609->83493 83610->83497 83615->83520 83616->83523 83617->83531 83618->83539 83621 416b52 83619->83621 83622 416b8f 83621->83622 83623 416b70 Sleep 83621->83623 83627 41f677 83621->83627 83622->83537 83622->83542 83624 416b85 83623->83624 83624->83621 83624->83622 83625->83544 83626->83534 83628 41f683 83627->83628 83633 41f69e _malloc 83627->83633 83629 41f68f 83628->83629 83628->83633 83635 417f77 46 API calls __getptd_noexit 83629->83635 83630 41f6b1 HeapAlloc 83632 41f6d8 83630->83632 83630->83633 83632->83621 83633->83630 83633->83632 83634 41f694 83634->83621 83635->83634 83638 416b0d 83636->83638 83637 4135bb _malloc 45 API calls 83637->83638 83638->83637 83639 416b43 83638->83639 83640 416b24 Sleep 83638->83640 83639->83562 83641 416b39 83640->83641 83641->83638 83641->83639 83642->83572 83644 41377c __dosmaperr 83643->83644 83645 413753 RtlFreeHeap 83643->83645 83644->83569 83645->83644 83646 413768 83645->83646 83652 417f77 46 API calls __getptd_noexit 83646->83652 83648 41376e GetLastError 83648->83644 83653 417daa 83649->83653 83652->83648 83654 417dc9 __gmtime64_s __call_reportfault 83653->83654 83655 417de7 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 83654->83655 83658 417eb5 __call_reportfault 83655->83658 83657 417ed1 GetCurrentProcess TerminateProcess 83657->83581 83659 41a208 83658->83659 83660 41a210 83659->83660 83661 41a212 IsDebuggerPresent 83659->83661 83660->83657 83667 41fe19 83661->83667 83664 421fd3 SetUnhandledExceptionFilter UnhandledExceptionFilter 83665 421ff0 __call_reportfault 83664->83665 83666 421ff8 GetCurrentProcess TerminateProcess 83664->83666 83665->83666 83666->83657 83667->83664 83668->83585 83670 408f48 moneypunct 83669->83670 83671 4265c7 VariantClear 83670->83671 83672 408f55 moneypunct 83670->83672 83671->83672 83672->83590 83731 40ebd0 83673->83731 83735 4182cb 83676->83735 83678 41195e 83742 4181f2 LeaveCriticalSection 83678->83742 83680 40d748 83681 4119b0 83680->83681 83682 4119d6 83681->83682 83683 4119bc 83681->83683 83682->83598 83683->83682 83777 417f77 46 API calls __getptd_noexit 83683->83777 83685 4119c6 83778 417f25 10 API calls __snwprintf 83685->83778 83687 4119d1 83687->83598 83688->83600 83779 401f20 83689->83779 83691 40d5b6 IsDebuggerPresent 83692 40d5c4 83691->83692 83693 42e1bb MessageBoxA 83691->83693 83694 42e1d4 83692->83694 83695 40d5e3 83692->83695 83693->83694 83867 403a50 52 API calls 3 library calls 83694->83867 83849 40f520 83695->83849 83698 40d5f5 83699 40d5fd GetFullPathNameW 83698->83699 83702 42e1fd 83698->83702 83861 401460 101 API calls _wcscat 83699->83861 83701 40d63b 83701->83702 83703 40d643 83701->83703 83704 42e231 SetCurrentDirectoryW 83702->83704 83705 40d64c 83703->83705 83706 42e24d 83703->83706 83704->83706 83862 410390 16 API calls 83705->83862 83868 432fee 6 API calls 83706->83868 83709 42e252 83709->83705 83712 42e25a GetModuleFileNameW 83709->83712 83710 40d651 83863 410570 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 83710->83863 83714 42e274 83712->83714 83715 42e2cb GetForegroundWindow ShellExecuteW 83712->83715 83713 40d656 83716 40d669 83713->83716 83864 40e0c0 74 API calls __gmtime64_s 83713->83864 83869 401b10 83714->83869 83721 40d688 83715->83721 83865 4091e0 304 API calls moneypunct 83716->83865 83724 40d692 SetCurrentDirectoryW 83721->83724 83723 40d675 83723->83721 83866 401000 Shell_NotifyIconW __gmtime64_s 83723->83866 83724->83602 83725 42e28d 83876 40d200 52 API calls 2 library calls 83725->83876 83728 42e299 GetForegroundWindow ShellExecuteW 83729 42e2c6 83728->83729 83729->83721 83730 40ec00 LoadLibraryA GetProcAddress 83730->83593 83732 40d72e 83731->83732 83733 40ebd6 LoadLibraryA 83731->83733 83732->83593 83732->83730 83733->83732 83734 40ebe7 GetProcAddress 83733->83734 83734->83732 83736 4182e0 83735->83736 83737 4182f3 EnterCriticalSection 83735->83737 83743 418209 83736->83743 83737->83678 83739 4182e6 83739->83737 83770 411924 46 API calls 3 library calls 83739->83770 83742->83680 83744 418215 __write 83743->83744 83745 418225 83744->83745 83746 41823d 83744->83746 83771 418901 46 API calls 2 library calls 83745->83771 83749 416b04 __malloc_crt 45 API calls 83746->83749 83755 41824b __write 83746->83755 83748 41822a 83772 418752 46 API calls 9 library calls 83748->83772 83751 418256 83749->83751 83753 41825d 83751->83753 83754 41826c 83751->83754 83752 418231 83773 411682 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 83752->83773 83774 417f77 46 API calls __getptd_noexit 83753->83774 83758 4182cb __lock 45 API calls 83754->83758 83755->83739 83760 418273 83758->83760 83761 4182a6 83760->83761 83762 41827b InitializeCriticalSectionAndSpinCount 83760->83762 83765 413748 _free 45 API calls 83761->83765 83763 418297 83762->83763 83764 41828b 83762->83764 83776 4182c2 LeaveCriticalSection _doexit 83763->83776 83766 413748 _free 45 API calls 83764->83766 83765->83763 83767 418291 83766->83767 83775 417f77 46 API calls __getptd_noexit 83767->83775 83771->83748 83772->83752 83774->83755 83775->83763 83776->83755 83777->83685 83778->83687 83877 40e6e0 83779->83877 83783 401f41 GetModuleFileNameW 83895 410100 83783->83895 83785 401f5c 83907 410960 83785->83907 83788 401b10 52 API calls 83789 401f81 83788->83789 83910 401980 83789->83910 83791 401f8e 83792 408f40 VariantClear 83791->83792 83793 401f9d 83792->83793 83794 401b10 52 API calls 83793->83794 83795 401fb4 83794->83795 83796 401980 53 API calls 83795->83796 83797 401fc3 83796->83797 83798 401b10 52 API calls 83797->83798 83799 401fd2 83798->83799 83918 40c2c0 83799->83918 83801 401fe1 83802 40bc70 52 API calls 83801->83802 83803 401ff3 83802->83803 83936 401a10 83803->83936 83805 401ffe 83943 4114ab 83805->83943 83808 428b05 83810 401a10 52 API calls 83808->83810 83809 402017 83811 4114ab __wcsicoll 58 API calls 83809->83811 83812 428b18 83810->83812 83813 402022 83811->83813 83815 401a10 52 API calls 83812->83815 83813->83812 83814 40202d 83813->83814 83816 4114ab __wcsicoll 58 API calls 83814->83816 83817 428b33 83815->83817 83818 402038 83816->83818 83820 428b3b GetModuleFileNameW 83817->83820 83819 402043 83818->83819 83818->83820 83821 4114ab __wcsicoll 58 API calls 83819->83821 83822 401a10 52 API calls 83820->83822 83823 40204e 83821->83823 83824 428b6c 83822->83824 83825 402092 83823->83825 83828 428b90 _wcscpy 83823->83828 83831 401a10 52 API calls 83823->83831 83955 40e0a0 52 API calls 83824->83955 83827 4020a3 83825->83827 83825->83828 83830 428bc6 83827->83830 83951 40e830 53 API calls 83827->83951 83836 401a10 52 API calls 83828->83836 83829 428b7a 83832 401a10 52 API calls 83829->83832 83834 402073 _wcscpy 83831->83834 83835 428b88 83832->83835 83839 401a10 52 API calls 83834->83839 83835->83828 83844 4020d0 83836->83844 83837 4020bb 83952 40cf00 53 API calls 83837->83952 83839->83825 83840 4020c6 83841 408f40 VariantClear 83840->83841 83841->83844 83842 402110 83846 408f40 VariantClear 83842->83846 83844->83842 83847 401a10 52 API calls 83844->83847 83953 40cf00 53 API calls 83844->83953 83954 40e6a0 53 API calls 83844->83954 83848 402120 moneypunct 83846->83848 83847->83844 83848->83691 83850 4295c9 __gmtime64_s 83849->83850 83851 40f53c 83849->83851 83854 4295d9 GetOpenFileNameW 83850->83854 84580 410120 83851->84580 83853 40f545 84584 4102b0 SHGetMalloc 83853->84584 83854->83851 83856 40f562 83854->83856 83856->83698 83857 40f54c 84589 410190 GetFullPathNameW 83857->84589 83859 40f559 84600 40f570 83859->84600 83861->83701 83862->83710 83863->83713 83864->83716 83865->83723 83866->83721 83867->83702 83868->83709 83870 401b16 _wcslen 83869->83870 83871 4115d7 52 API calls 83870->83871 83874 401b63 83870->83874 83872 401b4b _memmove 83871->83872 83873 4115d7 52 API calls 83872->83873 83873->83874 83875 40d200 52 API calls 2 library calls 83874->83875 83875->83725 83876->83728 83878 40bc70 52 API calls 83877->83878 83879 401f31 83878->83879 83880 402560 83879->83880 83881 40256d __write_nolock 83880->83881 83882 402160 52 API calls 83881->83882 83884 402593 83882->83884 83887 4025bd 83884->83887 83956 401c90 83884->83956 83885 4026f0 52 API calls 83885->83887 83886 4026a7 83888 401b10 52 API calls 83886->83888 83894 4026db 83886->83894 83887->83885 83887->83886 83890 401b10 52 API calls 83887->83890 83892 401c90 52 API calls 83887->83892 83959 40d7c0 52 API calls 2 library calls 83887->83959 83889 4026d1 83888->83889 83960 40d7c0 52 API calls 2 library calls 83889->83960 83890->83887 83892->83887 83894->83783 83961 40f760 83895->83961 83898 410118 83898->83785 83900 42805d 83901 42806a 83900->83901 84017 431e58 83900->84017 83903 413748 _free 46 API calls 83901->83903 83904 428078 83903->83904 83905 431e58 82 API calls 83904->83905 83906 428084 83905->83906 83906->83785 83908 4115d7 52 API calls 83907->83908 83909 401f74 83908->83909 83909->83788 83911 4019a3 83910->83911 83915 401985 83910->83915 83912 4019b8 83911->83912 83911->83915 84569 403e10 53 API calls 83912->84569 83913 40199f 83913->83791 83915->83913 84568 403e10 53 API calls 83915->84568 83917 4019c4 83917->83791 83919 40c2c7 83918->83919 83920 40c30e 83918->83920 83923 40c2d3 83919->83923 83924 426c79 83919->83924 83921 40c315 83920->83921 83922 426c2b 83920->83922 83925 40c321 83921->83925 83926 426c5a 83921->83926 83928 426c4b 83922->83928 83929 426c2e 83922->83929 84570 403ea0 52 API calls __cinit 83923->84570 84575 4534e3 52 API calls 83924->84575 84571 403ea0 52 API calls __cinit 83925->84571 84574 4534e3 52 API calls 83926->84574 84573 4534e3 52 API calls 83928->84573 83935 40c2de 83929->83935 84572 4534e3 52 API calls 83929->84572 83935->83801 83935->83935 83937 401a30 83936->83937 83938 401a17 83936->83938 83940 402160 52 API calls 83937->83940 83939 401a2d 83938->83939 84576 403c30 52 API calls _memmove 83938->84576 83939->83805 83942 401a3d 83940->83942 83942->83805 83944 411523 83943->83944 83945 4114ba 83943->83945 84579 4113a8 58 API calls 3 library calls 83944->84579 83950 40200c 83945->83950 84577 417f77 46 API calls __getptd_noexit 83945->84577 83948 4114c6 84578 417f25 10 API calls __snwprintf 83948->84578 83950->83808 83950->83809 83951->83837 83952->83840 83953->83844 83954->83844 83955->83829 83957 4026f0 52 API calls 83956->83957 83958 401c97 83957->83958 83958->83884 83959->83887 83960->83894 84021 40f6f0 83961->84021 83963 40f77b _strcat moneypunct 84029 40f850 83963->84029 83968 427c2a 84058 414d04 83968->84058 83970 40f7fc 83970->83968 83971 40f804 83970->83971 84045 414a46 83971->84045 83975 40f80e 83975->83898 83980 4528bd 83975->83980 83977 427c59 84064 414fe2 83977->84064 83979 427c79 83981 4150d1 _fseek 81 API calls 83980->83981 83982 452930 83981->83982 84561 452719 83982->84561 83985 452948 83985->83900 83986 414d04 __fread_nolock 61 API calls 83987 452966 83986->83987 83988 414d04 __fread_nolock 61 API calls 83987->83988 83989 452976 83988->83989 83990 414d04 __fread_nolock 61 API calls 83989->83990 83991 45298f 83990->83991 83992 414d04 __fread_nolock 61 API calls 83991->83992 83993 4529aa 83992->83993 83994 4150d1 _fseek 81 API calls 83993->83994 83995 4529c4 83994->83995 83996 4135bb _malloc 46 API calls 83995->83996 83997 4529cf 83996->83997 83998 4135bb _malloc 46 API calls 83997->83998 83999 4529db 83998->83999 84000 414d04 __fread_nolock 61 API calls 83999->84000 84001 4529ec 84000->84001 84002 44afef GetSystemTimeAsFileTime 84001->84002 84003 452a00 84002->84003 84004 452a36 84003->84004 84005 452a13 84003->84005 84007 452aa5 84004->84007 84008 452a3c 84004->84008 84006 413748 _free 46 API calls 84005->84006 84009 452a1c 84006->84009 84011 413748 _free 46 API calls 84007->84011 84567 44b1a9 117 API calls __fcloseall 84008->84567 84013 413748 _free 46 API calls 84009->84013 84012 452aa3 84011->84012 84012->83900 84015 452a25 84013->84015 84014 452a9d 84016 413748 _free 46 API calls 84014->84016 84015->83900 84016->84012 84018 431e64 84017->84018 84019 431e6a 84017->84019 84020 414a46 __fcloseall 82 API calls 84018->84020 84019->83901 84020->84019 84022 425de2 84021->84022 84023 40f6fc _wcslen 84021->84023 84022->83963 84024 40f710 WideCharToMultiByte 84023->84024 84025 40f756 84024->84025 84026 40f728 84024->84026 84025->83963 84027 4115d7 52 API calls 84026->84027 84028 40f735 WideCharToMultiByte 84027->84028 84028->83963 84031 40f85d __gmtime64_s _strlen 84029->84031 84032 40f7ab 84031->84032 84077 414db8 84031->84077 84033 4149c2 84032->84033 84089 414904 84033->84089 84035 40f7e9 84035->83968 84036 40f5c0 84035->84036 84041 40f5cd _strcat __write_nolock _memmove 84036->84041 84037 414d04 __fread_nolock 61 API calls 84037->84041 84039 425d11 84040 4150d1 _fseek 81 API calls 84039->84040 84042 425d33 84040->84042 84041->84037 84041->84039 84044 40f691 __tzset_nolock 84041->84044 84177 4150d1 84041->84177 84043 414d04 __fread_nolock 61 API calls 84042->84043 84043->84044 84044->83970 84046 414a52 __write 84045->84046 84047 414a64 84046->84047 84048 414a79 84046->84048 84317 417f77 46 API calls __getptd_noexit 84047->84317 84051 415471 __lock_file 47 API calls 84048->84051 84055 414a74 __write 84048->84055 84050 414a69 84318 417f25 10 API calls __snwprintf 84050->84318 84053 414a92 84051->84053 84301 4149d9 84053->84301 84055->83975 84386 414c76 84058->84386 84060 414d1c 84061 44afef 84060->84061 84554 442c5a 84061->84554 84063 44b00d 84063->83977 84065 414fee __write 84064->84065 84066 414ffa 84065->84066 84067 41500f 84065->84067 84558 417f77 46 API calls __getptd_noexit 84066->84558 84068 415471 __lock_file 47 API calls 84067->84068 84071 415017 84068->84071 84070 414fff 84559 417f25 10 API calls __snwprintf 84070->84559 84073 414e4e __ftell_nolock 51 API calls 84071->84073 84074 415024 84073->84074 84560 41503d LeaveCriticalSection LeaveCriticalSection _fseek 84074->84560 84076 41500a __write 84076->83979 84078 414dd6 84077->84078 84079 414deb 84077->84079 84086 417f77 46 API calls __getptd_noexit 84078->84086 84079->84078 84084 414df2 84079->84084 84081 414ddb 84087 417f25 10 API calls __snwprintf 84081->84087 84083 414de6 84083->84031 84084->84083 84088 418f98 77 API calls 5 library calls 84084->84088 84086->84081 84087->84083 84088->84083 84091 414910 __write 84089->84091 84090 414923 84145 417f77 46 API calls __getptd_noexit 84090->84145 84091->84090 84093 414951 84091->84093 84108 41d4d1 84093->84108 84094 414928 84146 417f25 10 API calls __snwprintf 84094->84146 84097 414956 84098 41496a 84097->84098 84099 41495d 84097->84099 84101 414992 84098->84101 84102 414972 84098->84102 84147 417f77 46 API calls __getptd_noexit 84099->84147 84125 41d218 84101->84125 84148 417f77 46 API calls __getptd_noexit 84102->84148 84107 414933 __write @_EH4_CallFilterFunc@8 84107->84035 84109 41d4dd __write 84108->84109 84110 4182cb __lock 46 API calls 84109->84110 84116 41d4eb 84110->84116 84111 41d567 84113 416b04 __malloc_crt 46 API calls 84111->84113 84115 41d56e 84113->84115 84114 41d5f0 __write 84114->84097 84117 41d57c InitializeCriticalSectionAndSpinCount 84115->84117 84123 41d560 84115->84123 84116->84111 84118 418209 __mtinitlocknum 46 API calls 84116->84118 84116->84123 84153 4154b2 47 API calls __lock 84116->84153 84154 415520 LeaveCriticalSection LeaveCriticalSection _doexit 84116->84154 84120 41d59c 84117->84120 84121 41d5af EnterCriticalSection 84117->84121 84118->84116 84122 413748 _free 46 API calls 84120->84122 84121->84123 84122->84123 84150 41d5fb 84123->84150 84126 41d23a 84125->84126 84127 41d255 84126->84127 84138 41d26c __wopenfile 84126->84138 84159 417f77 46 API calls __getptd_noexit 84127->84159 84129 41d25a 84160 417f25 10 API calls __snwprintf 84129->84160 84130 41d47a 84164 417f77 46 API calls __getptd_noexit 84130->84164 84131 41d48c 84156 422bf9 84131->84156 84135 41d47f 84165 417f25 10 API calls __snwprintf 84135->84165 84136 41499d 84149 4149b8 LeaveCriticalSection LeaveCriticalSection _fseek 84136->84149 84138->84130 84144 41d421 84138->84144 84161 41341f 58 API calls 2 library calls 84138->84161 84140 41d41a 84140->84144 84162 41341f 58 API calls 2 library calls 84140->84162 84142 41d439 84142->84144 84163 41341f 58 API calls 2 library calls 84142->84163 84144->84130 84144->84131 84145->84094 84146->84107 84147->84107 84148->84107 84149->84107 84155 4181f2 LeaveCriticalSection 84150->84155 84152 41d602 84152->84114 84153->84116 84154->84116 84155->84152 84166 422b35 84156->84166 84158 422c14 84158->84136 84159->84129 84160->84136 84161->84140 84162->84142 84163->84144 84164->84135 84165->84136 84167 422b41 __write 84166->84167 84168 422b54 84167->84168 84171 422b8a 84167->84171 84169 417f77 __snwprintf 46 API calls 84168->84169 84170 422b59 84169->84170 84172 417f25 __snwprintf 10 API calls 84170->84172 84173 422400 __tsopen_nolock 109 API calls 84171->84173 84176 422b63 __write 84172->84176 84174 422ba4 84173->84174 84175 422bcb __wsopen_helper LeaveCriticalSection 84174->84175 84175->84176 84176->84158 84180 4150dd __write 84177->84180 84178 4150e9 84208 417f77 46 API calls __getptd_noexit 84178->84208 84180->84178 84181 41510f 84180->84181 84190 415471 84181->84190 84182 4150ee 84209 417f25 10 API calls __snwprintf 84182->84209 84189 4150f9 __write 84189->84041 84191 415483 84190->84191 84192 4154a5 EnterCriticalSection 84190->84192 84191->84192 84193 41548b 84191->84193 84195 415117 84192->84195 84194 4182cb __lock 46 API calls 84193->84194 84194->84195 84196 415047 84195->84196 84197 415067 84196->84197 84198 415057 84196->84198 84203 415079 84197->84203 84211 414e4e 84197->84211 84266 417f77 46 API calls __getptd_noexit 84198->84266 84202 41505c 84210 415143 LeaveCriticalSection LeaveCriticalSection _fseek 84202->84210 84228 41443c 84203->84228 84206 4150b9 84241 41e1f4 84206->84241 84208->84182 84209->84189 84210->84189 84212 414e61 84211->84212 84213 414e79 84211->84213 84267 417f77 46 API calls __getptd_noexit 84212->84267 84214 414139 __flswbuf 46 API calls 84213->84214 84216 414e80 84214->84216 84219 41e1f4 __write 51 API calls 84216->84219 84217 414e66 84268 417f25 10 API calls __snwprintf 84217->84268 84220 414e97 84219->84220 84221 414f09 84220->84221 84223 414ec9 84220->84223 84227 414e71 84220->84227 84269 417f77 46 API calls __getptd_noexit 84221->84269 84224 41e1f4 __write 51 API calls 84223->84224 84223->84227 84225 414f64 84224->84225 84226 41e1f4 __write 51 API calls 84225->84226 84225->84227 84226->84227 84227->84203 84229 414455 84228->84229 84230 414477 84228->84230 84229->84230 84231 414139 __flswbuf 46 API calls 84229->84231 84234 414139 84230->84234 84232 414470 84231->84232 84270 41b7b2 77 API calls 4 library calls 84232->84270 84235 414145 84234->84235 84236 41415a 84234->84236 84271 417f77 46 API calls __getptd_noexit 84235->84271 84236->84206 84238 41414a 84272 417f25 10 API calls __snwprintf 84238->84272 84240 414155 84240->84206 84242 41e200 __write 84241->84242 84243 41e223 84242->84243 84244 41e208 84242->84244 84246 41e22f 84243->84246 84250 41e269 84243->84250 84293 417f8a 46 API calls __getptd_noexit 84244->84293 84295 417f8a 46 API calls __getptd_noexit 84246->84295 84248 41e20d 84294 417f77 46 API calls __getptd_noexit 84248->84294 84249 41e234 84296 417f77 46 API calls __getptd_noexit 84249->84296 84273 41ae56 84250->84273 84254 41e23c 84297 417f25 10 API calls __snwprintf 84254->84297 84255 41e26f 84257 41e291 84255->84257 84258 41e27d 84255->84258 84298 417f77 46 API calls __getptd_noexit 84257->84298 84283 41e17f 84258->84283 84259 41e215 __write 84259->84202 84262 41e289 84300 41e2c0 LeaveCriticalSection __unlock_fhandle 84262->84300 84263 41e296 84299 417f8a 46 API calls __getptd_noexit 84263->84299 84266->84202 84267->84217 84268->84227 84269->84227 84270->84230 84271->84238 84272->84240 84274 41ae62 __write 84273->84274 84275 41aebc 84274->84275 84276 4182cb __lock 46 API calls 84274->84276 84277 41aec1 EnterCriticalSection 84275->84277 84280 41aede __write 84275->84280 84278 41ae8e 84276->84278 84277->84280 84279 41ae97 InitializeCriticalSectionAndSpinCount 84278->84279 84281 41aeaa 84278->84281 84279->84281 84280->84255 84282 41aeec ___lock_fhandle LeaveCriticalSection 84281->84282 84282->84275 84284 41aded __lseek_nolock 46 API calls 84283->84284 84285 41e18e 84284->84285 84286 41e1a4 SetFilePointer 84285->84286 84287 41e194 84285->84287 84289 41e1c3 84286->84289 84290 41e1bb GetLastError 84286->84290 84288 417f77 __snwprintf 46 API calls 84287->84288 84292 41e199 84288->84292 84291 417f9d __dosmaperr 46 API calls 84289->84291 84289->84292 84290->84289 84291->84292 84292->84262 84293->84248 84294->84259 84295->84249 84296->84254 84297->84259 84298->84263 84299->84262 84300->84259 84302 4149ea 84301->84302 84303 4149fe 84301->84303 84347 417f77 46 API calls __getptd_noexit 84302->84347 84305 4149fa 84303->84305 84307 41443c __flush 77 API calls 84303->84307 84319 414ab2 LeaveCriticalSection LeaveCriticalSection _fseek 84305->84319 84306 4149ef 84348 417f25 10 API calls __snwprintf 84306->84348 84309 414a0a 84307->84309 84320 41d8c2 84309->84320 84312 414139 __flswbuf 46 API calls 84313 414a18 84312->84313 84324 41d7fe 84313->84324 84315 414a1e 84315->84305 84316 413748 _free 46 API calls 84315->84316 84316->84305 84317->84050 84318->84055 84319->84055 84321 414a12 84320->84321 84322 41d8d2 84320->84322 84321->84312 84322->84321 84323 413748 _free 46 API calls 84322->84323 84323->84321 84325 41d80a __write 84324->84325 84326 41d812 84325->84326 84327 41d82d 84325->84327 84364 417f8a 46 API calls __getptd_noexit 84326->84364 84328 41d839 84327->84328 84334 41d873 84327->84334 84366 417f8a 46 API calls __getptd_noexit 84328->84366 84331 41d817 84365 417f77 46 API calls __getptd_noexit 84331->84365 84333 41d83e 84367 417f77 46 API calls __getptd_noexit 84333->84367 84337 41ae56 ___lock_fhandle 48 API calls 84334->84337 84335 41d81f __write 84335->84315 84339 41d879 84337->84339 84338 41d846 84368 417f25 10 API calls __snwprintf 84338->84368 84340 41d893 84339->84340 84341 41d887 84339->84341 84369 417f77 46 API calls __getptd_noexit 84340->84369 84349 41d762 84341->84349 84345 41d88d 84370 41d8ba LeaveCriticalSection __unlock_fhandle 84345->84370 84347->84306 84348->84305 84371 41aded 84349->84371 84351 41d7c8 84384 41ad67 47 API calls 2 library calls 84351->84384 84353 41d772 84353->84351 84354 41d7a6 84353->84354 84357 41aded __lseek_nolock 46 API calls 84353->84357 84354->84351 84355 41aded __lseek_nolock 46 API calls 84354->84355 84358 41d7b2 CloseHandle 84355->84358 84356 41d7d0 84359 41d7f2 84356->84359 84385 417f9d 46 API calls 3 library calls 84356->84385 84360 41d79d 84357->84360 84358->84351 84362 41d7be GetLastError 84358->84362 84359->84345 84361 41aded __lseek_nolock 46 API calls 84360->84361 84361->84354 84362->84351 84364->84331 84365->84335 84366->84333 84367->84338 84368->84335 84369->84345 84370->84335 84372 41adfa 84371->84372 84373 41ae12 84371->84373 84374 417f8a __write 46 API calls 84372->84374 84375 417f8a __write 46 API calls 84373->84375 84378 41ae51 84373->84378 84376 41adff 84374->84376 84377 41ae23 84375->84377 84379 417f77 __snwprintf 46 API calls 84376->84379 84380 417f77 __snwprintf 46 API calls 84377->84380 84378->84353 84381 41ae07 84379->84381 84382 41ae2b 84380->84382 84381->84353 84383 417f25 __snwprintf 10 API calls 84382->84383 84383->84381 84384->84356 84385->84359 84387 414c82 __write 84386->84387 84388 414cc3 84387->84388 84389 414c96 __gmtime64_s 84387->84389 84390 414cbb __write 84387->84390 84391 415471 __lock_file 47 API calls 84388->84391 84413 417f77 46 API calls __getptd_noexit 84389->84413 84390->84060 84393 414ccb 84391->84393 84399 414aba 84393->84399 84394 414cb0 84414 417f25 10 API calls __snwprintf 84394->84414 84400 414af2 84399->84400 84403 414ad8 __gmtime64_s 84399->84403 84415 414cfa LeaveCriticalSection LeaveCriticalSection _fseek 84400->84415 84401 414ae2 84466 417f77 46 API calls __getptd_noexit 84401->84466 84403->84400 84403->84401 84407 414b2d 84403->84407 84406 414c38 __gmtime64_s 84469 417f77 46 API calls __getptd_noexit 84406->84469 84407->84400 84407->84406 84408 414139 __flswbuf 46 API calls 84407->84408 84416 41dfcc 84407->84416 84446 41d8f3 84407->84446 84468 41e0c2 46 API calls 3 library calls 84407->84468 84408->84407 84412 414ae7 84467 417f25 10 API calls __snwprintf 84412->84467 84413->84394 84414->84390 84415->84390 84417 41dfd8 __write 84416->84417 84418 41dfe0 84417->84418 84419 41dffb 84417->84419 84539 417f8a 46 API calls __getptd_noexit 84418->84539 84421 41e007 84419->84421 84424 41e041 84419->84424 84541 417f8a 46 API calls __getptd_noexit 84421->84541 84422 41dfe5 84540 417f77 46 API calls __getptd_noexit 84422->84540 84427 41e063 84424->84427 84428 41e04e 84424->84428 84426 41e00c 84542 417f77 46 API calls __getptd_noexit 84426->84542 84432 41ae56 ___lock_fhandle 48 API calls 84427->84432 84544 417f8a 46 API calls __getptd_noexit 84428->84544 84429 41dfed __write 84429->84407 84435 41e069 84432->84435 84433 41e014 84543 417f25 10 API calls __snwprintf 84433->84543 84434 41e053 84545 417f77 46 API calls __getptd_noexit 84434->84545 84437 41e077 84435->84437 84438 41e08b 84435->84438 84470 41da15 84437->84470 84546 417f77 46 API calls __getptd_noexit 84438->84546 84442 41e083 84548 41e0ba LeaveCriticalSection __unlock_fhandle 84442->84548 84443 41e090 84547 417f8a 46 API calls __getptd_noexit 84443->84547 84447 41d900 84446->84447 84451 41d915 84446->84451 84552 417f77 46 API calls __getptd_noexit 84447->84552 84449 41d905 84553 417f25 10 API calls __snwprintf 84449->84553 84452 41d94a 84451->84452 84457 41d910 84451->84457 84549 420603 84451->84549 84454 414139 __flswbuf 46 API calls 84452->84454 84455 41d95e 84454->84455 84456 41dfcc __read 59 API calls 84455->84456 84458 41d965 84456->84458 84457->84407 84458->84457 84459 414139 __flswbuf 46 API calls 84458->84459 84460 41d988 84459->84460 84460->84457 84461 414139 __flswbuf 46 API calls 84460->84461 84462 41d994 84461->84462 84462->84457 84463 414139 __flswbuf 46 API calls 84462->84463 84464 41d9a1 84463->84464 84465 414139 __flswbuf 46 API calls 84464->84465 84465->84457 84466->84412 84467->84400 84468->84407 84469->84412 84471 41da31 84470->84471 84472 41da4c 84470->84472 84474 417f8a __write 46 API calls 84471->84474 84473 41da5b 84472->84473 84475 41da7a 84472->84475 84476 417f8a __write 46 API calls 84473->84476 84477 41da36 84474->84477 84480 41da98 84475->84480 84491 41daac 84475->84491 84479 41da60 84476->84479 84478 417f77 __snwprintf 46 API calls 84477->84478 84492 41da3e 84478->84492 84482 417f77 __snwprintf 46 API calls 84479->84482 84483 417f8a __write 46 API calls 84480->84483 84481 41db02 84485 417f8a __write 46 API calls 84481->84485 84484 41da67 84482->84484 84486 41da9d 84483->84486 84487 417f25 __snwprintf 10 API calls 84484->84487 84488 41db07 84485->84488 84489 417f77 __snwprintf 46 API calls 84486->84489 84487->84492 84493 417f77 __snwprintf 46 API calls 84488->84493 84490 41daa4 84489->84490 84495 417f25 __snwprintf 10 API calls 84490->84495 84491->84481 84491->84492 84494 41dae1 84491->84494 84496 41db1b 84491->84496 84492->84442 84493->84490 84494->84481 84499 41daec ReadFile 84494->84499 84495->84492 84498 416b04 __malloc_crt 46 API calls 84496->84498 84500 41db31 84498->84500 84501 41dc17 84499->84501 84502 41df8f GetLastError 84499->84502 84505 41db59 84500->84505 84506 41db3b 84500->84506 84501->84502 84509 41dc2b 84501->84509 84503 41de16 84502->84503 84504 41df9c 84502->84504 84514 417f9d __dosmaperr 46 API calls 84503->84514 84518 41dd9b 84503->84518 84507 417f77 __snwprintf 46 API calls 84504->84507 84510 420494 __lseeki64_nolock 48 API calls 84505->84510 84508 417f77 __snwprintf 46 API calls 84506->84508 84512 41dfa1 84507->84512 84513 41db40 84508->84513 84509->84518 84519 41dc47 84509->84519 84522 41de5b 84509->84522 84511 41db67 84510->84511 84511->84499 84515 417f8a __write 46 API calls 84512->84515 84516 417f8a __write 46 API calls 84513->84516 84514->84518 84515->84518 84516->84492 84517 413748 _free 46 API calls 84517->84492 84518->84492 84518->84517 84520 41dcab ReadFile 84519->84520 84527 41dd28 84519->84527 84525 41dcc9 GetLastError 84520->84525 84530 41dcd3 84520->84530 84521 41ded0 ReadFile 84523 41deef GetLastError 84521->84523 84531 41def9 84521->84531 84522->84518 84522->84521 84523->84522 84523->84531 84524 41ddec MultiByteToWideChar 84524->84518 84526 41de10 GetLastError 84524->84526 84525->84519 84525->84530 84526->84503 84527->84518 84528 41dda3 84527->84528 84529 41dd96 84527->84529 84535 41dd60 84527->84535 84528->84535 84536 41ddda 84528->84536 84532 417f77 __snwprintf 46 API calls 84529->84532 84530->84519 84533 420494 __lseeki64_nolock 48 API calls 84530->84533 84531->84522 84534 420494 __lseeki64_nolock 48 API calls 84531->84534 84532->84518 84533->84530 84534->84531 84535->84524 84537 420494 __lseeki64_nolock 48 API calls 84536->84537 84538 41dde9 84537->84538 84538->84524 84539->84422 84540->84429 84541->84426 84542->84433 84543->84429 84544->84434 84545->84433 84546->84443 84547->84442 84548->84429 84550 416b04 __malloc_crt 46 API calls 84549->84550 84551 420618 84550->84551 84551->84452 84552->84449 84553->84457 84557 4148b3 GetSystemTimeAsFileTime __aulldiv 84554->84557 84556 442c6b 84556->84063 84557->84556 84558->84070 84559->84076 84560->84076 84564 45272f __tzset_nolock _wcscpy 84561->84564 84562 44afef GetSystemTimeAsFileTime 84562->84564 84563 4528a4 84563->83985 84563->83986 84564->84562 84564->84563 84565 414d04 61 API calls __fread_nolock 84564->84565 84566 4150d1 81 API calls _fseek 84564->84566 84565->84564 84566->84564 84567->84014 84568->83913 84569->83917 84570->83935 84571->83935 84572->83935 84573->83926 84574->83935 84575->83935 84576->83939 84577->83948 84578->83950 84579->83950 84627 410160 84580->84627 84582 41012f GetFullPathNameW 84583 410147 moneypunct 84582->84583 84583->83853 84585 4102cb SHGetDesktopFolder 84584->84585 84588 410333 _wcsncpy 84584->84588 84586 4102e0 _wcsncpy 84585->84586 84585->84588 84587 41031c SHGetPathFromIDListW 84586->84587 84586->84588 84587->84588 84588->83857 84590 4101bb 84589->84590 84594 425f4a 84589->84594 84591 410160 52 API calls 84590->84591 84593 4101c7 84591->84593 84592 4114ab __wcsicoll 58 API calls 84592->84594 84631 410200 52 API calls 2 library calls 84593->84631 84594->84592 84596 425f6e 84594->84596 84596->83859 84597 4101d6 84632 410200 52 API calls 2 library calls 84597->84632 84599 4101e9 84599->83859 84601 40f760 126 API calls 84600->84601 84602 40f584 84601->84602 84603 429335 84602->84603 84604 40f58c 84602->84604 84607 4528bd 118 API calls 84603->84607 84605 40f598 84604->84605 84606 429358 84604->84606 84638 4033c0 109 API calls 7 library calls 84605->84638 84633 434034 GetModuleHandleW LoadStringW GetModuleHandleW LoadStringW 84606->84633 84610 42934b 84607->84610 84611 429369 84610->84611 84613 431e58 82 API calls 84610->84613 84614 4115d7 52 API calls 84611->84614 84612 40f5b4 84612->83856 84613->84606 84626 4293c5 moneypunct 84614->84626 84615 42959c 84616 413748 _free 46 API calls 84615->84616 84617 4295a5 84616->84617 84618 431e58 82 API calls 84617->84618 84619 4295b1 84618->84619 84623 401b10 52 API calls 84623->84626 84626->84615 84626->84623 84639 444af8 52 API calls _memmove 84626->84639 84640 44c7dd 64 API calls 3 library calls 84626->84640 84641 44b41c 52 API calls 84626->84641 84642 402780 52 API calls 2 library calls 84626->84642 84643 4022d0 52 API calls moneypunct 84626->84643 84628 410167 _wcslen 84627->84628 84629 4115d7 52 API calls 84628->84629 84630 41017e _wcscpy 84629->84630 84630->84582 84631->84597 84632->84599 84634 4340aa MessageBoxW 84633->84634 84635 434088 84633->84635 84634->84611 84644 413abe 81 API calls 6 library calls 84635->84644 84637 4340a6 84637->84611 84638->84612 84639->84626 84640->84626 84641->84626 84642->84626 84643->84626 84644->84637 84645 425b2b 84650 40f000 84645->84650 84649 425b3a 84651 4115d7 52 API calls 84650->84651 84652 40f007 84651->84652 84653 4276ea 84652->84653 84659 40f030 84652->84659 84658 41130a 51 API calls __cinit 84658->84649 84660 40f039 84659->84660 84661 40f01a 84659->84661 84689 41130a 51 API calls __cinit 84660->84689 84663 40e500 84661->84663 84664 40bc70 52 API calls 84663->84664 84665 40e515 GetVersionExW 84664->84665 84666 402160 52 API calls 84665->84666 84667 40e557 84666->84667 84690 40e660 84667->84690 84673 427674 84677 4276c6 GetSystemInfo 84673->84677 84675 40e5e0 84678 4276d5 GetSystemInfo 84675->84678 84704 40efd0 84675->84704 84676 40e5cd GetCurrentProcess 84711 40ef20 LoadLibraryA GetProcAddress 84676->84711 84677->84678 84682 40e629 84708 40ef90 84682->84708 84685 40e641 FreeLibrary 84686 40e644 84685->84686 84687 40e653 FreeLibrary 84686->84687 84688 40e656 84686->84688 84687->84688 84688->84658 84689->84661 84691 40e667 84690->84691 84692 42761d 84691->84692 84693 40c600 52 API calls 84691->84693 84694 40e55c 84693->84694 84695 40e680 84694->84695 84696 40e687 84695->84696 84697 427616 84696->84697 84698 40c600 52 API calls 84696->84698 84699 40e566 84698->84699 84699->84673 84700 40ef60 84699->84700 84701 40e5c8 84700->84701 84702 40ef66 LoadLibraryA 84700->84702 84701->84675 84701->84676 84702->84701 84703 40ef77 GetProcAddress 84702->84703 84703->84701 84705 40e620 84704->84705 84706 40efd6 LoadLibraryA 84704->84706 84705->84677 84705->84682 84706->84705 84707 40efe7 GetProcAddress 84706->84707 84707->84705 84712 40efb0 LoadLibraryA GetProcAddress 84708->84712 84710 40e632 GetNativeSystemInfo 84710->84685 84710->84686 84711->84675 84712->84710 84713 425b5e 84718 40c7f0 84713->84718 84717 425b6d 84753 40db10 52 API calls 84718->84753 84720 40c82a 84754 410ab0 6 API calls 84720->84754 84722 40c86d 84723 40bc70 52 API calls 84722->84723 84724 40c877 84723->84724 84725 40bc70 52 API calls 84724->84725 84726 40c881 84725->84726 84727 40bc70 52 API calls 84726->84727 84728 40c88b 84727->84728 84729 40bc70 52 API calls 84728->84729 84730 40c8d1 84729->84730 84731 40bc70 52 API calls 84730->84731 84732 40c991 84731->84732 84755 40d2c0 52 API calls 84732->84755 84734 40c99b 84756 40d0d0 53 API calls 84734->84756 84736 40c9c1 84737 40bc70 52 API calls 84736->84737 84738 40c9cb 84737->84738 84757 40e310 53 API calls 84738->84757 84740 40ca28 84741 408f40 VariantClear 84740->84741 84742 40ca30 84741->84742 84743 408f40 VariantClear 84742->84743 84744 40ca38 GetStdHandle 84743->84744 84745 429630 84744->84745 84746 40ca87 84744->84746 84745->84746 84747 429639 84745->84747 84752 41130a 51 API calls __cinit 84746->84752 84758 4432c0 57 API calls 84747->84758 84749 429641 84759 44b6ab CreateThread 84749->84759 84751 42964f CloseHandle 84751->84746 84752->84717 84753->84720 84754->84722 84755->84734 84756->84736 84757->84740 84758->84749 84759->84751 84760 44b5cb 58 API calls 84759->84760 84761 425b6f 84766 40dc90 84761->84766 84765 425b7e 84767 40bc70 52 API calls 84766->84767 84768 40dd03 84767->84768 84775 40f210 84768->84775 84770 426a97 84772 40dd96 84772->84770 84773 40ddb7 84772->84773 84778 40dc00 52 API calls 2 library calls 84772->84778 84774 41130a 51 API calls __cinit 84773->84774 84774->84765 84779 40f250 RegOpenKeyExW 84775->84779 84777 40f230 84777->84772 84778->84772 84780 425e17 84779->84780 84781 40f275 RegQueryValueExW 84779->84781 84780->84777 84782 40f2c3 RegCloseKey 84781->84782 84783 40f298 84781->84783 84782->84777 84784 40f2a9 RegCloseKey 84783->84784 84785 425e1d 84783->84785 84784->84777

    Control-flow Graph

    APIs
    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0040D5AA
      • Part of subcall function 00401F20: GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402007
      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 0040201D
      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402033
      • Part of subcall function 00401F20: __wcsicoll.LIBCMT ref: 00402049
      • Part of subcall function 00401F20: _wcscpy.LIBCMT ref: 0040207C
    • IsDebuggerPresent.KERNEL32 ref: 0040D5B6
    • GetFullPathNameW.KERNEL32(004A7F6C,00000104,?,004A7F50,004A7F54), ref: 0040D625
      • Part of subcall function 00401460: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 004014A5
    • SetCurrentDirectoryW.KERNEL32(?,00000001), ref: 0040D699
    • MessageBoxA.USER32(00000000,This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.,00484C92,00000010), ref: 0042E1C9
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0042E238
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0042E268
    • GetForegroundWindow.USER32(runas,?,?,?,00000001), ref: 0042E2B2
    • ShellExecuteW.SHELL32(00000000), ref: 0042E2B9
      • Part of subcall function 00410390: GetSysColorBrush.USER32(0000000F), ref: 0041039B
      • Part of subcall function 00410390: LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
      • Part of subcall function 00410390: LoadIconW.USER32(?,00000063), ref: 004103C0
      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A4), ref: 004103D3
      • Part of subcall function 00410390: LoadIconW.USER32(?,000000A2), ref: 004103E6
      • Part of subcall function 00410390: LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
      • Part of subcall function 00410390: RegisterClassExW.USER32(?), ref: 0041045D
      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
      • Part of subcall function 00410570: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105E4
      • Part of subcall function 00410570: ShowWindow.USER32(?,00000000), ref: 004105EE
      • Part of subcall function 0040E0C0: Shell_NotifyIconW.SHELL32(00000000,?), ref: 0040E1A7
    Strings
    • This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support., xrefs: 0042E1C2
    • runas, xrefs: 0042E2AD, 0042E2DC
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: LoadWindow$IconName__wcsicoll$CurrentDirectory$CreateFileFullModulePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcscpy
    • String ID: This is a compiled AutoIt script. AV researchers please email avsupport@autoitscript.com for support.$runas
    • API String ID: 2495805114-3383388033
    • Opcode ID: e632c6ee4617dbfd75e0ed3d3f087477aad7453696fc977a02cf57d713d1418d
    • Instruction ID: d8104b1e62918721d1641daf81013a976a0e8d4b3b5b72af0edf1e1af392be53
    • Opcode Fuzzy Hash: e632c6ee4617dbfd75e0ed3d3f087477aad7453696fc977a02cf57d713d1418d
    • Instruction Fuzzy Hash: A3513B71A48201AFD710B7E1AC45BEE3B689B59714F4049BFF905672D2CBBC4A88C72D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 284 40e500-40e57c call 40bc70 GetVersionExW call 402160 call 40e660 call 40e680 293 40e582-40e583 284->293 294 427674-427679 284->294 297 40e585-40e596 293->297 298 40e5ba-40e5cb call 40ef60 293->298 295 427683-427686 294->295 296 42767b-427681 294->296 300 427693-427696 295->300 301 427688-427691 295->301 299 4276b4-4276be 296->299 302 427625-427629 297->302 303 40e59c-40e59f 297->303 316 40e5ec-40e60c 298->316 317 40e5cd-40e5e6 GetCurrentProcess call 40ef20 298->317 318 4276c6-4276ca GetSystemInfo 299->318 300->299 307 427698-4276a8 300->307 301->299 309 427636-427640 302->309 310 42762b-427631 302->310 305 40e5a5-40e5ae 303->305 306 427654-427657 303->306 312 40e5b4 305->312 313 427645-42764f 305->313 306->298 311 42765d-42766f 306->311 314 4276b0 307->314 315 4276aa-4276ae 307->315 309->298 310->298 311->298 312->298 313->298 314->299 315->299 319 40e612-40e623 call 40efd0 316->319 320 4276d5-4276df GetSystemInfo 316->320 317->316 328 40e5e8 317->328 318->320 319->318 325 40e629-40e63f call 40ef90 GetNativeSystemInfo 319->325 330 40e641-40e642 FreeLibrary 325->330 331 40e644-40e651 325->331 328->316 330->331 332 40e653-40e654 FreeLibrary 331->332 333 40e656-40e65d 331->333 332->333
    APIs
    • GetVersionExW.KERNEL32(?), ref: 0040E52A
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • GetCurrentProcess.KERNEL32(?), ref: 0040E5D4
    • GetNativeSystemInfo.KERNELBASE(?), ref: 0040E632
    • FreeLibrary.KERNEL32(?), ref: 0040E642
    • FreeLibrary.KERNEL32(?), ref: 0040E654
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: FreeLibrary$CurrentInfoNativeProcessSystemVersion_memmove_wcslen
    • String ID: 0SH
    • API String ID: 3363477735-851180471
    • Opcode ID: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
    • Instruction ID: 6dc39e8e7f592ebea2fdbb3e4710260bd4e3e134fe0a85e77c096ec086c2d55c
    • Opcode Fuzzy Hash: f8f98c37c4406a4215dc85d7f2641c0e713eb1a411c42a342b42510fc6581298
    • Instruction Fuzzy Hash: E361C170908656EECB10CFA9D84429DFBB0BF19308F54496ED404A3B42D379E969CB9A

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 440 40ebd0-40ebd4 441 40ebf6 440->441 442 40ebd6-40ebe5 LoadLibraryA 440->442 442->441 443 40ebe7-40ebf3 GetProcAddress 442->443 443->441
    APIs
    • LoadLibraryA.KERNELBASE(uxtheme.dll,0040EBB5,0040D72E), ref: 0040EBDB
    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0040EBED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: IsThemeActive$uxtheme.dll
    • API String ID: 2574300362-3542929980
    • Opcode ID: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
    • Instruction ID: d0aec1e7cdd3fc231052cfb2f432bc7d0e698e699ac1f50efe2d89ca8b78c0bc
    • Opcode Fuzzy Hash: d24d5e89e243abfb53b7c80675e6652b9f125c078b3c3d01997506936a79e34d
    • Instruction Fuzzy Hash: D6D0C7B49407039AD7305F71C91871B76E47B50751F104C3DF946A1294DB7CD040D768

    Control-flow Graph

    APIs
    • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104,?), ref: 00401F4C
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • __wcsicoll.LIBCMT ref: 00402007
    • __wcsicoll.LIBCMT ref: 0040201D
    • __wcsicoll.LIBCMT ref: 00402033
      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
    • __wcsicoll.LIBCMT ref: 00402049
    • _wcscpy.LIBCMT ref: 0040207C
    • GetModuleFileNameW.KERNEL32(00000000,004A7F6C,00000104), ref: 00428B5B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wcsicoll$FileModuleName$__wcsicmp_l_memmove_wcscpy_wcslen
    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$CMDLINE$CMDLINERAW
    • API String ID: 3948761352-1609664196
    • Opcode ID: fb742eb3e3b9472f662d9eb0d9266b7c596f0002b12228fde03e2c1a898d0588
    • Instruction ID: a67d1fff980de619c7b08a01c822048bbc87f212fdb5160913ca6de555091b2a
    • Opcode Fuzzy Hash: fb742eb3e3b9472f662d9eb0d9266b7c596f0002b12228fde03e2c1a898d0588
    • Instruction Fuzzy Hash: 0E718571D0021A9ACB10EBA1DD456EE7774AF54308F40843FF905772D1EBBC6A49CB99

    Control-flow Graph

    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 0040E3FF
    • __wsplitpath.LIBCMT ref: 0040E41C
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcsncat.LIBCMT ref: 0040E433
    • __wmakepath.LIBCMT ref: 0040E44F
      • Part of subcall function 00413A9E: __wmakepath_s.LIBCMT ref: 00413AB4
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
    • _wcscpy.LIBCMT ref: 0040E487
      • Part of subcall function 0040E4C0: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
    • _wcscat.LIBCMT ref: 00427541
    • _wcslen.LIBCMT ref: 00427551
    • _wcslen.LIBCMT ref: 00427562
    • _wcscat.LIBCMT ref: 0042757C
    • _wcsncpy.LIBCMT ref: 004275BC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcscat_wcslenstd::exception::exception$Exception@8FileModuleNameOpenThrow__wmakepath__wmakepath_s__wsplitpath__wsplitpath_helper_malloc_wcscpy_wcsncat_wcsncpy
    • String ID: Include$\
    • API String ID: 3173733714-3429789819
    • Opcode ID: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
    • Instruction ID: e70d120923bcd55e0c09bdb97153e7c20ea4c8242d515b2096525f9594b4aeca
    • Opcode Fuzzy Hash: f7b2e8dd37dad95b873b636539c9fa9ee4ced90e3c163691215c383b9fb11936
    • Instruction Fuzzy Hash: 9851DAB1504301ABE314EF66DC8589BBBE4FB8D304F40493EF589972A1E7749944CB5E

    Control-flow Graph

    APIs
    • _fseek.LIBCMT ref: 0045292B
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
    • __fread_nolock.LIBCMT ref: 00452961
    • __fread_nolock.LIBCMT ref: 00452971
    • __fread_nolock.LIBCMT ref: 0045298A
    • __fread_nolock.LIBCMT ref: 004529A5
    • _fseek.LIBCMT ref: 004529BF
    • _malloc.LIBCMT ref: 004529CA
    • _malloc.LIBCMT ref: 004529D6
    • __fread_nolock.LIBCMT ref: 004529E7
    • _free.LIBCMT ref: 00452A17
    • _free.LIBCMT ref: 00452A20
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __fread_nolock$_free_fseek_malloc_wcscpy
    • String ID:
    • API String ID: 1255752989-0
    • Opcode ID: 52745d9ddfa852e4416d88c1eae67d516b86c928f00ce23e67f23089e82d0498
    • Instruction ID: f7ea06a446360153d9086f7ce944ba4ee1a7a4a6ab52c1fb03413739877f8e55
    • Opcode Fuzzy Hash: 52745d9ddfa852e4416d88c1eae67d516b86c928f00ce23e67f23089e82d0498
    • Instruction Fuzzy Hash: B95111F1900218AFDB60DF65DC81B9A77B9EF88304F0085AEF50CD7241E675AA84CF59

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __fread_nolock$_fseek_wcscpy
    • String ID: FILE
    • API String ID: 3888824918-3121273764
    • Opcode ID: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
    • Instruction ID: d9efd4ed024b2b159ad8c10c4a9bf0fd337e36d0f3dc2ca46923192c63d65648
    • Opcode Fuzzy Hash: b4a6abdb64f38c8defcee882be961308622b799a5cba7293a02d79de09a932e7
    • Instruction Fuzzy Hash: DC4196B2910204BBEB20EBD5DC81FEF7379AF88704F14455EFA0497281F6799684CBA5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 334 40f5c0-40f5cf call 422240 337 40f5d0-40f5e8 334->337 337->337 338 40f5ea-40f613 call 413650 call 410e60 337->338 343 40f614-40f633 call 414d04 338->343 346 40f691 343->346 347 40f635-40f63c 343->347 348 40f696-40f69c 346->348 349 40f660-40f674 call 4150d1 347->349 350 40f63e 347->350 353 40f679-40f67c 349->353 351 40f640 350->351 354 40f642-40f650 351->354 353->343 355 40f652-40f655 354->355 356 40f67e-40f68c 354->356 359 40f65b-40f65e 355->359 360 425d1e-425d3e call 4150d1 call 414d04 355->360 357 40f68e-40f68f 356->357 358 40f69f-40f6ad 356->358 357->355 362 40f6b4-40f6c2 358->362 363 40f6af-40f6b2 358->363 359->349 359->351 370 425d43-425d5f call 414d30 360->370 365 425d16 362->365 366 40f6c8-40f6d6 362->366 363->355 365->360 368 425d05-425d0b 366->368 369 40f6dc-40f6df 366->369 368->354 371 425d11 368->371 369->355 370->348 371->365
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __fread_nolock_fseek_memmove_strcat
    • String ID: AU3!$EA06
    • API String ID: 1268643489-2658333250
    • Opcode ID: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
    • Instruction ID: 581a58983a44a30c9dde9fea67fd4d6d070b0eb534c71953d0d39c84ae2506d9
    • Opcode Fuzzy Hash: 344840b9fdfdbe4b30e8dbd48a4dc96b4183e4050995daab1dbb295d1862c352
    • Instruction Fuzzy Hash: A541EF3160414CABCB21DF64D891FFD3B749B15304F2808BFF581A7692EA79A58AC754

    Control-flow Graph

    APIs
    • GetModuleHandleW.KERNEL32(00000000,004A90E8,?,00000100,?,004A7F6C), ref: 00434057
    • LoadStringW.USER32(00000000), ref: 00434060
    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00434075
    • LoadStringW.USER32(00000000), ref: 00434078
    • _wprintf.LIBCMT ref: 004340A1
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004340B9
    Strings
    • %s (%d) : ==> %s: %s %s, xrefs: 0043409C
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: HandleLoadModuleString$Message_wprintf
    • String ID: %s (%d) : ==> %s: %s %s
    • API String ID: 3648134473-3128320259
    • Opcode ID: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
    • Instruction ID: 3f99f1473d628bc1a501e0113e735bb0cc043e2cca9b2706ac47da9b95460e2a
    • Opcode Fuzzy Hash: 5806584fae846cee426602f55e287a2c1afdddb79e6f9c87a69d5249cd46d2cb
    • Instruction Fuzzy Hash: EB016CB26903187EE710E754DD06FFA376CEBC4B11F00459AB708A61C49AF469848BB5

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 379 4115d7-4115df 380 4115ee-4115f9 call 4135bb 379->380 383 4115e1-4115ec call 411988 380->383 384 4115fb-4115fc 380->384 383->380 387 4115fd-41160e 383->387 388 411610-41163b call 417fc0 call 41130a 387->388 389 41163c-411656 call 4180af call 418105 387->389 388->389
    APIs
    • _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
    • std::exception::exception.LIBCMT ref: 00411626
    • std::exception::exception.LIBCMT ref: 00411640
    • __CxxThrowException@8.LIBCMT ref: 00411651
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: std::exception::exception$AllocateException@8HeapThrow_malloc
    • String ID: ,*H$4*H$@fI
    • API String ID: 615853336-1459471987
    • Opcode ID: 4c3234da221406e919e60ca1662c01636fb1b8f8df4bcb261aa51e1772e486af
    • Instruction ID: 1677ae912bb9c86ef767233b76c14da205579da8f33ef274bedc9cd0e4e1b94c
    • Opcode Fuzzy Hash: 4c3234da221406e919e60ca1662c01636fb1b8f8df4bcb261aa51e1772e486af
    • Instruction Fuzzy Hash: C5F0F9716001196BCB24AB56DC01AEE7AA5AB40708F15002FF904951A1CBB98AC2875D

    Control-flow Graph

    APIs
    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,?,?,0040E4A1), ref: 0040E4DD
    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,0040E4A1,00000000,?,?,?,0040E4A1), ref: 004271A6
    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,0040E4A1,?,00000000,?,?,?,?,0040E4A1), ref: 004271ED
    • RegCloseKey.ADVAPI32(?,?,?,?,0040E4A1), ref: 0042721E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: QueryValue$CloseOpen
    • String ID: Include$Software\AutoIt v3\AutoIt
    • API String ID: 1586453840-614718249
    • Opcode ID: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
    • Instruction ID: d6672e68ffeed78ba434be4ce119fa1e10800d5a5bf196f8e2f41644cb46c1f5
    • Opcode Fuzzy Hash: 89069ff54290d95ffeb0e4b83fb23c072447fe8f5d078393e68a3dec861a8096
    • Instruction Fuzzy Hash: CF21D871780204BBDB14EBF4ED46FAF737CEB54700F10055EB605E7281EAB5AA008768

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 415 40f250-40f26f RegOpenKeyExW 416 425e17-425e1c 415->416 417 40f275-40f296 RegQueryValueExW 415->417 418 40f2c3-40f2d6 RegCloseKey 417->418 419 40f298-40f2a3 417->419 420 40f2a9-40f2c2 RegCloseKey 419->420 421 425e1d-425e1f 419->421
    APIs
    • RegOpenKeyExW.KERNELBASE(00000004,Control Panel\Mouse,00000000,00000001,00000004,00000004), ref: 0040F267
    • RegQueryValueExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000002,00000000), ref: 0040F28E
    • RegCloseKey.KERNELBASE(?), ref: 0040F2B5
    • RegCloseKey.ADVAPI32(?), ref: 0040F2C9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Close$OpenQueryValue
    • String ID: Control Panel\Mouse
    • API String ID: 1607946009-824357125
    • Opcode ID: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
    • Instruction ID: a31ac2e1b7deaa2d1d9e7506379341dce8fcd1dacbe24dc49005ae4a0027d3ba
    • Opcode Fuzzy Hash: 0a2ddf5dd10fc63f6e19eedc2563a5e53f3783e3c799d68c1c3a3a1866560054
    • Instruction Fuzzy Hash: 91118C76640108AFCB10CFA8ED459EFB7BCEF59300B1089AAF908C3210E6759A11DBA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 422 4102b0-4102c5 SHGetMalloc 423 4102cb-4102da SHGetDesktopFolder 422->423 424 425dfd-425e0e call 433244 422->424 425 4102e0-41031a call 412fba 423->425 426 41036b-410379 423->426 434 410360-410368 425->434 435 41031c-410331 SHGetPathFromIDListW 425->435 426->424 432 41037f-410384 426->432 434->426 436 410351-41035d 435->436 437 410333-41034a call 412fba 435->437 436->434 437->436
    APIs
    • SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
    • SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
    • _wcsncpy.LIBCMT ref: 004102ED
    • SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
    • _wcsncpy.LIBCMT ref: 00410340
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcsncpy$DesktopFolderFromListMallocPath
    • String ID:
    • API String ID: 3170942423-0
    • Opcode ID: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
    • Instruction ID: 8627f7bfe00d67ecf541507c27de0d1a6b0c746b93627a891ac6cfe5d1469166
    • Opcode Fuzzy Hash: bfe3e3032d26ed5990890659b1503a19068975a9e613434ef85ace480ecdfa96
    • Instruction Fuzzy Hash: 4B219475A00619ABCB14DBA4DC84DEFB37DEF88700F108599F909D7210E674EE45DBA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 444 40f520-40f536 445 4295c9-429623 call 412f40 GetOpenFileNameW 444->445 446 40f53c-40f55d call 410120 call 4102b0 call 410190 call 40f570 444->446 445->446 452 429629-42962b 445->452 453 40f562-40f567 446->453 452->453
    APIs
    • GetOpenFileNameW.COMDLG32(?), ref: 0042961B
      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
      • Part of subcall function 004102B0: SHGetMalloc.SHELL32(0040F54C), ref: 004102BD
      • Part of subcall function 004102B0: SHGetDesktopFolder.SHELL32(?,004A90E8), ref: 004102D2
      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 004102ED
      • Part of subcall function 004102B0: SHGetPathFromIDListW.SHELL32(?,?), ref: 00410327
      • Part of subcall function 004102B0: _wcsncpy.LIBCMT ref: 00410340
      • Part of subcall function 00410190: GetFullPathNameW.KERNEL32(?,00000104,?,?,?), ref: 004101AB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: NamePath$Full_wcsncpy$DesktopFileFolderFromListMallocOpen
    • String ID: X$pWH
    • API String ID: 85490731-941433119
    • Opcode ID: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
    • Instruction ID: b6f0e4d7e30e2857a1e9cc165fafff24640ac0dd2e9829c062eaf90218724cbe
    • Opcode Fuzzy Hash: 1b62eedeb2ba23f3a12794f4d72c3fd3ac9c0abd578206ca8986e50026ca9cbc
    • Instruction Fuzzy Hash: 1F118AB0A00244ABDB11EFD9DC457DEBBF95F45304F14842AE504AB392D7FD08498BA9

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 458 414aba-414ad6 459 414af2 458->459 460 414ad8-414adc 458->460 462 414af4-414af8 459->462 460->459 461 414ade-414ae0 460->461 463 414ae2-414ae7 call 417f77 461->463 464 414af9-414afe 461->464 476 414aed call 417f25 463->476 466 414b00-414b0a 464->466 467 414b0c-414b0f 464->467 466->467 469 414b2d-414b3d 466->469 470 414b11-414b1a call 412f40 467->470 471 414b1d-414b1f 467->471 474 414b47 469->474 475 414b3f-414b45 469->475 470->471 471->463 473 414b21-414b2b 471->473 473->463 473->469 478 414b4e-414b50 474->478 475->478 476->459 480 414c30-414c33 478->480 481 414b56-414b5d 478->481 480->462 482 414ba3-414ba6 481->482 483 414b5f-414b64 481->483 484 414c04-414c05 call 41d8f3 482->484 485 414ba8-414bac 482->485 483->482 486 414b66 483->486 493 414c0a-414c0e 484->493 488 414bcd-414bd4 485->488 489 414bae-414bb7 485->489 490 414b6c-414b70 486->490 491 414c5e 486->491 496 414bd6 488->496 497 414bd8-414bdb 488->497 494 414bc2-414bc7 489->494 495 414bb9-414bc0 489->495 498 414b72 490->498 499 414b74-414b77 490->499 492 414c62-414c6b 491->492 492->462 493->492 500 414c10-414c14 493->500 501 414bc9-414bcb 494->501 495->501 496->497 502 414c38-414c3c 497->502 503 414bdd-414be9 call 414139 call 41dfcc 497->503 498->499 499->502 504 414b7d-414b9e call 41e0c2 499->504 500->502 505 414c16-414c25 500->505 501->497 506 414c4e-414c59 call 417f77 502->506 507 414c3e-414c4b call 412f40 502->507 518 414bee-414bf3 503->518 511 414c28-414c2a 504->511 505->511 506->476 507->506 511->480 511->481 519 414c70-414c74 518->519 520 414bf5-414bf8 518->520 519->492 520->491 521 414bfa-414c02 520->521 521->511
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __filbuf__getptd_noexit__read_memcpy_s
    • String ID:
    • API String ID: 1794320848-0
    • Opcode ID: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
    • Instruction ID: 2f36134af58cf06217a4581a57f76d3547d7b7b98d7afe96428f3577b7504850
    • Opcode Fuzzy Hash: b5af9ce9d8135965a8c163c1359f1833c669f36246c0dfec509ee2915f8c5eb0
    • Instruction Fuzzy Hash: 6C51E631A01208DBCB249F69C9446DFB7B1AFC0364F25826BE43597290E378EED1CB59
    APIs
      • Part of subcall function 0040F760: _strcat.LIBCMT ref: 0040F786
    • _free.LIBCMT ref: 004295A0
      • Part of subcall function 004033C0: GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
      • Part of subcall function 004033C0: GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
      • Part of subcall function 004033C0: __wsplitpath.LIBCMT ref: 00403492
      • Part of subcall function 004033C0: _wcscpy.LIBCMT ref: 004034A7
      • Part of subcall function 004033C0: _wcscat.LIBCMT ref: 004034BC
      • Part of subcall function 004033C0: SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CurrentDirectory$FullNamePath__wsplitpath_free_strcat_wcscat_wcscpy
    • String ID: >>>AUTOIT SCRIPT<<<
    • API String ID: 3938964917-2806939583
    • Opcode ID: fc84879226a546b367cf024e70070cf70ec46ce461a0b8337c548542ceb1a8e8
    • Instruction ID: c8289cc7cde30cfde4dff3f83c8481f20f860a5b07fa540731426c520eca24fb
    • Opcode Fuzzy Hash: fc84879226a546b367cf024e70070cf70ec46ce461a0b8337c548542ceb1a8e8
    • Instruction Fuzzy Hash: 9A919171A00219ABCF04EFA5D8819EE7774BF48314F50452EF915B7391D778EA06CBA8
    Strings
    • >>>AUTOIT NO CMDEXECUTE<<<, xrefs: 0042804F
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _strcat
    • String ID: >>>AUTOIT NO CMDEXECUTE<<<
    • API String ID: 1765576173-2684727018
    • Opcode ID: 1bd97a3dce65a00afcf485fde8a2c6e70bcd6b34d19cfa92a7d30b549991c499
    • Instruction ID: e645463cc19bd0c1a49bcabea2d674544a6c2f3c5714d62cb3526a870e150300
    • Opcode Fuzzy Hash: 1bd97a3dce65a00afcf485fde8a2c6e70bcd6b34d19cfa92a7d30b549991c499
    • Instruction Fuzzy Hash: FBF090B390020D768B00F6E6D942CEFB37C9985704B5006AFA905B3152EA79EA0987B6
    APIs
      • Part of subcall function 0040F6F0: _wcslen.LIBCMT ref: 0040F705
      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,00454478,?,00000000,?,?), ref: 0040F71E
      • Part of subcall function 0040F6F0: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,?,00000000,?,?,?,?), ref: 0040F747
    • _strcat.LIBCMT ref: 0040F786
      • Part of subcall function 0040F850: _strlen.LIBCMT ref: 0040F858
      • Part of subcall function 0040F850: _sprintf.LIBCMT ref: 0040F9AE
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ByteCharMultiWide$_sprintf_strcat_strlen_wcslen
    • String ID:
    • API String ID: 3199840319-0
    • Opcode ID: 634418af37c1c68810c62f7400feb38cb070ac88e3ba5bbcf78631f4d2240eed
    • Instruction ID: aac9d08775c2cbfae45fd546c2dd5c585d34072f6b495fb7426f91ad36779b1c
    • Opcode Fuzzy Hash: 634418af37c1c68810c62f7400feb38cb070ac88e3ba5bbcf78631f4d2240eed
    • Instruction Fuzzy Hash: 7B2148B260825027D724EF3A9C82A6EF2D4AF85304F14893FF555C22C2F738D554879A
    APIs
    • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 0040D779
    • FreeLibrary.KERNEL32(?), ref: 0040D78E
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: FreeInfoLibraryParametersSystem
    • String ID:
    • API String ID: 3403648963-0
    • Opcode ID: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
    • Instruction ID: 5fcdf068f8d8459ddaa7ea8882eac3df2259875866eaebb33036fc29c92b3e87
    • Opcode Fuzzy Hash: 1bcd72a0122d59f5f1ef4a441970033eb21b1c6439336685a4482ae7c853bb59
    • Instruction Fuzzy Hash: BB2184719083019FC300DF5ADC8190ABBE4FB84358F40493FF988A7392D735D9458B9A
    APIs
      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
    • __lock_file.LIBCMT ref: 00414A8D
      • Part of subcall function 00415471: __lock.LIBCMT ref: 00415496
    • __fclose_nolock.LIBCMT ref: 00414A98
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
    • String ID:
    • API String ID: 2800547568-0
    • Opcode ID: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
    • Instruction ID: d9443fdd3ee0a3059f5d17ec53abbfe2105cc8a5d10ddad395bff0ae1f283336
    • Opcode Fuzzy Hash: a5ee4eb6f63f5c531cf15d6f0d52328148e0080a1a420ce895dcb566fcff73ac
    • Instruction Fuzzy Hash: EEF0F6308417019AD710AB7588027EF37A09F41379F22864FA061961D1C73C85C29B5D
    APIs
    • __lock_file.LIBCMT ref: 00415012
    • __ftell_nolock.LIBCMT ref: 0041501F
      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __ftell_nolock__getptd_noexit__lock_file
    • String ID:
    • API String ID: 2999321469-0
    • Opcode ID: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
    • Instruction ID: e3e7bc223609ce985a1750c66bb322057640979a4505571362f253753ce4bf01
    • Opcode Fuzzy Hash: 5d7fd30e9bb4e6974f03027405c635b91b5e55acacb14f372dcacdb3af77c648
    • Instruction Fuzzy Hash: 64F03030900605EADB107FB5DD027EE3B70AF443A8F20825BB0259A0E1DB7C8AC29A59
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __lock_file
    • String ID:
    • API String ID: 3031932315-0
    • Opcode ID: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
    • Instruction ID: 324047821ed349453e17c5e7f52af34d31ade4ebcb64e32b23ce3c6ad3b356a0
    • Opcode Fuzzy Hash: 9d46abaf5bc0bef18357e8259ddf310e5220bee08d011669e2131a09b3543261
    • Instruction Fuzzy Hash: FF011E71801219EBCF21AFA5C8028DF7B71AF44764F11851BF824551A1E7398AE2DBD9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wfsopen
    • String ID:
    • API String ID: 197181222-0
    • Opcode ID: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
    • Instruction ID: b34ddb7a850719c89311ce964fc9f65e9e9400c6a390d5c1cbb008c3125e494a
    • Opcode Fuzzy Hash: b5c1dd7f54315c70b952dff0fe33ec93e52da603c388fdf08d18a597afa050f6
    • Instruction Fuzzy Hash: 82C092B244020C77CF112A93EC02F9A3F1E9BC0764F058021FB1C1A162AA77EAA19689
    APIs
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C8E1
    • DefDlgProcW.USER32(?,0000004E,?,?), ref: 0047C8FC
    • GetKeyState.USER32(00000011), ref: 0047C92D
    • GetKeyState.USER32(00000009), ref: 0047C936
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0047C949
    • GetKeyState.USER32(00000010), ref: 0047C953
    • GetWindowLongW.USER32(00000002,000000F0), ref: 0047C967
    • SendMessageW.USER32(00000002,0000110A,00000009,00000000), ref: 0047C993
    • SendMessageW.USER32(00000002,0000113E,00000000,?), ref: 0047C9B6
    • _wcsncpy.LIBCMT ref: 0047CA29
    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0047CA5A
    • SendMessageW.USER32 ref: 0047CA7F
    • InvalidateRect.USER32(?,00000000,00000001), ref: 0047CADF
    • SendMessageW.USER32(?,00001030,?,0047EA68), ref: 0047CB84
    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,00000000), ref: 0047CB9B
    • ImageList_BeginDrag.COMCTL32(00000000,00000000,000000F8,000000F0), ref: 0047CBAC
    • SetCapture.USER32(?), ref: 0047CBB6
    • ClientToScreen.USER32(?,?), ref: 0047CC17
    • ImageList_DragEnter.COMCTL32(00000000,?,?,?,?), ref: 0047CC26
    • ReleaseCapture.USER32 ref: 0047CC3A
    • GetCursorPos.USER32(?), ref: 0047CC72
    • ScreenToClient.USER32(?,?), ref: 0047CC80
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CCE6
    • SendMessageW.USER32 ref: 0047CD12
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CD53
    • SendMessageW.USER32 ref: 0047CD80
    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0047CD99
    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0047CDAA
    • GetCursorPos.USER32(?), ref: 0047CDC8
    • ScreenToClient.USER32(?,?), ref: 0047CDD6
    • GetParent.USER32(00000000), ref: 0047CDF7
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 0047CE60
    • SendMessageW.USER32 ref: 0047CE93
    • ClientToScreen.USER32(?,?), ref: 0047CEEE
    • TrackPopupMenuEx.USER32(?,00000000,?,?,030C1A00,00000000,?,?,?,?), ref: 0047CF1C
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 0047CF46
    • SendMessageW.USER32 ref: 0047CF6B
    • ClientToScreen.USER32(?,?), ref: 0047CFB5
    • TrackPopupMenuEx.USER32(?,00000080,?,?,030C1A00,00000000,?,?,?,?), ref: 0047CFE6
    • GetWindowLongW.USER32(?,000000F0), ref: 0047D086
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$ClientScreen$Image$CursorDragList_State$CaptureLongMenuPopupTrackWindow$BeginEnterInvalidateParentProcRectRelease_wcsncpy
    • String ID: @GUI_DRAGID$F
    • API String ID: 3100379633-4164748364
    • Opcode ID: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
    • Instruction ID: 980357f173c9be8e312ccaa606797ee7157b6525bda81ee0817efdfc4c954517
    • Opcode Fuzzy Hash: 2b9e17ba3223fb7b4804536e302a42d427f78481ee09a8534aafb1e4469c1a6d
    • Instruction Fuzzy Hash: F842AD706043419FD714DF28C884FABB7A5FF89700F14865EFA489B291C7B8E846CB5A
    APIs
    • GetForegroundWindow.USER32 ref: 00434420
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00434446
    • IsIconic.USER32(?), ref: 0043444F
    • ShowWindow.USER32(?,00000009), ref: 0043445C
    • SetForegroundWindow.USER32(?), ref: 0043446A
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434481
    • GetCurrentThreadId.KERNEL32 ref: 00434485
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00434493
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A2
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004344A8
    • AttachThreadInput.USER32(00000000,?,00000001), ref: 004344B1
    • SetForegroundWindow.USER32(00000000), ref: 004344B7
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344C6
    • keybd_event.USER32(00000012,00000000), ref: 004344CF
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344DD
    • keybd_event.USER32(00000012,00000000), ref: 004344E6
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 004344F4
    • keybd_event.USER32(00000012,00000000), ref: 004344FD
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043450B
    • keybd_event.USER32(00000012,00000000), ref: 00434514
    • SetForegroundWindow.USER32(00000000), ref: 0043451E
    • AttachThreadInput.USER32(00000000,?,00000000), ref: 0043453F
    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434545
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ThreadWindow$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
    • String ID: Shell_TrayWnd
    • API String ID: 2889586943-2988720461
    • Opcode ID: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
    • Instruction ID: 0b42b206f44700a00bd4aa1610e9651ae8f7722fee000eb3c659fd44b6abead8
    • Opcode Fuzzy Hash: 8fb90041bee2e10260771149cd23f534c9f7767a381d567acbe6a88cba9e6a8e
    • Instruction Fuzzy Hash: AD416272640218BFE7205BA4DE4AFBE7B6CDB58B11F10442EFA01EA1D0D6F458419BA9
    APIs
    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 0044638E
    • CloseHandle.KERNEL32(?), ref: 004463A0
    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004463B8
    • GetProcessWindowStation.USER32 ref: 004463D1
    • SetProcessWindowStation.USER32(00000000), ref: 004463DB
    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004463F7
    • _wcslen.LIBCMT ref: 00446498
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • _wcsncpy.LIBCMT ref: 004464C0
    • LoadUserProfileW.USERENV(?,00000020), ref: 004464D9
    • CreateEnvironmentBlock.USERENV(?,?,00000000), ref: 004464F3
    • CreateProcessAsUserW.ADVAPI32(?,00000000,00000000,00000000,00000000,?,?,?,?,000F01FF,00000400), ref: 00446522
    • UnloadUserProfile.USERENV(?,?), ref: 00446555
    • CloseWindowStation.USER32(00000000), ref: 0044656C
    • CloseDesktop.USER32(?), ref: 0044657A
    • SetProcessWindowStation.USER32(?), ref: 00446588
    • CloseHandle.KERNEL32(?), ref: 00446592
    • DestroyEnvironmentBlock.USERENV(?), ref: 004465A9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: StationWindow$CloseProcess$User$BlockCreateDesktopEnvironmentHandleOpenProfile$DestroyDuplicateLoadTokenUnload_malloc_wcslen_wcsncpy
    • String ID: $@OH$default$winsta0
    • API String ID: 3324942560-3791954436
    • Opcode ID: 89825d2e99e48f8c37bf3d83f8858ac9df3d567d964e8e83b7294b14b974461b
    • Instruction ID: a255b9755a473e3b45922b0ee48cea4cb67e1360e8ecd59b8ab49ad27cdc7b44
    • Opcode Fuzzy Hash: 89825d2e99e48f8c37bf3d83f8858ac9df3d567d964e8e83b7294b14b974461b
    • Instruction Fuzzy Hash: A28180B0A00209ABEF10CFA5DD4AFAF77B8AF49704F05455EF914A7284D778D901CB69
    APIs
    • _wcslen.LIBCMT ref: 004096C1
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • _memmove.LIBCMT ref: 0040970C
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00000000), ref: 00409753
    • _memmove.LIBCMT ref: 00409D96
    • _memmove.LIBCMT ref: 0040A6C4
    • _memmove.LIBCMT ref: 004297E5
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove$std::exception::exception$BuffCharException@8ThrowUpper_malloc_wcslen
    • String ID:
    • API String ID: 2383988440-0
    • Opcode ID: fb06dff430aaf1c01c4dd638e2cd008a516aee1ecac5eeb13fb9f8f8e87c0f5d
    • Instruction ID: 3262ed4b583d717621f118bf118656dde374edbe3d76219253c131e703a2432c
    • Opcode Fuzzy Hash: fb06dff430aaf1c01c4dd638e2cd008a516aee1ecac5eeb13fb9f8f8e87c0f5d
    • Instruction Fuzzy Hash: CD13BF706043109FD724DF25D480A2BB7E1BF89304F54896EE8869B392D739EC56CB9B
    APIs
      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
      • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 0043392E
      • Part of subcall function 00433908: __wsplitpath.LIBCMT ref: 00433950
      • Part of subcall function 00433908: __wcsicoll.LIBCMT ref: 00433974
      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
    • _wcscat.LIBCMT ref: 0044BD94
    • _wcscat.LIBCMT ref: 0044BDBD
    • __wsplitpath.LIBCMT ref: 0044BDEA
    • FindFirstFileW.KERNEL32(?,?), ref: 0044BE02
    • _wcscpy.LIBCMT ref: 0044BE71
    • _wcscat.LIBCMT ref: 0044BE83
    • _wcscat.LIBCMT ref: 0044BE95
    • lstrcmpiW.KERNEL32(?,?), ref: 0044BEC1
    • DeleteFileW.KERNEL32(?), ref: 0044BED3
    • MoveFileW.KERNEL32(?,?), ref: 0044BEF3
    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF0A
    • DeleteFileW.KERNEL32(?), ref: 0044BF15
    • CopyFileW.KERNEL32(?,?,00000000), ref: 0044BF2C
    • FindClose.KERNEL32(00000000), ref: 0044BF33
    • MoveFileW.KERNEL32(?,?), ref: 0044BF4F
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 0044BF64
    • FindClose.KERNEL32(00000000), ref: 0044BF7C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: File$Find_wcscat$__wsplitpath$CloseCopyDeleteMove$AttributesFirstFullNameNextPath__wcsicoll_wcscpylstrcmpi
    • String ID: \*.*
    • API String ID: 2188072990-1173974218
    • Opcode ID: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
    • Instruction ID: 72a2fd59153234373391f972af8bc7e503bf673df65afccb4f4ecee040a4f935
    • Opcode Fuzzy Hash: c24caf0b266a53f5e7acd00b30f5ede1e5d756040c77aa0fe23e7167681731b8
    • Instruction Fuzzy Hash: E25167B2408384AAD734DB50DC45EDF73E9AFC8304F544E1EF68982141EB75D249CBA6
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 004788E4
    • FindClose.KERNEL32(00000000), ref: 00478924
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478949
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00478961
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00478989
    • __swprintf.LIBCMT ref: 004789D3
    • __swprintf.LIBCMT ref: 00478A1D
    • __swprintf.LIBCMT ref: 00478A4B
    • __swprintf.LIBCMT ref: 00478A79
      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 00413314
      • Part of subcall function 0041329B: __flsbuf.LIBCMT ref: 0041332C
    • __swprintf.LIBCMT ref: 00478AA7
    • __swprintf.LIBCMT ref: 00478AD5
    • __swprintf.LIBCMT ref: 00478B03
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem
    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
    • API String ID: 999945258-2428617273
    • Opcode ID: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
    • Instruction ID: 8fd0730747e081185947bc4026d2fd3d0a29cbe563c255e8678d3cf3417a7967
    • Opcode Fuzzy Hash: 438ad41bdba169d6dbcdf3912f97c2a8dc3502a0945a742a170651836116907f
    • Instruction Fuzzy Hash: 32719772204300ABC310EF55CC85FAFB7E9AF88705F504D2FF645962D1E6B9E944875A
    APIs
      • Part of subcall function 00443D19: _wcslen.LIBCMT ref: 00443D34
    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00464F2A
    • GetLastError.KERNEL32 ref: 00464F40
    • GetCurrentThread.KERNEL32 ref: 00464F54
    • OpenThreadToken.ADVAPI32(00000000), ref: 00464F5B
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00464F6C
    • OpenProcessToken.ADVAPI32(00000000), ref: 00464F73
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: OpenProcess$CurrentThreadToken$ErrorLast_wcslen
    • String ID: SeDebugPrivilege
    • API String ID: 1312810259-2896544425
    • Opcode ID: 4ccb8eda33b7606bc70f55622b8c9345a385014adf55ef82b2f5723e997a33b0
    • Instruction ID: 6ee098d93b5c3ece286c9d7df0f89eb4f2932b8b97d60c134c5a8e1830bdbe8f
    • Opcode Fuzzy Hash: 4ccb8eda33b7606bc70f55622b8c9345a385014adf55ef82b2f5723e997a33b0
    • Instruction Fuzzy Hash: E1519372204301AFE710EF64DC85F6BB7E8AB84705F10491EFA44DB2C1D7B5E8058BAA
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • GetCurrentDirectoryW.KERNEL32(00000104,?,?), ref: 00403451
    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00403467
    • __wsplitpath.LIBCMT ref: 00403492
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcscpy.LIBCMT ref: 004034A7
    • _wcscat.LIBCMT ref: 004034BC
    • SetCurrentDirectoryW.KERNEL32(?), ref: 004034CC
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,?,0040355C,?,?,?,00000010), ref: 00403B08
      • Part of subcall function 00403AF0: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,?,?,00000010), ref: 00403B41
    • _wcscpy.LIBCMT ref: 004035A0
    • _wcslen.LIBCMT ref: 00403623
    • _wcslen.LIBCMT ref: 0040367D
    Strings
    • #include depth exceeded. Make sure there are no recursive includes, xrefs: 00428200
    • Unterminated string, xrefs: 00428348
    • _, xrefs: 0040371C
    • Error opening the file, xrefs: 00428231
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcslen$ByteCharCurrentDirectoryMultiWide_wcscpystd::exception::exception$Exception@8FullNamePathThrow__wsplitpath__wsplitpath_helper_malloc_memmove_wcscat
    • String ID: #include depth exceeded. Make sure there are no recursive includes$Error opening the file$Unterminated string$_
    • API String ID: 3393021363-188983378
    • Opcode ID: 6b3644d94f60e3389549cdcbb24d3edc2ae264c6f6f73721fbab812a4248d270
    • Instruction ID: 51a390cb75b153cc6cab8b26b712b327f6f81406d0e69f910df9a3585dc9283e
    • Opcode Fuzzy Hash: 6b3644d94f60e3389549cdcbb24d3edc2ae264c6f6f73721fbab812a4248d270
    • Instruction Fuzzy Hash: CCD105B1508341AAD710EF64D841AEFBBE8AF85304F404C2FF98553291DB79DA49C7AB
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 00431AAA
    • GetFileAttributesW.KERNEL32(?), ref: 00431AE7
    • SetFileAttributesW.KERNEL32(?,?), ref: 00431AFD
    • FindNextFileW.KERNEL32(00000000,?), ref: 00431B0F
    • FindClose.KERNEL32(00000000), ref: 00431B20
    • FindClose.KERNEL32(00000000), ref: 00431B34
    • FindFirstFileW.KERNEL32(*.*,?), ref: 00431B4F
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00431B96
    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 00431BBA
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00431BC2
    • FindClose.KERNEL32(00000000), ref: 00431BCD
    • FindClose.KERNEL32(00000000), ref: 00431BDB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
    • String ID: *.*
    • API String ID: 1409584000-438819550
    • Opcode ID: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
    • Instruction ID: b696eadadcb8a1627fc7fa6feda0e6e57aab690e04623b9265854ab7309d24dd
    • Opcode Fuzzy Hash: 375c8f5163c02f9b34b1ce4408ff1b09f98ffe2d72fc8025119183882b6461df
    • Instruction Fuzzy Hash: CE41D8726002046BC700EF65DC45EAFB3ACAE89311F04592FF954C3190E7B8E519C7A9
    APIs
    • GetFullPathNameW.KERNEL32(?,00000104,?,?), ref: 00431C09
    • __swprintf.LIBCMT ref: 00431C2E
    • _wcslen.LIBCMT ref: 00431C3A
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00431C67
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CreateDirectoryFullNamePath__swprintf_wcslen
    • String ID: :$\$\??\%s
    • API String ID: 2192556992-3457252023
    • Opcode ID: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
    • Instruction ID: 5b8928ca783b893dacbf0721098a8616f59dd17613a34138e213b27d6ec4c177
    • Opcode Fuzzy Hash: e3674d1d1678aa5b2072ca287ea13c599f7f343b69fea712d52b9408e430d9c0
    • Instruction Fuzzy Hash: EE413E726403186BD720DB54DC45FDFB3BCFF58710F00859AFA0896191EBB49A548BD8
    APIs
    • GetLocalTime.KERNEL32(?), ref: 004722A2
    • __swprintf.LIBCMT ref: 004722B9
    • SHGetFolderPathW.SHELL32(00000000,00000026,00000000,00000000,0048BF68), ref: 004724EC
    • SHGetFolderPathW.SHELL32(00000000,0000002B,00000000,00000000,0048BF68), ref: 00472506
    • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,0048BF68), ref: 00472520
    • SHGetFolderPathW.SHELL32(00000000,00000023,00000000,00000000,0048BF68), ref: 0047253A
    • SHGetFolderPathW.SHELL32(00000000,00000019,00000000,00000000,0048BF68), ref: 00472554
    • SHGetFolderPathW.SHELL32(00000000,0000002E,00000000,00000000,0048BF68), ref: 0047256E
    • SHGetFolderPathW.SHELL32(00000000,0000001F,00000000,00000000,0048BF68), ref: 00472588
    • SHGetFolderPathW.SHELL32(00000000,00000017,00000000,00000000,0048BF68), ref: 004725A2
    • SHGetFolderPathW.SHELL32(00000000,00000016,00000000,00000000,0048BF68), ref: 004725BC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: FolderPath$LocalTime__swprintf
    • String ID: %.3d
    • API String ID: 3337348382-986655627
    • Opcode ID: 48c07388412e252f080c16643772a7d18a3b55828c11779c89d55816a2428872
    • Instruction ID: 0d137f706e98bab13a4a4c7fcb7914b07bdb7c22a72ec07ab57cd4d47a51df83
    • Opcode Fuzzy Hash: 48c07388412e252f080c16643772a7d18a3b55828c11779c89d55816a2428872
    • Instruction Fuzzy Hash: A6C1EC326101185BD710FBA1DD8AFEE7328EB44701F5045BFF909A60C2DBB99B598F64
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 004428A8
    • FindNextFileW.KERNEL32(00000000,?), ref: 0044290B
    • FindClose.KERNEL32(00000000), ref: 0044291C
    • FindClose.KERNEL32(00000000), ref: 00442930
    • FindFirstFileW.KERNEL32(*.*,?), ref: 0044294D
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0044299C
    • SetCurrentDirectoryW.KERNEL32(0048AB30), ref: 004429BF
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 004429C9
    • FindClose.KERNEL32(00000000), ref: 004429D4
      • Part of subcall function 00433C08: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00433C2A
    • FindClose.KERNEL32(00000000), ref: 004429E2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
    • String ID: *.*
    • API String ID: 2640511053-438819550
    • Opcode ID: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
    • Instruction ID: 696d482812dd8bff2d9106dd2d2144e175b5fe2258968c3fd44c1969776f6f9a
    • Opcode Fuzzy Hash: 8a47bb142582fb369a588aeabde8b58686abdf3d8367fad8d2448c9b03ae91f1
    • Instruction Fuzzy Hash: AD410AB2A001186BDB10EBA5ED45FEF73689F89321F50465BFD0493280D6B8DE558BB8
    APIs
    • GetCurrentProcess.KERNEL32(00000028,?), ref: 004333CE
    • OpenProcessToken.ADVAPI32(00000000), ref: 004333D5
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 004333EA
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0043340E
    • GetLastError.KERNEL32 ref: 00433414
    • ExitWindowsEx.USER32(?,00000000), ref: 00433437
    • InitiateSystemShutdownExW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,?), ref: 00433466
    • SetSystemPowerState.KERNEL32(00000001,00000000), ref: 00433479
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ProcessSystemToken$AdjustCurrentErrorExitInitiateLastLookupOpenPowerPrivilegePrivilegesShutdownStateValueWindows
    • String ID: SeShutdownPrivilege
    • API String ID: 2938487562-3733053543
    • Opcode ID: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
    • Instruction ID: ad32a9094aef850e2966724807b7d50af50c82f056daff98c21d8f44207777ad
    • Opcode Fuzzy Hash: e998af62085c6697935ed50d35c6a1543144275e53dff9101095b3913992069c
    • Instruction Fuzzy Hash: F221C971640205ABF7108FA4EC4EF7FB3ACE708702F144569FE09D51D1D6BA5D408765
    APIs
      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00436E45
      • Part of subcall function 00436E2B: GetLastError.KERNEL32(?,00000000,?), ref: 00436E4F
      • Part of subcall function 00436E2B: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00436E75
      • Part of subcall function 00436DF7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001), ref: 00436E12
    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 0044618A
    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004461BE
    • GetLengthSid.ADVAPI32(?), ref: 004461D0
    • GetAce.ADVAPI32(?,00000000,?), ref: 0044620D
    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00446229
    • GetLengthSid.ADVAPI32(?), ref: 00446241
    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 0044626A
    • CopySid.ADVAPI32(00000000), ref: 00446271
    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004462A3
    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004462C5
    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004462D8
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Security$DescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
    • String ID:
    • API String ID: 1255039815-0
    • Opcode ID: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
    • Instruction ID: cbecfdc94e872455e881353a2ef69e95113e06a92746e25f2a634f38edc45108
    • Opcode Fuzzy Hash: cf498e736c0040d611dc61921388a4e783ba54ad69564fff20abd6321b712b19
    • Instruction Fuzzy Hash: C251BC71A00209BBEB10EFA1CD84EEFB778BF49704F01855EF515A7241D6B8DA05CB69
    APIs
    • __swprintf.LIBCMT ref: 00433073
    • __swprintf.LIBCMT ref: 00433085
    • __wcsicoll.LIBCMT ref: 00433092
    • FindResourceW.KERNEL32(?,?,0000000E), ref: 004330A5
    • LoadResource.KERNEL32(?,00000000), ref: 004330BD
    • LockResource.KERNEL32(00000000), ref: 004330CA
    • FindResourceW.KERNEL32(?,?,00000003), ref: 004330F7
    • LoadResource.KERNEL32(?,00000000), ref: 00433105
    • SizeofResource.KERNEL32(?,00000000), ref: 00433114
    • LockResource.KERNEL32(?), ref: 00433120
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Resource$FindLoadLock__swprintf$Sizeof__wcsicoll
    • String ID:
    • API String ID: 1158019794-0
    • Opcode ID: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
    • Instruction ID: 48d2d5a3af9b637b7fc6f2c6b5a7fdd3517197a5f8dc2ef3994740021b7ed835
    • Opcode Fuzzy Hash: b140e135c5f727b40d296f2f4b3108eaeb1a217ee9fa6a28346dce69b8385e70
    • Instruction Fuzzy Hash: C741F1322002146BDB10EF65EC84FAB37ADEB89321F00846BFD01C6245E779DA51C7A8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
    • String ID:
    • API String ID: 1737998785-0
    • Opcode ID: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
    • Instruction ID: d84b136cee2c902db59abfe4f82a3f409d39725fe24efd6a62fd8a04edebb5dd
    • Opcode Fuzzy Hash: bc1c5a0e04e7211697dd638385d424d337038878635646daacac479226a8eb74
    • Instruction Fuzzy Hash: 334114726001119FC310EFA5EC89B5EB7A4FF54315F00856EF909EB3A1EB75A941CB88
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D627
    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,?), ref: 0045D6B5
    • GetLastError.KERNEL32 ref: 0045D6BF
    • SetErrorMode.KERNEL32(00000000,?), ref: 0045D751
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Error$Mode$DiskFreeLastSpace
    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
    • API String ID: 4194297153-14809454
    • Opcode ID: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
    • Instruction ID: 1f300c266cb1daf6abeae651b696e439ee3a0372042695327ab67fb83666ce96
    • Opcode Fuzzy Hash: 7585e308607772b0055f7746bf91c511cc03d2319b95ee688ecb5d1da683c46d
    • Instruction Fuzzy Hash: FE418235D00209DFCB10EFA5C884A9DB7B4FF48315F10846BE905AB352D7799A85CB69
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove$_strncmp
    • String ID: @oH$\$^$h
    • API String ID: 2175499884-3701065813
    • Opcode ID: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
    • Instruction ID: d0725f23cfd3ca281eac06f76a82abe5967bc3f30214560d9089fed7748fa16d
    • Opcode Fuzzy Hash: f002cf83b61508de9c211a0f0d172e3a132fb63b457bb46fdb7389c8079d7204
    • Instruction Fuzzy Hash: C642E270E04249CFEB14CF69C8806AEBBF2FF85304F2481AAD855AB351D7399946CF55
    APIs
    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 0046530D
    • WSAGetLastError.WSOCK32(00000000), ref: 0046531C
    • bind.WSOCK32(00000000,?,00000010), ref: 00465356
    • WSAGetLastError.WSOCK32(00000000), ref: 00465363
    • closesocket.WSOCK32(00000000,00000000), ref: 00465377
    • listen.WSOCK32(00000000,00000005), ref: 00465381
    • WSAGetLastError.WSOCK32(00000000), ref: 004653A9
    • closesocket.WSOCK32(00000000,00000000), ref: 004653BD
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorLast$closesocket$bindlistensocket
    • String ID:
    • API String ID: 540024437-0
    • Opcode ID: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
    • Instruction ID: 689f190a2b8ca197395c4559ba4ec64c13dad074e2778b61c05f6be918bdb8b0
    • Opcode Fuzzy Hash: 56b395d1b7441155ee1d78469f99a9871a9e2360f64803e3ab449944eb02724f
    • Instruction Fuzzy Hash: A8319331200500ABD310EF25DD89B6EB7A8EF44725F10866EF855E73D1DBB4AC818B99
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID: ERCP$VUUU$VUUU$VUUU$XjH
    • API String ID: 0-2872873767
    • Opcode ID: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
    • Instruction ID: d175e7d0ae6fb3d700f9da8fb6b70819649eb02c4ceaf458d011f7582104736e
    • Opcode Fuzzy Hash: 34fecdbc504fccc055e136d4951117c2a740426f4eee1b738e863fbded63ce7f
    • Instruction Fuzzy Hash: D772D871A042198BEF24CF58C8807AEB7F1EB42314F25829BD859A7380D7799DC5CF5A
    APIs
    • CreateToolhelp32Snapshot.KERNEL32 ref: 00475608
    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00475618
    • __wsplitpath.LIBCMT ref: 00475644
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcscat.LIBCMT ref: 00475657
    • __wcsicoll.LIBCMT ref: 0047567B
    • Process32NextW.KERNEL32(00000000,?), ref: 004756AB
    • CloseHandle.KERNEL32(00000000), ref: 004756BA
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
    • String ID:
    • API String ID: 2547909840-0
    • Opcode ID: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
    • Instruction ID: 52239f647ae7113ca4c6e3167181772f82882466072c53a1302db900a9aecbbd
    • Opcode Fuzzy Hash: 9e44ac92eedd99fdf3f2932738b6949334d3f24a3592eb41664da5fdf167909f
    • Instruction Fuzzy Hash: B3518671900618ABDB10DF55CD85FDE77B8EF44704F1084AAF509AB282DA75AF84CF68
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • FindFirstFileW.KERNEL32(?,?), ref: 004524DF
    • Sleep.KERNEL32(0000000A), ref: 0045250B
    • FindNextFileW.KERNEL32(?,?), ref: 004525E9
    • FindClose.KERNEL32(?), ref: 004525FF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNextSleep_memmove_wcslen
    • String ID: *.*$\VH
    • API String ID: 2786137511-2657498754
    • Opcode ID: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
    • Instruction ID: de376bcde865418ddd8e10142a6165d1fec8b8ecf5afc9fd422e88b207ce0255
    • Opcode Fuzzy Hash: 952b61541a12346a9a2631e93aef0720ba9757898c7ad2f9180af277910d7a38
    • Instruction Fuzzy Hash: 37417F7190021DABDB14DF64CD58AEE77B4AF49305F14445BEC09A3281E678EE49CB98
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 00421FC1
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00421FD6
    • UnhandledExceptionFilter.KERNEL32(pqI), ref: 00421FE1
    • GetCurrentProcess.KERNEL32(C0000409), ref: 00421FFD
    • TerminateProcess.KERNEL32(00000000), ref: 00422004
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID: pqI
    • API String ID: 2579439406-2459173057
    • Opcode ID: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
    • Instruction ID: 2caf929301e55fbdfba35cdc3931bb3174c20cf3198a7c5bb5494214f042e870
    • Opcode Fuzzy Hash: 25dc777f16e4295b66819c01749bb17431433dcbcd396824bac5e12fb106518c
    • Instruction Fuzzy Hash: 9E21CDB45392059FCB50DF65FE456483BA4BB68304F5005BBF90987371E7B969818F0D
    APIs
    • OleInitialize.OLE32(00000000), ref: 0046CF63
    • _wcslen.LIBCMT ref: 0046CF75
    • CreateBindCtx.OLE32(00000000,?), ref: 0046D01F
    • MkParseDisplayName.OLE32(?,?,?,?), ref: 0046D065
      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
    • CLSIDFromProgID.OLE32(00000000,?,?), ref: 0046D10B
    • GetActiveObject.OLEAUT32(?,00000000,?), ref: 0046D125
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$Copy$ActiveBindClearCreateDisplayErrorFromInitializeLastNameObjectParseProg_wcslen
    • String ID:
    • API String ID: 2728119192-0
    • Opcode ID: ef839d374f24c2b4802c94ddfd6fcc219cbb0d6a077378fc64215d2d3e59a905
    • Instruction ID: 654cbfa1d8fefa06abeba6563afdd6e3d5f820db169d2b444807b365abf91408
    • Opcode Fuzzy Hash: ef839d374f24c2b4802c94ddfd6fcc219cbb0d6a077378fc64215d2d3e59a905
    • Instruction Fuzzy Hash: 3D815E71604301ABD700EF65DC85F6BB3E8BF88704F10491EF64597291E775E905CB6A
    APIs
    • __wcsicoll.LIBCMT ref: 00433349
    • mouse_event.USER32(00000800,00000000,00000000,00000078,00000000), ref: 0043335F
    • __wcsicoll.LIBCMT ref: 00433375
    • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 0043338B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wcsicollmouse_event
    • String ID: DOWN
    • API String ID: 1033544147-711622031
    • Opcode ID: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
    • Instruction ID: c5effa3e7e2998e6ee15a8e10ce6e2e5d36a5fc043d4170c53cc9f091e4fe068
    • Opcode Fuzzy Hash: 3af7a305a716ba131119f47d61043d9bc75f7fbd5de0530911e4e2de0579c383
    • Instruction Fuzzy Hash: 78F0A0726846103AF80026947C02EFB334C9B26767F004023FE0CD1280EA59290557BD
    APIs
    • GetKeyboardState.USER32(?), ref: 0044C3D2
    • SetKeyboardState.USER32(00000080), ref: 0044C3F6
    • PostMessageW.USER32(00000000,00000101,?,?), ref: 0044C43A
    • PostMessageW.USER32(00000000,00000105,?,?), ref: 0044C472
    • SendInput.USER32(00000001,?,0000001C), ref: 0044C4FF
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: KeyboardMessagePostState$InputSend
    • String ID:
    • API String ID: 3031425849-0
    • Opcode ID: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
    • Instruction ID: ca9f4cb769efad0e1be190fe8763212e5a79bd7c4ee8908ff6f5a5d8a4a0dc9b
    • Opcode Fuzzy Hash: 0ab52cc7f1a00f618f34bf6b1006ae93bda3478e58ada741bb1ac89fd44d8d1c
    • Instruction Fuzzy Hash: 4D415D755001082AEB109FA9DCD5BFFBB68AF96320F04815BFD8456283C378D9518BF8
    APIs
      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
    • socket.WSOCK32(00000002,00000002,00000011,?,00000000), ref: 0047666F
    • WSAGetLastError.WSOCK32(00000000), ref: 00476692
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorLastinet_addrsocket
    • String ID:
    • API String ID: 4170576061-0
    • Opcode ID: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
    • Instruction ID: b6cffcacb6afaf0b8cd9bee7f3c7ce362d61c656181a10c6507bcc72ef542d5a
    • Opcode Fuzzy Hash: beba4ad3326242fe02a37a331f69581919bdb462f679bf8c0e3d41d719e28549
    • Instruction Fuzzy Hash: 604129326002005BD710EF39DC86F5A73D59F44728F15866FF944AB3C2DABAEC418799
    APIs
      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
    • IsWindowVisible.USER32 ref: 0047A368
    • IsWindowEnabled.USER32 ref: 0047A378
    • GetForegroundWindow.USER32(?,?,?,00000001), ref: 0047A385
    • IsIconic.USER32 ref: 0047A393
    • IsZoomed.USER32 ref: 0047A3A1
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$EnabledForegroundIconicVisibleZoomed
    • String ID:
    • API String ID: 292994002-0
    • Opcode ID: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
    • Instruction ID: 143e3079ffab126fd184b85051f6534cdea6adf6d01d93e69c1b4810180b6228
    • Opcode Fuzzy Hash: 0a48a302b729025e65be405b7f5f19fe679dbad6397f14c7d9a4bdd7ec3e43df
    • Instruction Fuzzy Hash: 8F11A2322001119BE3219F2ADC05B9FB798AF80715F15842FF849E7250DBB8E85187A9
    APIs
      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
    • CoInitialize.OLE32(00000000), ref: 00478442
    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0047845B
    • CoUninitialize.OLE32 ref: 0047863C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_wcslen
    • String ID: .lnk
    • API String ID: 886957087-24824748
    • Opcode ID: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
    • Instruction ID: cf4755465b87a828534c2837f83e1451e93ee4f6fe559e45c0b7480b45348b92
    • Opcode Fuzzy Hash: a78490bbd6710ed4fb80770143ba5b6b6d69e34379d2ac1719b679a46047f49b
    • Instruction Fuzzy Hash: 17816D70344301AFD210EB54CC82F5AB3E5AFC8B18F10896EF658DB2D1DAB5E945CB96
    APIs
    • OpenClipboard.USER32(?), ref: 0046DCE7
    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
    • GetClipboardData.USER32(0000000D), ref: 0046DD01
    • CloseClipboard.USER32 ref: 0046DD0D
    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
    • CloseClipboard.USER32 ref: 0046DD41
    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
    • GetClipboardData.USER32(00000001), ref: 0046DD8D
    • CloseClipboard.USER32 ref: 0046DD99
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
    • String ID:
    • API String ID: 15083398-0
    • Opcode ID: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
    • Instruction ID: df02eb04a95629b292fb88db9571ebb8a4b5ed240788a0c572d8156b6d3d2bc0
    • Opcode Fuzzy Hash: 15add7cba21d4e7b0994eb4f29ae7fc89ecef22f443925247f1b4e4ac981ab14
    • Instruction Fuzzy Hash: 1A0128326042416BC311BBB99C8596E7B64EF4A324F04097FF984A72C1EB74A912C3A9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: U$\
    • API String ID: 4104443479-100911408
    • Opcode ID: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
    • Instruction ID: 961864e7757f6edfa256f53df2fe8495351bb1c33360f7104140ceff5b52ad59
    • Opcode Fuzzy Hash: 8409e1e1a3b6e8568ef346b3eec2e6609d783923d36277a6c09bfee55c093031
    • Instruction Fuzzy Hash: 7002A070E002499FEF28CF69C4907AEBBF2AF95304F2481AED45297381D7396D4ACB55
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \
    • API String ID: 4104443479-2967466578
    • Opcode ID: 805adc2059bf501b1fa7be94bd771afe84ede2009410d8cfdb1e23709f1c8037
    • Instruction ID: c9675114c6ec2fd72297f2377e71b357c10be6b45234191c4e6a35d7edb1fe2e
    • Opcode Fuzzy Hash: 805adc2059bf501b1fa7be94bd771afe84ede2009410d8cfdb1e23709f1c8037
    • Instruction Fuzzy Hash: 1BF1A470D006498FEF24CFA9C4802AEFBF2FF85314F2882AAD455AB345D375A946CB55
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045CB1F
    • FindNextFileW.KERNEL32(00000000,?), ref: 0045CB7C
    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 0045CBAB
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Find$File$CloseFirstNext
    • String ID:
    • API String ID: 3541575487-0
    • Opcode ID: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
    • Instruction ID: f333144462bda28c064cc07c1e05bb1389ec512a64b809c533c1c3d7cc497df0
    • Opcode Fuzzy Hash: f8ec562d354739d1813db85dcf23f13665d7d9b039f732a3c66120ad17a42715
    • Instruction Fuzzy Hash: 6741DF716003019FC710EF69D881A9BB3E5FF89315F108A6EE9698B351DB75F844CB94
    APIs
    • GetFileAttributesW.KERNEL32(?,00000000), ref: 004339C7
    • FindFirstFileW.KERNEL32(?,?), ref: 004339D8
    • FindClose.KERNEL32(00000000), ref: 004339EB
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: FileFind$AttributesCloseFirst
    • String ID:
    • API String ID: 48322524-0
    • Opcode ID: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
    • Instruction ID: b419dbaef297d354eb99830e4178f101d1a7f75c7260f3cbf0392e7d05c3e8e7
    • Opcode Fuzzy Hash: 957631a30c41d6cd228e989780156951a90b63876f33aac8b2b1d3c9657f363e
    • Instruction Fuzzy Hash: 22E092328145189B8610AA78AC0D4EE779CDF0A236F100B56FE38C21E0D7B49A9047DA
    APIs
    • __time64.LIBCMT ref: 00442E1E
      • Part of subcall function 004148B3: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,00430E3E,00000000,?,?,00441E36,?,00000001), ref: 004148BE
      • Part of subcall function 004148B3: __aulldiv.LIBCMT ref: 004148DE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Time$FileSystem__aulldiv__time64
    • String ID: @uJ
    • API String ID: 2893107130-1268412911
    • Opcode ID: f8baac42c5f25f74c7dd853c159356035b8e1d829a17ed988ba9b2caf3e3cd55
    • Instruction ID: d38707ff02ce459d0d249ce09c4ef886a5fe37698b82f7f0427e65daa233e585
    • Opcode Fuzzy Hash: f8baac42c5f25f74c7dd853c159356035b8e1d829a17ed988ba9b2caf3e3cd55
    • Instruction Fuzzy Hash: CB21A2335605108BF320CF37CC01652B7E7EBE5310F358A69E4A5973D1DAB96906CB98
    APIs
    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 0044231E
    • InternetReadFile.WININET(?,00000000,?,?), ref: 00442356
      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Internet$AvailableDataErrorFileLastQueryRead
    • String ID:
    • API String ID: 901099227-0
    • Opcode ID: 2766dd017a35a582f281a5a962d2d1cd72be87eede06af1684fc2a386cf4a680
    • Instruction ID: 2cb050104b41b6b223ad4d4b8d529f91c68f3ac810c45c6f1fc1690b5501c343
    • Opcode Fuzzy Hash: 2766dd017a35a582f281a5a962d2d1cd72be87eede06af1684fc2a386cf4a680
    • Instruction Fuzzy Hash: B32174752002047BFB10DE26DC41FAB73A8EB54765F40C42BFE059A141D6B8E5458BA5
    APIs
    • FindFirstFileW.KERNEL32(00000000,?,?), ref: 0045DEB4
    • FindClose.KERNEL32(00000000), ref: 0045DEF0
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: fa8284a9ded648ffea22647615070995beef9130508a8479dbfd4b77e5f7619d
    • Instruction ID: 87eaadf29b8e191e1ea341be1384c57ecbaef0316c3fc1e5a02930af3baeb018
    • Opcode Fuzzy Hash: fa8284a9ded648ffea22647615070995beef9130508a8479dbfd4b77e5f7619d
    • Instruction Fuzzy Hash: 5C11E5726002049FD310EF6ADC49A5AF7E9FF84325F10C92EF998DB281DB74E8448B94
    APIs
    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,00000001,?,00451C81,?,00000001,?), ref: 0044AF9D
    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,00000001,?,00451C81,?,00000001,?), ref: 0044AFB6
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorFormatLastMessage
    • String ID:
    • API String ID: 3479602957-0
    • Opcode ID: 7201a099929c13ddf9d8c4ed88e1fa575203edf34e49f70b38f45227ddf022c1
    • Instruction ID: 34579116b05a7082732a3a1f7365c6d8fd3edd81a632b3ed1e6c87f0e426309d
    • Opcode Fuzzy Hash: 7201a099929c13ddf9d8c4ed88e1fa575203edf34e49f70b38f45227ddf022c1
    • Instruction Fuzzy Hash: 57F0B4712503186AFB24AB58DC49FBAB36CEF44711F0046AAF504971D1D6F07D40C7A9
    APIs
    • DefDlgProcW.USER32(?,?,?,?), ref: 0047EA9E
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Proc
    • String ID:
    • API String ID: 2346855178-0
    • Opcode ID: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
    • Instruction ID: f892bfb12232205f5f58103f0897237a3558493ed3735c4837d976d353c396a9
    • Opcode Fuzzy Hash: abcbf0d1afc1a497e280cfdffd4bd47b828388575322d1f456f5668f6881d692
    • Instruction Fuzzy Hash: 82B1167330C1182DF218A6AABC81EFF679CD7C5779B10863FF248C55C2D62B5821A1B9
    APIs
    • BlockInput.USER32(00000001), ref: 0045A38B
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: BlockInput
    • String ID:
    • API String ID: 3456056419-0
    • Opcode ID: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
    • Instruction ID: ec784d9e1adcb2c5bdb0852901797f150ca91aa996cd98963819779bf85d9a24
    • Opcode Fuzzy Hash: 458ede1686394d551c7eb4c8b41db034409c2976cc7efd11918dc51f9e1a79d5
    • Instruction Fuzzy Hash: D8E0DF352002029FC300EF66C84495AB7E8EF94368F10883EFD45D7341EA74E80087A6
    APIs
    • LogonUserW.ADVAPI32(?,?,?,?,00000000,?), ref: 00436CF9
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: LogonUser
    • String ID:
    • API String ID: 1244722697-0
    • Opcode ID: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
    • Instruction ID: 7208d1371e48addad7a82bf776aec5a394cd9d1c10cc53d221989696c058f8f6
    • Opcode Fuzzy Hash: 58321df28e67eb099ee318ec18723cdf01b8a378577a77c5fc1e9d8837392bcc
    • Instruction Fuzzy Hash: 4DE0ECB626460EAFDB04CF68DC42EBF37ADA749710F004618BA16D7280C670E911CA74
    APIs
    • GetUserNameW.ADVAPI32(?,?), ref: 00472C51
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: NameUser
    • String ID:
    • API String ID: 2645101109-0
    • Opcode ID: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
    • Instruction ID: cbdb53fe1e94bfc77c89611ca4b62432a5518fa0aa6a76fb1323f8d63e00c007
    • Opcode Fuzzy Hash: b76fc723219d1f30d7a8c85bc8b1429fb957fe091183e5ae036ed6f26941642b
    • Instruction Fuzzy Hash: C3C04CB5004008EBDB148F50D9889D93B78BB04340F108199B60E95040D7B496C9DBA5
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0001F20E), ref: 0041F255
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
    • Instruction ID: fb0c5f5a3ae0de1c345b26270a1521b23addb5e119a177cdcf8b78f668196b28
    • Opcode Fuzzy Hash: c60cc95176153529ac13be9fefe03fec559109ed9a450e1086cc56a024ff5f26
    • Instruction Fuzzy Hash: 8190027625150157470417705E1964925905B5960275108BA6D11C8564DAA98089A619
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID: N@
    • API String ID: 0-1509896676
    • Opcode ID: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
    • Instruction ID: 433aa61276291b0397d7e0efaabfbd78b7095b9e612e68cb1662ee3b8c9c8781
    • Opcode Fuzzy Hash: 92e9a144b7047ce14b539b05f6d9118c1a7fbc1d7368d7adfc1bc9e5646efcc8
    • Instruction Fuzzy Hash: 48618E71A003259FCB18CF48D584AAEBBF2FF84310F5AC1AED9095B361C7B59955CB88
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
    • Instruction ID: 421b1f2eadcb2952f8febc08502f38db6b120a980ad90a3a21cdce547adf9c29
    • Opcode Fuzzy Hash: 9ccd90b163c6adb52abe1d2335d475eb1e8f24fdd15ffb4383e0e414a09222a9
    • Instruction Fuzzy Hash: 132270B7E5151A9BDB08CE95CC415D9B3A3BBC832471F9129D819E7305EE78BA078BC0
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
    • Instruction ID: 2bcfc4213c201322ab01e918109ed7ba488288358e1fe6702c600853dbf8b640
    • Opcode Fuzzy Hash: f02dcea883d10451d84a59732baab65edb0b568fbd8ca007beb23fa60eef1400
    • Instruction Fuzzy Hash: 9CC1B473D0E6B3058B35466D45182BFFE626E91B8031FC392DDD03F399C22AADA196D4
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
    • Instruction ID: 7014f9c6c4bb04029b5f83a2624c32223adacf072d8c068e18a9ecb8bc3ae66d
    • Opcode Fuzzy Hash: 0c69e47d847606dd43a020a10b245ffd8c98205713db3c8f796c6159738d0b06
    • Instruction Fuzzy Hash: 04C1A473D1A6B2058B36476D05182BFFE626E91B8031FC3D6CCD03F299C22AAD9596D4
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
    • Instruction ID: 878ae001d8650add2b069b622ec184fb54f95ec25c04ba16196e518284591b6f
    • Opcode Fuzzy Hash: 21018234ac6c65dce347e9eb3c09d9e563dc327998c84d170fb29f747537f1fa
    • Instruction Fuzzy Hash: FBC19473D0A6B2068B36476D05582BFFE626E91B8131FC3D2CCD03F299C22AAD9595D4
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
    • Instruction ID: 1be110723fa64262e89d0aec0a1a20255c1bae91910aebb39a61821022ff9223
    • Opcode Fuzzy Hash: 21b74c51e355f1ada917146b454bba93dbff062365e48e41ecc74cc68dac6f4d
    • Instruction Fuzzy Hash: 55B1B533D0A6B3058736836D05582BFFE626E91B8031FC396CDD03F399C62AAD9295D4
    APIs
    • DeleteObject.GDI32(?), ref: 0045953B
    • DeleteObject.GDI32(?), ref: 00459551
    • DestroyWindow.USER32(?), ref: 00459563
    • GetDesktopWindow.USER32 ref: 00459581
    • GetWindowRect.USER32(00000000), ref: 00459588
    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 0045969E
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004596AC
    • CreateWindowExW.USER32(?,AutoIt v3,00000000,?,88C00000,00000002,00000007,?,?,?,00000000,00000000), ref: 004596E8
    • GetClientRect.USER32(00000000,?), ref: 004596F8
    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,?,00000000,00000000,00000000), ref: 0045973B
    • CreateFileW.KERNEL32(00000000,000001F4,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00459760
    • GetFileSize.KERNEL32(00000000,00000000), ref: 0045977B
    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00459786
    • GlobalLock.KERNEL32(00000000), ref: 0045978F
    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0045979E
    • GlobalUnlock.KERNEL32(00000000), ref: 004597A5
    • CloseHandle.KERNEL32(00000000), ref: 004597AC
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000001F4), ref: 004597B9
    • OleLoadPicture.OLEAUT32(000001F4,00000000,00000000,004829F8,00000000), ref: 004597D0
    • GlobalFree.KERNEL32(00000000), ref: 004597E2
    • CopyImage.USER32(50000001,00000000,00000000,00000000,00002000), ref: 0045980E
    • SendMessageW.USER32(00000000,00000172,00000000,50000001), ref: 00459831
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00459857
    • ShowWindow.USER32(?,00000004), ref: 00459865
    • CreateWindowExW.USER32(00000000,static,00000000,000001F4,50000001,0000000B,0000000B,?,?,?,00000000,00000000), ref: 004598AF
    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004598C3
    • GetStockObject.GDI32(00000011), ref: 004598CD
    • SelectObject.GDI32(00000000,00000000), ref: 004598D5
    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004598E5
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004598EE
    • DeleteDC.GDI32(00000000), ref: 004598F8
    • _wcslen.LIBCMT ref: 00459916
    • _wcscpy.LIBCMT ref: 0045993A
    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004599DB
    • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 004599EF
    • GetDC.USER32(00000000), ref: 004599FC
    • SelectObject.GDI32(00000000,?), ref: 00459A0C
    • SelectObject.GDI32(00000000,00000007), ref: 00459A37
    • ReleaseDC.USER32(00000000,00000000), ref: 00459A42
    • MoveWindow.USER32(00000000,0000000B,?,?,00000190,00000001), ref: 00459A5F
    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00459A6D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$Create$Object$Global$Rect$DeleteFileSelect$MessageSendShow$AdjustAllocCapsClientCloseCopyDesktopDestroyDeviceFaceFontFreeHandleImageLoadLockMovePictureReadReleaseSizeStockStreamTextUnlock_wcscpy_wcslen
    • String ID: $AutoIt v3$DISPLAY$static
    • API String ID: 4040870279-2373415609
    • Opcode ID: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
    • Instruction ID: 0470743097681e939cd033c9659fc80dd101af82a4c7fdd8c03ae3a829a790b9
    • Opcode Fuzzy Hash: 6d6993f212ed0893db9275c3f84f169bec7eeddded5228c42ae13acbc858d7fb
    • Instruction Fuzzy Hash: 92027D71600204EFDB14DF64CD89FAE7BB9BB48305F108569FA05AB292D7B4ED05CB68
    APIs
    • GetSysColor.USER32(00000012), ref: 0044181E
    • SetTextColor.GDI32(?,?), ref: 00441826
    • GetSysColorBrush.USER32(0000000F), ref: 0044183D
    • GetSysColor.USER32(0000000F), ref: 00441849
    • SetBkColor.GDI32(?,?), ref: 00441864
    • SelectObject.GDI32(?,?), ref: 00441874
    • InflateRect.USER32(?,000000FF,000000FF), ref: 004418AA
    • GetSysColor.USER32(00000010), ref: 004418B2
    • CreateSolidBrush.GDI32(00000000), ref: 004418B9
    • FrameRect.USER32(?,?,00000000), ref: 004418CA
    • DeleteObject.GDI32(?), ref: 004418D5
    • InflateRect.USER32(?,000000FE,000000FE), ref: 0044192F
    • FillRect.USER32(?,?,?), ref: 00441970
      • Part of subcall function 004308EF: GetSysColor.USER32(0000000E), ref: 00430913
      • Part of subcall function 004308EF: SetTextColor.GDI32(?,00000000), ref: 0043091B
      • Part of subcall function 004308EF: GetSysColorBrush.USER32(0000000F), ref: 0043094E
      • Part of subcall function 004308EF: GetSysColor.USER32(0000000F), ref: 00430959
      • Part of subcall function 004308EF: GetSysColor.USER32(00000011), ref: 00430979
      • Part of subcall function 004308EF: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
      • Part of subcall function 004308EF: SelectObject.GDI32(?,00000000), ref: 0043099C
      • Part of subcall function 004308EF: SetBkColor.GDI32(?,?), ref: 004309A6
      • Part of subcall function 004308EF: SelectObject.GDI32(?,?), ref: 004309B4
      • Part of subcall function 004308EF: InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
      • Part of subcall function 004308EF: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
      • Part of subcall function 004308EF: GetWindowLongW.USER32(?,000000F0), ref: 00430A09
      • Part of subcall function 004308EF: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Color$Rect$Object$BrushInflateSelect$CreateText$DeleteFillFrameLongMessageRoundSendSolidWindow
    • String ID:
    • API String ID: 69173610-0
    • Opcode ID: 67e9ead5c942165e280b43d4d1bf61f8269e9ac583cd994716fd3aef5842f8a2
    • Instruction ID: 7a723b7ebc9985c742df47702d768576d0729d4f0beaa2415310c4eb73739e4f
    • Opcode Fuzzy Hash: 67e9ead5c942165e280b43d4d1bf61f8269e9ac583cd994716fd3aef5842f8a2
    • Instruction Fuzzy Hash: 76B15BB1508301AFD304DF64DD88A6FB7F8FB88720F104A2DF996922A0D774E945CB66
    APIs
    • DestroyWindow.USER32(?), ref: 004590F2
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004591AF
    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004591EF
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00459200
    • CreateWindowExW.USER32(00000008,AutoIt v3,00000000,?,88C00000,?,?,?,00000001,?,00000000,00000000), ref: 00459242
    • GetClientRect.USER32(00000000,?), ref: 0045924E
    • CreateWindowExW.USER32(00000000,static,00000000,?,50000000,?,00000004,00000500,00000018,?,00000000,00000000), ref: 00459290
    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004592A2
    • GetStockObject.GDI32(00000011), ref: 004592AC
    • SelectObject.GDI32(00000000,00000000), ref: 004592B4
    • GetTextFaceW.GDI32(00000000,00000040,?), ref: 004592C4
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004592CD
    • DeleteDC.GDI32(00000000), ref: 004592D6
    • CreateFontW.GDI32(?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0045931C
    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00459334
    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,?,00000000,00000000,00000000), ref: 0045936E
    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00459382
    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00459393
    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,?,00000000,00000000,00000000), ref: 004593C8
    • GetStockObject.GDI32(00000011), ref: 004593D3
    • SendMessageW.USER32(?,00000030,00000000), ref: 004593E3
    • ShowWindow.USER32(?,00000004,?,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004593EE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
    • API String ID: 2910397461-517079104
    • Opcode ID: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
    • Instruction ID: c5562805fc82c6770b180505aab83e69ed0b4cba248239bed49a3b83ebf26fc7
    • Opcode Fuzzy Hash: 7a94e82ab5e7eba8c21ff2ad013f2909889a905bd0bc04285d9267b4528ddb10
    • Instruction Fuzzy Hash: 71A18371B40214BFEB14DF64CD8AFAE7769AB44711F208529FB05BB2D1D6B4AD00CB68
    APIs
    • LoadCursorW.USER32(00000000,00007F89), ref: 00430754
    • SetCursor.USER32(00000000), ref: 0043075B
    • LoadCursorW.USER32(00000000,00007F8A), ref: 0043076C
    • SetCursor.USER32(00000000), ref: 00430773
    • LoadCursorW.USER32(00000000,00007F03), ref: 00430784
    • SetCursor.USER32(00000000), ref: 0043078B
    • LoadCursorW.USER32(00000000,00007F8B), ref: 0043079C
    • SetCursor.USER32(00000000), ref: 004307A3
    • LoadCursorW.USER32(00000000,00007F01), ref: 004307B4
    • SetCursor.USER32(00000000), ref: 004307BB
    • LoadCursorW.USER32(00000000,00007F88), ref: 004307CC
    • SetCursor.USER32(00000000), ref: 004307D3
    • LoadCursorW.USER32(00000000,00007F86), ref: 004307E4
    • SetCursor.USER32(00000000), ref: 004307EB
    • LoadCursorW.USER32(00000000,00007F83), ref: 004307FC
    • SetCursor.USER32(00000000), ref: 00430803
    • LoadCursorW.USER32(00000000,00007F85), ref: 00430814
    • SetCursor.USER32(00000000), ref: 0043081B
    • LoadCursorW.USER32(00000000,00007F82), ref: 0043082C
    • SetCursor.USER32(00000000), ref: 00430833
    • LoadCursorW.USER32(00000000,00007F84), ref: 00430844
    • SetCursor.USER32(00000000), ref: 0043084B
    • LoadCursorW.USER32(00000000,00007F04), ref: 0043085C
    • SetCursor.USER32(00000000), ref: 00430863
    • LoadCursorW.USER32(00000000,00007F02), ref: 00430874
    • SetCursor.USER32(00000000), ref: 0043087B
    • SetCursor.USER32(00000000), ref: 00430887
    • LoadCursorW.USER32(00000000,00007F00), ref: 00430898
    • SetCursor.USER32(00000000), ref: 0043089F
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Cursor$Load
    • String ID:
    • API String ID: 1675784387-0
    • Opcode ID: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
    • Instruction ID: ada3a8d1d263842f4cf6b5ed80e179871947c4c62c163598e9ab22da256eac1d
    • Opcode Fuzzy Hash: c7473186da6a924b3206e1e01d9541ab2871430d40d1833d6e341d2f3415b8bd
    • Instruction Fuzzy Hash: AF3101729C8205B7EA546BE0BE1DF5D3618AB28727F004836F309B54D09AF551509B6D
    APIs
    • GetSysColor.USER32(0000000E), ref: 00430913
    • SetTextColor.GDI32(?,00000000), ref: 0043091B
    • GetSysColor.USER32(00000012), ref: 00430933
    • SetTextColor.GDI32(?,?), ref: 0043093B
    • GetSysColorBrush.USER32(0000000F), ref: 0043094E
    • GetSysColor.USER32(0000000F), ref: 00430959
    • CreateSolidBrush.GDI32(?), ref: 00430962
    • GetSysColor.USER32(00000011), ref: 00430979
    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0043098B
    • SelectObject.GDI32(?,00000000), ref: 0043099C
    • SetBkColor.GDI32(?,?), ref: 004309A6
    • SelectObject.GDI32(?,?), ref: 004309B4
    • InflateRect.USER32(?,000000FF,000000FF), ref: 004309D9
    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004309F4
    • GetWindowLongW.USER32(?,000000F0), ref: 00430A09
    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00430A29
    • GetWindowTextW.USER32(00000000,00000000,?), ref: 00430A5A
    • InflateRect.USER32(?,000000FD,000000FD), ref: 00430A86
    • DrawFocusRect.USER32(?,?), ref: 00430A91
    • GetSysColor.USER32(00000011), ref: 00430A9F
    • SetTextColor.GDI32(?,00000000), ref: 00430AA7
    • DrawTextW.USER32(?,?,000000FF,?,00000105), ref: 00430ABC
    • SelectObject.GDI32(?,?), ref: 00430AD0
    • DeleteObject.GDI32(00000105), ref: 00430ADC
    • SelectObject.GDI32(?,?), ref: 00430AE3
    • DeleteObject.GDI32(?), ref: 00430AE9
    • SetTextColor.GDI32(?,?), ref: 00430AF0
    • SetBkColor.GDI32(?,?), ref: 00430AFB
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Color$ObjectText$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
    • String ID:
    • API String ID: 1582027408-0
    • Opcode ID: 01477bbfb5fd2d7e2e48adeaaca7c0b8a7ab70b0676868411687b74f3ea9e298
    • Instruction ID: b12033eb3fa9204049de4d7caedd8dcf025edfa44633034d6aae7949f8ecba99
    • Opcode Fuzzy Hash: 01477bbfb5fd2d7e2e48adeaaca7c0b8a7ab70b0676868411687b74f3ea9e298
    • Instruction Fuzzy Hash: 6F713071900209BFDB04DFA8DD88EAEBBB9FF48710F104619F915A7290D774A941CFA8
    APIs
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BAE6
    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00484EA8,00000000,?,00000000,?,?,?), ref: 0046BB40
    • RegCloseKey.ADVAPI32(?,00000001,00000000,00000000,00000000), ref: 0046BB8A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CloseConnectCreateRegistry
    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
    • API String ID: 3217815495-966354055
    • Opcode ID: e3f7a3a4c399bdd3170a18b4acf64230a3e96664a900d08813bdecec8633954b
    • Instruction ID: 14c723365299aea1e32a80c9e2d98689f85295d348ed372ee81e16963ac3f886
    • Opcode Fuzzy Hash: e3f7a3a4c399bdd3170a18b4acf64230a3e96664a900d08813bdecec8633954b
    • Instruction Fuzzy Hash: BCE18171604200ABD710EF65C885F1BB7E8EF88704F14895EB949DB352D739ED41CBA9
    APIs
    • GetCursorPos.USER32(?), ref: 004566AE
    • GetDesktopWindow.USER32 ref: 004566C3
    • GetWindowRect.USER32(00000000), ref: 004566CA
    • GetWindowLongW.USER32(?,000000F0), ref: 00456722
    • GetWindowLongW.USER32(?,000000F0), ref: 00456735
    • DestroyWindow.USER32(?), ref: 00456746
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00456794
    • SendMessageW.USER32(00000000,00000432,00000000,0000002C), ref: 004567B2
    • SendMessageW.USER32(?,00000418,00000000,?), ref: 004567C6
    • SendMessageW.USER32(?,00000439,00000000,0000002C), ref: 004567D6
    • SendMessageW.USER32(?,00000421,?,?), ref: 004567F6
    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 0045680C
    • IsWindowVisible.USER32(?), ref: 0045682C
    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00456848
    • SendMessageW.USER32(?,00000411,00000001,0000002C), ref: 0045685C
    • GetWindowRect.USER32(?,?), ref: 00456873
    • MonitorFromPoint.USER32(?,00000001,00000002), ref: 00456891
    • GetMonitorInfoW.USER32(00000000,?), ref: 004568A9
    • CopyRect.USER32(?,?), ref: 004568BE
    • SendMessageW.USER32(?,00000412,00000000), ref: 00456914
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSendWindow$Rect$LongMonitor$CopyCreateCursorDesktopDestroyFromInfoPointVisible
    • String ID: ($,$tooltips_class32
    • API String ID: 225202481-3320066284
    • Opcode ID: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
    • Instruction ID: fcdb4dd5bfb9c4cfeeadc9569793f3eee26ed74f2078e1bfb0220ba6a1b85fea
    • Opcode Fuzzy Hash: d36279d6046af7916fa8cb53b873a9c87cdaa8c87180e7b1c59dea88ca998a74
    • Instruction Fuzzy Hash: 4CB17170A00205AFDB54DFA4CD85BAEB7B4BF48304F10895DE919BB282D778A949CB58
    APIs
    • _wcslen.LIBCMT ref: 00454EB0
    • _wcslen.LIBCMT ref: 00454EC3
    • __wcsicoll.LIBCMT ref: 00454ED0
    • _wcslen.LIBCMT ref: 00454EE4
    • __wcsicoll.LIBCMT ref: 00454EF1
    • _wcslen.LIBCMT ref: 00454F05
    • __wcsicoll.LIBCMT ref: 00454F12
      • Part of subcall function 004114AB: __wcsicmp_l.LIBCMT ref: 0041152B
    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00454F48
    • LoadLibraryExW.KERNEL32(?,00000000,00000032), ref: 00454F5B
    • LoadImageW.USER32(?,00000000,?,00000001,?,?), ref: 00454F9B
    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00454FE5
    • LoadImageW.USER32(?,00000000,?,00000001,?,?), ref: 00455016
    • FreeLibrary.KERNEL32(?,?), ref: 00455023
    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0045507D
    • DestroyIcon.USER32(?), ref: 0045508B
    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 004550A8
    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 004550B4
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 004550D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Load$Image_wcslen$__wcsicoll$IconLibraryMessageSend$DestroyExtractFreeMoveWindow__wcsicmp_l
    • String ID: .dll$.exe$.icl
    • API String ID: 2511167534-1154884017
    • Opcode ID: b375f9f1c060e8dc6bc6b77497d5ee60ef8e4d255dc939bc4899f3b4511c0762
    • Instruction ID: 15f67b2365a9f585a2e114aae537e2d642ac99032f03718e2682cba1ccb7e1e2
    • Opcode Fuzzy Hash: b375f9f1c060e8dc6bc6b77497d5ee60ef8e4d255dc939bc4899f3b4511c0762
    • Instruction Fuzzy Hash: 1C71B571500704BAEB10DF64DD95BFF73A8AF44B06F00881EFE45D6182E7B9A988C769
    APIs
    • OpenClipboard.USER32(?), ref: 0046DCE7
    • IsClipboardFormatAvailable.USER32(0000000D), ref: 0046DCF5
    • GetClipboardData.USER32(0000000D), ref: 0046DD01
    • CloseClipboard.USER32 ref: 0046DD0D
    • GlobalLock.KERNEL32(00000000), ref: 0046DD37
    • CloseClipboard.USER32 ref: 0046DD41
    • IsClipboardFormatAvailable.USER32(00000001), ref: 0046DD81
    • GetClipboardData.USER32(00000001), ref: 0046DD8D
    • CloseClipboard.USER32 ref: 0046DD99
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Clipboard$Close$AvailableDataFormat$GlobalLockOpen
    • String ID:
    • API String ID: 15083398-0
    • Opcode ID: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
    • Instruction ID: c6f05cb0c77453757aa6b00544986da50a17ac1627668c5aecb5782462309948
    • Opcode Fuzzy Hash: 5d52f7a8e2fbd0ab087c8c139685d9916ac200a5779b15fccd04bfb456a25eb2
    • Instruction Fuzzy Hash: CE81B072704201ABD310EF65DD8AB5EB7A8FF94315F00482EF605E72D1EB74E905879A
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • GetWindowRect.USER32(?,?), ref: 00471CF7
    • GetClientRect.USER32(?,?), ref: 00471D05
    • GetSystemMetrics.USER32(00000007), ref: 00471D0D
    • GetSystemMetrics.USER32(00000008), ref: 00471D20
    • GetSystemMetrics.USER32(00000004), ref: 00471D42
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471D71
    • GetSystemMetrics.USER32(00000007), ref: 00471D79
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00471DA3
    • GetSystemMetrics.USER32(00000008), ref: 00471DAB
    • GetSystemMetrics.USER32(00000004), ref: 00471DCF
    • SetRect.USER32(?,00000000,00000000,?,?), ref: 00471DEE
    • AdjustWindowRectEx.USER32(?,?,00000000,00000040), ref: 00471DFF
    • CreateWindowExW.USER32(00000040,AutoIt v3 GUI,?,?,?,?,?,?,?,00000000,00000000,00000000), ref: 00471E35
    • SetWindowLongW.USER32(00000000,000000EB,?), ref: 00471E6E
    • GetClientRect.USER32(?,?), ref: 00471E8A
    • GetStockObject.GDI32(00000011), ref: 00471EA6
    • SendMessageW.USER32(?,00000030,00000000), ref: 00471EB2
    • SetTimer.USER32(00000000,00000000,00000028,00462986), ref: 00471ED9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: System$Metrics$Rect$Window$ClientInfoParameters$AdjustCreateLongMessageObjectSendStockTimer_malloc
    • String ID: @$AutoIt v3 GUI
    • API String ID: 867697134-3359773793
    • Opcode ID: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
    • Instruction ID: 8cf5fd9e7b0abf2f472dad9b41bae804ea9cb1b32c1b51d65689880f1cfe2d6c
    • Opcode Fuzzy Hash: a77764dc97b758b9f138980a30eafcd252b45b083a0cf55b9ff7e92d3de70106
    • Instruction Fuzzy Hash: 7DC17F71A402059FDB14DFA8DD85BAF77B4FB58714F10862EFA09A7290DB78A840CB58
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wcsicoll$__wcsnicmp
    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:$pQH
    • API String ID: 790654849-32604322
    • Opcode ID: fda3356f9a514e75ac50708b2e0f549657cc7649cef593225b85309bc7d45243
    • Instruction ID: c91e69f26a1c2718e03151092e39642ccf44f92bf630fd0466772f198d10bc2a
    • Opcode Fuzzy Hash: fda3356f9a514e75ac50708b2e0f549657cc7649cef593225b85309bc7d45243
    • Instruction Fuzzy Hash: CA317731A0420966DB10FAA2DD46BAE736C9F15315F20053BBD00BB2D5E7BC6E4587AE
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 132bb78e4814032672bcefea7924c76711b66464c0ffe455d11a6fd9663ecfe9
    • Instruction ID: 62dae473257cc2caee0a49c5626d46440081d624880130feb25903cd50123649
    • Opcode Fuzzy Hash: 132bb78e4814032672bcefea7924c76711b66464c0ffe455d11a6fd9663ecfe9
    • Instruction Fuzzy Hash: 84C128727002046BE724CFA8DC46FAFB7A4EF55311F00416AFA05DA2C1EBB99909C795
    APIs
      • Part of subcall function 00442C5A: __time64.LIBCMT ref: 00442C66
    • _fseek.LIBCMT ref: 00452B3B
    • __wsplitpath.LIBCMT ref: 00452B9B
    • _wcscpy.LIBCMT ref: 00452BB0
    • _wcscat.LIBCMT ref: 00452BC5
    • __wsplitpath.LIBCMT ref: 00452BEF
    • _wcscat.LIBCMT ref: 00452C07
    • _wcscat.LIBCMT ref: 00452C1C
    • __fread_nolock.LIBCMT ref: 00452C53
    • __fread_nolock.LIBCMT ref: 00452C64
    • __fread_nolock.LIBCMT ref: 00452C83
    • __fread_nolock.LIBCMT ref: 00452C94
    • __fread_nolock.LIBCMT ref: 00452CB5
    • __fread_nolock.LIBCMT ref: 00452CC6
    • __fread_nolock.LIBCMT ref: 00452CD7
    • __fread_nolock.LIBCMT ref: 00452CE8
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045273E
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452780
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 0045279E
      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 004527D2
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 004527E2
      • Part of subcall function 00452719: __fread_nolock.LIBCMT ref: 00452800
      • Part of subcall function 00452719: _wcscpy.LIBCMT ref: 00452831
    • __fread_nolock.LIBCMT ref: 00452D78
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __fread_nolock$_wcscat_wcscpy$__wsplitpath$__time64_fseek
    • String ID:
    • API String ID: 2054058615-0
    • Opcode ID: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
    • Instruction ID: 04d0e47ed4a2b248740d2851a73093f1b496c65d3ae4d984919b8c0089c9d159
    • Opcode Fuzzy Hash: 0fea368d492e8b0ff51cb8fd7897a71ebf5dc00d39f6f8cf48bc83bd06102a16
    • Instruction Fuzzy Hash: 6FC14EB2508340ABD720DF65D881EEFB7E8EFC9704F40492FF68987241E6759548CB66
    APIs
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004487BD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window
    • String ID: 0
    • API String ID: 2353593579-4108050209
    • Opcode ID: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
    • Instruction ID: 06508bea8339de1511a48146ac1d08a96458f0089f80555ee302a354f7131a6f
    • Opcode Fuzzy Hash: b0df0e29545e706fc7615ccb9c436c62dbee4145767baabea16aca18bd76baa2
    • Instruction Fuzzy Hash: 35B18BB0204341ABF324CF24CC89BABBBE4FB89744F14491EF591962D1DBB8A845CB59
    APIs
    • GetSysColor.USER32(0000000F), ref: 0044A05E
    • GetClientRect.USER32(?,?), ref: 0044A0D1
    • SendMessageW.USER32(?,00001328,00000000,?), ref: 0044A0E9
    • GetWindowDC.USER32(?), ref: 0044A0F6
    • GetPixel.GDI32(00000000,?,?), ref: 0044A108
    • ReleaseDC.USER32(?,?), ref: 0044A11B
    • GetSysColor.USER32(0000000F), ref: 0044A131
    • GetWindowLongW.USER32(?,000000F0), ref: 0044A140
    • GetSysColor.USER32(0000000F), ref: 0044A14F
    • GetSysColor.USER32(00000005), ref: 0044A15B
    • GetWindowDC.USER32(?), ref: 0044A1BE
    • GetPixel.GDI32(00000000,00000000,00000000), ref: 0044A1CB
    • GetPixel.GDI32(00000000,?,00000000), ref: 0044A1E4
    • GetPixel.GDI32(00000000,00000000,?), ref: 0044A1FD
    • GetPixel.GDI32(00000000,?,?), ref: 0044A21D
    • ReleaseDC.USER32(?,00000000), ref: 0044A229
    • SetBkColor.GDI32(?,00000000), ref: 0044A24C
    • GetSysColor.USER32(00000008), ref: 0044A265
    • SetTextColor.GDI32(?,00000000), ref: 0044A270
    • SetBkMode.GDI32(?,00000001), ref: 0044A282
    • GetStockObject.GDI32(00000005), ref: 0044A28A
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Color$Pixel$Window$Release$ClientLongMessageModeObjectRectSendStockText
    • String ID:
    • API String ID: 1744303182-0
    • Opcode ID: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
    • Instruction ID: 0380b5c53d8a23173c1b90063483f03488caaf4f58ae5d2001aea5c06c56dff4
    • Opcode Fuzzy Hash: e73dd003506282a75ec33c48a00615cd632731ac0e25c139f5641f86d6275693
    • Instruction Fuzzy Hash: E6612531140101ABE7109F78CC88BAB7764FB46320F14876AFD659B3D0DBB49C529BAA
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,004164DE), ref: 00417C28
    • __mtterm.LIBCMT ref: 00417C34
      • Part of subcall function 004178FF: TlsFree.KERNEL32(00000017,00417D96,?,004164DE), ref: 0041792A
      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000000,00000000,00410E44,?,00417D96,?,004164DE), ref: 004181B8
      • Part of subcall function 004178FF: _free.LIBCMT ref: 004181BB
      • Part of subcall function 004178FF: DeleteCriticalSection.KERNEL32(00000017,00410E44,?,00417D96,?,004164DE), ref: 004181E2
    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00417C4A
    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00417C57
    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00417C64
    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00417C71
    • TlsAlloc.KERNEL32(?,004164DE), ref: 00417CC1
    • TlsSetValue.KERNEL32(00000000,?,004164DE), ref: 00417CDC
    • __init_pointers.LIBCMT ref: 00417CE6
    • __calloc_crt.LIBCMT ref: 00417D54
    • GetCurrentThreadId.KERNEL32 ref: 00417D80
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm_free
    • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
    • API String ID: 4163708885-3819984048
    • Opcode ID: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
    • Instruction ID: ca22d9d2e1075830452d52834408fe47c465c3b6ac2468b12672dd77d4d5938c
    • Opcode Fuzzy Hash: b664ad2f65df639e4a6a12b7ff6e2ff430dd15d20f416fce335d42a987fa1153
    • Instruction Fuzzy Hash: D5315A75808710DECB10AF75BD0865A3EB8BB60764B12093FE914932B0DB7D8881CF9C
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • GetForegroundWindow.USER32(?,?,?,?,?,?,?), ref: 0046EE79
    • GetForegroundWindow.USER32(?,?,?,?,?,?), ref: 0046F265
    • IsWindow.USER32(?), ref: 0046F29A
    • GetDesktopWindow.USER32 ref: 0046F356
    • EnumChildWindows.USER32(00000000), ref: 0046F35D
    • EnumWindows.USER32(0046130D,?), ref: 0046F365
      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$EnumForegroundWindows_wcslen$ChildDesktop_memmove
    • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
    • API String ID: 329138477-1919597938
    • Opcode ID: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
    • Instruction ID: 15289122aec5319afe5b60ce0d71565fabc5791e0031d8771947120ab82528ab
    • Opcode Fuzzy Hash: 7eb0f3ae9a0304a5d069b7ca5d1222961736e80184ced8954434bc01324a9774
    • Instruction Fuzzy Hash: 83F10B714143019BDB00FF61D885AAFB3A4BF85308F44496FF94567282E779E909CBA7
    APIs
    • GetLocalTime.KERNEL32(?), ref: 0045DFE5
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 0045DFF5
    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0045E001
    • _wcsncpy.LIBCMT ref: 0045E020
    • __wsplitpath.LIBCMT ref: 0045E065
    • _wcscat.LIBCMT ref: 0045E07D
    • _wcscat.LIBCMT ref: 0045E08F
    • GetCurrentDirectoryW.KERNEL32(00000104,?), ref: 0045E0A4
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E0B8
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E0F6
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E10C
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E11E
    • _wcscpy.LIBCMT ref: 0045E12A
    • SetCurrentDirectoryW.KERNEL32(?), ref: 0045E170
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CurrentDirectory$Time$File$Local_wcscat$System__wsplitpath_wcscpy_wcsncpy
    • String ID: *.*
    • API String ID: 3201719729-438819550
    • Opcode ID: b07f584b71cf8d19aa50005951bdae2eb0100712e91d12c0769b4b69628a66d9
    • Instruction ID: 7dcc6d5f32d0a9fc1f1ff7e746cf1f91f269f34358fad58ace0a68446733b78c
    • Opcode Fuzzy Hash: b07f584b71cf8d19aa50005951bdae2eb0100712e91d12c0769b4b69628a66d9
    • Instruction Fuzzy Hash: 296199725043009BD724EF61D981E9FB3E9AFC4315F004D1EF98A87241DB79E949CBA6
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wcsicoll$IconLoad
    • String ID: blank$info$question$stop$warning
    • API String ID: 2485277191-404129466
    • Opcode ID: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
    • Instruction ID: a4c8356a5cb7371e963c7ba7671977edd7eb5cf64b0a9c0e84f2fcb3e6131cad
    • Opcode Fuzzy Hash: 90066845996854fde84de619c40f1fe09919dc61d56db525c82daa747bae1459
    • Instruction Fuzzy Hash: 9121A732B4021566DB00AB65BC05FEF3358DB98762F040837FA05E2282E3A9A52093BD
    APIs
    • LoadIconW.USER32(?,00000063), ref: 0045464C
    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0045465E
    • SetWindowTextW.USER32(?,?), ref: 00454678
    • GetDlgItem.USER32(?,000003EA), ref: 00454690
    • SetWindowTextW.USER32(00000000,?), ref: 00454697
    • GetDlgItem.USER32(?,000003E9), ref: 004546A8
    • SetWindowTextW.USER32(00000000,?), ref: 004546AF
    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004546D1
    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,?,00000000), ref: 004546EB
    • GetWindowRect.USER32(?,?), ref: 004546F5
    • SetWindowTextW.USER32(?,?), ref: 00454765
    • GetDesktopWindow.USER32 ref: 0045476F
    • GetWindowRect.USER32(00000000), ref: 00454776
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004547C4
    • GetClientRect.USER32(?,?), ref: 004547D2
    • PostMessageW.USER32(?,00000005,00000000,00000080), ref: 004547FC
    • SetTimer.USER32(?,0000040A,?,00000000), ref: 0045483F
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
    • String ID:
    • API String ID: 3869813825-0
    • Opcode ID: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
    • Instruction ID: 23cbb84c7db07f79204f7fb68ef1a354279dd66d41dce19f663d7a5246859b32
    • Opcode Fuzzy Hash: 7299b5a8a54a0497ad48b5c2470d2d1877852c465202323cb5b3bdfcc53dc08d
    • Instruction Fuzzy Hash: 06619D75A00705ABD720DFA8CE89F6FB7F8AB48705F00491DEA46A7290D778E944CB54
    APIs
    • LoadCursorW.USER32(00000000,00007F8A), ref: 00458EBF
    • LoadCursorW.USER32(00000000,00007F00), ref: 00458ECB
    • LoadCursorW.USER32(00000000,00007F03), ref: 00458ED7
    • LoadCursorW.USER32(00000000,00007F8B), ref: 00458EE3
    • LoadCursorW.USER32(00000000,00007F01), ref: 00458EEF
    • LoadCursorW.USER32(00000000,00007F81), ref: 00458EFB
    • LoadCursorW.USER32(00000000,00007F88), ref: 00458F07
    • LoadCursorW.USER32(00000000,00007F80), ref: 00458F13
    • LoadCursorW.USER32(00000000,00007F86), ref: 00458F1F
    • LoadCursorW.USER32(00000000,00007F83), ref: 00458F2B
    • LoadCursorW.USER32(00000000,00007F85), ref: 00458F37
    • LoadCursorW.USER32(00000000,00007F82), ref: 00458F43
    • LoadCursorW.USER32(00000000,00007F84), ref: 00458F4F
    • LoadCursorW.USER32(00000000,00007F04), ref: 00458F5B
    • LoadCursorW.USER32(00000000,00007F02), ref: 00458F67
    • LoadCursorW.USER32(00000000,00007F89), ref: 00458F73
    • GetCursorInfo.USER32(?), ref: 00458F83
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Cursor$Load$Info
    • String ID:
    • API String ID: 2577412497-0
    • Opcode ID: df8496a5ccf8980c413cee1492e9511dd2a8cf50dccd45c320fbb6698c2849a1
    • Instruction ID: d9ac11be0830284379e84a8ce80867a77d5222e4d8acd5552d2ffd66ae6e186d
    • Opcode Fuzzy Hash: df8496a5ccf8980c413cee1492e9511dd2a8cf50dccd45c320fbb6698c2849a1
    • Instruction Fuzzy Hash: 54314471E4831966EB509FB59C0AB9FBFA0EF40750F10452BE648BF2C0DEB964408BD5
    APIs
    • _wcslen.LIBCMT ref: 00464B28
    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B38
    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00464B60
    • _wcslen.LIBCMT ref: 00464C28
    • GetCurrentDirectoryW.KERNEL32(00000000,00000000,?), ref: 00464C3C
    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00464C64
    • _wcslen.LIBCMT ref: 00464CBA
    • _wcslen.LIBCMT ref: 00464CD0
    • _wcslen.LIBCMT ref: 00464CEF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcslen$Directory$CurrentSystem
    • String ID: D
    • API String ID: 1914653954-2746444292
    • Opcode ID: db4a824bce24d25818fab6367d638cb23397f974d7059867a4bb37184fd70cb2
    • Instruction ID: cb0983c86ca1fa87ccea60adda1cf5635047c5df12380c224dcb23d097980814
    • Opcode Fuzzy Hash: db4a824bce24d25818fab6367d638cb23397f974d7059867a4bb37184fd70cb2
    • Instruction Fuzzy Hash: 98E101716043409BD710EF65C845B6BB7E4AFC4308F148D2EF98987392EB39E945CB9A
    APIs
    • _wcsncpy.LIBCMT ref: 0045CE39
    • __wsplitpath.LIBCMT ref: 0045CE78
    • _wcscat.LIBCMT ref: 0045CE8B
    • _wcscat.LIBCMT ref: 0045CE9E
    • GetCurrentDirectoryW.KERNEL32(00000104,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEB2
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,00000104,?), ref: 0045CEC5
      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
    • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF05
    • SetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF1D
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF2E
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF3F
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CF53
    • _wcscpy.LIBCMT ref: 0045CF61
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,?,?,?,00000104,?), ref: 0045CFA4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CurrentDirectory$AttributesFile$_wcscat$__wsplitpath_wcscpy_wcsncpy
    • String ID: *.*
    • API String ID: 1153243558-438819550
    • Opcode ID: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
    • Instruction ID: eacc2f87ca0c49a88fd160cf35c0ab61f7b8ac52d7ffc0430f804bda47b2a69a
    • Opcode Fuzzy Hash: 28b8a1e182566b38844f77773a79acdc9f60bea9bca2776be04cde59cc8a5d2f
    • Instruction Fuzzy Hash: F071D572900208AEDB24DB54CCC5AEEB7B5AB44305F1489ABE805D7242D67C9ECDCB99
    APIs
    • DragQueryPoint.SHELL32(?,?), ref: 00470EC0
      • Part of subcall function 00441672: ClientToScreen.USER32(00000000,?), ref: 0044169A
      • Part of subcall function 00441672: GetWindowRect.USER32(?,?), ref: 00441722
      • Part of subcall function 00441672: PtInRect.USER32(?,?,?), ref: 00441734
    • SendMessageW.USER32 ref: 00470F32
    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00470F3B
    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00470F65
    • _wcscat.LIBCMT ref: 00470FA2
    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00470FB7
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00470FC9
    • SendMessageW.USER32(?,000000B1,?,?), ref: 00470FD7
    • SendMessageW.USER32(?,000000B1,?,?), ref: 00470FF4
    • DragFinish.SHELL32(?), ref: 00470FFA
    • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 004710E2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$Drag$Query$FileRect$ClientFinishPointProcScreenWindow_wcscat
    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
    • API String ID: 4085615965-3440237614
    • Opcode ID: d46f0dc6a402942f8e7c2c56388383e1fbb47624789ac98c9c2308d24ef9fef1
    • Instruction ID: 4ea733558c9692989c64ea5f36e42be92b13a76634dc251051ad4f24abf1ae27
    • Opcode Fuzzy Hash: d46f0dc6a402942f8e7c2c56388383e1fbb47624789ac98c9c2308d24ef9fef1
    • Instruction Fuzzy Hash: 076190716043019FD310EF65CC85E9FB7A8FFC9704F104A2EF59497291DB74AA098BAA
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wcsicoll
    • String ID: LEFT$MAIN$MENU$MIDDLE$PRIMARY$RIGHT$SECONDARY
    • API String ID: 3832890014-4202584635
    • Opcode ID: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
    • Instruction ID: 3b59ed03df0c76d23b576b9f0bbd6b5c96606bf3e4c0b80e5c93e428ec3f30be
    • Opcode Fuzzy Hash: 95885f1eddacfd63033607ac838e89683eff4e7941016429c0898dbf95f86d61
    • Instruction Fuzzy Hash: AB117772A4422512E91072657C03BFF219CCF1177AF14487BF90DE5A82FB4EDA9541ED
    APIs
    • PostMessageW.USER32(?,00000112,0000F060,00000000), ref: 0046A0C9
    • GetFocus.USER32 ref: 0046A0DD
    • GetDlgCtrlID.USER32(00000000), ref: 0046A0E8
    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0046A13C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessagePost$CtrlFocus
    • String ID: 0
    • API String ID: 1534620443-4108050209
    • Opcode ID: 5bdeef9738118ee5c9c38733562ec940b83ad32b40f05922a010845f715a3b7f
    • Instruction ID: bf3f5449e9a8ba554bb586fd0597798874618ae7c394ba8af81d11134a55f14d
    • Opcode Fuzzy Hash: 5bdeef9738118ee5c9c38733562ec940b83ad32b40f05922a010845f715a3b7f
    • Instruction Fuzzy Hash: 9791AD71604711AFE710CF14D884BABB7A4FB85314F004A1EF991A7381E7B9D895CBAB
    APIs
    • DestroyWindow.USER32(?), ref: 004558E3
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,00000000), ref: 0045592C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$CreateDestroy
    • String ID: ,$tooltips_class32
    • API String ID: 1109047481-3856767331
    • Opcode ID: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
    • Instruction ID: 3e2a402d8ef05c983ab6a33f0f0d51d253aadf8c8a2d9d50fdabec1795fb524a
    • Opcode Fuzzy Hash: ae2d9903759a545ce0c494cdefa096f9672d9422e9f4a365a31b4f6ccc33a5ca
    • Instruction Fuzzy Hash: AE71AD71650208AFE720CF58DC84FBA77B8FB59310F20851AFD45AB391DA74AD46CB98
    APIs
    • GetMenuItemInfoW.USER32(?,00000007,00000000,00000030), ref: 00468BB1
    • GetMenuItemCount.USER32(?), ref: 00468C45
    • DeleteMenu.USER32(?,00000005,00000000,?,?,?), ref: 00468CD9
    • DeleteMenu.USER32(?,00000004,00000000,?,?), ref: 00468CE2
    • DeleteMenu.USER32(00000000,00000006,00000000,?,00000004,00000000,?,?), ref: 00468CEB
    • DeleteMenu.USER32(?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468CF4
    • GetMenuItemCount.USER32 ref: 00468CFD
    • SetMenuItemInfoW.USER32(?,00000004,00000000,00000030), ref: 00468D35
    • GetCursorPos.USER32(?), ref: 00468D3F
    • SetForegroundWindow.USER32(?), ref: 00468D49
    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,?,00000003,00000000,?,00000004,00000000,?,?), ref: 00468D5F
    • PostMessageW.USER32(?,00000000,00000000,00000000), ref: 00468D6C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow
    • String ID: 0
    • API String ID: 1441871840-4108050209
    • Opcode ID: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
    • Instruction ID: 6d2915cdebcc0779354c8c01805c07fba6dcd836026253be2713676dcba25ca6
    • Opcode Fuzzy Hash: 07587df8a471d518792fccb5aa1665f6bc623426d2a925fe0db1080b86145506
    • Instruction Fuzzy Hash: F571A0B0644300BBE720DB58CC45F5AB7A4AF85724F20470EF5656B3D1DBB8B8448B2A
    APIs
    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
    • __swprintf.LIBCMT ref: 00460915
    • __swprintf.LIBCMT ref: 0046092D
    • _wprintf.LIBCMT ref: 004609E1
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004609FA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wcslen_wprintf
    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
    • API String ID: 3631882475-2268648507
    • Opcode ID: fa3f6862133619af0c8d91bc8d1f7a2e71e3d76ca5879c2374ca29fe6f13d18d
    • Instruction ID: 03c51728676f919c2e33c8c13cfd5c1cee97c3d48cab2dbcdd3400b30208eb52
    • Opcode Fuzzy Hash: fa3f6862133619af0c8d91bc8d1f7a2e71e3d76ca5879c2374ca29fe6f13d18d
    • Instruction Fuzzy Hash: F5416071900209ABDB00FB91CD46AEF7778AF44314F44447AF50577192EA786E45CBA9
    APIs
    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004716C7
    • ExtractIconExW.SHELL32(?,000000FF,?,?,00000001), ref: 004716E1
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00471711
    • SendMessageW.USER32 ref: 00471740
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,?,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 00471779
    • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 0047179A
    • ImageList_Create.COMCTL32(00000020,00000020,00000021,00000000,00000001,?,?,?,?,?,?,?,?,?,?,00001053), ref: 004717B0
    • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 004717D3
    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004717F8
    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 00471807
    • SendMessageW.USER32 ref: 0047184F
    • SendMessageW.USER32(?,0000104C,00000000,00000002), ref: 00471872
    • SendMessageW.USER32(?,00001015,00000000,00000000), ref: 00471890
    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 0047189C
    • DestroyIcon.USER32(?,?,?,?,?,?,?,?,?,?,?,00001053,000000FF,?), ref: 004718A2
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$Icon$ImageList_$CreateDestroyExtractReplace
    • String ID:
    • API String ID: 4116747274-0
    • Opcode ID: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
    • Instruction ID: aa77b4eb3e0d334a4980849760fe45b072e458157f6a66894e70986bfe60c355
    • Opcode Fuzzy Hash: 0980e37b37b59800b468ddf3c96ce45e1e3e21a553a40365caf2b501cbb695b2
    • Instruction Fuzzy Hash: 39617D75A00209AFEB10DF68CD85FEEB7B4FB48710F10855AF618AB2D0D7B4A981CB54
    APIs
    • GetClassNameW.USER32(?,?,00000100), ref: 00461678
    • _wcslen.LIBCMT ref: 00461683
    • __swprintf.LIBCMT ref: 00461721
    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00461794
    • GetClassNameW.USER32(?,?,00000400), ref: 00461811
    • GetDlgCtrlID.USER32(?), ref: 00461869
    • GetWindowRect.USER32(?,?), ref: 004618A4
    • GetParent.USER32(?), ref: 004618C3
    • ScreenToClient.USER32(00000000), ref: 004618CA
    • GetClassNameW.USER32(?,?,00000100), ref: 00461941
    • GetWindowTextW.USER32(?,?,00000400), ref: 0046197E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_wcslen
    • String ID: %s%u
    • API String ID: 1899580136-679674701
    • Opcode ID: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
    • Instruction ID: 362d1c13b2509f288ecdbc272899e32e1bd8f20a7ba75cfa55bfcaf2deda5cb5
    • Opcode Fuzzy Hash: 766f23a74968ff95f09f311a42cbe987384f70ffc1712f5abd724c40a01aa324
    • Instruction Fuzzy Hash: 1DA1B2715043019FDB10DF55C884BAB73A8FF84314F08896EFD899B255E738E94ACBA6
    APIs
    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FDDB
    • SetMenuItemInfoW.USER32(00000008,00000004,00000000,00000030), ref: 0045FE14
    • Sleep.KERNEL32(000001F4,?,FFFFFFFF,00000000,00000030,?,?,?,?,?,?), ref: 0045FE26
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: InfoItemMenu$Sleep
    • String ID: 0
    • API String ID: 1196289194-4108050209
    • Opcode ID: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
    • Instruction ID: 163fe6e236f433162160dce37f71c375d73f8c96772172175a1e07f10d517f7e
    • Opcode Fuzzy Hash: 5de70b745d60c46cef08f56f1a5c3a55b51ac4f0ed049d1ad5198b842cd33ee8
    • Instruction Fuzzy Hash: 12710172500244ABDB20CF55EC49FAFBBA8EB95316F00842FFD0197292C374A94DCB69
    APIs
    • GetDC.USER32(00000000), ref: 0043143E
    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 0043144F
    • CreateCompatibleDC.GDI32(00000000), ref: 00431459
    • SelectObject.GDI32(00000000,?), ref: 00431466
    • StretchBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 004314CC
    • GetDIBits.GDI32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 00431505
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CompatibleCreate$BitmapBitsObjectSelectStretch
    • String ID: (
    • API String ID: 3300687185-3887548279
    • Opcode ID: 1a3f62e8fb17afda8d6fcc23eed94a387a48bc8ee2b3109f4c6c0d9ae14dcc08
    • Instruction ID: 70523424e9a4c52fdd53d867b9eeb1eac2d89839f103c71a78559f5a5eece38f
    • Opcode Fuzzy Hash: 1a3f62e8fb17afda8d6fcc23eed94a387a48bc8ee2b3109f4c6c0d9ae14dcc08
    • Instruction Fuzzy Hash: 63514971A00209AFDB14CF98C884FAFBBB8EF49310F10891DFA5997290D774A940CBA4
    APIs
      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
    • GetDriveTypeW.KERNEL32 ref: 0045DB32
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DB78
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBB3
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045DBED
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: SendString$_wcslen$BuffCharDriveLowerType_memmove
    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
    • API String ID: 1976180769-4113822522
    • Opcode ID: 0f6c8a3de1c9442f7f3474ab6782275dee6e5c09c811d69c53e3fb1fd536eda6
    • Instruction ID: 81dc6b2e9a5b1b7ac5bd11c7175921e379baf9e0c2b27e14ed053c07c028f3b1
    • Opcode Fuzzy Hash: 0f6c8a3de1c9442f7f3474ab6782275dee6e5c09c811d69c53e3fb1fd536eda6
    • Instruction Fuzzy Hash: 75516E715043049FD710EF21C981B5EB3E4BF88304F14896FF995AB292D7B8E909CB5A
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcslen$_wcsncpy$LocalTime__fassign
    • String ID:
    • API String ID: 461458858-0
    • Opcode ID: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
    • Instruction ID: 9848deb76f2cd1bd94a84263f46e444e1138d8b87e7a9916e51222e649cc75ea
    • Opcode Fuzzy Hash: 26761b0a7209b856481a9ddbc8736091f87f92f0ac2320453e44697a96ade7e6
    • Instruction Fuzzy Hash: B1417372D10204B6CF10EFA5C946ADFF3B8DF49314F90885BE909E3121F6B4E65583A9
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 004300C3
    • GetFileSize.KERNEL32(00000000,00000000), ref: 004300DE
    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 004300E9
    • GlobalLock.KERNEL32(00000000), ref: 004300F6
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00430105
    • GlobalUnlock.KERNEL32(00000000), ref: 0043010C
    • CloseHandle.KERNEL32(00000000), ref: 00430113
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00430120
    • OleLoadPicture.OLEAUT32(?,00000000,00000000,004829F8,?), ref: 0043013E
    • GlobalFree.KERNEL32(00000000), ref: 00430150
    • GetObjectW.GDI32(?,00000018,?), ref: 00430177
    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 004301A8
    • DeleteObject.GDI32(?), ref: 004301D0
    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004301E7
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Global$File$CreateObject$AllocCloseCopyDeleteFreeHandleImageLoadLockMessagePictureReadSendSizeStreamUnlock
    • String ID:
    • API String ID: 3969911579-0
    • Opcode ID: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
    • Instruction ID: 40287395d2d29e4935595b2baf4d6657c54b4003bec4d35786bf86d2452689d1
    • Opcode Fuzzy Hash: fd1addb57dfcb9cf3c81a7192785a12cb72203be8d3c1966912b6329e8233f20
    • Instruction Fuzzy Hash: 41414C75600208AFDB10DF64DD88FAE77B8EF48711F108659FA05AB290D7B5AD01CB68
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Menu$Delete$Destroy$ItemObject$CountDrawIconInfoWindow
    • String ID: 0
    • API String ID: 956284711-4108050209
    • Opcode ID: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
    • Instruction ID: b5af5d15e8ca477bb279da78e69062a53aed449fe0dbaae2e4c2ef00f9b57ed5
    • Opcode Fuzzy Hash: d13a276e73d68c5a88ff05331af00a4635b68400f986b822500444c43e982ccd
    • Instruction Fuzzy Hash: 91412770200601AFD714DF64D9A8B6B77A8BF48302F10896DFD45CB292D778E848CFA9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcscpy$Cleanup$Startup_memmove_strcatgethostbynamegethostnameinet_ntoa
    • String ID: 0.0.0.0
    • API String ID: 1965227024-3771769585
    • Opcode ID: 26b12fbff4d00c82a0a207e3059eddb61ab54a01c3bbbcf423605757ca3fe1a5
    • Instruction ID: 28916de6e65f37ac85efecafd260a3a31c9a3caf28ae6c56f7260ddb0d4b80cb
    • Opcode Fuzzy Hash: 26b12fbff4d00c82a0a207e3059eddb61ab54a01c3bbbcf423605757ca3fe1a5
    • Instruction Fuzzy Hash: 4F213A32A00114BBC710AF65DC05EEF736CEF99716F0045AFF90993151EEB99A8187E8
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0045F5D5
    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F5EC
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0045F5FE
    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0045F611
    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0045F61E
    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0045F634
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: SendString$_memmove_wcslen
    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
    • API String ID: 369157077-1007645807
    • Opcode ID: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
    • Instruction ID: e81aaa69409cfefceaf3864659f825962b2ddf67c6d06b6a861a29a56a66176d
    • Opcode Fuzzy Hash: f963851227cb2bcafec7df3ef8778280fda42e08bc5c03876a4728c3ed9f2a05
    • Instruction Fuzzy Hash: 7F21A83168021D66E720FB95DC46FFE7368AF40700F20087BFA14B71D1DAB4A949879D
    APIs
    • GetParent.USER32 ref: 00445BF8
    • GetClassNameW.USER32(00000000,?,00000100), ref: 00445C0D
    • __wcsicoll.LIBCMT ref: 00445C33
    • __wcsicoll.LIBCMT ref: 00445C4F
    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00445CA9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wcsicoll$ClassMessageNameParentSend
    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
    • API String ID: 3125838495-3381328864
    • Opcode ID: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
    • Instruction ID: b9a51c7f116d0e73852bd225d20f6d8bcb5f39b8f57bd3164038c04ed7d94027
    • Opcode Fuzzy Hash: 17bab07e815737d0aecd422002c3b7a0f260523ca91fc6be5302b60c0052203b
    • Instruction Fuzzy Hash: C6110AB1E447017BFE10BA659D46EBB339C9B54B11F00051BFE44D7242F6ACA94147A9
    APIs
    • SendMessageW.USER32(?,?,000000FF,?), ref: 004492A4
    • SendMessageW.USER32(?,?,00000000,00000000), ref: 004492B7
    • CharNextW.USER32(?,?,?,000000FF,?), ref: 004492E9
    • SendMessageW.USER32(?,?,00000000,00000000), ref: 00449301
    • SendMessageW.USER32(?,?,00000000,?), ref: 00449332
    • SendMessageW.USER32(?,?,000000FF,?), ref: 00449349
    • SendMessageW.USER32(?,?,00000000,00000000), ref: 0044935C
    • SendMessageW.USER32(?,00000402,?), ref: 00449399
    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0044940D
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$CharNext
    • String ID:
    • API String ID: 1350042424-0
    • Opcode ID: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
    • Instruction ID: 867fdc7b80e212b75fe5daf06e5219747a853435bb2a874e280223eddbea68d3
    • Opcode Fuzzy Hash: 0066c399e5a393c923680e2e66105d8530035c3b09cc99687380ea8ee93f4497
    • Instruction Fuzzy Hash: 5B81D535A00119BBEB10CF85DD80FFFB778FB55720F10825AFA14AA280D7B99D4197A4
    APIs
      • Part of subcall function 004536F7: CharLowerBuffW.USER32(?,?), ref: 0045370C
      • Part of subcall function 00445AE0: _wcslen.LIBCMT ref: 00445AF0
    • GetDriveTypeW.KERNEL32(?), ref: 004787B9
    • _wcscpy.LIBCMT ref: 004787E5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: BuffCharDriveLowerType_wcscpy_wcslen
    • String ID: \VH$a$all$cdrom$fixed$network$ramdisk$removable$unknown
    • API String ID: 3052893215-2127371420
    • Opcode ID: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
    • Instruction ID: 541bc2b2506c052d744bcb7e7e177e26c036821b53f5a58429f0f0853ea8de24
    • Opcode Fuzzy Hash: d2cef25e8da5c5e3ff62787a2d5bf57075b394b4544bde345958b2b0489681b6
    • Instruction Fuzzy Hash: 4761C1716443018BD700EF14CC85B9BB7D4AB84348F14892FF949AB382DB79E94987AB
    APIs
    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E77F
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • LoadStringW.USER32(?,?,?,00000FFF), ref: 0045E7A0
    • __swprintf.LIBCMT ref: 0045E7F7
    • _wprintf.LIBCMT ref: 0045E8B3
    • _wprintf.LIBCMT ref: 0045E8D7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
    • API String ID: 2295938435-2354261254
    • Opcode ID: 44e01960a33580a095bbf2e3e13559187395cafc70d58b6b713acd2f3f366ced
    • Instruction ID: 453f5dd12ee62c270a242db3517b58e8b6225e49c0ff470bc5072f32437c925c
    • Opcode Fuzzy Hash: 44e01960a33580a095bbf2e3e13559187395cafc70d58b6b713acd2f3f366ced
    • Instruction Fuzzy Hash: 6A519E71A10219ABDB14EB91CC85EEF7778AF44314F14407EF90477292DB78AE49CBA8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __swprintf_wcscpy$__i64tow__itow
    • String ID: %.15g$0x%p$False$True
    • API String ID: 3038501623-2263619337
    • Opcode ID: 9558fb29f32284a54d229eda63eecd6038d83cdafd4a91f3ef0076e5298f973b
    • Instruction ID: fd507a47f7d2c8f7f5848ea17d112ce969af4838d766d220e6d3988dad71e25c
    • Opcode Fuzzy Hash: 9558fb29f32284a54d229eda63eecd6038d83cdafd4a91f3ef0076e5298f973b
    • Instruction Fuzzy Hash: 264108729001005BDB10EF75DC42FAAB364EF55306F0445ABFE09CB242EA39DA48C79A
    APIs
    • LoadStringW.USER32(?,00000066,?,00000FFF), ref: 0045E580
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • LoadStringW.USER32(?,00000072,?,00000FFF), ref: 0045E59F
    • __swprintf.LIBCMT ref: 0045E5F6
    • _wprintf.LIBCMT ref: 0045E6A3
    • _wprintf.LIBCMT ref: 0045E6C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: LoadString_wprintf$__swprintf_memmove_wcslen
    • String ID: Error: $%s (%d) : ==> %s:$%s (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
    • API String ID: 2295938435-8599901
    • Opcode ID: 97ebc5a5c228c2a30bddf96a7da616a93a1f5c8b5e746e323a0bc296dbc3a2d1
    • Instruction ID: ff3e2b23dced8a629e5b21f12e79e468b5cd48208a3d74017576322ff0354a8f
    • Opcode Fuzzy Hash: 97ebc5a5c228c2a30bddf96a7da616a93a1f5c8b5e746e323a0bc296dbc3a2d1
    • Instruction Fuzzy Hash: 9A519171D00109ABDB14EBA1C845EEF7778EF44304F50847EF91477292EA78AE49CBA8
    APIs
    • timeGetTime.WINMM ref: 00443B67
      • Part of subcall function 0040C620: timeGetTime.WINMM(0042DD5D), ref: 0040C620
    • Sleep.KERNEL32(0000000A), ref: 00443B9F
    • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00443BC8
    • SetActiveWindow.USER32(?), ref: 00443BEC
    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00443BFC
    • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00443C22
    • Sleep.KERNEL32(000000FA), ref: 00443C2D
    • IsWindow.USER32(?), ref: 00443C3A
    • EndDialog.USER32(?,00000000), ref: 00443C4C
      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
    • EnumThreadWindows.USER32(00000000,Function_00033D09,00000000), ref: 00443C6B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ThreadWindow$MessageSendSleepTimetime$ActiveAttachCurrentDialogEnumFindInputProcessWindows
    • String ID: BUTTON
    • API String ID: 1834419854-3405671355
    • Opcode ID: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
    • Instruction ID: 3c6370bb7d17ad47abda0b7088cfd3672c19e1ca6c3f529de1b12449ce3ad6f8
    • Opcode Fuzzy Hash: 0b90b562b2b8ddd8d32d3d53e67965f547c0866e24595f66544518a968b379f6
    • Instruction Fuzzy Hash: 6B31E676784200BFE3349F74FD99F5A3B58AB55B22F10083AF600EA2A1D6B5A441876C
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,?,?,0042820D,?,?,?,#include depth exceeded. Make sure there are no recursive includes,?), ref: 00454039
    • LoadStringW.USER32(00000000), ref: 00454040
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • _wprintf.LIBCMT ref: 00454074
    • __swprintf.LIBCMT ref: 004540A3
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0045410F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wcslen_wprintf
    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
    • API String ID: 455036304-4153970271
    • Opcode ID: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
    • Instruction ID: e2f14448b15a7dab571624068eda089460c560eca1c8ebe4dd0daaccfe0aa2c5
    • Opcode Fuzzy Hash: 0cc89bd23a2e2e53ac7bb2b5ed0e913a3f1e972501752cb0da19f3bd95e8304c
    • Instruction Fuzzy Hash: 3B31E872B0011997CB00EF95CD069AE3378AF88714F50445EFA0877282D678AE45C7A9
    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 004104C3
    • RegisterClassExW.USER32(00000030), ref: 004104ED
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
    • InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
    • LoadIconW.USER32(00000000,000000A9), ref: 00410542
    • ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,00000000), ref: 00410552
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
    • API String ID: 2914291525-1005189915
    • Opcode ID: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
    • Instruction ID: 324008788ca11066222c16167fc5b3db855b21205033cf9bff29629ff6c43806
    • Opcode Fuzzy Hash: d6ae890ac616c70b0adde597a8f502ff5fb08519606e77913bb64844803ac3e9
    • Instruction Fuzzy Hash: 6221F7B1900218AFDB40DFA4E988B9DBFB4FB09710F10862EFA15A6390D7B40544CF99
    APIs
    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467D63
    • SafeArrayAccessData.OLEAUT32(0000007F,0000007F), ref: 00467DDC
    • SafeArrayGetVartype.OLEAUT32(0000007F,?), ref: 00467E71
    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00467E9D
    • _memmove.LIBCMT ref: 00467EB8
    • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00467EC1
    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467EDE
    • _memmove.LIBCMT ref: 00467F6C
    • SafeArrayAccessData.OLEAUT32(0000007F,?), ref: 00467FC1
    • SafeArrayUnaccessData.OLEAUT32(00000004), ref: 00467FAB
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00467E48
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • SafeArrayUnaccessData.OLEAUT32(00479A50), ref: 00468030
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ArraySafe$Data$Access$Unaccess$_memmovestd::exception::exception$Exception@8ThrowVartype_malloc
    • String ID:
    • API String ID: 2170234536-0
    • Opcode ID: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
    • Instruction ID: 6369f5c3f22445f0d5bf5c4520e4337682cbd46778e63a39b460943b9460954a
    • Opcode Fuzzy Hash: ee399615404d7bb1bafc861e07f1b5ddd683e7781e6b5cedfe79e56e9046232f
    • Instruction Fuzzy Hash: 26B124716042059FD700CF59D884BAEB7B5FF88308F24856EEA05DB351EB3AD845CB6A
    APIs
    • GetKeyboardState.USER32(?), ref: 00453CE0
    • SetKeyboardState.USER32(?), ref: 00453D3B
    • GetAsyncKeyState.USER32(000000A0), ref: 00453D5E
    • GetKeyState.USER32(000000A0), ref: 00453D75
    • GetAsyncKeyState.USER32(000000A1), ref: 00453DA4
    • GetKeyState.USER32(000000A1), ref: 00453DB5
    • GetAsyncKeyState.USER32(00000011), ref: 00453DE1
    • GetKeyState.USER32(00000011), ref: 00453DEF
    • GetAsyncKeyState.USER32(00000012), ref: 00453E18
    • GetKeyState.USER32(00000012), ref: 00453E26
    • GetAsyncKeyState.USER32(0000005B), ref: 00453E4F
    • GetKeyState.USER32(0000005B), ref: 00453E5D
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
    • Instruction ID: 009fbf1908f75ed0a62addf5985db529f64a747a45b1090b1102dc3b9208550d
    • Opcode Fuzzy Hash: a3f88cab2abdfc68c44a637c7b6f2bd83c4aa3bfdff3a706604d8f1b20d6ef18
    • Instruction Fuzzy Hash: BC61DD3190478829FB329F6488057EBBBF45F12346F08459ED9C2162C3D7AC6B4CCB65
    APIs
    • GetDlgItem.USER32(?,00000001), ref: 004357DB
    • GetWindowRect.USER32(00000000,?), ref: 004357ED
    • MoveWindow.USER32(?,0000000A,?,?,?,00000000), ref: 00435857
    • GetDlgItem.USER32(?,00000002), ref: 0043586A
    • GetWindowRect.USER32(00000000,?), ref: 0043587C
    • MoveWindow.USER32(?,?,00000000,?,00000001,00000000), ref: 004358CE
    • GetDlgItem.USER32(?,000003E9), ref: 004358DC
    • GetWindowRect.USER32(00000000,?), ref: 004358EE
    • MoveWindow.USER32(?,0000000A,00000000,?,?,00000000), ref: 00435933
    • GetDlgItem.USER32(?,000003EA), ref: 00435941
    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-000000FB,00000000), ref: 0043595A
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00435967
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$ItemMoveRect$Invalidate
    • String ID:
    • API String ID: 3096461208-0
    • Opcode ID: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
    • Instruction ID: 6af1b44a8b8b1dd3dfd8c00d901dfbe31295268d39f582813a56aed3f3dd18d2
    • Opcode Fuzzy Hash: 5d52927da84fb547f57ff0a94c85d4d7e4cc3ec4f802ea2f498aab0433028225
    • Instruction Fuzzy Hash: 7C515FB1B00609ABCB18DF68CD95AAEB7B9EF88310F148529F905E7390E774ED008B54
    APIs
    • GetWindowLongW.USER32(?,000000F0), ref: 004714DC
    • LoadImageW.USER32(00000000,?,00000000,00000000,00000000,00002010), ref: 004714F7
    • SendMessageW.USER32(?,000000F7,00000000,00000000), ref: 00471510
    • DeleteObject.GDI32(?), ref: 0047151E
    • DestroyIcon.USER32(?,?,000000F7,00000000,00000000,?,000000F0), ref: 0047152C
    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00002010), ref: 0047156F
    • SendMessageW.USER32(?,000000F7,00000001,00000000), ref: 00471588
    • ExtractIconExW.SHELL32(?,?,?,?,00000001), ref: 004715A9
    • DestroyIcon.USER32(?,?,?,?,?,?,000000F0), ref: 004715CD
    • SendMessageW.USER32(?,000000F7,00000001,?), ref: 004715DC
    • DeleteObject.GDI32(?), ref: 004715EA
    • DestroyIcon.USER32(?,?,000000F7,00000001,?,?,?,?,?,?,000000F0), ref: 004715F8
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Icon$DestroyMessageSend$DeleteImageLoadObject$ExtractLongWindow
    • String ID:
    • API String ID: 3218148540-0
    • Opcode ID: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
    • Instruction ID: 6a50b90733f0312424b7b906018c15bc054940e4c1588362709ca6bab20dc4d5
    • Opcode Fuzzy Hash: 09c61f0bb0da2772a57e209ce6a73de2c43359248684d71e73f4e5cafd481585
    • Instruction Fuzzy Hash: D2419231740206ABDB209F69DD49FEB77A8EB84711F10452AFA46E72D0DBB4E805C768
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
    • String ID:
    • API String ID: 136442275-0
    • Opcode ID: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
    • Instruction ID: 55d98b2249b58b9b89d53d2d63704957c70a659fb5fc0040d5683289e7d9fa4f
    • Opcode Fuzzy Hash: 6cac6aaee55c93d52b89e688f8fbcd2468be5ec8bb4ca81dd5968faf06821e55
    • Instruction Fuzzy Hash: C24174B381021C66CB24EB55CC41DEE737DAB98705F0085DEB60963141EA796BC8CFA5
    APIs
    • _wcsncpy.LIBCMT ref: 00467490
    • _wcsncpy.LIBCMT ref: 004674BC
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • _wcstok.LIBCMT ref: 004674FF
      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
    • _wcstok.LIBCMT ref: 004675B2
    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
    • _wcslen.LIBCMT ref: 00467793
    • _wcscpy.LIBCMT ref: 00467641
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • _wcslen.LIBCMT ref: 004677BD
    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcslen$FileName_memmove_wcscpy_wcsncpy_wcstok$OpenSave__getptd
    • String ID: X
    • API String ID: 3104067586-3081909835
    • Opcode ID: b68abb8f803176e9b7dbe847da29e758ec7e9b5067a266dcb368a43c8e18a4a8
    • Instruction ID: 683e1e2944aeccc99b179fad4e52216d38d827d7da526ed866e93360804c4864
    • Opcode Fuzzy Hash: b68abb8f803176e9b7dbe847da29e758ec7e9b5067a266dcb368a43c8e18a4a8
    • Instruction Fuzzy Hash: 69C1C5306083009BD310FF65C985A5FB7E4AF84318F108D2EF559972A2EB78ED45CB9A
    APIs
    • OleInitialize.OLE32(00000000), ref: 0046CBC7
    • CLSIDFromProgID.OLE32(?,?), ref: 0046CBDF
    • CLSIDFromString.OLE32(?,?), ref: 0046CBF1
    • CoCreateInstance.OLE32(?,?,00000005,00482998,?), ref: 0046CC56
    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 0046CCCA
    • _wcslen.LIBCMT ref: 0046CDB0
    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0046CE33
    • CoTaskMemFree.OLE32(?), ref: 0046CE42
    • CoSetProxyBlanket.OLE32(?,?,?,?,?,?,?,00000800), ref: 0046CE85
      • Part of subcall function 00468070: VariantInit.OLEAUT32(00000000), ref: 004680B0
      • Part of subcall function 00468070: VariantCopy.OLEAUT32(00000000,00479A50), ref: 004680BA
      • Part of subcall function 00468070: VariantClear.OLEAUT32 ref: 004680C7
    Strings
    • NULL Pointer assignment, xrefs: 0046CEA6
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$CreateFromInitializeInstance$BlanketClearCopyFreeInitProgProxySecurityStringTask_wcslen
    • String ID: NULL Pointer assignment
    • API String ID: 440038798-2785691316
    • Opcode ID: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
    • Instruction ID: 7aab634462a7dbcbf958abac95e41bd58996b502d0213671d322085b5631b432
    • Opcode Fuzzy Hash: 58df38d68bb8b0de8b452a242e06650ce93d7fbbb76e65ad7c2ec0be56c62684
    • Instruction Fuzzy Hash: 74B13FB1D00229AFDB10DFA5CC85FEEB7B8EF48700F10855AF909A7281EB745A45CB95
    APIs
    • GetClassNameW.USER32(?,?,00000400), ref: 00461056
    • GetWindowTextW.USER32(?,?,00000400), ref: 00461092
    • _wcslen.LIBCMT ref: 004610A3
    • CharUpperBuffW.USER32(?,00000000), ref: 004610B1
    • GetClassNameW.USER32(?,?,00000400), ref: 00461124
    • GetWindowTextW.USER32(?,?,00000400), ref: 0046115D
    • GetClassNameW.USER32(?,?,00000400), ref: 004611A1
    • GetClassNameW.USER32(?,?,00000400), ref: 004611D9
    • GetWindowRect.USER32(?,?), ref: 00461248
      • Part of subcall function 00436299: _memmove.LIBCMT ref: 004362D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ClassName$Window$Text$BuffCharRectUpper_memmove_wcslen
    • String ID: ThumbnailClass
    • API String ID: 4136854206-1241985126
    • Opcode ID: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
    • Instruction ID: 9bdbaadfe46dce382da1609a4111f175dadd43cf518d3c7fb815d390e9d71813
    • Opcode Fuzzy Hash: d083942efa6e299b81e87f64ddc190b4296276633e8192dbc1e7cc466e4535cb
    • Instruction Fuzzy Hash: D991F3715043009FCB14DF51C881BAB77A8EF89719F08895FFD84A6252E738E946CBA7
    APIs
    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 004718C7
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00471922
    • SendMessageW.USER32(?,00001109,00000000,00000000), ref: 00471947
    • ImageList_ReplaceIcon.COMCTL32(?,000000FF,?), ref: 00471960
    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004719E0
    • SendMessageW.USER32(?,0000113F,00000000,00000032), ref: 00471A0D
    • GetClientRect.USER32(?,?), ref: 00471A1A
    • RedrawWindow.USER32(?,?,00000000,00000000), ref: 00471A29
    • DestroyIcon.USER32(?), ref: 00471AF4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: IconMessageSend$ImageList_$ClientCreateDestroyExtractRectRedrawReplaceWindow
    • String ID: 2
    • API String ID: 1331449709-450215437
    • Opcode ID: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
    • Instruction ID: 8a8bfaa361b8e4ad447499ed02e60938d35b352fbee86dd909721fc396438cf5
    • Opcode Fuzzy Hash: 35af861e1287c83bf6b22685c9feb70a55a109cab4d535c9bbd66d0cf124b3e0
    • Instruction Fuzzy Hash: 19519070A00209AFDB10CF98CD95BEEB7B5FF49310F10815AEA09AB3A1D7B4AD41CB55
    APIs
    • GetModuleHandleW.KERNEL32(00000000,00000066,?,00000FFF,00000010,00000001,?,?,00427F75,?,0000138C,?,00000001,?,?,?), ref: 004608A9
    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608B0
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,00427F75,?,0000138C,?,00000001,?,?,?,?,?,00000000), ref: 004608D0
    • LoadStringW.USER32(00000000,?,00427F75,?), ref: 004608D7
    • __swprintf.LIBCMT ref: 00460915
    • __swprintf.LIBCMT ref: 0046092D
    • _wprintf.LIBCMT ref: 004609E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: HandleLoadModuleString__swprintf$_memmove_wcslen_wprintf
    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d:$^ ERROR
    • API String ID: 3054410614-2561132961
    • Opcode ID: 525672c6318f03bf5c80d6cc28fa1f1d99bb47d67e8ddb41e80830938e70613e
    • Instruction ID: 8ea7bd36613c7ff98b4c02c5a019b599898316a67ab96f708308d0ed756dbd7a
    • Opcode Fuzzy Hash: 525672c6318f03bf5c80d6cc28fa1f1d99bb47d67e8ddb41e80830938e70613e
    • Instruction Fuzzy Hash: 654183B29001099BDB00FBD1DC9AAEF7778EF44354F45403AF504B7192EB78AA45CBA9
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00458721
    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 0045873E
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?), ref: 0045875C
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 0045878A
    • CLSIDFromString.OLE32(?,?), ref: 004587B3
    • RegCloseKey.ADVAPI32(000001FE), ref: 004587BF
    • RegCloseKey.ADVAPI32(?), ref: 004587C5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_wcslen
    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
    • API String ID: 600699880-22481851
    • Opcode ID: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
    • Instruction ID: 095cb2d92039a6881e8bf561e9cb0619f72fc8c68408713302cc045b8cca0367
    • Opcode Fuzzy Hash: cfc91adc3568b3696bc93f198b4a86b184f94eddf56cabac594ca02b2fd0747b
    • Instruction Fuzzy Hash: 58415275D0020DABCB04EBA4DC45ADE77B8EF48304F10846EE914B7291EF78A909CB94
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: DestroyWindow
    • String ID: static
    • API String ID: 3375834691-2160076837
    • Opcode ID: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
    • Instruction ID: e571488c54e010bbe3192cf51c39f0d33963e2fa0fa89bc12fd4c8100c345edb
    • Opcode Fuzzy Hash: d780a762e7facdedeb15ece3d926807f2c32385f8c9501599d87c18bab5c95b9
    • Instruction Fuzzy Hash: 2C41B375200205ABDB149F64DC85FEB33A8EF89725F20472AFA15E72C0D7B4E841CB68
    APIs
    • GetCurrentProcess.KERNEL32(00000008,00000000,?), ref: 00436F6A
    • OpenThreadToken.ADVAPI32(00000000), ref: 00436F6D
    • GetCurrentProcess.KERNEL32(00000008,?), ref: 00436F7D
    • OpenProcessToken.ADVAPI32(00000000), ref: 00436F80
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeAssignPrimaryTokenPrivilege,?), ref: 00436FB9
    • LookupPrivilegeValueW.ADVAPI32(00000000,SeIncreaseQuotaPrivilege,?), ref: 00436FD0
    • _memcmp.LIBCMT ref: 00437001
    • CloseHandle.KERNEL32(?), ref: 0043704B
    Strings
    • SeAssignPrimaryTokenPrivilege, xrefs: 00436FB1
    • SeIncreaseQuotaPrivilege, xrefs: 00436FC7
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Process$CurrentLookupOpenPrivilegeTokenValue$CloseHandleThread_memcmp
    • String ID: SeAssignPrimaryTokenPrivilege$SeIncreaseQuotaPrivilege
    • API String ID: 1446985595-805462909
    • Opcode ID: 20e3785b7433241d37dd94a03bfa4397e83b78d22b2bbb476a85e96c63628419
    • Instruction ID: 5d9cc79d75c838d3750a3a1f44766322371bceb9368f6a60d1057fe533f678da
    • Opcode Fuzzy Hash: 20e3785b7433241d37dd94a03bfa4397e83b78d22b2bbb476a85e96c63628419
    • Instruction Fuzzy Hash: 6531BEB2D40209ABDF20DBA1CD44AEFBBB8FB88310F14545BE940A7240D7789A45CFA5
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D959
    • GetDriveTypeW.KERNEL32(?,?), ref: 0045D9AB
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045DA4B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$DriveType
    • String ID: CDROM$Fixed$Network$RAMDisk$Removable$Unknown$\VH
    • API String ID: 2907320926-3566645568
    • Opcode ID: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
    • Instruction ID: 8c6a7395db7573f60177d60b7e789de744ab79b943898383e565048f237880a7
    • Opcode Fuzzy Hash: d176aaa606c69a21fa64de5f54fcf515c340d5c4a7f23c4320f7b4e4ff292d02
    • Instruction Fuzzy Hash: B7316E35A042049BCB10FFA9C48595EB771FF88315B1088ABFD05AB392C739DD45CB6A
    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 0041039B
    • LoadCursorW.USER32(00000000,00007F00), ref: 004103AA
    • LoadIconW.USER32(?,00000063), ref: 004103C0
    • LoadIconW.USER32(?,000000A4), ref: 004103D3
    • LoadIconW.USER32(?,000000A2), ref: 004103E6
    • LoadImageW.USER32(?,00000063,00000001,00000010,00000010,00000000), ref: 0041040E
    • RegisterClassExW.USER32(?), ref: 0041045D
      • Part of subcall function 00410490: GetSysColorBrush.USER32(0000000F), ref: 004104C3
      • Part of subcall function 00410490: RegisterClassExW.USER32(00000030), ref: 004104ED
      • Part of subcall function 00410490: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004104FE
      • Part of subcall function 00410490: InitCommonControlsEx.COMCTL32(004A90E8), ref: 0041051B
      • Part of subcall function 00410490: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 0041052B
      • Part of subcall function 00410490: LoadIconW.USER32(00000000,000000A9), ref: 00410542
      • Part of subcall function 00410490: ImageList_ReplaceIcon.COMCTL32(00000000,000000FF,00000000), ref: 00410552
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
    • String ID: #$0$AutoIt v3
    • API String ID: 423443420-4155596026
    • Opcode ID: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
    • Instruction ID: fa3beea58d24b169a793a749875a715f65b9999dd8e8f54869ce90ead7ff89b0
    • Opcode Fuzzy Hash: c82d51e411665b6a3a3e76d1a8d87b49acf25a0f72c8993ed2556b78267af7e8
    • Instruction Fuzzy Hash: 31212AB1E55214AFD720DFA9ED45B9EBBB8BB4C700F00447AFA08A7290D7B559408B98
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046BF8D
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ConnectRegistry_memmove_wcslen
    • String ID:
    • API String ID: 15295421-0
    • Opcode ID: 83e36273a1605fe10e189e937fa3589e2aecd19acdff471d05dabce0444bf4f4
    • Instruction ID: 33baa24a15bb30b806ffdc3d4c8c2128b8dbdbb38b4108e5c3e965d5e336c96e
    • Opcode Fuzzy Hash: 83e36273a1605fe10e189e937fa3589e2aecd19acdff471d05dabce0444bf4f4
    • Instruction Fuzzy Hash: 89E17471204200ABD714EF69CD85F2BB7E8AF88704F14891EF985DB381D779E941CB9A
    APIs
      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
    • DestroyAcceleratorTable.USER32(?), ref: 0047094A
    • ImageList_Destroy.COMCTL32(?), ref: 004709AD
    • ImageList_Destroy.COMCTL32(?), ref: 004709C5
    • ImageList_Destroy.COMCTL32(?), ref: 004709D5
    • DeleteObject.GDI32(?), ref: 00470A04
    • DestroyIcon.USER32(?), ref: 00470A1C
    • DeleteObject.GDI32(?), ref: 00470A34
    • DestroyWindow.USER32(?), ref: 00470A4C
    • DestroyIcon.USER32(?), ref: 00470A73
    • DestroyIcon.USER32(?), ref: 00470A81
    • KillTimer.USER32(00000000,00000000), ref: 00470B00
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Destroy$IconImageList_$DeleteObject$AcceleratorInvalidateKillRectTableTimerWindow
    • String ID:
    • API String ID: 1237572874-0
    • Opcode ID: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
    • Instruction ID: 3938066daea6daae9dc0c39577387909b3bcb8112bd91d3310d64c2ecda3814a
    • Opcode Fuzzy Hash: 4ee17edbf3fbf185c7a1b530a933687592c26a3f705ddbb244818e4a2882b4b3
    • Instruction Fuzzy Hash: 24616874601201CFE714DF65DD94FAA77B8FB6A304B54856EE6098B3A2CB38EC41CB58
    APIs
    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,004795FD), ref: 00479380
    • SafeArrayAllocData.OLEAUT32(004795FD), ref: 004793CF
    • VariantInit.OLEAUT32(?), ref: 004793E1
    • SafeArrayAccessData.OLEAUT32(004795FD,?), ref: 00479402
    • VariantCopy.OLEAUT32(?,?), ref: 00479461
    • SafeArrayUnaccessData.OLEAUT32(004795FD), ref: 00479474
    • VariantClear.OLEAUT32(?), ref: 00479489
    • SafeArrayDestroyData.OLEAUT32(004795FD), ref: 004794AE
    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794B8
    • VariantClear.OLEAUT32(?), ref: 004794CA
    • SafeArrayDestroyDescriptor.OLEAUT32(004795FD), ref: 004794E7
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
    • String ID:
    • API String ID: 2706829360-0
    • Opcode ID: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
    • Instruction ID: 8c269571b42c1441f814514f03b92edd351012a73d8239c9f379a0a89e1b4ae1
    • Opcode Fuzzy Hash: 23f20de2412018a08f4578d4e0f12eac70a18aacfa0f9406534bc12fd33cd3b0
    • Instruction Fuzzy Hash: F6515E76A00119ABCB00DFA5DD849DEB7B9FF88704F10856EE905A7241DB749E06CBA4
    APIs
    • GetKeyboardState.USER32(?), ref: 0044480E
    • GetAsyncKeyState.USER32(000000A0), ref: 00444899
    • GetKeyState.USER32(000000A0), ref: 004448AA
    • GetAsyncKeyState.USER32(000000A1), ref: 004448C8
    • GetKeyState.USER32(000000A1), ref: 004448D9
    • GetAsyncKeyState.USER32(00000011), ref: 004448F5
    • GetKeyState.USER32(00000011), ref: 00444903
    • GetAsyncKeyState.USER32(00000012), ref: 0044491F
    • GetKeyState.USER32(00000012), ref: 0044492D
    • GetAsyncKeyState.USER32(0000005B), ref: 00444949
    • GetKeyState.USER32(0000005B), ref: 00444958
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
    • Instruction ID: 827c2ee343902556a703916e37c968ecd50c133e95067caf6822082f003788d3
    • Opcode Fuzzy Hash: 9fce1f5b3a66d3eff563dda32bd6bc0484776d74d04e18c21d6e4f8d76764453
    • Instruction Fuzzy Hash: 27412B34A047C969FF31A6A4C8043A7BBA16FA1314F04805FD5C5477C1DBED99C8C7A9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: InitVariant$_malloc_wcscpy_wcslen
    • String ID:
    • API String ID: 3413494760-0
    • Opcode ID: 2a8305ef8d4776459e33b90f77451cd3990213b7daaf01a0e2fad0b7a80df6fc
    • Instruction ID: 93a03e1dde4748921c3f7e50244c45dc9774a8ad470eaa8d68eb3f4e8808ad8d
    • Opcode Fuzzy Hash: 2a8305ef8d4776459e33b90f77451cd3990213b7daaf01a0e2fad0b7a80df6fc
    • Instruction Fuzzy Hash: 33414BB260070AAFC754DF69C880A86BBE8FF48314F00862AE619C7750D775E564CBE5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _strncmp
    • String ID: '$DEFINE$\$`$h$h
    • API String ID: 909875538-3708680428
    • Opcode ID: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
    • Instruction ID: 816ce89e9d314c50cae2ff635e2dae77420ade2a81b985ada7b38a9c48760da0
    • Opcode Fuzzy Hash: c0119b86fdbff93204f49aa9905b13b9b84c98abe9b4d8f4a229c1acd795ed82
    • Instruction Fuzzy Hash: C502B470A042498FEF14CF69C9906AEBBF2FF85304F2481AED8459B341D7399946CB55
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressProc_free_malloc$_strcat_strlen
    • String ID: AU3_FreeVar
    • API String ID: 2634073740-771828931
    • Opcode ID: 541c90b565702ce7dbf644f146bde85b045e57c542551da08e129f5016a5b795
    • Instruction ID: 8d08e60933d1045585c44e473594da8d0bbfd8a8652ecee4fcef853dc29158a1
    • Opcode Fuzzy Hash: 541c90b565702ce7dbf644f146bde85b045e57c542551da08e129f5016a5b795
    • Instruction Fuzzy Hash: 00B1ADB4A00206DFCB00DF55C880A6AB7A5FF88319F2485AEED058F352D739ED95CB94
    APIs
    • CoInitialize.OLE32 ref: 0046C63A
    • CoUninitialize.OLE32 ref: 0046C645
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 0044CB87: CreateDispTypeInfo.OLEAUT32(?,00000800,?), ref: 0044CBD4
      • Part of subcall function 0044CB87: CreateStdDispatch.OLEAUT32(00000000,?,?,?), ref: 0044CBF4
    • CLSIDFromProgID.OLE32(00000000,?), ref: 0046C694
    • CLSIDFromString.OLE32(00000000,?), ref: 0046C6A4
    • CoCreateInstance.OLE32(?,00000000,00000017,00482998,?), ref: 0046C6CD
    • IIDFromString.OLE32(?,?), ref: 0046C705
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CreateFrom$String$DispDispatchInfoInitializeInstanceProgTypeUninitialize_malloc
    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
    • API String ID: 2294789929-1287834457
    • Opcode ID: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
    • Instruction ID: adb6a6f601bf1a612e569d1fac1689f55b30b767fcafa950e0578031a668eb85
    • Opcode Fuzzy Hash: 8665205133a3f3d83065b0d9f42e266eef00d51d9f24292ab734099309a65fda
    • Instruction Fuzzy Hash: B861BC712043019FD710EF21D885B7BB3E8FB84715F10891EF9859B241E779E909CBAA
    APIs
      • Part of subcall function 00456391: GetCursorPos.USER32(?), ref: 004563A6
      • Part of subcall function 00456391: ScreenToClient.USER32(?,?), ref: 004563C3
      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456400
      • Part of subcall function 00456391: GetAsyncKeyState.USER32(?), ref: 00456410
    • DefDlgProcW.USER32(?,00000205,?,?), ref: 00471145
    • ImageList_DragLeave.COMCTL32(00000000), ref: 00471163
    • ImageList_EndDrag.COMCTL32 ref: 00471169
    • ReleaseCapture.USER32 ref: 0047116F
    • SetWindowTextW.USER32(?,00000000), ref: 00471206
    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00471216
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AsyncDragImageList_State$CaptureClientCursorLeaveMessageProcReleaseScreenSendTextWindow
    • String ID: @GUI_DRAGFILE$@GUI_DROPID
    • API String ID: 2483343779-2107944366
    • Opcode ID: 038dcd04e55ec5c438f21b4de5b1dce7b91b6dae1b9492eacb09f34ba24fe95b
    • Instruction ID: f70d9246110d4513cc5ea0640624bfdb04bec8758509bedf4130776013c57ff9
    • Opcode Fuzzy Hash: 038dcd04e55ec5c438f21b4de5b1dce7b91b6dae1b9492eacb09f34ba24fe95b
    • Instruction Fuzzy Hash: D751E5706002109FD700EF59CC85BAF77A5FB89310F004A6EF945A72E2DB789D45CBAA
    APIs
    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004506A0
    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004506B4
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004506D5
    • _wcslen.LIBCMT ref: 00450720
    • _wcscat.LIBCMT ref: 00450733
    • SendMessageW.USER32(?,00001057,00000000,?), ref: 0045074C
    • SendMessageW.USER32(?,00001061,?,?), ref: 0045077E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$Window_wcscat_wcslen
    • String ID: -----$SysListView32
    • API String ID: 4008455318-3975388722
    • Opcode ID: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
    • Instruction ID: d83f74bd31ff7b91e94eebeff09b40632409ca0fd113a8de7250d6f1aa6a1b31
    • Opcode Fuzzy Hash: ffec743b0eb36e838b163f32d05296d45530ca8b23685d337e61e8ea6b23e255
    • Instruction Fuzzy Hash: 9C51D470500308ABDB24CF64CD89FEE77A5EF98304F10065EF944A72C2D3B99959CB58
    APIs
    • EnumProcesses.PSAPI(?,00000800,?,?,00443D49,?,?,?,004A8178), ref: 00433DBB
    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,004A8178), ref: 00433E19
    • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00433E2C
    • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104), ref: 00433E43
    • __wsplitpath.LIBCMT ref: 00433E6D
    • _wcscat.LIBCMT ref: 00433E80
    • __wcsicoll.LIBCMT ref: 00433E90
    • CloseHandle.KERNEL32(00000000), ref: 00433EC8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: EnumProcess$BaseCloseHandleModuleModulesNameOpenProcesses__wcsicoll__wsplitpath_wcscat
    • String ID: I=D
    • API String ID: 2903788889-2605949546
    • Opcode ID: e2a61d30099513a4b86aa9445ff639564bac9cad2a304c62a227ff9d1443cd16
    • Instruction ID: 36098e5712afd53b5e3c4de91d69c0015cf2cbbc5c01d2287a97767e02e0faf1
    • Opcode Fuzzy Hash: e2a61d30099513a4b86aa9445ff639564bac9cad2a304c62a227ff9d1443cd16
    • Instruction Fuzzy Hash: 05319376600108AFDB11CFA4CD85EEF73B9AF8C701F10419AFA0987250DB75AB85CBA4
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(00000000,0000018C,000000FF,00000000), ref: 00469C73
    • GetDlgCtrlID.USER32(00000000), ref: 00469C84
    • GetParent.USER32 ref: 00469C98
    • SendMessageW.USER32(00000000,?,00000111), ref: 00469C9F
    • GetDlgCtrlID.USER32(00000000), ref: 00469CA5
    • GetParent.USER32 ref: 00469CBC
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469CC3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 2360848162-1403004172
    • Opcode ID: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
    • Instruction ID: b77daa4920d68b7dc7b38413de7e2b04daab878370679d8231203fb1b5b646ea
    • Opcode Fuzzy Hash: 7a27601cbaa80f740c595597d901cdf30e8ed390f6d586fa417b55efe09de5c4
    • Instruction Fuzzy Hash: 0121E7716001187BDB00AB69CC85ABF779CEB85320F00855BFA149B2D1D6B8D845C7A5
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(00000186,00000186,?,00000000), ref: 00469E71
    • GetDlgCtrlID.USER32(00000000), ref: 00469E82
    • GetParent.USER32 ref: 00469E96
    • SendMessageW.USER32(00000000,?,00000111), ref: 00469E9D
    • GetDlgCtrlID.USER32(00000000), ref: 00469EA3
    • GetParent.USER32 ref: 00469EBA
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00469EC1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 2360848162-1403004172
    • Opcode ID: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
    • Instruction ID: 3a0c9dd1fa5fd4c1d1a647422213a645dfa1e4764d365342f395b6f430504e68
    • Opcode Fuzzy Hash: 986fe2d2ad3502a89dd9d9f189f0f45c93be64f12821e5ba271ad6af13960510
    • Instruction Fuzzy Hash: D121F7716001187BDB00ABA9CC85BBF77ACEB85310F00855FFA44EB2D5D6B8DC4587A5
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcscpy$FolderUninitialize$BrowseDesktopFromInitializeListMallocPath
    • String ID:
    • API String ID: 262282135-0
    • Opcode ID: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
    • Instruction ID: f209a7e015878e5ef66622a864ec89938c936514b9877fb167e893f071c19078
    • Opcode Fuzzy Hash: 6572a5b0ab20a3b352b20f616e179ebe31bc85c3400954ff5f88a0c3e804af97
    • Instruction Fuzzy Hash: 25718275900208AFCB14EF95C9849DEB7B9EF88304F00899AE9099B312D735EE45CF64
    APIs
    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004481A8
    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004481AB
    • GetWindowLongW.USER32(?,000000F0), ref: 004481CF
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004481F2
    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00448266
    • SendMessageW.USER32(?,00001074,?,00000007), ref: 004482B4
    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004482CF
    • SendMessageW.USER32(?,0000101D,00000001,00000000), ref: 004482F1
    • SendMessageW.USER32(?,0000101E,00000001,?), ref: 00448308
    • SendMessageW.USER32(?,00001008,?,00000007), ref: 00448320
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID:
    • API String ID: 312131281-0
    • Opcode ID: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
    • Instruction ID: c7c5d5d6f9bf0949bb943eac7ac5a8ec30049dd2ce11923e35461b50cec8bdb0
    • Opcode Fuzzy Hash: 6a3a0ce9ab1f2311975bf00a061da1b0f9e556c56634a45a126b5d9c196b7e2c
    • Instruction Fuzzy Hash: 97617C70A00208AFEB10DF94DC81FEE77B9FF49714F10429AF914AB291DBB5AA41CB54
    APIs
      • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
    • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
    • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
      • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$BrushCreateDeleteObjectSolid
    • String ID:
    • API String ID: 3771399671-0
    • Opcode ID: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
    • Instruction ID: 7c26134f999fedcb31daf2d1c178305a5bad5d5d588b7e0560cc3c70a69cf84e
    • Opcode Fuzzy Hash: 36703352345276820fdd923f04099b07a85a16fcace37fcd15d9f96d3dbdb764
    • Instruction Fuzzy Hash: C7511570300214ABF720DF24DC85FAE77A9EF14724F10491EFA59AB291CB79E9498B18
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00434643
    • GetForegroundWindow.USER32(00000000), ref: 00434655
    • GetWindowThreadProcessId.USER32(00000000), ref: 0043465C
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434671
    • GetWindowThreadProcessId.USER32(?,?), ref: 0043467F
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00434698
    • AttachThreadInput.USER32(00000000,00000000,00000001), ref: 004346A6
    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 004346F3
    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434707
    • AttachThreadInput.USER32(00000000,00000000,00000000), ref: 00434712
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
    • String ID:
    • API String ID: 2156557900-0
    • Opcode ID: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
    • Instruction ID: 33c2ceff45d8cb0672f592c0823183733d26e7ad7419b63083ab10cfbc882f35
    • Opcode Fuzzy Hash: 67cee910062edc5350ae4d2b9d1366d6ad4b01d413104696f98c87e4c7643c1b
    • Instruction Fuzzy Hash: 98313EB2600204BFDB11DF69DC859AEB7A9FB9A310F00552AF905D7250E778AD40CB6C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
    • API String ID: 0-1603158881
    • Opcode ID: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
    • Instruction ID: 400245e8055df5988f0e80dfbae95eacb55e3b8a933f722a5dc1e2c8929bf265
    • Opcode Fuzzy Hash: b2205c720eb57eaa9acd20c5cdad8c47631596d61f09c649adc7dd6ac6f1094b
    • Instruction Fuzzy Hash: FAA162B5800204ABDF00EF61D8C1BEA3368AF54349F58857BEC096B146EB7D6909D77A
    APIs
    • CreateMenu.USER32 ref: 00448603
    • SetMenu.USER32(?,00000000), ref: 00448613
    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448697
    • IsMenu.USER32(?), ref: 004486AB
    • CreatePopupMenu.USER32 ref: 004486B5
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004486EC
    • DrawMenuBar.USER32 ref: 004486F5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Menu$CreateItem$DrawInfoInsertPopup
    • String ID: 0
    • API String ID: 161812096-4108050209
    • Opcode ID: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
    • Instruction ID: 1651b4fd0bf3e4e6d8e032b2651979207be8780685d2f09cc615cc8e1c1775d8
    • Opcode Fuzzy Hash: 5f9c542d8f07ae56d95057f828c3334b95156dd137b7db0efda9360fb5a3d221
    • Instruction Fuzzy Hash: 9D418B75A01209AFEB40DF98D884ADEB7B4FF49314F10815EED189B340DB74A851CFA8
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 204a62f87721512235ad49b95d856cee8e1f5862e003688d905bed4d5cc31dde
    • Instruction ID: 0df76164974c5272bb459d6cb57aadea20bc0786d7edd9cc69ce034119999088
    • Opcode Fuzzy Hash: 204a62f87721512235ad49b95d856cee8e1f5862e003688d905bed4d5cc31dde
    • Instruction Fuzzy Hash: 10A1CE726083009FD310EF65D886B5BB3E9EBC4718F108E2EF559E7281D679E804CB96
    APIs
      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
    • lstrcmpiW.KERNEL32(?,?), ref: 00453900
    • MoveFileW.KERNEL32(?,?), ref: 00453932
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: File$AttributesFullMoveNamePathlstrcmpi
    • String ID:
    • API String ID: 978794511-0
    • Opcode ID: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
    • Instruction ID: 27746a5f3a3ee1b1e58f24b17d6851fe0efcb48f315c8e59f2eb92c6bb7fc6f1
    • Opcode Fuzzy Hash: e7576e1258f6bbb5b55b57ee2c4336deeb121e8720ac0ec1c8be93e036d3feb8
    • Instruction Fuzzy Hash: 295155B2C0021996CF20EFA1DD45BEEB379AF44305F0445DEEA0DA3101EB79AB98CB55
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
    • Instruction ID: 5433ce91f60fc94fc18d391a2a535eeaa569d09d9a52eba385401fd30cec28f3
    • Opcode Fuzzy Hash: dd945b6e1d8e8d9855cf24d2d3706bb91709aa24080d3beeb23df65cd9890c42
    • Instruction Fuzzy Hash: 5B41C4322142405AF3619B6DFCC4BEBBB98FBA6324F10056FF185E55A0C3EA74C58769
    APIs
      • Part of subcall function 00445AA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00445AC7
      • Part of subcall function 00445AA7: GetCurrentThreadId.KERNEL32 ref: 00445ACE
      • Part of subcall function 00445AA7: AttachThreadInput.USER32(00000000), ref: 00445AD5
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445E6F
    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00445E88
    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00445E96
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445E9C
    • PostMessageW.USER32(00000000,00000100,00000027,00000000), ref: 00445EBD
    • Sleep.KERNEL32(00000000), ref: 00445ECB
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00445ED1
    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00445EE6
    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000), ref: 00445EEE
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
    • String ID:
    • API String ID: 2014098862-0
    • Opcode ID: 5ca03ddf5c5627d7609a553b695717aade5f72ce3845e2189486292beca2fa90
    • Instruction ID: 3cb45b36699f005c3339592b7719367c9fd6f04972b18b3a4454280c1561912d
    • Opcode Fuzzy Hash: 5ca03ddf5c5627d7609a553b695717aade5f72ce3845e2189486292beca2fa90
    • Instruction Fuzzy Hash: 44115671390300BBF6209B959D8AF5A775DEB98B11F20490DFB80AB1C1C5F5A4418B7C
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID:
    • API String ID: 1473721057-0
    • Opcode ID: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
    • Instruction ID: 82c0e5a8bed1f7f82a0371e607e4af2e63fad7cf90771a3a9635cac59f663638
    • Opcode Fuzzy Hash: 3e0aaa4ed6ce8b6007e7bdda37da77eca1e161273c17b4dd860825949f7c6934
    • Instruction Fuzzy Hash: C301ECB6000B486AD630E7B9DC84FD7B7ED6B85600F018E1DE69A82514DA75F188CB64
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove$_memcmp
    • String ID: '$\$h
    • API String ID: 2205784470-1303700344
    • Opcode ID: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
    • Instruction ID: e67660c870af743a7fabfec7c4e9e8b186464fd05e4f656457aecd1ba61caca8
    • Opcode Fuzzy Hash: b142f59b2296442f2f65cbc20b4c9604eb51a9c16c8aaf0febd8f469beae5ca2
    • Instruction Fuzzy Hash: 5CE1C070A002498FDB18CFA9D8806BEFBF2FF89304F28816ED84697341D778A945CB54
    APIs
    • VariantInit.OLEAUT32(00000000), ref: 0045EA56
    • VariantCopy.OLEAUT32(00000000), ref: 0045EA60
    • VariantClear.OLEAUT32 ref: 0045EA6D
    • VariantTimeToSystemTime.OLEAUT32 ref: 0045EC06
    • __swprintf.LIBCMT ref: 0045EC33
    • VariantInit.OLEAUT32(00000000), ref: 0045ECEE
    Strings
    • %4d%02d%02d%02d%02d%02d, xrefs: 0045EC2D
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$InitTime$ClearCopySystem__swprintf
    • String ID: %4d%02d%02d%02d%02d%02d
    • API String ID: 2441338619-1568723262
    • Opcode ID: c249b4bb22c479881ec575d2075add2cc07daae690d7195f66b3f0f4b7776076
    • Instruction ID: 6ef9d3a4897ddb850998a39013325e9d2daf595bbef4806ea59c93c68b265cd6
    • Opcode Fuzzy Hash: c249b4bb22c479881ec575d2075add2cc07daae690d7195f66b3f0f4b7776076
    • Instruction Fuzzy Hash: F8A10873A0061487CB209F5AE48066AF7B0FF84721F1485AFED849B341C736AD99D7E5
    APIs
    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C659
    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C677
    • Sleep.KERNEL32(0000000A), ref: 0042C67F
    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0042C68A
    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0042C73C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Interlocked$DecrementIncrement$Sleep
    • String ID: @COM_EVENTOBJ
    • API String ID: 327565842-2228938565
    • Opcode ID: 997b95c1e3285604d7d07a7155651dd6665a5d9619594153496ea208ffa7f47c
    • Instruction ID: 079f2a2c733a9a3e151bbe14bd9981fb61a061d6167fc58a91b905d371dd4d86
    • Opcode Fuzzy Hash: 997b95c1e3285604d7d07a7155651dd6665a5d9619594153496ea208ffa7f47c
    • Instruction Fuzzy Hash: 18D1D271A002198FDB10EF94C985BEEB7B0FF45304F60856AE5057B392D778AE46CB98
    APIs
    • VariantClear.OLEAUT32(?), ref: 0047031B
    • VariantClear.OLEAUT32(?), ref: 0047044F
    • VariantInit.OLEAUT32(?), ref: 004704A3
    • DispCallFunc.OLEAUT32(?,?,?,00000015,?,?,?,?), ref: 00470504
    • VariantClear.OLEAUT32(?), ref: 00470516
      • Part of subcall function 00435481: VariantCopy.OLEAUT32(?,?), ref: 00435492
    • VariantCopy.OLEAUT32(?,?), ref: 0047057A
      • Part of subcall function 00435403: VariantClear.OLEAUT32(?), ref: 00435414
    • VariantClear.OLEAUT32(00000000), ref: 0047060D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$Clear$Copy$CallDispFuncInit
    • String ID: H
    • API String ID: 3613100350-2852464175
    • Opcode ID: bacfc3834c1e1f64d6a980e869512a64616dd68ff0230e80b28a17780798d585
    • Instruction ID: 4e55d858753f5aac0b63ea9498fb9ef25a468b81cfd7169f1740116cc4944d08
    • Opcode Fuzzy Hash: bacfc3834c1e1f64d6a980e869512a64616dd68ff0230e80b28a17780798d585
    • Instruction Fuzzy Hash: 93B15BB5605311EFD710DF54C880A6BB3A4FF88308F049A2EFA8997351D738E951CB9A
    APIs
    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00401D06
    • DestroyWindow.USER32(?), ref: 00426F50
    • UnregisterHotKey.USER32(?), ref: 00426F77
    • FreeLibrary.KERNEL32(?), ref: 0042701F
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00427050
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Free$DestroyLibrarySendStringUnregisterVirtualWindow
    • String ID: close all
    • API String ID: 4174999648-3243417748
    • Opcode ID: bff2fcf0380ed1109d9e97093e2b24a73880c514d234ccde4525561dc618a34d
    • Instruction ID: 89fc9d45334329c88beddca7a6314a06ce6e15860ee53b488cbf8147960762b2
    • Opcode Fuzzy Hash: bff2fcf0380ed1109d9e97093e2b24a73880c514d234ccde4525561dc618a34d
    • Instruction Fuzzy Hash: 9BA1C174710212CFC710EF15C985B5AF3A8BF48304F5045AEE909672A2CB78BD96CF99
    APIs
    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0044AAC5
    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0044AAFA
    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,00001000), ref: 0044AB5E
    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0044AB74
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044AB83
    • HttpQueryInfoW.WININET(00000000,00000005,?,00001000,00000000), ref: 0044ABBB
      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: HttpInternet$OptionQueryRequest$ConnectErrorInfoLastOpenSend
    • String ID:
    • API String ID: 1291720006-3916222277
    • Opcode ID: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
    • Instruction ID: 89538bfc19842651326e528327905a39262a83d8aa3acd63c003c629d13479a9
    • Opcode Fuzzy Hash: 91fdcc8e85295173cca015a6521aec32459a41892940df1d160b2f6c73229ea3
    • Instruction Fuzzy Hash: FA51B1756403087BF710DF56DC86FEBB7A8FB88715F00851EFB0196281D7B8A5148BA8
    APIs
    • GetMenuItemInfoW.USER32(?,FFFFFFFF,00000000,00000030), ref: 0045FC48
    • IsMenu.USER32(?), ref: 0045FC5F
    • CreatePopupMenu.USER32 ref: 0045FC97
    • GetMenuItemCount.USER32(?), ref: 0045FCFD
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0045FD26
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Menu$Item$CountCreateInfoInsertPopup
    • String ID: 0$2
    • API String ID: 93392585-3793063076
    • Opcode ID: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
    • Instruction ID: a5f6d3c146e885c54ead74f35c39eec4acd60bc9fc93d28bc39e3d14768ea649
    • Opcode Fuzzy Hash: f01c363b391305104942df3bb39f3e86dedaf87795108832ec1df4cdc4019c53
    • Instruction Fuzzy Hash: B55192719002099BDB11DF69D888BAF7BB4BB44319F14853EEC15DB282D3B8984CCB66
    APIs
    • DefWindowProcW.USER32(?,?,?,?,?,?,?,004010F8,?,?,?), ref: 00401136
    • KillTimer.USER32(?,00000001,?), ref: 004011B9
    • PostQuitMessage.USER32(00000000), ref: 004011CB
    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004011E5
    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,004010F8,?,?,?), ref: 004011F0
    • CreatePopupMenu.USER32 ref: 00401204
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
    • String ID: TaskbarCreated
    • API String ID: 129472671-2362178303
    • Opcode ID: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
    • Instruction ID: c871ea33cf18a3cc9178abcaf30b48d6b70312a550ef0fd47f6a389c1f0ea6f4
    • Opcode Fuzzy Hash: 3a68920b2457bf0ecdafc1b2be4b40edda77bb20db2372f596e363752a538359
    • Instruction Fuzzy Hash: 1E417932B0420497DB28DB68EC85BBE3355E759320F10493FFA11AB6F1C67D9850879E
    APIs
    • SafeArrayAccessData.OLEAUT32(?,?), ref: 004352E6
    • VariantClear.OLEAUT32(?), ref: 00435320
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00435340
    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00435373
    • VariantClear.OLEAUT32(?), ref: 004353B3
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004353F6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ArrayDataSafeVariant$ClearUnaccess$AccessChangeType
    • String ID: crts
    • API String ID: 586820018-3724388283
    • Opcode ID: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
    • Instruction ID: e94501f388d0d73ced66c0aa9444ce68fa972137b9c89e1913ae9ea64c05cbbc
    • Opcode Fuzzy Hash: 545d374044e3945891266c858ffc3b068b1e43ab9a1ba77500f3c10b34ab4cdf
    • Instruction Fuzzy Hash: DE418BB5200208EBDB10CF1CD884A9AB7B5FF9C314F20852AEE49CB351E775E911CBA4
    APIs
      • Part of subcall function 00410120: GetFullPathNameW.KERNEL32(00000000,00000104,004A7F6C,0040F545,004A7F6C,004A90E8,004A7F6C,?,0040F545), ref: 0041013C
    • lstrcmpiW.KERNEL32(?,?), ref: 0044BC09
    • MoveFileW.KERNEL32(?,?), ref: 0044BC3F
    • _wcscat.LIBCMT ref: 0044BCAF
    • _wcslen.LIBCMT ref: 0044BCBB
    • _wcslen.LIBCMT ref: 0044BCD1
    • SHFileOperationW.SHELL32(?), ref: 0044BD17
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: File_wcslen$FullMoveNameOperationPath_wcscatlstrcmpi
    • String ID: \*.*
    • API String ID: 2326526234-1173974218
    • Opcode ID: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
    • Instruction ID: cfb238852dc788c6f4e4306d35388aa956c556a9525b71239849112dc74cb112
    • Opcode Fuzzy Hash: dfa273c9728ae0aa44cf40aad3cddd2261aca17058b0337a789aafef13e29e40
    • Instruction Fuzzy Hash: 5C3184B1800219AACF14EFB1DC85ADEB3B5AF48304F5095EEE90997211EB35D748CB98
    APIs
      • Part of subcall function 00433244: _wcsncpy.LIBCMT ref: 0043325C
    • _wcslen.LIBCMT ref: 004335F2
    • GetFileAttributesW.KERNEL32(?), ref: 0043361C
    • GetLastError.KERNEL32 ref: 0043362B
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 0043363F
    • _wcsrchr.LIBCMT ref: 00433666
      • Part of subcall function 004335CD: CreateDirectoryW.KERNEL32(?,00000000), ref: 004336A7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CreateDirectory$AttributesErrorFileLast_wcslen_wcsncpy_wcsrchr
    • String ID: \
    • API String ID: 321622961-2967466578
    • Opcode ID: 526c1cfc3a43b05f59396125bad82ada4ca6822ef6053a482ff07b87bd9873bd
    • Instruction ID: 66c6ecc179b40ab72a0151a8d865592f5e80cbeaaa2383c239fb12261b929cf9
    • Opcode Fuzzy Hash: 526c1cfc3a43b05f59396125bad82ada4ca6822ef6053a482ff07b87bd9873bd
    • Instruction Fuzzy Hash: C72129719013146ADF30AF25AC06BEB73AC9B05715F10569AFD18C2241E6799A888BE9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
    • API String ID: 1038674560-2734436370
    • Opcode ID: efa81754a5abe8513f160bb6911180a265eadee6fd6379dbf0aa142365742102
    • Instruction ID: d05ed79ef8649e951018b8bbb1c2d61e3c33a7345c6b0b1fc41c187b8edaa79f
    • Opcode Fuzzy Hash: efa81754a5abe8513f160bb6911180a265eadee6fd6379dbf0aa142365742102
    • Instruction Fuzzy Hash: 1221003365151066E72176199C82FDBB3989FA5314F04442BFE049B242D26EF99A83E9
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0048D148,00000008,00417A44,00000000,00000000,?,004115F6,?,00401BAC,?,?,?), ref: 0041794D
    • __lock.LIBCMT ref: 00417981
      • Part of subcall function 004182CB: __mtinitlocknum.LIBCMT ref: 004182E1
      • Part of subcall function 004182CB: __amsg_exit.LIBCMT ref: 004182ED
      • Part of subcall function 004182CB: EnterCriticalSection.KERNEL32(004115F6,004115F6,?,00417986,0000000D,?,004115F6,?,00401BAC,?,?,?), ref: 004182F5
    • InterlockedIncrement.KERNEL32(FF00482A), ref: 0041798E
    • __lock.LIBCMT ref: 004179A2
    • ___addlocaleref.LIBCMT ref: 004179C0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __lock$CriticalEnterHandleIncrementInterlockedModuleSection___addlocaleref__amsg_exit__mtinitlocknum
    • String ID: KERNEL32.DLL$pI
    • API String ID: 637971194-197072765
    • Opcode ID: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
    • Instruction ID: a50d44c6e21ae10dfe2421e8c890a682036196f235240147777d58dc068d601e
    • Opcode Fuzzy Hash: de2ab6b473c2d5586c9f362b8c2f57dc22cd34abb7029a86a899895714b74b87
    • Instruction Fuzzy Hash: A401A171404B00EFD720AF66C90A78DBBF0AF50324F20890FE496536A1CBB8A684CB5D
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove$_malloc
    • String ID:
    • API String ID: 1938898002-0
    • Opcode ID: 1bed212381ad3185792968c85b8b0abedda8a146b74a926c962dbafdbe4d9c2e
    • Instruction ID: bb51e0d14dcfee45c4d36839732496dc4400bff611838f67d83ec86e680bb9ef
    • Opcode Fuzzy Hash: 1bed212381ad3185792968c85b8b0abedda8a146b74a926c962dbafdbe4d9c2e
    • Instruction Fuzzy Hash: FC81CB726001195BDB00EF66DC42AFF7368EF84318F040A6FFD04A7282EE7D995587A9
    APIs
      • Part of subcall function 004413AA: DeleteObject.GDI32(?), ref: 0044140B
    • SendMessageW.USER32(75C123D0,00001001,00000000,?), ref: 00448E16
    • SendMessageW.USER32(75C123D0,00001026,00000000,?), ref: 00448E25
      • Part of subcall function 00441432: CreateSolidBrush.GDI32(?), ref: 0044147E
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$BrushCreateDeleteObjectSolid
    • String ID:
    • API String ID: 3771399671-0
    • Opcode ID: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
    • Instruction ID: 7a731ed810a83f1ebb4df5e1cc4d29f9b75a103154dfe2ed632c3d1cef216bf4
    • Opcode Fuzzy Hash: 66a9d50f8c9d6af755a83d84fc10a8c9f79f913464eba51571b63e3dd0d935a7
    • Instruction Fuzzy Hash: 72513970204244AFF720DF24CC85FAE7BB9AF15314F10495EFA999B292CB79E549CB18
    APIs
    • GetWindowLongW.USER32(?,000000EC), ref: 00455F6E
    • SendMessageW.USER32 ref: 00455FA9
    • SendMessageW.USER32(?,0000104B,00000000,?), ref: 00455FE0
    • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 00456046
    • _wcslen.LIBCMT ref: 0045604D
    • _wcslen.LIBCMT ref: 0045606B
    • CharNextW.USER32(00000000), ref: 00456087
    • SendMessageW.USER32(?,0000104B,00000000,00000001), ref: 004560B0
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$_wcslen$CharLongNextWindow
    • String ID:
    • API String ID: 159606182-0
    • Opcode ID: 59df6781a71446fe026c203c4417afc8634a97d9bc02ffc36c49d526b22b95e4
    • Instruction ID: 3bbf8a548e7eb208f054a6dd8501fd8283818e16530c2b92652a98a135d3fd27
    • Opcode Fuzzy Hash: 59df6781a71446fe026c203c4417afc8634a97d9bc02ffc36c49d526b22b95e4
    • Instruction Fuzzy Hash: 6B411A71A0020A9BDB10DFA8DC85BEEB7B4FF48325F00862EEA14E72C0D7759414CB94
    APIs
    • SysAllocString.OLEAUT32(00000000), ref: 00434EE8
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00434F0B
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00434F37
    • SysAllocString.OLEAUT32(00000000), ref: 00434F3E
    • SysAllocString.OLEAUT32(?), ref: 00434F64
    • SysFreeString.OLEAUT32(?), ref: 00434F6D
    • StringFromGUID2.OLE32(?,?,00000028), ref: 00434FA8
    • SysAllocString.OLEAUT32(?), ref: 00434FB6
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
    • String ID:
    • API String ID: 3761583154-0
    • Opcode ID: 5e4403ef6ed37e1d137cb97d7d4a89a2378753c8b4a47dbacee134994b78d1de
    • Instruction ID: 62a2b3f98caf240b0b87dceec1cde1b3ad41479520e9ab1bd59fe61f77259947
    • Opcode Fuzzy Hash: 5e4403ef6ed37e1d137cb97d7d4a89a2378753c8b4a47dbacee134994b78d1de
    • Instruction Fuzzy Hash: A631A5327001186BC710AB99EC49FEFB7A8EB8C731F14427BFA09D7290DA759844C7A4
    APIs
    • DeleteObject.GDI32(?), ref: 00440F24
    • GetDC.USER32(00000000), ref: 00440F2C
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00440F38
    • ReleaseDC.USER32(00000000,?), ref: 00440F46
    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,?,?,?,00000001,00000004,00000000,?,00000000,00000000), ref: 00440F90
    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00440FA7
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00440FDD
    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00440FFF
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
    • String ID:
    • API String ID: 3864802216-0
    • Opcode ID: fef0053c073632ff5c176fa8d0eb2aaca295a54c025a4b12eac0c4782f4ea02e
    • Instruction ID: d9fc15c341c8c83caa3938f749aa41814f3de42eaf1e3e6405ddac876be99683
    • Opcode Fuzzy Hash: fef0053c073632ff5c176fa8d0eb2aaca295a54c025a4b12eac0c4782f4ea02e
    • Instruction Fuzzy Hash: F13164B16402147FEB14CF54DC89FAB3799EB98B15F048169FE08DE2C5D6B9E840CB64
    APIs
    • InterlockedExchange.KERNEL32(?,000001F5), ref: 0044B4A7
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 0044B4DA
    • EnterCriticalSection.KERNEL32(?), ref: 0044B4F7
    • _memmove.LIBCMT ref: 0044B555
    • _memmove.LIBCMT ref: 0044B578
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B587
    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0044B5A3
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B5B8
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterLeave_malloc
    • String ID:
    • API String ID: 2737351978-0
    • Opcode ID: 5789a2044f73980f16ba12a49533b714abcc400cabe2e4c88e4fa865c8451c83
    • Instruction ID: 70cbfa243a2dcbaabd352bc30cb9c3ad46017a318630e818b765f133545e4983
    • Opcode Fuzzy Hash: 5789a2044f73980f16ba12a49533b714abcc400cabe2e4c88e4fa865c8451c83
    • Instruction Fuzzy Hash: 4F41BC71900308EFDB20DF55D984EAFB7B8EF48704F10896EF54696650D7B4EA80CB58
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 0041523A
    • __calloc_crt.LIBCMT ref: 00415246
    • __getptd.LIBCMT ref: 00415253
    • CreateThread.KERNEL32(00000000,?,004151BB,00000000,00000004,00000000), ref: 0041527A
    • ResumeThread.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 0041528A
    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00415295
    • _free.LIBCMT ref: 0041529E
    • __dosmaperr.LIBCMT ref: 004152A9
      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Thread$CreateErrorLastResume___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
    • String ID:
    • API String ID: 3638380555-0
    • Opcode ID: 1654a222b4646c9f69efac9ffde4207e0fedfcb173d1918ac66127d2e2137f4d
    • Instruction ID: 1ae632b5747f25178f06b1f704b10109f3b838f12a9538f44878b4cc3517b2ff
    • Opcode Fuzzy Hash: 1654a222b4646c9f69efac9ffde4207e0fedfcb173d1918ac66127d2e2137f4d
    • Instruction Fuzzy Hash: 31110A33105B00ABD2102BB69C45ADB37A4DF85734B24065FF924862D1CA7C98814AAD
    APIs
    • VariantInit.OLEAUT32(?), ref: 0046C96E
      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$Copy$ClearErrorInitLast
    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
    • API String ID: 3207048006-625585964
    • Opcode ID: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
    • Instruction ID: 684ba17e2c3ca727561f7970afa8535519679aefa5cdc663b381c32651820a10
    • Opcode Fuzzy Hash: ca4782e3f1b8c357821c68e66e95b499971d8adc7301cf0feb6afda3dd37ffd4
    • Instruction Fuzzy Hash: F6A19472600209ABDB10DF99DCC1EFEB3B9FB84714F10852EF604A7281E7B59D458BA5
    APIs
    • WSAStartup.WSOCK32(00000101,?), ref: 00465559
      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
    • inet_addr.WSOCK32(?,00000000,?,?), ref: 0046559B
    • gethostbyname.WSOCK32(?), ref: 004655A6
    • GlobalAlloc.KERNEL32(00000040,00000040), ref: 0046561C
    • _memmove.LIBCMT ref: 004656CA
    • GlobalFree.KERNEL32(00000000), ref: 0046575C
    • WSACleanup.WSOCK32 ref: 00465762
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Global$AllocByteCharCleanupFreeMultiStartupWide_memmovegethostbynameinet_addr
    • String ID:
    • API String ID: 2945290962-0
    • Opcode ID: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
    • Instruction ID: 472bd1bc5547e678c188051989a3a6c7a671c7751f2ff3ad056c489052ad9926
    • Opcode Fuzzy Hash: b73dd2c417b7ad13d51beda6076b83dea337e616a356c7a57e90c36d1df505c0
    • Instruction Fuzzy Hash: CAA19E72604300AFD310EF65C981F5FB7E8AF88704F544A1EF64597291E778E905CB9A
    APIs
    • GetSystemMetrics.USER32(0000000F), ref: 00440527
    • MoveWindow.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00440763
    • SendMessageW.USER32(?,00000142,00000000,0000FFFF), ref: 00440782
    • InvalidateRect.USER32(?,00000000,00000001), ref: 004407A5
    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004407DA
    • ShowWindow.USER32(?,00000000,?,00000469,?,00000000), ref: 004407FD
    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00440817
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSendWindow$InvalidateMetricsMoveProcRectShowSystem
    • String ID:
    • API String ID: 1457242333-0
    • Opcode ID: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
    • Instruction ID: 469fbb3f3db71b9324cb07d082b932f31bc4dcc79b85a5821822f518eef070f3
    • Opcode Fuzzy Hash: d4bac657e1d3c25226f3662cee365975ebc34d7204b8b764d69e27e9e2fa035e
    • Instruction Fuzzy Hash: 0BB19F71600619EFEB14CF68C984BAFBBF1FF48301F15851AEA5597280D738BA61CB54
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B799
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ConnectRegistry_memmove_wcslen
    • String ID:
    • API String ID: 15295421-0
    • Opcode ID: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
    • Instruction ID: 8aea567fc0405534ed4901798b67d501f7e0ea7b8d3e81485b6dc33093e60a2a
    • Opcode Fuzzy Hash: af9aed33993baa0a6bbf415c0be9acaad95f35a4fb003459e4997ac6d107bcf3
    • Instruction Fuzzy Hash: 96A170B12043019FD710EF65CC85B1BB7E8EF85304F14892EF6859B291DB78E945CB9A
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • _wcstok.LIBCMT ref: 004675B2
      • Part of subcall function 00413EB8: __getptd.LIBCMT ref: 00413EBE
    • _wcscpy.LIBCMT ref: 00467641
    • GetOpenFileNameW.COMDLG32(00000058), ref: 00467774
    • _wcslen.LIBCMT ref: 00467793
    • _wcslen.LIBCMT ref: 004677BD
      • Part of subcall function 00461465: _memmove.LIBCMT ref: 004614F8
    • GetSaveFileNameW.COMDLG32(00000058), ref: 00467807
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcslen$FileName_memmove$OpenSave__getptd_wcscpy_wcstok
    • String ID: X
    • API String ID: 780548581-3081909835
    • Opcode ID: 5378e8049ee2a95257be1467db38ea41a0f606468867fb51d90dd075906198f3
    • Instruction ID: 4d78316a312392ccd7929e5b9cc6f9f998d70627324fd0ae594e8e4bf7546d1d
    • Opcode Fuzzy Hash: 5378e8049ee2a95257be1467db38ea41a0f606468867fb51d90dd075906198f3
    • Instruction Fuzzy Hash: 1381A3315083008FD310EF65C985A5FB7E5AF84318F108A2FF599572A1EB78ED46CB9A
    APIs
      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
    • Ellipse.GDI32(?,?,FFFFFFFE,00000000,00000000), ref: 004474C4
    • MoveToEx.GDI32(?,?,FFFFFFFE,00000000), ref: 004474D4
    • AngleArc.GDI32(?,?,FFFFFFFE,00000000), ref: 0044750F
    • LineTo.GDI32(?,?,FFFFFFFE), ref: 00447518
    • CloseFigure.GDI32(?), ref: 0044751F
    • SetPixel.GDI32(?,?,FFFFFFFE,00000000), ref: 0044752E
    • Rectangle.GDI32(?,?,FFFFFFFE,00000000), ref: 0044754A
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Object$Select$AngleBeginCloseCreateDeleteEllipseFigureLineMovePathPixelRectangle
    • String ID:
    • API String ID: 4082120231-0
    • Opcode ID: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
    • Instruction ID: e674395c2b36b0b5590bf657e4107f8d2570055e184bc57fe517c57e0a53fcaf
    • Opcode Fuzzy Hash: 7999c5ddb42d2811e8fcb41125d4db3c21d66abb345ae56e6caae54fa290efb2
    • Instruction Fuzzy Hash: 36713CB4904109EFEB04CF94C884EBEBBB9EF85310F24855AE9156B341D774AE42CBA5
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B3A6
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?), ref: 0046B3D2
    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 0046B3FD
    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0046B430
    • RegCloseKey.ADVAPI32(?,000000FF,00000000), ref: 0046B459
    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0046B492
    • RegCloseKey.ADVAPI32(?), ref: 0046B49D
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Close$ConnectEnumOpenRegistryValue_malloc_memmove_wcslen
    • String ID:
    • API String ID: 2027346449-0
    • Opcode ID: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
    • Instruction ID: e744fe3a0f0af3658e2b80b3541497a384b181c150b1b14c88f03688e4e42502
    • Opcode Fuzzy Hash: f0ceecdc90b01f2c9ddf0369269a16fa16a69f0e3d9f986347dd5438d1ccccc0
    • Instruction Fuzzy Hash: 92613D71218301ABD304EF65C985E6BB7A8FFC8704F008A2EF945D7281DB75E945CBA6
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
    • GetMenu.USER32 ref: 0047A703
    • GetMenuItemCount.USER32(00000000), ref: 0047A74F
    • GetMenuStringW.USER32(00000000,?,?,00007FFF,00000400), ref: 0047A783
    • _wcslen.LIBCMT ref: 0047A79E
    • GetMenuItemID.USER32(00000000,?), ref: 0047A7E0
    • GetSubMenu.USER32(00000000,?), ref: 0047A7F2
    • PostMessageW.USER32(?,00000111,?,00000000), ref: 0047A884
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Menu$Item$CountMessagePostStringWindow_malloc_wcslen
    • String ID:
    • API String ID: 3257027151-0
    • Opcode ID: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
    • Instruction ID: 02f8ada5611b6a2978ded3aa89f74167ce8c021908d800e5e23178b580333db3
    • Opcode Fuzzy Hash: 80d25b5d47cdb8856cfd5c6f23c0a19e515c97fff049208cbae9d6eea43d64d6
    • Instruction Fuzzy Hash: AA51FA71504301ABD310EF25DC81B9FB7E8FF88314F108A2EF989A7241D779E95487A6
    APIs
    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 0046D3D3
    • WSAGetLastError.WSOCK32(00000000), ref: 0046D3E4
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorLastselect
    • String ID:
    • API String ID: 215497628-0
    • Opcode ID: c4f514985c7b7d4e5508c77535d48de0581ad36333c8bb2771713ca7b92eb0a9
    • Instruction ID: fadcceb5308e48970113ceaff65c18732520a09434288b0a98514d96d8681c7b
    • Opcode Fuzzy Hash: c4f514985c7b7d4e5508c77535d48de0581ad36333c8bb2771713ca7b92eb0a9
    • Instruction Fuzzy Hash: 65510772E001046BD710EF69DC85FAEB3A8EB94320F14856EF905D7381EA35DD41C7A5
    APIs
    • GetParent.USER32(?), ref: 0044443B
    • GetKeyboardState.USER32(?), ref: 00444450
    • SetKeyboardState.USER32(?), ref: 004444A4
    • PostMessageW.USER32(?,00000101,00000010,?), ref: 004444D4
    • PostMessageW.USER32(?,00000101,00000011,?), ref: 004444F5
    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00444541
    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00444566
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
    • Instruction ID: 8f44bbd55e3387c5fecf3766ecc31f273ddc6601011f0052083f6d8a5cbafb33
    • Opcode Fuzzy Hash: 4481168041494e1849bbb8b05fe85edf3de4190132d6f0e43f59e21d2d662a19
    • Instruction Fuzzy Hash: 2051D6A05047D53AFB3682748846BA7BFE42F86704F08868BE1D5559C3D3ECE994CB68
    APIs
    • GetParent.USER32(?), ref: 00444633
    • GetKeyboardState.USER32(?), ref: 00444648
    • SetKeyboardState.USER32(?), ref: 0044469C
    • PostMessageW.USER32(?,00000100,00000010,?), ref: 004446C9
    • PostMessageW.USER32(?,00000100,00000011,?), ref: 004446E7
    • PostMessageW.USER32(?,00000100,00000012,?), ref: 00444730
    • PostMessageW.USER32(?,00000100,0000005B,?), ref: 00444752
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
    • Instruction ID: 3b822c4357a53f38689f34ecdfb8cd013e642acfd09065eaf4f6fa9230d15588
    • Opcode Fuzzy Hash: 988eb571eba6180a4ec7f7c38e49780efe397f424a6b2059308ac6c1f0666447
    • Instruction Fuzzy Hash: 7451D4B05047D139F73692688C45BA7BFD86B8B304F08868FF1D5156C2D3ACB895CB69
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __snwprintf__wcsicoll_wcscpy
    • String ID: , $$AUTOITCALLVARIABLE%d$CALLARGARRAY
    • API String ID: 1729044348-3025626884
    • Opcode ID: 599cccbd760059ba6f53ae3639d1d80998b6b1e729bf9cd2c9905b8b1e7a15cb
    • Instruction ID: fa375d034fa7217e9d4d929611683fd4ef9c76ca58110cba6d833e9902d6ecd0
    • Opcode Fuzzy Hash: 599cccbd760059ba6f53ae3639d1d80998b6b1e729bf9cd2c9905b8b1e7a15cb
    • Instruction Fuzzy Hash: 5D5184719002099BCB10EF51C982AEFB779EF84308F10856BF905B7281D779AE45CBE9
    APIs
    • SendMessageW.USER32(?,00001308,?,00000000), ref: 0045539F
    • ImageList_Remove.COMCTL32(?,?), ref: 004553D3
    • SendMessageW.USER32(?,0000133D,?,00000002), ref: 004554BB
    • DeleteObject.GDI32(?), ref: 00455736
    • DeleteObject.GDI32(?), ref: 00455744
    • DestroyIcon.USER32(?), ref: 00455752
    • DestroyWindow.USER32(?), ref: 00455760
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: DeleteDestroyMessageObjectSend$IconImageList_RemoveWindow
    • String ID:
    • API String ID: 2354583917-0
    • Opcode ID: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
    • Instruction ID: c6eb43681ca9132c11a6020d2ba108f27148fdc9c8ef1f50c91adec3b3f4716e
    • Opcode Fuzzy Hash: 35278296b08b7a07ab4037b75477043e0b107217007b5923df3ad7b8258325fa
    • Instruction Fuzzy Hash: 76516B74204A419FC714DF24C4A4BB677F5FF8A302F1486AAED998B392D738A849CB54
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
    • Instruction ID: 5d193f65ffce5f3a1406795a0d9a37a93f2f4887bdc9b14e5c8c629f49d9966a
    • Opcode Fuzzy Hash: 3e9aeaa8e8d9a9efa26880ce8322a829618f36bb2b0e75f2f32cf9c77c57eef6
    • Instruction Fuzzy Hash: 0A413871900114ABE710DF58CC84FAF7765EB46320F14826EF858AB3C1C7745D02EB98
    APIs
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004488BD
    • SendMessageW.USER32(?,00000469,?,00000000), ref: 004488D3
    • EnableWindow.USER32(?,00000000), ref: 00448B5C
    • EnableWindow.USER32(?,00000001), ref: 00448B72
    • ShowWindow.USER32(?,00000000), ref: 00448BE8
    • ShowWindow.USER32(?,00000004), ref: 00448BF4
    • EnableWindow.USER32(?,00000001), ref: 00448C09
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$Enable$Show$MessageMoveSend
    • String ID:
    • API String ID: 896007046-0
    • Opcode ID: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
    • Instruction ID: 578be1c3660e2fd518c7beccd973f741d6ce186f3db94e5441c29ef1e5fc56da
    • Opcode Fuzzy Hash: 487afd455632248a3d509b30b3d46b8f07dcfb1983bcccedac1426ad742150ab
    • Instruction Fuzzy Hash: 5F419D742003809FF724DB24C894BAB77E0FF96305F18446EF5859B291DB78A845CB59
    APIs
    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
    • GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
    • GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
    • SendMessageW.USER32(030C1A00,000000F1,00000000,00000000), ref: 00440E6E
    • SendMessageW.USER32(030C1A00,000000F1,00000001,00000000), ref: 00440E9A
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID:
    • API String ID: 312131281-0
    • Opcode ID: 8e011b54ce9cde448a93fe9bb8036a6d541319eb6c66cabd8f3e8fc2f85cf438
    • Instruction ID: 2c169baf4234265a3f6c05f50e500cf46f5ce099e15a3d3a23704bf731ec4cbe
    • Opcode Fuzzy Hash: 8e011b54ce9cde448a93fe9bb8036a6d541319eb6c66cabd8f3e8fc2f85cf438
    • Instruction Fuzzy Hash: 944189342402119FE720CF58DDC4F2A77A1FF9A710F6049A9E2119B3A1CB74ACA2CB58
    APIs
    • SendMessageW.USER32(?,00000401,?,00000000), ref: 00448AC9
    • GetFocus.USER32 ref: 00448ACF
    • EnableWindow.USER32(?,00000000), ref: 00448B5C
    • EnableWindow.USER32(?,00000001), ref: 00448B72
    • ShowWindow.USER32(?,00000000), ref: 00448BE8
    • ShowWindow.USER32(?,00000004), ref: 00448BF4
    • EnableWindow.USER32(?,00000001), ref: 00448C09
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$Enable$Show$FocusMessageSend
    • String ID:
    • API String ID: 3429747543-0
    • Opcode ID: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
    • Instruction ID: 6f3afe48a64986b2df7f4b22be5166ca64fe0b5af1f2aee4406df3dc20f3ce1d
    • Opcode Fuzzy Hash: 611a307e80107d343a79f7fc2cfd1bfbec1158008c6b2b7743f92638a6db6fc0
    • Instruction Fuzzy Hash: F331C4706043805BF7248F24CCC8BAFB7D4FB95305F08491EF581A6291DBBCA845CB59
    APIs
      • Part of subcall function 00401B80: _wcsncpy.LIBCMT ref: 00401C41
      • Part of subcall function 00401B80: _wcscpy.LIBCMT ref: 00401C5D
      • Part of subcall function 00401B80: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
    • KillTimer.USER32(?,?,?,?,?), ref: 004012D3
    • SetTimer.USER32(?,?,000002EE,00000000), ref: 004012E2
    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 0042730F
    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 00427363
    • Shell_NotifyIconW.SHELL32(?,000003A8), ref: 004273AE
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: IconNotifyShell_$Timer$Kill_wcscpy_wcsncpy
    • String ID:
    • API String ID: 3300667738-0
    • Opcode ID: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
    • Instruction ID: ad6fff92b80ef16b1053521cf30c66606da497e43c90b6e238f917110e524b22
    • Opcode Fuzzy Hash: 98bdb4639f13a2aff9c284aaa5c14a4e0db979becac89074174bb9299657736d
    • Instruction Fuzzy Hash: AF31EA70604259BFDB16CB24DC55BEAFBBCBB02304F0000EAF58CA3291C7741A95CB9A
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D459
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D4CF
    • __swprintf.LIBCMT ref: 0045D4E9
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D52D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume__swprintf
    • String ID: %lu$\VH
    • API String ID: 3164766367-2432546070
    • Opcode ID: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
    • Instruction ID: a5bcfc38f1a54d16d783223dfbe865d4bc924dff4e6617147b97584b2165572c
    • Opcode Fuzzy Hash: 886de82fe176795aba7bdb97f378ec25336d41d961a023bcb5d27bbb6add7ed5
    • Instruction Fuzzy Hash: 11317171A00209AFCB14EF95DD85EAEB7B8FF48304F1084AAF905A7291D774EA45CB94
    APIs
    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00450BE7
    • SendMessageW.USER32(00000000,00000409,00000000,FF000000), ref: 00450BF8
    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00450C06
    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00450C17
    • SendMessageW.USER32(00000000,00000404,00000001,00000000), ref: 00450C25
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: Msctls_Progress32
    • API String ID: 3850602802-3636473452
    • Opcode ID: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
    • Instruction ID: 3e9a69ee1b5e3cb2ffa50bc712587bba9ef5757239c838e11c91c46d95a842ac
    • Opcode Fuzzy Hash: bde72abdda352e35c3e71b9276821fa19048fea6f3879b5342d5f34549d04d22
    • Instruction Fuzzy Hash: 7A21667135030477EB20DEA9DC82F97B3AD9F94B24F21460AFB54A72D1C5B5F8418B58
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,?,?), ref: 00433EFD
    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00433F0D
    • Process32NextW.KERNEL32(00000000,0000022C), ref: 00433F38
    • __wsplitpath.LIBCMT ref: 00433F63
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcscat.LIBCMT ref: 00433F76
    • __wcsicoll.LIBCMT ref: 00433F86
    • CloseHandle.KERNEL32(00000000), ref: 00433FBF
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
    • String ID:
    • API String ID: 2547909840-0
    • Opcode ID: 182a9fd14032e8e93bb148eed081eedfbc5356b8f5808f875ed41f9760706005
    • Instruction ID: e17d583989bb1df9e9dd6b28cd90faaf4a95b78209a4298828de810110d6b8cb
    • Opcode Fuzzy Hash: 182a9fd14032e8e93bb148eed081eedfbc5356b8f5808f875ed41f9760706005
    • Instruction Fuzzy Hash: 9621EAB2800109ABC721DF50DC84FEEB7B8AB48300F5045DEF60997240EB799B84CFA4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Destroy$DeleteImageList_ObjectWindow$Icon
    • String ID:
    • API String ID: 3985565216-0
    • Opcode ID: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
    • Instruction ID: 510e71718d61fb01ae158a6e5fa7ad280301b7661e5b3aef53c80a3471921dd4
    • Opcode Fuzzy Hash: 49ccd75876ce99cd15ee405d1ac93d8c116bb45471ccb95599c5d22b34275644
    • Instruction Fuzzy Hash: 70217E70200A00EFCB20DF25D9D4A2A77AABF48712F10896DE906CB356D739EC45CB69
    APIs
    • OpenProcess.KERNEL32(00000410,00000000,?,?,?,004A8178), ref: 00433E19
    • EnumProcessModules.PSAPI(00000000,?,00000004,?), ref: 00433E2C
    • GetModuleBaseNameW.PSAPI(00000000,?,?,00000104), ref: 00433E43
    • __wsplitpath.LIBCMT ref: 00433E6D
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • _wcscat.LIBCMT ref: 00433E80
    • __wcsicoll.LIBCMT ref: 00433E90
    • CloseHandle.KERNEL32(00000000), ref: 00433EC8
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Process$BaseCloseEnumHandleModuleModulesNameOpen__wcsicoll__wsplitpath__wsplitpath_helper_wcscat
    • String ID:
    • API String ID: 135935984-0
    • Opcode ID: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
    • Instruction ID: 66738fc5919b7c3a3c7c4a311c48fd84e22d6c2a66b6279363cc5d51ef299119
    • Opcode Fuzzy Hash: b9dd60fc789600814193b10c203562de5ce45e1fa765f6932a0e1556b25623f2
    • Instruction Fuzzy Hash: 832180B6500118AFDB11CF90CD85EEEB379EB8C700F10459AFA0997150DA75AA85CBA4
    APIs
    • _malloc.LIBCMT ref: 0041F707
      • Part of subcall function 004135BB: __FF_MSGBANNER.LIBCMT ref: 004135D4
      • Part of subcall function 004135BB: __NMSG_WRITE.LIBCMT ref: 004135DB
      • Part of subcall function 004135BB: RtlAllocateHeap.NTDLL(00000000,00000001,?,?,?,?,004115F6,?,00401BAC,?,?,?), ref: 00413600
    • _free.LIBCMT ref: 0041F71A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AllocateHeap_free_malloc
    • String ID: [B
    • API String ID: 1020059152-632041663
    • Opcode ID: fb2c2a04e00756f7c045e2cf33d68372e445ba8eb1714cf227669b285e538727
    • Instruction ID: 066e14217b5799beb7557260d36092b09813ce611e9d099bbd870b86b34de80c
    • Opcode Fuzzy Hash: fb2c2a04e00756f7c045e2cf33d68372e445ba8eb1714cf227669b285e538727
    • Instruction Fuzzy Hash: 0211EB32454615AACB213F75EC086DB3BA49F443A5B20053BF824CA2D1DB7C88C7C7AC
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 00413DA4
    • __calloc_crt.LIBCMT ref: 00413DB0
    • __getptd.LIBCMT ref: 00413DBD
    • CreateThread.KERNEL32(?,?,00413D1A,00000000,?,?), ref: 00413DF4
    • GetLastError.KERNEL32(?,?,?,?,?,00000000), ref: 00413DFE
    • _free.LIBCMT ref: 00413E07
    • __dosmaperr.LIBCMT ref: 00413E12
      • Part of subcall function 00417F77: __getptd_noexit.LIBCMT ref: 00417F77
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CreateErrorLastThread___set_flsgetvalue__calloc_crt__dosmaperr__getptd__getptd_noexit_free
    • String ID:
    • API String ID: 155776804-0
    • Opcode ID: 747485f25b08bc58b9deeabd238d5495aef4e1f104f4def88fecd2e8df7ea77c
    • Instruction ID: a8fa495ec3ad1bcc0d525816251f0ff308f4c172cb7463a6c3574dd724ca7d0d
    • Opcode Fuzzy Hash: 747485f25b08bc58b9deeabd238d5495aef4e1f104f4def88fecd2e8df7ea77c
    • Instruction Fuzzy Hash: 8E11E9321087066FD7107FA6DC459DB3BE8DF04775B20042FF91586292DB79D99186AC
    APIs
      • Part of subcall function 00436B19: GetProcessHeap.KERNEL32(00000008,0000000C,00436C79), ref: 00436B1D
      • Part of subcall function 00436B19: HeapAlloc.KERNEL32(00000000), ref: 00436B24
    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002), ref: 00436C88
    • GetCurrentProcess.KERNEL32(?,00000000), ref: 00436C91
    • DuplicateHandle.KERNEL32(00000000,?,00000000), ref: 00436C9A
    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00000000), ref: 00436CA6
    • GetCurrentProcess.KERNEL32(?,00000000,?,00000000), ref: 00436CAF
    • DuplicateHandle.KERNEL32(00000000,?,00000000,?,00000000), ref: 00436CB2
    • CreateThread.KERNEL32(00000000,00000000,Function_00036C2B,00000000,00000000,00000000), ref: 00436CCA
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
    • String ID:
    • API String ID: 1957940570-0
    • Opcode ID: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
    • Instruction ID: 99b39fe8e7f3ac854e5c8e3994335d5d6f6ef2f737fc2b72a46a077924210789
    • Opcode Fuzzy Hash: 3f80535c3287afe012eec8eac85a3d96c91e040866ec74b6355b9bdb3dfb6838
    • Instruction Fuzzy Hash: A301E6753403047BD620EB65DC96F5B775CEB89B50F114819FA04DB1D1C6B5E8008B78
    APIs
    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,?,00000000), ref: 004105A5
    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,?,00000000), ref: 004105CE
    • ShowWindow.USER32(?,00000000), ref: 004105E4
    • ShowWindow.USER32(?,00000000), ref: 004105EE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$CreateShow
    • String ID: AutoIt v3$edit
    • API String ID: 1584632944-3779509399
    • Opcode ID: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
    • Instruction ID: 021b1916d714280a6beb379f8f8b29d81737bdb93309e58067b2166fb7f1837a
    • Opcode Fuzzy Hash: b28a7d78b19f48c216133de275d8b0452446851dd496b073adb1022152ad6d67
    • Instruction Fuzzy Hash: 29F01771BE43107BF6B0A764AC43F5A2698A758F65F31083BB700BB5D0E1E4B8408B9C
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 00413D20
      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
    • ___fls_getvalue@4.LIBCMT ref: 00413D2B
      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
    • ___fls_setvalue@8.LIBCMT ref: 00413D3E
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
    • ExitThread.KERNEL32 ref: 00413D4E
    • GetCurrentThreadId.KERNEL32 ref: 00413D54
    • __freefls@4.LIBCMT ref: 00413D74
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
    • String ID:
    • API String ID: 259663610-0
    • Opcode ID: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
    • Instruction ID: 675159a2c5a9d795bd3e19fa90b6febf5cd616b5876767659bafc4934cd781b8
    • Opcode Fuzzy Hash: a6f8f3d0a20f5c796c32073770e32d9df078d3112ed711158995b20890782f5b
    • Instruction Fuzzy Hash: 0DF0FF75504700AFC704BF72D9498CE7BB9AF48349720846EB80987222DA3DD9C2DBA9
    APIs
    • GetClientRect.USER32(?,?), ref: 004302E6
    • GetWindowRect.USER32(00000000,?), ref: 00430316
    • GetClientRect.USER32(?,?), ref: 00430364
    • GetSystemMetrics.USER32(0000000F), ref: 004303B1
    • GetWindowRect.USER32(?,?), ref: 004303C3
    • ScreenToClient.USER32(?,?), ref: 004303EC
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Rect$Client$Window$MetricsScreenSystem
    • String ID:
    • API String ID: 3220332590-0
    • Opcode ID: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
    • Instruction ID: e4235e81f7515d2978e088f6fadb01cec8eb5fe04dcc4a3bbd5a83ea815e8f28
    • Opcode Fuzzy Hash: b722cec4de1de3fe17d9867fbb91cd497d3f089f761d48fb585960e999a4a017
    • Instruction Fuzzy Hash: 13A14875A0070A9BCB10CFA8C594BEFB7B1FF58314F00961AE9A9E7350E734AA44CB54
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _malloc_wcslen$_strcat_wcscpy
    • String ID:
    • API String ID: 1612042205-0
    • Opcode ID: cff60bc2eb5d88776962a9065ec2abd3768e1b0cbbaf35bf9109d33c4ae81b56
    • Instruction ID: da8a40d04f443fc8bffa22af6bb0a7b3fb41b3e40a14b17b7fca75945af8e81c
    • Opcode Fuzzy Hash: cff60bc2eb5d88776962a9065ec2abd3768e1b0cbbaf35bf9109d33c4ae81b56
    • Instruction Fuzzy Hash: 40914A74604205EFCB10DF98D4C09A9BBA5FF48305B60C66AEC0A8B35AD738EE55CBD5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove_strncmp
    • String ID: >$U$\
    • API String ID: 2666721431-237099441
    • Opcode ID: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
    • Instruction ID: 902f5a6c35c0d49260658601fd29bdf8c292b60929ab84f6d376942388b5a00c
    • Opcode Fuzzy Hash: 22f22e1ac28dc69493aec85f3eea1e1d82883446f00fc80900d5fd24c0790888
    • Instruction Fuzzy Hash: 8DF1B170A00249CFEB14CFA9C8906AEFBF1FF89304F2485AED845A7341D779A946CB55
    APIs
    • GetKeyboardState.USER32(?), ref: 0044C570
    • SetKeyboardState.USER32(00000080), ref: 0044C594
    • PostMessageW.USER32(?,00000100,?,?), ref: 0044C5D5
    • PostMessageW.USER32(?,00000104,?,?), ref: 0044C60D
    • PostMessageW.USER32(?,00000102,?,00000001), ref: 0044C62F
    • SendInput.USER32(00000001,?,0000001C), ref: 0044C6C2
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$InputSend
    • String ID:
    • API String ID: 2221674350-0
    • Opcode ID: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
    • Instruction ID: 625ea0eb49cc588760ebb6bc0eb208289033378f73eea84c13a2ca11a8b118cf
    • Opcode Fuzzy Hash: 253f2b6e14f8b29283c151e9eff2603b50f4fedb3541a599f467ca45a100d6c4
    • Instruction Fuzzy Hash: D1514A725001187AEB109FA99C81BFFBB68AF9E311F44815BFD8496242C379D941CBA8
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcscpy$_wcscat
    • String ID:
    • API String ID: 2037614760-0
    • Opcode ID: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
    • Instruction ID: 99b1098f8f7a3a84d55f117cb3556dd5d93458401dda30520ad7f1c57b96c0d6
    • Opcode Fuzzy Hash: d8b18b1f5d4952a0fc5752811c1295952a1c4566f52136af492825f039622e45
    • Instruction Fuzzy Hash: 0741357190011466DB34EF5998C1BFF7368EFE6314F84455FFC4287212DB2DAA92C2A9
    APIs
    • GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
    • VariantCopy.OLEAUT32(?,?), ref: 00451BF8
    • VariantCopy.OLEAUT32(?,?), ref: 00451C0E
    • VariantCopy.OLEAUT32(?,?), ref: 00451C27
    • VariantClear.OLEAUT32(?), ref: 00451CA1
    • SysAllocString.OLEAUT32(00000000), ref: 00451CBA
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$Copy$AllocClearErrorLastString
    • String ID:
    • API String ID: 960795272-0
    • Opcode ID: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
    • Instruction ID: e234943060a9aef7ccdf580943a4f321f6ba3cfb1df2bc58669f78ff50eabc4c
    • Opcode Fuzzy Hash: 218b2f6110521206867dfa84a42cd28f2b67ec3390fd0729a790b06cd777bcc7
    • Instruction Fuzzy Hash: C751AE719042099FCB14DF65CC84BAAB7B4FF48300F14856EED05A7361DB79AE45CBA8
    APIs
    • BeginPaint.USER32(00000000,?), ref: 00447BDF
    • GetWindowRect.USER32(?,?), ref: 00447C5D
    • ScreenToClient.USER32(?,?), ref: 00447C7B
    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
    • EndPaint.USER32(?,?), ref: 00447D13
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Paint$BeginClientRectRectangleScreenViewportWindow
    • String ID:
    • API String ID: 4189319755-0
    • Opcode ID: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
    • Instruction ID: 4e3fb435071a661ad846631c1082d1486cc319c76cae6976ccfd06e2d512f03c
    • Opcode Fuzzy Hash: 0de1757924998e3fd5473b1ac31060e8ba53e31114793872216692834f921a18
    • Instruction Fuzzy Hash: DC417F706042019FE310DF14D8C4F7B7BA8EB86724F14466EF9A487391CB74A806CB69
    APIs
    • SendMessageW.USER32(?,00001024,00000000,00000000), ref: 0044908B
    • SendMessageW.USER32(?,00000409,00000000,?), ref: 0044909F
    • SendMessageW.USER32(?,0000111E,00000000,00000000), ref: 004490B3
    • InvalidateRect.USER32(?,00000000,00000001,?,0000111E,00000000,00000000,?,00000409,00000000,?), ref: 004490C9
    • GetWindowLongW.USER32(?,000000F0), ref: 004490D4
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004490E1
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$LongWindow$InvalidateRect
    • String ID:
    • API String ID: 1976402638-0
    • Opcode ID: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
    • Instruction ID: 8674d855734444f977eaeabaa32478bd653fbe911923e0a4a3d3eb28cec46bd0
    • Opcode Fuzzy Hash: 2001084b9f030ce18b996af9061ac6ceee4bb7592284355317d8a12df4a6bddd
    • Instruction Fuzzy Hash: 2531E135240104AFF724CF48DC89FBB77B9EB49320F10851AFA559B290CA79AD41DB69
    APIs
    • ShowWindow.USER32(?,00000000), ref: 00440A8A
    • EnableWindow.USER32(?,00000000), ref: 00440AAF
    • ShowWindow.USER32(?,00000000), ref: 00440B18
    • ShowWindow.USER32(?,00000004), ref: 00440B2B
    • EnableWindow.USER32(?,00000001), ref: 00440B50
    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00440B75
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$Show$Enable$MessageSend
    • String ID:
    • API String ID: 642888154-0
    • Opcode ID: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
    • Instruction ID: a5db896fb2ae06c85211a956f566d4ff66a2da6af11bfa2c2b637766cd700386
    • Opcode Fuzzy Hash: 7c24049b1d37fdb6142be8766dc22fb93f1068172a9e83c57f7795f596ff73c7
    • Instruction Fuzzy Hash: F4413C346003409FEB25CF24C588BA67BE1FF55304F1885AAEB599B3A1CB78A851CB58
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$Copy$ClearErrorLast
    • String ID: NULL Pointer assignment$Not an Object type
    • API String ID: 2487901850-572801152
    • Opcode ID: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
    • Instruction ID: 7224d39ad4dd36db717bb7decd6d6f3456075e50b8db1d036073f09e8ed5fad7
    • Opcode Fuzzy Hash: bb0f7491a1d8fcb1a9e92f7a9394b8a60bc93380917bfa262315a66d62baea93
    • Instruction Fuzzy Hash: 70C1AFB1A00209ABDF14DF98C881FEEB7B9EB44304F10C55EE909AB341D7799D85CBA5
    APIs
    • SendMessageW.USER32(?,000000F1,?,00000000), ref: 0044881F
    • EnableWindow.USER32(?,00000000), ref: 00448B5C
    • EnableWindow.USER32(?,00000001), ref: 00448B72
    • ShowWindow.USER32(?,00000000), ref: 00448BE8
    • ShowWindow.USER32(?,00000004), ref: 00448BF4
    • EnableWindow.USER32(?,00000001), ref: 00448C09
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$Enable$Show$MessageSend
    • String ID:
    • API String ID: 1871949834-0
    • Opcode ID: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
    • Instruction ID: ab733961f10eda6fa12bc0977b233c6b2b6736debfa9bed553c9f015fe8cd40e
    • Opcode Fuzzy Hash: 24295af7dc8a36502def6d29e9c9bc5dd9332af4054e76ab47d27171ed2ecc38
    • Instruction Fuzzy Hash: 6931B3B17443815BF7258E24CCC4BAFB7D0EB95345F08482EF58196291DBAC9845C75A
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
    • Instruction ID: c6101d665a98d140be62f029472ab7f8db1b0ce4c02a7c647e8453833b83309f
    • Opcode Fuzzy Hash: b4f5e70efc1acb4fe019c63046a51222323f6892fbde794835cc8a87d9f58231
    • Instruction Fuzzy Hash: 5F21B672204110ABEB108F699C85B6F7798EB49370F24463BF625C62E0DB74D8C1C76D
    APIs
    • ExtractIconExW.SHELL32(?,?,00000000,?,00000001), ref: 00471A45
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001,?,00000000,?,00000001), ref: 00471A86
    • SendMessageW.USER32(?,00001303,00000000,00000000), ref: 00471AA8
    • ImageList_ReplaceIcon.COMCTL32(?,?,?,?,00000000,?,00000001), ref: 00471ABF
    • SendMessageW.USER32 ref: 00471AE3
    • DestroyIcon.USER32(?), ref: 00471AF4
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Icon$ImageList_MessageSend$CreateDestroyExtractReplace
    • String ID:
    • API String ID: 3611059338-0
    • Opcode ID: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
    • Instruction ID: ff529b192773d28f9e5fe2f6f8d7a9043cb056f7fe4a3f7912da33dbd9270a4a
    • Opcode Fuzzy Hash: b0e439fc93c86aa425f752c0c26de9476ffc90f5fc0a1de8674fd8c7e7c0c220
    • Instruction Fuzzy Hash: FB21AB71600204AFEB10CF64DD85FAA73B5FF88700F10846EFA05AB290DBB4A9428B64
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: DestroyWindow$DeleteObject$IconMove
    • String ID:
    • API String ID: 1640429340-0
    • Opcode ID: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
    • Instruction ID: 1af524ae86da71fe4f89171a472fc693caa25f853ed14bd6ff7d4c509651bbe6
    • Opcode Fuzzy Hash: a9e5de2d3b90f467c30d036e219f0746eef0d56afd734d018f8f78b53e6c5f41
    • Instruction Fuzzy Hash: C6311874200A41DFC710DF24D9D8B3A77E9FB48712F0445AAE946CB262D778E848CB69
    APIs
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • _wcslen.LIBCMT ref: 004438CD
    • _wcslen.LIBCMT ref: 004438E6
    • _wcstok.LIBCMT ref: 004438F8
    • _wcslen.LIBCMT ref: 0044390C
    • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0044391A
    • _wcstok.LIBCMT ref: 00443931
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcslen$_wcstok$ExtentPoint32Text_wcscpy
    • String ID:
    • API String ID: 3632110297-0
    • Opcode ID: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
    • Instruction ID: d12b8bce329459066c03420e1b0c57cf331e6d1a2def9435cce8fb2ce1fb425a
    • Opcode Fuzzy Hash: 5ca99eab14a2200aefa90245e429ddeb3cf04e0f88646427c0d38f27a71423b2
    • Instruction Fuzzy Hash: 9621B072900305ABDB10AF559C82AAFB7F8FF48711F64482EF95993301E678EA5087A5
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Destroy$DeleteMenuObject$IconWindow
    • String ID:
    • API String ID: 752480666-0
    • Opcode ID: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
    • Instruction ID: 7b220c8407ffc283b2c26cc65a644285b0b18e1ed163c7e0472fb9f2b18bc557
    • Opcode Fuzzy Hash: 877022e28911037ff8e4029beee24c6714a8c165e8bca7c16b59b5f39fc2e0c5
    • Instruction Fuzzy Hash: B7215970600A01DFD714DF29D9E8B3A7BA9BF49312F04855AE8468B352C738EC89CB59
    APIs
    • GetCurrentProcess.KERNEL32(0000000A,?), ref: 00436EC9
    • OpenProcessToken.ADVAPI32(00000000), ref: 00436ED0
    • CreateEnvironmentBlock.USERENV(?,?,00000001), ref: 00436EE0
    • CloseHandle.KERNEL32(?), ref: 00436EED
    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 00436F23
    • DestroyEnvironmentBlock.USERENV(?), ref: 00436F36
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
    • String ID:
    • API String ID: 1413079979-0
    • Opcode ID: c9cc6947404163de0e4cba86d071e92e41844a234d0bab68a120be017310f46c
    • Instruction ID: dd31e3d5ef53dadf09d6f4902918c4fef8fb0ebcc20249036383472598af8dfc
    • Opcode Fuzzy Hash: c9cc6947404163de0e4cba86d071e92e41844a234d0bab68a120be017310f46c
    • Instruction Fuzzy Hash: 10214C7620020AABDB14CF69DD59EEB37ADEB8D310F15851AFD05A3250C775EC12CB64
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconImageList_
    • String ID:
    • API String ID: 3275902921-0
    • Opcode ID: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
    • Instruction ID: 11d86efc281b6c380d974b68bd8b9632be9d9c574e85584f431c859402bfc888
    • Opcode Fuzzy Hash: bee8e7950a17a017ef8c4c424090cfe506cbffc57fc41e64353b46a851298919
    • Instruction Fuzzy Hash: 9C217C70200A01DFC714DF39D998A6AB7E4BF49311F10862EE959C7392D778D845CB58
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconImageList_
    • String ID:
    • API String ID: 3275902921-0
    • Opcode ID: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
    • Instruction ID: f2615e71845bffb995fe2c2b9381f89f67980fa6d4eb7dd8f13843e5971e4781
    • Opcode Fuzzy Hash: ef392be253363c3276fd2682622d0856bd6baec92828374cdc4114f01cb4ab17
    • Instruction Fuzzy Hash: 54213D70200A01DFD710EF25D9D4A2B37E9BF49312F10896EE945CB352D739D845CB69
    APIs
    • Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
    • QueryPerformanceCounter.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331D4
    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331DE
    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331E6
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331F0
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: PerformanceQuery$CounterSleep$Frequency
    • String ID:
    • API String ID: 2833360925-0
    • Opcode ID: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
    • Instruction ID: f8c058edd9890a080c9b5d5c764251204f1987641da473bf5ecf7e3e358c806a
    • Opcode Fuzzy Hash: 454a0f1f7a5b9dabfe1a5840f9ecaff855ca9224c6d53cc9b14a46810094a05c
    • Instruction Fuzzy Hash: 1911B632D0011DABCF00DFD9EA489EEB778FF49722F1145AAED04A6204DB755A01CBA4
    APIs
    • SendMessageW.USER32 ref: 004555C7
    • SendMessageW.USER32(?,00001008,00000000,00000000), ref: 004555E2
    • DeleteObject.GDI32(?), ref: 00455736
    • DeleteObject.GDI32(?), ref: 00455744
    • DestroyIcon.USER32(?), ref: 00455752
    • DestroyWindow.USER32(?), ref: 00455760
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: DeleteDestroyMessageObjectSend$IconWindow
    • String ID:
    • API String ID: 3691411573-0
    • Opcode ID: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
    • Instruction ID: 7bbaf3a525edecc9c7f674a1bc178dbce74773f27e06def1294b58b6a87c9b54
    • Opcode Fuzzy Hash: a36765697229ff4e213bf7548d3c220621229afc2c11469716cb0ded27b8d901
    • Instruction Fuzzy Hash: 3D116071204601DBC710DF69EDC8A2A77A8FB58322F10466AFD10DB292D779D849CB68
    APIs
      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472A0
    • LineTo.GDI32(?,?,?), ref: 004472AC
    • MoveToEx.GDI32(?,?,?,00000000), ref: 004472BA
    • LineTo.GDI32(?,?,?), ref: 004472C6
    • EndPath.GDI32(?), ref: 004472D6
    • StrokePath.GDI32(?), ref: 004472E4
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ObjectPath$LineMoveSelect$BeginCreateDeleteStroke
    • String ID:
    • API String ID: 372113273-0
    • Opcode ID: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
    • Instruction ID: 9972a7b2ea06d4c5ad2b855a17b8a9a0d98d12ec42d2644493c4a69bc6448ed6
    • Opcode Fuzzy Hash: 31eeda2ce056db83d926a779f5beead5a54a2e657b8e2367e9d837ae160c277d
    • Instruction Fuzzy Hash: 7701BC76101214BBE3119B44ED8DFDF7B6CEF4A710F104259FA01A629187F42A02CBBD
    APIs
    • GetDC.USER32(00000000), ref: 0044CC6D
    • GetDeviceCaps.GDI32(00000000,00000058), ref: 0044CC78
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044CC84
    • ReleaseDC.USER32(00000000,00000000), ref: 0044CC90
    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCA8
    • MulDiv.KERNEL32(000009EC,?,?), ref: 0044CCB9
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CapsDevice$Release
    • String ID:
    • API String ID: 1035833867-0
    • Opcode ID: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
    • Instruction ID: 48d0fedbc9b5ed1f8cca1220e36c4d83aa6571d18a2c693a8c9b468b660f0fbb
    • Opcode Fuzzy Hash: 30463c625ccaefc53399fcb5a1d51c2b4aa5fdcbff3641f1d403fc7908ff7e54
    • Instruction Fuzzy Hash: 60015276240214BFFB009F95DD89F5A7BACFF54751F14802EFF089B240D6B098008BA4
    APIs
    • __getptd.LIBCMT ref: 0041708E
      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
    • __amsg_exit.LIBCMT ref: 004170AE
    • __lock.LIBCMT ref: 004170BE
    • InterlockedDecrement.KERNEL32(?), ref: 004170DB
    • _free.LIBCMT ref: 004170EE
    • InterlockedIncrement.KERNEL32(030C2CE0), ref: 00417106
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock_free
    • String ID:
    • API String ID: 3470314060-0
    • Opcode ID: 0ee54f674d42c8e19835d178a2d8f84e1f10baa1ba857576d2c295ded9b9a03e
    • Instruction ID: d92c7102fc6d098775a0f5363b9b5483e5b10d08a1c29475ed017091780ded1e
    • Opcode Fuzzy Hash: 0ee54f674d42c8e19835d178a2d8f84e1f10baa1ba857576d2c295ded9b9a03e
    • Instruction Fuzzy Hash: 3301AD32905711ABC721ABA698497DE7BB0AB04724F15416BF950A7381CB3CAAC1CFDD
    APIs
    • InterlockedExchange.KERNEL32(?,?), ref: 0044B655
    • EnterCriticalSection.KERNEL32(?), ref: 0044B666
    • TerminateThread.KERNEL32(?,000001F6), ref: 0044B674
    • WaitForSingleObject.KERNEL32(?,000003E8,?,000001F6), ref: 0044B682
      • Part of subcall function 00432614: CloseHandle.KERNEL32(00000000,00000000,?,0044B68E,00000000,?,000003E8,?,000001F6), ref: 00432622
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 0044B697
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B69E
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
    • String ID:
    • API String ID: 3495660284-0
    • Opcode ID: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
    • Instruction ID: c0d5b59c8b9084ef0a5212f46b36de0b3fb5a8468090cd03c061fc2099eb7203
    • Opcode Fuzzy Hash: 80b6dccbd1e5d9cd8e45b8a26e63ab1859993381d971fdb3943588aa16a91346
    • Instruction Fuzzy Hash: A8F0AF72141201BBD210AB64EE8CDAFB77CFF88311F40092AFA0192560CBB4E420CBB6
    APIs
    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00410AE8
    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00410AF0
    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00410AFB
    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00410B06
    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00410B0E
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00410B16
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Virtual
    • String ID:
    • API String ID: 4278518827-0
    • Opcode ID: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
    • Instruction ID: ec5b0e47a8727e2ef01e8325cfcf1e1c5a721ad9102a6d662b709b351e7b749c
    • Opcode Fuzzy Hash: c23d3b718cf4e8061cd741903dec6eccba5b4b0418601ad509713896de31bf0c
    • Instruction Fuzzy Hash: 79016770106B88ADD3309F668C84B47FFF8EF95704F01491DD1D507A52C6B5A84CCB69
    APIs
    • ___set_flsgetvalue.LIBCMT ref: 004151C0
      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
    • ___fls_getvalue@4.LIBCMT ref: 004151CB
      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
    • ___fls_setvalue@8.LIBCMT ref: 004151DD
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
    • ExitThread.KERNEL32 ref: 004151ED
    • __freefls@4.LIBCMT ref: 00415209
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4
    • String ID:
    • API String ID: 442100245-0
    • Opcode ID: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
    • Instruction ID: 28e435cdead01fd65333368df2891c86ea6a44e569ea48f613a140ff37384f5b
    • Opcode Fuzzy Hash: 3ee415d2c127bcf6c5e710345aa78d19554ad97a0662bc484850007a9fc41a8b
    • Instruction Fuzzy Hash: FEF01975544700AFC704BF76C54D9CE7BB99F94349720845EB80887222DA3CD8C2C669
    APIs
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • GetMenuItemInfoW.USER32(?,00000000), ref: 0045F85C
    • _wcslen.LIBCMT ref: 0045F94A
    • SetMenuItemInfoW.USER32(00000011,00000000,00000000,?), ref: 0045F9AE
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • SetMenuDefaultItem.USER32(00000000,000000FF,00000000,?,00000000), ref: 0045F9CA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ItemMenu$Info_wcslen$Default_malloc_wcscpy
    • String ID: 0
    • API String ID: 621800784-4108050209
    • Opcode ID: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
    • Instruction ID: 8916cda2fcff4f3da81aa675480f1736598f59ba0f795e6899437ff2d0190f01
    • Opcode Fuzzy Hash: a44a9b3346c6bb8aee0ad9873ab8e4bb0a101d6bd4856354047c9bdc96e9273a
    • Instruction Fuzzy Hash: E061EDB1604301AAD710EF69D885B6B77A4AF99315F04493FF98087292E7BCD84CC79B
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SetErrorMode.KERNEL32 ref: 004781CE
    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00478387
      • Part of subcall function 00433998: GetFileAttributesW.KERNEL32(?), ref: 0043399F
    • SetErrorMode.KERNEL32(?), ref: 00478270
    • SetErrorMode.KERNEL32(?), ref: 00478340
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$AttributesFile_memmove_wcslen
    • String ID: \VH
    • API String ID: 3884216118-234962358
    • Opcode ID: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
    • Instruction ID: 3f1cdca54a202f1bd1938e87a451cd9606667cca5306a7eaf6ab6c0a6d737147
    • Opcode Fuzzy Hash: 178592a45c440348c39a3b7bd59973aab5981f95bb0f1257baca06643fcd57b5
    • Instruction Fuzzy Hash: F9619F715043019BC310EF25C585A5BB7E0BFC8708F04896EFA996B392CB76ED45CB96
    APIs
    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00448539
    • IsMenu.USER32(?), ref: 0044854D
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0044859B
    • DrawMenuBar.USER32 ref: 004485AF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Menu$Item$DrawInfoInsert
    • String ID: 0
    • API String ID: 3076010158-4108050209
    • Opcode ID: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
    • Instruction ID: 7b58e0297b022ec9ba855d833b0382692745775969200e6848d17b537ef0d45f
    • Opcode Fuzzy Hash: 1799694fe08fa7a149e3e917ddeca428ef12783b8609c92dee7a023332204936
    • Instruction Fuzzy Hash: 1F417975A00209AFEB10DF55D884B9FB7B5FF59300F14852EE9059B390DB74A845CFA8
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00469D69
    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00469D7C
    • SendMessageW.USER32(?,00000189,00000000,00000000), ref: 00469DAC
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 1589278365-1403004172
    • Opcode ID: bfed425d001c9fa422ddebf872dbe37176c28e343ac168301da98a19cfb76962
    • Instruction ID: b025c67d46b61e1fa51b41144ded2117d8c1ab71acdc4e5cb50a5164a05e923b
    • Opcode Fuzzy Hash: bfed425d001c9fa422ddebf872dbe37176c28e343ac168301da98a19cfb76962
    • Instruction Fuzzy Hash: 8D31287160010477DB10BB69CC45BEF775C9F86324F10852FF918AB2D1DABC9E4583A6
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Handle
    • String ID: nul
    • API String ID: 2519475695-2873401336
    • Opcode ID: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
    • Instruction ID: 058e2060cb23de8d889deff533ab301820a4ae088d702658d54b05e79d5a48de
    • Opcode Fuzzy Hash: efdaae6ab43bf4356d88622121a7e42c7f624cc6de1d12637521731ec53ca4c5
    • Instruction Fuzzy Hash: 84319571500204ABEB20DF68DC46BEB77A8EF04721F104A4EFD50973D1E7B59A50CBA5
    APIs
    • GetStdHandle.KERNEL32(000000F6), ref: 0044337D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Handle
    • String ID: nul
    • API String ID: 2519475695-2873401336
    • Opcode ID: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
    • Instruction ID: 7fb8f1e98e57093f7bc771e71f756598ee5282d4f5ffeaa4ddc08f3ab3272662
    • Opcode Fuzzy Hash: 97b946d9a765a46b1e85699804a5cf49c651f34dfecb3a2317456e71fe30ed78
    • Instruction Fuzzy Hash: 05219331600204ABE720DF689C49FAB77A8EF55731F20474EFDA0972D0EBB59A50C795
    APIs
    • LoadStringW.USER32(?,00000065,?,0000007F), ref: 0042723B
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • _wcsncpy.LIBCMT ref: 00401C41
    • _wcscpy.LIBCMT ref: 00401C5D
    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00401C6F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: IconLoadNotifyShell_String_memmove_wcscpy_wcslen_wcsncpy
    • String ID: Line:
    • API String ID: 1874344091-1585850449
    • Opcode ID: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
    • Instruction ID: 22c0e507134e40740d6fd31dbafdd21c3b8ff828be9a92102ab360472f74cad7
    • Opcode Fuzzy Hash: 71d679a4a9352c46b300ee00bac0ebd609a16659c7848ecadc14a4878baa23f7
    • Instruction Fuzzy Hash: EB31A1715083459BD320EB61DC45BDA77E8BF85318F04093EF588931E1E7B8AA49C75E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID: SysAnimate32
    • API String ID: 0-1011021900
    • Opcode ID: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
    • Instruction ID: b1a10ecfd0a3fc3d2af2854cd73c9de1262d8b9fd4b2252518a975ef6c54cff1
    • Opcode Fuzzy Hash: 8caf53187f6e77aecacb49307b2e697766faa1bc511b1160dce697a174d3407c
    • Instruction Fuzzy Hash: 0D21C975600205ABFB149EA9EC81FAB73DCEB95324F20471BF711972C0D279EC518768
    APIs
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
      • Part of subcall function 0043646A: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
      • Part of subcall function 0043646A: GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
      • Part of subcall function 0043646A: GetCurrentThreadId.KERNEL32 ref: 004364A3
      • Part of subcall function 0043646A: AttachThreadInput.USER32(00000000), ref: 004364AA
    • GetFocus.USER32 ref: 0046157B
      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364C3
      • Part of subcall function 004364B5: GetParent.USER32(?), ref: 004364CF
    • GetClassNameW.USER32(?,?,00000100), ref: 004615C4
    • EnumChildWindows.USER32(?,Function_00045B98,?), ref: 004615EF
    • __swprintf.LIBCMT ref: 00461608
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Thread$Parent$AttachChildClassCurrentEnumFocusInputMessageNameProcessSendTimeoutWindowWindows__swprintf_memmove_wcslen
    • String ID: %s%d
    • API String ID: 2645982514-1110647743
    • Opcode ID: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
    • Instruction ID: 8eac61321038dbd32bfe14263504560db7c98c8fbeeeb2eb49a46d34c9d63f73
    • Opcode Fuzzy Hash: 964dbc2a73d3b51658c129c0940897b8911b785c40af9afe88b96a44e5c449bd
    • Instruction Fuzzy Hash: 272180756007096BD610AF69DC89FAF73A8FB88704F00841FF918A7241DAB8A9418B69
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
    • Instruction ID: b0f148a0463f8e77612455c4d0488571574065cadd758f34d18f988e9301810f
    • Opcode Fuzzy Hash: 0beeaaa579c9339ee211e6c40176bce708d39a94b7630d2852c1f2343b6e5e4f
    • Instruction Fuzzy Hash: 2A819F74600604BFEB24CF95C994FBB7B68EF59350F10804EF8959B341E6B8AC45CB6A
    APIs
    • GetCurrentProcessId.KERNEL32(?), ref: 0047584D
    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047585B
    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047587F
    • CloseHandle.KERNEL32(00000000), ref: 00475A4D
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Process$CloseCountersCurrentHandleOpen
    • String ID:
    • API String ID: 3488606520-0
    • Opcode ID: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
    • Instruction ID: 747e8e91012d04cc7bcfbda4f2b49d0ca9967bea8b965680eccea6cdbc9dea0c
    • Opcode Fuzzy Hash: 26153b84b5bd532cea053015d5cabd50dcff0e84e990c9f357f6b864eae744da
    • Instruction Fuzzy Hash: 82817170A047029FD310DF65C981B4BBBE1BF84704F10892EF6999B3D2DA75E944CB96
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0046B5B5
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ConnectRegistry_memmove_wcslen
    • String ID:
    • API String ID: 15295421-0
    • Opcode ID: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
    • Instruction ID: 481e56be03c4cee60d8ca92471cfa4b3875eab78bcfcbf7fb961631f720e0f99
    • Opcode Fuzzy Hash: d8d3d6a2cecaed762a510ed52f320a3b4f5546c74b9e94ec6e10ba7928b5d5b3
    • Instruction Fuzzy Hash: 7D515F71208301ABD304EF65C885E5BB7A8FF88704F10892EB54597291D774E945CBA6
    APIs
    • LoadLibraryW.KERNEL32(00000000,?,?,?), ref: 0046485D
    • GetProcAddress.KERNEL32(?,?), ref: 004648F7
    • GetProcAddress.KERNEL32(?,00000000), ref: 00464916
    • GetProcAddress.KERNEL32(?,?), ref: 0046495A
    • FreeLibrary.KERNEL32(?,?,?,?), ref: 0046497C
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressProc$Library$FreeLoad
    • String ID:
    • API String ID: 2449869053-0
    • Opcode ID: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
    • Instruction ID: 8919579e2c9fc9b2d94c4928dd3202a5bdd7863bc063e44bf2a6fba2f1eed130
    • Opcode Fuzzy Hash: 178b694003ef1c8c6ddf6c03964e3c93f4f33891ff2eeadba8088ba5e41252f8
    • Instruction Fuzzy Hash: 2351BF756002049FCB00EFA4C985A9EB7B4EF88304F14856EFD05AB392DB79ED45CB99
    APIs
    • GetCursorPos.USER32(?), ref: 004563A6
    • ScreenToClient.USER32(?,?), ref: 004563C3
    • GetAsyncKeyState.USER32(?), ref: 00456400
    • GetAsyncKeyState.USER32(?), ref: 00456410
    • GetWindowLongW.USER32(?,000000F0), ref: 00456466
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AsyncState$ClientCursorLongScreenWindow
    • String ID:
    • API String ID: 3539004672-0
    • Opcode ID: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
    • Instruction ID: 60090bce41a6de58f2ab96a8453d1e3558661e38fd0c916b19f374a884add038
    • Opcode Fuzzy Hash: 47775ca2c9d3ed855d965de7f9cc13cd0d0477b61ed95063c4b58fcc2d2fd159
    • Instruction Fuzzy Hash: 49414C74504204BBDB24CF65C884EEFBBB8EB46326F60464EFC6593281CB34A944CB68
    APIs
    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D438
    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D44D
    • Sleep.KERNEL32(0000000A), ref: 0047D455
    • InterlockedIncrement.KERNEL32(004A7F04), ref: 0047D460
    • InterlockedDecrement.KERNEL32(004A7F04), ref: 0047D56A
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Interlocked$DecrementIncrement$Sleep
    • String ID:
    • API String ID: 327565842-0
    • Opcode ID: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
    • Instruction ID: e00c67d4cb89bf1d5311357fb713975cbca1e0cfcee7190b0451066ade77f289
    • Opcode Fuzzy Hash: a05157aca8d30d558f467c32ec822d8ac937f36e77973d55cccdaa836f381863
    • Instruction Fuzzy Hash: CC412571A002055FEB10DF65CD84AEE7774EF45304B10852EF609A7351E738EE46CB99
    APIs
    • GetPrivateProfileSectionW.KERNEL32(00000000,?,?,00007FFF), ref: 0045C44F
    • GetPrivateProfileSectionW.KERNEL32(00000000,00000003,?,00000003), ref: 0045C477
    • WritePrivateProfileSectionW.KERNEL32(00000000,00000003,?), ref: 0045C4C3
    • WritePrivateProfileStringW.KERNEL32(00000000,?,00000000,00000000), ref: 0045C4E7
    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0045C4F6
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: PrivateProfile$SectionWrite$String
    • String ID:
    • API String ID: 2832842796-0
    • Opcode ID: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
    • Instruction ID: 1eb5009190fa999c36a74edd43b7bd9b51adbc8f8691a9c3f5840d50e9073e8b
    • Opcode Fuzzy Hash: 30ee6bb99ff74686aae1268d80be9655946e1dc94406621de855fc36ffcf476c
    • Instruction Fuzzy Hash: D1413075A00209BFDB10EFA1DC85FAAB7A8BF44305F10855EF9049B292DA79EE44CB54
    APIs
    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?), ref: 00441CA9
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00441CDD
    • RegCloseKey.ADVAPI32(?), ref: 00441CFE
    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00441D40
    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00441D6E
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Enum$CloseDeleteOpen
    • String ID:
    • API String ID: 2095303065-0
    • Opcode ID: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
    • Instruction ID: 7ca4c7ada97503ad9332fce322fe5d5fc03c2789ff93db080e75f28165cdf273
    • Opcode Fuzzy Hash: d2ce045a3c5b7a9f88abc7d1956311aab30076c6419bcb4202e5cbde6d6cad15
    • Instruction Fuzzy Hash: 69317CB2940108BAEB10DBD4DC85FFEB77CEB49304F04456EF605A7241D774AA858BA8
    APIs
    • GetWindowRect.USER32(?,?), ref: 00436A24
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: RectWindow
    • String ID:
    • API String ID: 861336768-0
    • Opcode ID: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
    • Instruction ID: 0a42da3bb0701689e96ef39581243ed39d97d4ba46bd7cd8c1f057aae640e0d3
    • Opcode Fuzzy Hash: d215e6d8dffd18d1ffc2da0b67cce38d66530bec6329dda4924901d83a0034d3
    • Instruction Fuzzy Hash: E531EA7160021EAFDB00DF68D988AAE77A5EB49324F11C62AFD24E7380D774EC11CB90
    APIs
    • SendMessageW.USER32 ref: 00449598
      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
    • SendMessageW.USER32(?,00001074,?,?), ref: 004495F8
    • _wcslen.LIBCMT ref: 0044960D
    • _wcslen.LIBCMT ref: 0044961A
    • SendMessageW.USER32(?,00001074,?,?), ref: 0044964E
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$_wcslen$_wcspbrk
    • String ID:
    • API String ID: 1856069659-0
    • Opcode ID: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
    • Instruction ID: 683be220b4a5e9d86ccbf412c3bd2f13dbb60120779f28b1c577ab6eeef24407
    • Opcode Fuzzy Hash: eb2345d78995945919f1fca8909d98cd083db74a4e9b61e28a7ea2bcab757230
    • Instruction Fuzzy Hash: 77318F71A00218ABEB20DF59DC80BDFB374FF94314F10466AFA0497280E7B59D958B94
    APIs
    • GetCursorPos.USER32(?), ref: 004478E2
    • TrackPopupMenuEx.USER32(00000000,00000000,?,?,?,00000000), ref: 004478FC
    • DefDlgProcW.USER32(?,0000007B,?,?), ref: 0044791D
    • GetCursorPos.USER32(00000000), ref: 0044796A
    • TrackPopupMenuEx.USER32(?,00000000,00000000,?,?,00000000), ref: 00447991
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CursorMenuPopupTrack$Proc
    • String ID:
    • API String ID: 1300944170-0
    • Opcode ID: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
    • Instruction ID: 8079d3ea29232e2d8a780d7c6517a0c600664366e77620ab1eef72d1e193e80f
    • Opcode Fuzzy Hash: 3a0c1b1e924032964aae082f89503a6e76aba0c647238f1368234d9f75c94910
    • Instruction Fuzzy Hash: EF31CF75600108AFE724CF59DC88FABB768EB89310F20455AF94587391C775AC53CBA8
    APIs
    • GetClientRect.USER32(?,?), ref: 004479CC
    • GetCursorPos.USER32(?), ref: 004479D7
    • ScreenToClient.USER32(?,?), ref: 004479F3
    • WindowFromPoint.USER32(?,?), ref: 00447A34
    • DefDlgProcW.USER32(?,00000020,?,?), ref: 00447AAD
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Client$CursorFromPointProcRectScreenWindow
    • String ID:
    • API String ID: 1822080540-0
    • Opcode ID: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
    • Instruction ID: a7e7621e8492875af53c289f1ad187460d50aec5ad556b3834d9a5cb4abdf121
    • Opcode Fuzzy Hash: 0f9a8e9b3e4e036e66763aee309a2391e7a5810cceb8633c4940fa55a949c157
    • Instruction Fuzzy Hash: B831A2741082029FE710DF69D884D7FB7A4FB89314F144A1EF850D7291D774E946CBA6
    APIs
    • GetWindowRect.USER32(?,?), ref: 00447C5D
    • ScreenToClient.USER32(?,?), ref: 00447C7B
    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00447C8E
    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00447CD5
    • EndPaint.USER32(?,?), ref: 00447D13
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ClientPaintRectRectangleScreenViewportWindow
    • String ID:
    • API String ID: 659298297-0
    • Opcode ID: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
    • Instruction ID: 3c0582d8bc81ba5dadaaf244cb1f1d3939805113443e317e1f98b5bdeebaec33
    • Opcode Fuzzy Hash: 9df24dda7700d3462e91b7be9c0077b8f1985bebde9900174ed076ebcab1caeb
    • Instruction Fuzzy Hash: C33161706043019FE310CF25D8C8F7B7BE8EB86724F144A6EF9A5872A1C774A845DB69
    APIs
    • EnableWindow.USER32(?,00000000), ref: 00448B5C
    • EnableWindow.USER32(?,00000001), ref: 00448B72
    • ShowWindow.USER32(?,00000000), ref: 00448BE8
    • ShowWindow.USER32(?,00000004), ref: 00448BF4
    • EnableWindow.USER32(?,00000001), ref: 00448C09
      • Part of subcall function 00440D98: SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00440DB8
      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440DFA
      • Part of subcall function 00440D98: GetWindowLongW.USER32(?,000000F0), ref: 00440E3A
      • Part of subcall function 00440D98: SendMessageW.USER32(030C1A00,000000F1,00000000,00000000), ref: 00440E6E
      • Part of subcall function 00440D98: SendMessageW.USER32(030C1A00,000000F1,00000001,00000000), ref: 00440E9A
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$EnableMessageSend$LongShow
    • String ID:
    • API String ID: 142311417-0
    • Opcode ID: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
    • Instruction ID: c941ec4e4e3d0536419715940b2668e48b64c275bb9f23e9dd6fd7b29375311a
    • Opcode Fuzzy Hash: 426854c6b9cbeb660193a9c091743316caa306963ba13d8f93245475b3a006f2
    • Instruction Fuzzy Hash: DE21F7B17443805BF7258E24CCC4BAFB7D0EF56345F08482EF98196391DBACA885C75A
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
    • Instruction ID: af34b986bc09d21a6a739d25b45c5a22770885c200d938a8bd6fc5fff5094107
    • Opcode Fuzzy Hash: cfa96c7b92ceffa4878489be5d10f88277f639196488ca8149908940c9a32487
    • Instruction Fuzzy Hash: 5921AE75200600DBC710EF29E9D496B77B9EF49362B00466EFE5197392DB34EC09CB69
    APIs
    • IsWindowVisible.USER32(?), ref: 00445879
    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00445893
    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004458CD
    • _wcslen.LIBCMT ref: 004458FB
    • CharUpperBuffW.USER32(00000000,00000000), ref: 00445905
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen
    • String ID:
    • API String ID: 3087257052-0
    • Opcode ID: c25f6043a71b3d1fc860815aa8e13a3df3e462daacd53f78b782aaf91a245a98
    • Instruction ID: ced771b0f23340e5f55e8fdbc4e1763ce6d97a07fd0b425722e47bce61cb145a
    • Opcode Fuzzy Hash: c25f6043a71b3d1fc860815aa8e13a3df3e462daacd53f78b782aaf91a245a98
    • Instruction Fuzzy Hash: F51136726009017BFB10AB25DC06F9FB78CAF65360F04403AF909D7241EB69ED5983A9
    APIs
    • IsWindow.USER32(00000000), ref: 00459F13
    • GetForegroundWindow.USER32 ref: 00459F2B
    • GetDC.USER32(00000000), ref: 00459F68
    • GetPixel.GDI32(00000000,?,00000003), ref: 00459F73
    • ReleaseDC.USER32(00000000,00000000), ref: 00459FAF
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$ForegroundPixelRelease
    • String ID:
    • API String ID: 4156661090-0
    • Opcode ID: 5afad29d2f6628ba852ec2f0e1202929834638e908bc6ef215a28b5977bea177
    • Instruction ID: 6b7338dff4dfdecd0952657b1ab2c92c8f9a91c38a36cf82f76c1914ab5c2144
    • Opcode Fuzzy Hash: 5afad29d2f6628ba852ec2f0e1202929834638e908bc6ef215a28b5977bea177
    • Instruction Fuzzy Hash: 22215076A00101ABD714EFA5CD89A5EF7A9FF88311F14856AED0997742DB74EC00CB94
    APIs
      • Part of subcall function 00465225: inet_addr.WSOCK32(?), ref: 00465249
    • socket.WSOCK32(00000002,00000001,00000006,00000000), ref: 004653FE
    • WSAGetLastError.WSOCK32(00000000), ref: 0046540D
    • connect.WSOCK32(00000000,?,00000010), ref: 00465446
    • WSAGetLastError.WSOCK32(00000000), ref: 0046546D
    • closesocket.WSOCK32(00000000,00000000), ref: 00465481
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorLast$closesocketconnectinet_addrsocket
    • String ID:
    • API String ID: 245547762-0
    • Opcode ID: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
    • Instruction ID: 0a95abeaf907522bb910ccff47ca5b8cdb65f95d12881c86cce1eb50970c9d0a
    • Opcode Fuzzy Hash: 4a364c3b246f50765ea579ebeb5236c2c367babb38bf5793ee33ccca847a6907
    • Instruction Fuzzy Hash: E921F032200510ABD310EF29DC49F6EB7E8EF44725F008A6FF844E72D1DBB4A8418B99
    APIs
    • DeleteObject.GDI32(00000000), ref: 004471D8
    • ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
    • SelectObject.GDI32(?,00000000), ref: 00447228
    • BeginPath.GDI32(?), ref: 0044723D
    • SelectObject.GDI32(?,00000000), ref: 00447266
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Object$Select$BeginCreateDeletePath
    • String ID:
    • API String ID: 2338827641-0
    • Opcode ID: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
    • Instruction ID: fd3aca4fc88a528095528039be3f852d236b7ebb9f74560e76bd8f11b15fbd2f
    • Opcode Fuzzy Hash: 2b4904aa023ab9776d85036867689c5727337e5a2013c968bceed19ab76b7b02
    • Instruction Fuzzy Hash: 92214F71905204AFEB10DF689D48A9E7FACFB16310F14466BF910D32A1DBB49C85CBAD
    APIs
    • Sleep.KERNEL32(00000000), ref: 00434598
    • QueryPerformanceCounter.KERNEL32(?), ref: 004345B5
    • Sleep.KERNEL32(00000000), ref: 004345D4
    • QueryPerformanceCounter.KERNEL32(?), ref: 004345DE
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CounterPerformanceQuerySleep
    • String ID:
    • API String ID: 2875609808-0
    • Opcode ID: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
    • Instruction ID: a92d15520113c221d818f77e193bed66bb4dcccdbbd961c90b57f37ba003579f
    • Opcode Fuzzy Hash: e7bcee6603ab5961272028a34fb999977f673cbbb9fa03059816f244ade9b228
    • Instruction Fuzzy Hash: 37118232D0011DA7CF00EF99DD49AEEBB78FF99721F00456AEE4473240DA3465618BE9
    APIs
    • GetDlgItem.USER32(?,000003E9), ref: 00460C17
    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00460C2E
    • MessageBeep.USER32(00000000), ref: 00460C46
    • KillTimer.USER32(?,0000040A), ref: 00460C68
    • EndDialog.USER32(?,00000001), ref: 00460C83
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: BeepDialogItemKillMessageTextTimerWindow
    • String ID:
    • API String ID: 3741023627-0
    • Opcode ID: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
    • Instruction ID: 069ac2582a8c3c153a507cef710a9e07e91c6f457c78871e3a9641c65eda6ae6
    • Opcode Fuzzy Hash: 1f18e2cfcdf944224a2d79a82bd846e8569cbd7b4094970ae8d1428a0e6a4617
    • Instruction Fuzzy Hash: AB01DD315403086BE7349B54EE8DBDB737CFB14705F00465FB645921C0E7F4A9948B95
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$Icon
    • String ID:
    • API String ID: 4023252218-0
    • Opcode ID: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
    • Instruction ID: b4c4dbb9b59ba1bd7f08d964dfa6937d7ad9fb038e30cf105cf785d591c64ca0
    • Opcode Fuzzy Hash: 3835efce57e2eefc6c6d584a426a71e2dd3a2f260109f85cc330253665e7d223
    • Instruction Fuzzy Hash: D5014870301A01DBDB10EF65E9D8A2B77A8BF48762F10462AFD04D7352D739D849CBA9
    APIs
    • SendMessageW.USER32(?,00001101,00000000,?), ref: 004555FC
    • DeleteObject.GDI32(?), ref: 00455736
    • DeleteObject.GDI32(?), ref: 00455744
    • DestroyIcon.USER32(?), ref: 00455752
    • DestroyWindow.USER32(?), ref: 00455760
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: DeleteDestroyObject$IconMessageSendWindow
    • String ID:
    • API String ID: 1489400265-0
    • Opcode ID: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
    • Instruction ID: 3262712e9a8127eed33bb9eb3d9864066e7dde5d47db0d590f2b6463dd6d37f9
    • Opcode Fuzzy Hash: 7dd20da83386a23a1814408c1199d2c33e99a8c26f67204b6fd348d50f61361a
    • Instruction Fuzzy Hash: 07017C74300601DBCB10EF25EEC8A2A73A8BF48712F004569FE019B286D778DC49CB68
    APIs
      • Part of subcall function 00430003: InvalidateRect.USER32(?,00000000,00000001), ref: 00430091
    • DestroyWindow.USER32(?), ref: 00455728
    • DeleteObject.GDI32(?), ref: 00455736
    • DeleteObject.GDI32(?), ref: 00455744
    • DestroyIcon.USER32(?), ref: 00455752
    • DestroyWindow.USER32(?), ref: 00455760
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Destroy$DeleteObjectWindow$IconInvalidateRect
    • String ID:
    • API String ID: 1042038666-0
    • Opcode ID: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
    • Instruction ID: 2016740d4609c4bbd0e5f1cf6dc7522ca00853e433b5032f7809eda0dc31aff9
    • Opcode Fuzzy Hash: 9df849479103f2de49514c9ec76f9cef1897402069f9b01ba3cc14c1fa4130bc
    • Instruction Fuzzy Hash: 3701F670200601DBCB10EF69E9D8A2B37ACAF49762B00466AFD01D7256D769DC498B69
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Path$ObjectStroke$DeleteFillSelect
    • String ID:
    • API String ID: 2625713937-0
    • Opcode ID: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
    • Instruction ID: 382768f54733291aaafbd4c53fc5fd67df7ff3e11fccf1fbf51b229105ba29ed
    • Opcode Fuzzy Hash: d1b587dd721dc2c7258c81d6469637db7768a45f5ba7f0175e0776e0e6e6c26f
    • Instruction Fuzzy Hash: B3F036751125109BD3519F28FD4875E3B68E747321F94423AEA15923F0CB785449CB6D
    APIs
    • __getptd.LIBCMT ref: 0041780F
      • Part of subcall function 00417A69: __getptd_noexit.LIBCMT ref: 00417A6C
      • Part of subcall function 00417A69: __amsg_exit.LIBCMT ref: 00417A79
    • __getptd.LIBCMT ref: 00417826
    • __amsg_exit.LIBCMT ref: 00417834
    • __lock.LIBCMT ref: 00417844
    • __updatetlocinfoEx_nolock.LIBCMT ref: 00417858
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$Ex_nolock__getptd_noexit__lock__updatetlocinfo
    • String ID:
    • API String ID: 938513278-0
    • Opcode ID: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
    • Instruction ID: 276dd8d19a6a3be70f37c916a71154ef36d62806621923b96dbf7b6e4fe89171
    • Opcode Fuzzy Hash: 82c9f3bbc84dc287df7640515fd49376d4ae64643407e313ceafc36016311655
    • Instruction Fuzzy Hash: 6DF09632A4C7009AD721BBA6940B7DD33B0AF10768F11415FF541572D2CB6C59C1CB9D
    APIs
      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
    • ___set_flsgetvalue.LIBCMT ref: 00413D20
      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
    • ___fls_getvalue@4.LIBCMT ref: 00413D2B
      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
    • ___fls_setvalue@8.LIBCMT ref: 00413D3E
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 00413D47
    • ExitThread.KERNEL32 ref: 00413D4E
    • GetCurrentThreadId.KERNEL32 ref: 00413D54
    • __freefls@4.LIBCMT ref: 00413D74
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Value$Thread$CurrentErrorExitLast___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
    • String ID:
    • API String ID: 2403457894-0
    • Opcode ID: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
    • Instruction ID: 99982f4671f9afe760f134679f3a1374bf557b67af872bc9692f731b59fefeca
    • Opcode Fuzzy Hash: 20cce849b0c51a5c00e20c35783146c720bf18a6b0a2527f17bda4bbe7e89b53
    • Instruction Fuzzy Hash: 1AE04F318443056B8F013BB39C1E8CF363C9E0434AB20082ABE1493112DA2C99C1C6BE
    APIs
      • Part of subcall function 004118F0: _doexit.LIBCMT ref: 004118FC
    • ___set_flsgetvalue.LIBCMT ref: 004151C0
      • Part of subcall function 004178AE: TlsGetValue.KERNEL32(?,00417A07,?,004115F6,?,00401BAC,?,?,?), ref: 004178B7
      • Part of subcall function 004178AE: TlsSetValue.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 004178D8
    • ___fls_getvalue@4.LIBCMT ref: 004151CB
      • Part of subcall function 0041788E: TlsGetValue.KERNEL32(?,?,00413D30,00000000), ref: 0041789C
    • ___fls_setvalue@8.LIBCMT ref: 004151DD
    • GetLastError.KERNEL32(00000000,?,00000000), ref: 004151E6
    • ExitThread.KERNEL32 ref: 004151ED
    • __freefls@4.LIBCMT ref: 00415209
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Value$ErrorExitLastThread___fls_getvalue@4___fls_setvalue@8___set_flsgetvalue__freefls@4_doexit
    • String ID:
    • API String ID: 4247068974-0
    • Opcode ID: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
    • Instruction ID: 3b3fb4cf1982b2ada2e5851f983e2cc6228237abb2dca353483d11accd99f00a
    • Opcode Fuzzy Hash: 3508d61e785490a8cfc18c63a66594c600054726567160c295e9e14b5a274e31
    • Instruction Fuzzy Hash: E5E0B631848705AECB013BB29D1E9DF3A799E54749B20082ABE1492122EE6C88D1C669
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID: )$U$\
    • API String ID: 0-3705770531
    • Opcode ID: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
    • Instruction ID: d0f1885598f34d5f764b4f2a5794ec4e3d7857f6dac93f6e146ba8491093b400
    • Opcode Fuzzy Hash: 028001eb2bff774db3903015b7fa80ce6d69291786b8857f67b928b721b55690
    • Instruction Fuzzy Hash: 83C1C074A00249CFEB24CF69C5806AEBBF2FF85304F2481ABD8569B351D739994ACF15
    APIs
      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
    • CoInitialize.OLE32(00000000), ref: 0046E505
    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
    • CoUninitialize.OLE32 ref: 0046E53D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_wcslen
    • String ID: .lnk
    • API String ID: 886957087-24824748
    • Opcode ID: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
    • Instruction ID: 2644725dabb75134900838bfbf7f9974cf5b6b8c274c659ea1b0544ab4b4cf98
    • Opcode Fuzzy Hash: 275befd32e5b5cb51e2fc879a9ecc6bbb724afd33f596a1e549e31a6ffdfd8c7
    • Instruction Fuzzy Hash: A6A1CB756042019FC700EF65C980E5BB7E9AFC8308F108A5EF9859B392DB35EC45CBA6
    Strings
    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 0046A75B
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmovestd::exception::exception$Exception@8Throw_malloc_wcslen
    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
    • API String ID: 708495834-557222456
    • Opcode ID: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
    • Instruction ID: 9c514e09f8cb76db8ae150367893d7536957bb5c5403f45e3580b17af89e858a
    • Opcode Fuzzy Hash: ad57006ec1c627c896323e780c1188bc9069f79cba7bd3d755793e69e2ee2a80
    • Instruction Fuzzy Hash: 7C917F711087009FC310EF65C88186BB7E8AF89314F148D2FF595672A2E778E919CB9B
    APIs
      • Part of subcall function 00434319: WriteProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043434A
    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004365EF
      • Part of subcall function 004342DD: ReadProcessMemory.KERNEL32(?,?,?,?,00000000), ref: 0043430E
      • Part of subcall function 004343AD: GetWindowThreadProcessId.USER32(?,?), ref: 004343E0
      • Part of subcall function 004343AD: OpenProcess.KERNEL32(00000438,00000000,?), ref: 004343F1
      • Part of subcall function 004343AD: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004), ref: 00434408
    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0043665F
    • SendMessageW.USER32(00000000,00001111,00000000,00000000), ref: 004366DF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
    • String ID: @
    • API String ID: 4150878124-2766056989
    • Opcode ID: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
    • Instruction ID: 60a9f40d71a87185ad744a771aacdfc79ad0a16393efc777ae91d2f205fac39b
    • Opcode Fuzzy Hash: 6104cbe5d4ae3c4c99a3306f76968d572a7f9f5d55716afa725ed0ba86ca2a2d
    • Instruction Fuzzy Hash: 0D51B972A00218ABCB10DFA5DD42FDEB778EFC9304F00459AFA05EB180D6B4BA45CB65
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \$^$h
    • API String ID: 4104443479-3224561352
    • Opcode ID: 3ad0d7372450da1a089cce05d5b76b63ad7fbddfe74fa277bcae2c6c581cef2a
    • Instruction ID: e23fcb8882e096e74594c4078241bb4ea8d91210f71a07bc2928ab6795bd9baf
    • Opcode Fuzzy Hash: 3ad0d7372450da1a089cce05d5b76b63ad7fbddfe74fa277bcae2c6c581cef2a
    • Instruction Fuzzy Hash: FA519370E002099FDF18CFA5C980AAEB7F2BF89304F28826AD405AB355D7795E45CB55
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \$]$h
    • API String ID: 4104443479-3262404753
    • Opcode ID: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
    • Instruction ID: f8aecd1968ad4f88b1990a67d2c0a139cd5c037738d7fdf96801fcbc28408ccb
    • Opcode Fuzzy Hash: 176a597a96dcd2a70b70cc410daef71b144e937b03d0c11d284d361abdce2453
    • Instruction Fuzzy Hash: 97518470E00209DFDF18CFA5C980AAEB7F2BF85304F29826AD405AB355D7385D45CB55
    APIs
    • ShellExecuteExW.SHELL32(0000003C), ref: 00457D67
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • CloseHandle.KERNEL32(?), ref: 00457E09
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CloseExecuteHandleShell_wcscpy_wcslen
    • String ID: <$@
    • API String ID: 2417854910-1426351568
    • Opcode ID: 514557f22d0f6e93a977befcff9d0e90bbfb1ee23c4dfd548d9af5fe2b3cdb46
    • Instruction ID: b88a15a70aa0ad5f6f29005b2a8070d35214d1ef645994392ec84fe4d9ca6df0
    • Opcode Fuzzy Hash: 514557f22d0f6e93a977befcff9d0e90bbfb1ee23c4dfd548d9af5fe2b3cdb46
    • Instruction Fuzzy Hash: C751D3719002089BDB10EFA1D985AAFB7B4EF44309F10446EED05AB352DB79ED49CB94
    APIs
    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0044A87A
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0044A8C9
    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0044A901
      • Part of subcall function 004422CB: GetLastError.KERNEL32 ref: 004422E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Http$ErrorInfoInternetLastOpenQueryRequestSend
    • String ID:
    • API String ID: 3705125965-3916222277
    • Opcode ID: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
    • Instruction ID: d28fa13b4dde737238ce5dcfaacd3c540a76458eeabd88e5a6b3f8614e5f537b
    • Opcode Fuzzy Hash: 0ee13e9a60eb6ba6c748d714ed0ce9e8e081c7518857538375ec5b6ad63af0be
    • Instruction Fuzzy Hash: DB310B76A802047AE720EF56DC42FDFB7A8EBD9710F00851FFA0097281D6B5550987AC
    APIs
    • GetMenuItemInfoW.USER32 ref: 0045FAC4
    • DeleteMenu.USER32(?,?,00000000), ref: 0045FB15
    • DeleteMenu.USER32(00000000,?,00000000), ref: 0045FB68
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Menu$Delete$InfoItem
    • String ID: 0
    • API String ID: 135850232-4108050209
    • Opcode ID: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
    • Instruction ID: 2caf7e1b7ae413ca61a5456c92b2eab9e90ede26a48057f627e29f4096114103
    • Opcode Fuzzy Hash: 44596b6c283006d3404d95c3e5e16104138b05286e513df4f299336d423ce3c8
    • Instruction Fuzzy Hash: CC41D2B1604201ABD710CF25CC45F17B7A9AF84315F148A2EFDA49B2C2D378E849CBA6
    APIs
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0045085F
    • GetWindowLongW.USER32(?,000000F0), ref: 0045087D
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0045088E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$Long
    • String ID: SysTreeView32
    • API String ID: 847901565-1698111956
    • Opcode ID: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
    • Instruction ID: 2f6c96d6d770cdd7f6b01965cae739f5ffbb06f7b8c4bfc7c6bf121f6b9a1f40
    • Opcode Fuzzy Hash: 6654344cdbbec2ecb5663208c63790126aca218b871aedcbee15bef271784643
    • Instruction Fuzzy Hash: 34418D75500205ABEB10DF29DC84FEB33A8FB49325F20471AF865972D1D778E895CBA8
    APIs
    • LoadLibraryA.KERNEL32(?), ref: 00434B10
    • GetProcAddress.KERNEL32(?,AU3_GetPluginDetails), ref: 00434B88
    • FreeLibrary.KERNEL32(?), ref: 00434B9F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Library$AddressFreeLoadProc
    • String ID: AU3_GetPluginDetails
    • API String ID: 145871493-4132174516
    • Opcode ID: f586b1f7d9e7c2531e2d8d22b6f03db77309e2df70eb2dd3a2418b3d6835b531
    • Instruction ID: fc8523f5daf935d660d2a9c884068eb8da3e2fc1adb06f3317e0194b47a185ca
    • Opcode Fuzzy Hash: f586b1f7d9e7c2531e2d8d22b6f03db77309e2df70eb2dd3a2418b3d6835b531
    • Instruction Fuzzy Hash: C24107B9600605EFC710DF59D8C0E9AF7A5FF89304B1082AAEA1A8B311D735FD52CB95
    APIs
    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00450DFD
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00450E16
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00450E3E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$Window
    • String ID: SysMonthCal32
    • API String ID: 2326795674-1439706946
    • Opcode ID: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
    • Instruction ID: 97bf4b40409f6c90460d1384a7672ac630dd7a2161d32aee0dcf483843136ede
    • Opcode Fuzzy Hash: aa3fdffd2c37c9d1283d502314bb1f920e47acbbfa02c8d10baeab348a12d0cc
    • Instruction Fuzzy Hash: A93195752002046BDB10DEA9DC85FEB73BDEB9C724F104619FA24A72C1D6B4FC558B64
    APIs
    • DestroyWindow.USER32(00000000), ref: 00450A2F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: DestroyWindow
    • String ID: msctls_updown32
    • API String ID: 3375834691-2298589950
    • Opcode ID: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
    • Instruction ID: fccd3fcc05e4e2aaf5990a1cc96ccc3c6d01ef6560d5fec67e6c7c3c5f699695
    • Opcode Fuzzy Hash: ede3ba3c4388c74c76a3cd747824982d62f6d25d37162a4df1ebcaa7ffb6df4e
    • Instruction Fuzzy Hash: 213182767402056FE710DF58EC81FAB3368FF99710F10411AFA009B282C7B5AC96C7A8
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: $<
    • API String ID: 4104443479-428540627
    • Opcode ID: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
    • Instruction ID: e8c4ca86f7ae52158d8313b00b6d431508e51e3fea12eaab667d4a9530e7d8b8
    • Opcode Fuzzy Hash: 6c7976b20de454da7fe1266d8cf8ce191b2ccd068f9cf911d6d19d23786630cd
    • Instruction Fuzzy Hash: A331EF30D04258DEFF25CFAAC9847EEBBB1AF11310F18419AD455A7382D7789E48CB25
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$DiskFreeSpace
    • String ID: \VH
    • API String ID: 1682464887-234962358
    • Opcode ID: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
    • Instruction ID: 72795a51c8fd7a71edb0939b11d44c3a5eb04741920228a3d2c34b8a4a3992bf
    • Opcode Fuzzy Hash: e9044521b94c7a2fd6e775d53faddef87f956e6addecf71534c1072a2e4d61eb
    • Instruction Fuzzy Hash: B5217171D002089FCB00EFA5D98499EBBB8FF48314F1184AAE805AB351D7349E05CB64
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D79D
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D812
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D85C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$DiskFreeSpace
    • String ID: \VH
    • API String ID: 1682464887-234962358
    • Opcode ID: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
    • Instruction ID: ae55674c87016058c86dc8d4ad6f5a536cd264dc70ae423c542bf2f5a0a67e7a
    • Opcode Fuzzy Hash: 02922531bbe1fdf38ecd1c48401d7894eac39f8171a3426d51aa67f0eafe79b3
    • Instruction Fuzzy Hash: C9316F75E002089FCB00EFA5D985A9DBBB4FF48314F1080AAE904AB351CB75EE05CB94
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D87B
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?,?), ref: 0045D8F0
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D93A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$DiskFreeSpace
    • String ID: \VH
    • API String ID: 1682464887-234962358
    • Opcode ID: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
    • Instruction ID: e5212c229d9c2069cdfe567d9572a18bb695f81ecf44ad0a977260396f8f3e20
    • Opcode Fuzzy Hash: 657bf3a7bf4e4b0879eb54f11f0d4a47d1274a72e537d3786cc0042974389a76
    • Instruction Fuzzy Hash: E6316D75E002089FCB00EFA5D984A9EBBB4FF48314F1084AAE904AB351CB35DE05CB94
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D37E
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D3F4
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D437
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume
    • String ID: \VH
    • API String ID: 2507767853-234962358
    • Opcode ID: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
    • Instruction ID: 9072e4f9bd6fffdf4d5f5b526d3ef1379cf95bcdbb04681c41660468616ecd75
    • Opcode Fuzzy Hash: 3e53e890434f9ea80ffb8b8b8863db28d9ef5c2317443d22617d365319ccab8e
    • Instruction Fuzzy Hash: E5213075A002099FC714EF95CD85EAEB7B8FF88300F1084AAE905A73A1D774EA45CB54
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D55C
    • GetVolumeInformationW.KERNEL32(?,?,000000FF,?,?,?,?,000000FF,?), ref: 0045D5D2
    • SetErrorMode.KERNEL32(?,00000001,00000000), ref: 0045D608
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume
    • String ID: \VH
    • API String ID: 2507767853-234962358
    • Opcode ID: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
    • Instruction ID: 5d1496e5fec29648c5677f840c6a5ff7f703137340fc9510fe584f3610dc7e3a
    • Opcode Fuzzy Hash: d1fa58eff2fbb7cc6c51b85e489fdb3630b63cb8eb333212ecdab13a3ad88969
    • Instruction Fuzzy Hash: 88218271A00209AFC714EF95C885EAEB7B4FF48300F0084AEF505A72A1D774E905CB58
    APIs
    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00450B3B
    • SendMessageW.USER32(00000000,00000406,00000000,00640000), ref: 00450B51
    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00450B5F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: msctls_trackbar32
    • API String ID: 3850602802-1010561917
    • Opcode ID: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
    • Instruction ID: cc80dcb7cd3031ad5716ab9229ca2671b5dcb2452333e47e40e099fef7a03d8b
    • Opcode Fuzzy Hash: b7bd052b599063d2228b5cfe26d5df8f76e43bb35df486dd72efd91b953fbf0c
    • Instruction Fuzzy Hash: 301196757403197BEB109EA8DC81FDB339CAB58B64F204216FA10A72C1D6B4FC5187A8
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • CLSIDFromString.OLE32(?,00000000), ref: 00435236
    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00435285
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 004352B4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ArrayDataSafe$AccessFromStringUnaccess_malloc
    • String ID: crts
    • API String ID: 943502515-3724388283
    • Opcode ID: 76b53f11df1b297ac8e01e380144ea637ce00521cfee33948bcff3e5c6b4c5c1
    • Instruction ID: ec3ec3aa447b477297a9cb7ebc6a7fbeb91602aa87849f29064a6671b92f781e
    • Opcode Fuzzy Hash: 76b53f11df1b297ac8e01e380144ea637ce00521cfee33948bcff3e5c6b4c5c1
    • Instruction Fuzzy Hash: EC213876600A009FC714CF8AE444D97FBE8EF98760714C46AEA49CB721D334E851CB94
    APIs
      • Part of subcall function 004426CD: _wcslen.LIBCMT ref: 004426F9
    • CoInitialize.OLE32(00000000), ref: 0046E505
    • CoCreateInstance.OLE32(00482A08,00000000,00000001,004828A8,?), ref: 0046E51E
    • CoUninitialize.OLE32 ref: 0046E53D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_wcslen
    • String ID: .lnk
    • API String ID: 886957087-24824748
    • Opcode ID: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
    • Instruction ID: 8523b4f55483354ee3aaa8e7e2ee5f8b04597d59409be9d2747526508be4cfd1
    • Opcode Fuzzy Hash: ca4e97b0deac3c583c427a3e57c18447ee07ba297a7231e98f3a70961bae8bd6
    • Instruction Fuzzy Hash: E72183312082009FD700EF55C985F4AB7F4AF88729F14866EF9589B2E1D7B4E804CB56
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 0045D2D2
    • SetVolumeLabelW.KERNEL32(?,00000000), ref: 0045D331
    • SetErrorMode.KERNEL32(?), ref: 0045D35C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorMode$LabelVolume
    • String ID: \VH
    • API String ID: 2006950084-234962358
    • Opcode ID: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
    • Instruction ID: 93ef07912bcba266d24f4400c0aa25f887f93b2782b8649f9ae8f5902fc9f078
    • Opcode Fuzzy Hash: 06ec5ceac71ab965c19bbe619e509a4f86e9865fc889b709aa917be6b1aab059
    • Instruction Fuzzy Hash: 10115175900105DFCB00EFA5D94499EBBB4FF48315B1084AAEC09AB352D774ED45CBA5
    APIs
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • GetMenuItemInfoW.USER32 ref: 00449727
    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00449751
    • DrawMenuBar.USER32 ref: 00449761
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Menu$InfoItem$Draw_malloc
    • String ID: 0
    • API String ID: 772068139-4108050209
    • Opcode ID: b17500183e70cec1536be144fcd2483edb44611556915e693b2a76687dd0afc4
    • Instruction ID: eb12e692e9d899ed3776fa10421b592e4983edb38958d2313c52402e3f8558b6
    • Opcode Fuzzy Hash: b17500183e70cec1536be144fcd2483edb44611556915e693b2a76687dd0afc4
    • Instruction Fuzzy Hash: 7711A3B1A10208AFEB10DF55DC49BAFB774EF85314F0041AEFA098B250DB759944DFA5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcslen$_wcscpy
    • String ID: 3, 3, 8, 1
    • API String ID: 3469035223-357260408
    • Opcode ID: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
    • Instruction ID: 583e1dd4926d5dc430cd1974fab242c37593855fc3f83b6d902887b8cb8118b3
    • Opcode Fuzzy Hash: 12b73319f7521ef091ea4856e2d9fc07411b991347f193140c1b9c5819a8a9d6
    • Instruction Fuzzy Hash: 44F06D61510655E2CB34A791AD917FF72546F44341F00947BD90ED2190F368CB85CF99
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312DE
    • GetProcAddress.KERNEL32(00000000,IcmpCloseHandle), ref: 004312F0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpCloseHandle
    • API String ID: 2574300362-3530519716
    • Opcode ID: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
    • Instruction ID: fe30dd6f995ef3e52e92cf139519288d45b371df6a06e7fbbc01cfddaae6e452
    • Opcode Fuzzy Hash: 21a2acdac0ba1e2d746e72dbff1012e7ad80fb0484e1fffebf05da08cb8a0c44
    • Instruction Fuzzy Hash: 89E01275500316DFDB105F66D80564B77DCDB14751F10482AFD45E2A51DBB8D48087E8
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 00431310
    • GetProcAddress.KERNEL32(00000000,IcmpCreateFile), ref: 00431322
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpCreateFile
    • API String ID: 2574300362-275556492
    • Opcode ID: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
    • Instruction ID: 95e0d00128142f820e0a83de5ed484af687323a382b0c693d148963e73e99334
    • Opcode Fuzzy Hash: c8e81b458e49d693ad0b98c25d1a2273645c6015ec642ff3830cff94addfde50
    • Instruction Fuzzy Hash: E3E0C270400306EFD7107FA5D81464A77E8DB08310F104C2AFC40A2650C7B8D48087A8
    APIs
    • LoadLibraryA.KERNEL32(ICMP.DLL), ref: 004312AC
    • GetProcAddress.KERNEL32(00000000,IcmpSendEcho), ref: 004312BE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: ICMP.DLL$IcmpSendEcho
    • API String ID: 2574300362-58917771
    • Opcode ID: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
    • Instruction ID: f6e067919a3be2c94262fb81e38fb1c28335358536499f04279aa6303c0198c7
    • Opcode Fuzzy Hash: 8463976e88658be12d547e53f001863c36b7eb8c5d8a0eb88088b9b0d7e59d79
    • Instruction Fuzzy Hash: ADE0C2B0400706DFC7105F65D80465B77D8DB04321F10482BFD80E2610C7B8E48087A8
    APIs
    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00430C91
    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00430CA3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: RegDeleteKeyExW$advapi32.dll
    • API String ID: 2574300362-4033151799
    • Opcode ID: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
    • Instruction ID: e1e112c22781e886f83f7ab60c8bc672304d94c0271b2a691c2b6ddb7eb549cd
    • Opcode Fuzzy Hash: d4a2309a593705586ca0189df29ebf11fe16cb5b9b4952fb03c76dd6ffec2ddb
    • Instruction Fuzzy Hash: 3FE0C2B0440315AFCB106F6AD95460B7BD89B14321F10583BF980E2600C7B8E88087B8
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430DD3
    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00430DE5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetSystemWow64DirectoryW$kernel32.dll
    • API String ID: 2574300362-1816364905
    • Opcode ID: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
    • Instruction ID: 24515a708fc6b3a38513646dac5635f6d90a943ae1c03eade4216686bbe3791e
    • Opcode Fuzzy Hash: 14bf9b0efbe06d93ad9dae09c2ad7cadeb51a6503e8f45336d859f06d84a08d6
    • Instruction Fuzzy Hash: 51E0127154070A9BD7105FA5E91878A77D8DB14751F10882AFD45E2650D7B8E480C7BC
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00430E8D
    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00430E9F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetModuleHandleExW$kernel32.dll
    • API String ID: 2574300362-199464113
    • Opcode ID: 264f8e721adbed0a0a4958d5ac8267ac8e19a3b8732fd2a865be9a36fa944cb5
    • Instruction ID: 757376e69a8637ab8385673bd519a3d20b1bca35ee4978b7889da1ae4d413b5b
    • Opcode Fuzzy Hash: 264f8e721adbed0a0a4958d5ac8267ac8e19a3b8732fd2a865be9a36fa944cb5
    • Instruction Fuzzy Hash: 4AE01271540706DFD7105F65D91964B77D8DF18762F104C2AFD85E2650D7B8E48087AC
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,0040E5C8), ref: 0040EF6B
    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0040EF7D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: IsWow64Process$kernel32.dll
    • API String ID: 2574300362-3024904723
    • Opcode ID: e434190cfc746d225dda0a282e539c1801c395cd0759adf62cd2f230f9054cea
    • Instruction ID: 8a5e235981a70bd178cc672d1476e78975e513144aeeb8d5c54acf6a3c23c6fb
    • Opcode Fuzzy Hash: e434190cfc746d225dda0a282e539c1801c395cd0759adf62cd2f230f9054cea
    • Instruction Fuzzy Hash: DCD0C9B4A00B03EAD7301F72DA1870A76E4AB10781F204C3EBC81E5290DBBCC0808B28
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
    • Instruction ID: c5df29d3d24fc858ebdc5227190e2e918b6fbc7f8fe9fd347d916346834f6d96
    • Opcode Fuzzy Hash: 6f77df26dc74fc40ac7bf47809af4b9178697b073442c11c01de5ef3306f6c16
    • Instruction Fuzzy Hash: 66E17F75600209AFCB04DF98C880EAEB7B9FF88714F10859AE909DB351D775EE45CBA0
    APIs
    • VariantInit.OLEAUT32(?), ref: 0047950F
    • SysAllocString.OLEAUT32(00000000), ref: 004795D8
    • VariantCopy.OLEAUT32(?,?), ref: 0047960F
    • VariantClear.OLEAUT32(?), ref: 00479650
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$AllocClearCopyInitString
    • String ID:
    • API String ID: 2808897238-0
    • Opcode ID: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
    • Instruction ID: 372c40b5ecffa4d340e825e49f449287305c7189bb1404562c27c74c4f1437f4
    • Opcode Fuzzy Hash: d4078b498bd58c38c4ff211c6799319bb2158b2b01decc8b4cd966ad5c1122ff
    • Instruction Fuzzy Hash: 8251C436600209A6C700FF3AD8815DAB764EF84315F50863FFD0897252DB78DA1997EA
    APIs
    • SendMessageW.USER32(00000000,0000110A,00000004,?), ref: 00469990
    • __itow.LIBCMT ref: 004699CD
      • Part of subcall function 00461C4A: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00461CC2
    • SendMessageW.USER32(00000000,0000110A,00000001,?), ref: 00469A3D
    • __itow.LIBCMT ref: 00469A97
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$__itow
    • String ID:
    • API String ID: 3379773720-0
    • Opcode ID: c3a956d33284f2c9f3f86cb058cc2767b53d45f45b0f3b019056d4494472ccb7
    • Instruction ID: c5a9f548720e127460bbd30f9c4a1142764b372a0404ca0a71d180b9b8c9b2b0
    • Opcode Fuzzy Hash: c3a956d33284f2c9f3f86cb058cc2767b53d45f45b0f3b019056d4494472ccb7
    • Instruction Fuzzy Hash: E8415671A002096BDB14EF95D981AEF77BC9F58314F00405EFA0567281E7789E46CBE9
    APIs
    • GetWindowRect.USER32(?,?), ref: 00449A4A
    • ScreenToClient.USER32(?,?), ref: 00449A80
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00449AEC
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$ClientMoveRectScreen
    • String ID:
    • API String ID: 3880355969-0
    • Opcode ID: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
    • Instruction ID: 772f2e9a8c44c8b90650fefa000f178a1b73e5e444e4323f54854131c67d2362
    • Opcode Fuzzy Hash: d0f348dd6b8999688d199205b3412f9258e7834e979bdc0e5f61431c3cd0f715
    • Instruction Fuzzy Hash: 5A517C70A00249AFEB14CF68D8C1AAB77B6FF58314F10822EF91597390D774AD90DB98
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
    • String ID:
    • API String ID: 2782032738-0
    • Opcode ID: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
    • Instruction ID: 72632960f292c6e9309c64fc9b7016af72cb639159fa0dd3c9cf05ee08d0b78d
    • Opcode Fuzzy Hash: b31e9d6d4fc57bcba7966bec51b765adca5e1eea9d7940e8138ef5a4af09ff03
    • Instruction Fuzzy Hash: CB41D531A00715ABDB248FA5C8486DFBBB5AFD0364F24856EF42597680D778DDC1CB48
    APIs
    • ClientToScreen.USER32(00000000,?), ref: 0044169A
    • GetWindowRect.USER32(?,?), ref: 00441722
    • PtInRect.USER32(?,?,?), ref: 00441734
    • MessageBeep.USER32(00000000), ref: 004417AD
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Rect$BeepClientMessageScreenWindow
    • String ID:
    • API String ID: 1352109105-0
    • Opcode ID: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
    • Instruction ID: 3e4d0a9d31bb6386801ef6381a7f0d6bf168684d8964ff5a195b0ca439f55e04
    • Opcode Fuzzy Hash: efc75fb8ed246b6ad65f2e8b456486d9870e0f063911f7aa846460c85c9d1d50
    • Instruction Fuzzy Hash: 5141A539A002049FE714DF54D884E6AB7B5FF95721F1482AED9158B360DB34AC81CB94
    APIs
    • CreateHardLinkW.KERNEL32(00000000,?,00000000,?,00000000), ref: 0045D248
    • GetLastError.KERNEL32(?,00000000), ref: 0045D26C
    • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 0045D28C
    • CreateHardLinkW.KERNEL32(00000000,?,00000000,00000000,00000000,?,00000000), ref: 0045D2AA
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CreateHardLink$DeleteErrorFileLast
    • String ID:
    • API String ID: 3321077145-0
    • Opcode ID: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
    • Instruction ID: 6818256dd78c2cb29ac0ce267de24fb792dca3a41353b59757f5ace631f71379
    • Opcode Fuzzy Hash: 49223ed515fb619a5bee3fab41eec0f0b951464039ac7af7222e30fa4423140a
    • Instruction Fuzzy Hash: DC318DB1A00201EBDB10EFB5C945A1ABBE8AF45319F10885EFC44AB343CB79ED45CB94
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00420873
    • __isleadbyte_l.LIBCMT ref: 004208A6
    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,000001AC,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 004208D7
    • MultiByteToWideChar.KERNEL32(BBDAE900,00000009,?,00000001,00000000,00000000,?,?,?,0042D7C1,?,00000000), ref: 00420945
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
    • String ID:
    • API String ID: 3058430110-0
    • Opcode ID: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
    • Instruction ID: f6550d230e50e909e13d2a99824cc28569674f7a7b9e5ef0daa2e7ce22e82e6e
    • Opcode Fuzzy Hash: 6122c04dd5dc57efc0e5b6c0779ec963bae9ccf891294cd495d8fd5d7cdcec1f
    • Instruction Fuzzy Hash: D731E231B00265EFDB20EF65E884AAF3BE5BF00310F55496AE4658B292D734CD80DB98
    APIs
    • GetParent.USER32(?), ref: 004503C8
    • DefDlgProcW.USER32(?,00000138,?,?), ref: 00450417
    • DefDlgProcW.USER32(?,00000133,?,?), ref: 00450466
    • DefDlgProcW.USER32(?,00000134,?,?), ref: 00450497
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Proc$Parent
    • String ID:
    • API String ID: 2351499541-0
    • Opcode ID: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
    • Instruction ID: 48835c6935d03606f494e5d0f95072c3389227be5880c4b08380f2331de9f088
    • Opcode Fuzzy Hash: 953005dfd523491bc8661b2d189c1fe3a1d27544861a9947cd3b684206b02ae0
    • Instruction Fuzzy Hash: F231B73A2001046BD720CF18DC94DAB7719EF97335B14461BFA298B3D3CB759856C769
    APIs
      • Part of subcall function 004367CF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004367E1
      • Part of subcall function 00402160: _wcslen.LIBCMT ref: 0040216D
      • Part of subcall function 00402160: _memmove.LIBCMT ref: 00402193
    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00461F92
    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00461FC1
    • __itow.LIBCMT ref: 00461FD2
    • __itow.LIBCMT ref: 00462016
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$__itow$_memmove_wcslen
    • String ID:
    • API String ID: 3055246884-0
    • Opcode ID: 680069b6984fce1f78b4a73a7cc87c87b9b9bd06752f3eaec9f9348e36ef7987
    • Instruction ID: 2d6fee67be8c1f37eead957347fb4951583f5dfa804ed1177570fd3be5bc4abd
    • Opcode Fuzzy Hash: 680069b6984fce1f78b4a73a7cc87c87b9b9bd06752f3eaec9f9348e36ef7987
    • Instruction Fuzzy Hash: 2F2127327003096BDB20EE69DD85EAF3768EB88714F00456BFD14AB241D679DC4587A9
    APIs
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442AC9
    • TranslateMessage.USER32(?), ref: 00442B01
    • DispatchMessageW.USER32(?), ref: 00442B0B
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00442B21
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Message$Peek$DispatchTranslate
    • String ID:
    • API String ID: 1795658109-0
    • Opcode ID: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
    • Instruction ID: 5e5183f3b0572ad37d893cec5a7cf9421d6c1ddc4b80b1975d6d8daaa3c1acd1
    • Opcode Fuzzy Hash: 36eab9d42bd73f6f728abf92f57c3db94032fb3fd80da71d70c6aa8f6f72699a
    • Instruction Fuzzy Hash: 012126719583469AFB30DF649D85FB7BBA8CB24314F40407BF91097281EAB86848C769
    APIs
    • GetForegroundWindow.USER32(?,?,?), ref: 0047439C
      • Part of subcall function 004439C1: GetWindowThreadProcessId.USER32(?,00000000), ref: 004439E4
      • Part of subcall function 004439C1: GetCurrentThreadId.KERNEL32 ref: 004439EB
      • Part of subcall function 004439C1: AttachThreadInput.USER32(00000000), ref: 004439F2
    • GetCaretPos.USER32(?), ref: 004743B2
    • ClientToScreen.USER32(00000000,?), ref: 004743E8
    • GetForegroundWindow.USER32 ref: 004743EE
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
    • String ID:
    • API String ID: 2759813231-0
    • Opcode ID: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
    • Instruction ID: 29594bdffde582d62cf8cb535202cb0f6e37f5c0e74140e0e8dac686a3932322
    • Opcode Fuzzy Hash: f13b499454a1a1822ca13fc8ae6b328d463f7326d10c65fcbffa9176c03fd335
    • Instruction Fuzzy Hash: 2F21AC71A00305ABD710EF75CC86B9E77B9AF44708F14446EF644BB2C2DBF9A9408BA5
    APIs
      • Part of subcall function 00430626: _wcspbrk.LIBCMT ref: 00430636
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00449477
    • SendMessageW.USER32(?,00001060,00000000,00000004), ref: 00449507
    • _wcslen.LIBCMT ref: 00449519
    • _wcslen.LIBCMT ref: 00449526
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend_wcslen$_wcspbrk
    • String ID:
    • API String ID: 2886238975-0
    • Opcode ID: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
    • Instruction ID: 7d4d19c59aaf55394df3596c947b25f6969e765268ec3300c5285dc4bbf20b28
    • Opcode Fuzzy Hash: cda1f7e16000b3d6f1552df2769fac91363fb93f1f54a3f578086acf89ecf69d
    • Instruction Fuzzy Hash: F7213A76B00208A6E730DF55ED81BEFB368EBA0310F10416FFF0896240E6794D55C799
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __setmode$DebugOutputString_fprintf
    • String ID:
    • API String ID: 1792727568-0
    • Opcode ID: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
    • Instruction ID: 94d91137fd77379d51e6296772f15362c7f2cf1f8b16651245aa9cc134f84072
    • Opcode Fuzzy Hash: 1ad8d8d19ebad69fc12c553a92627abd23c9aa4f6f7f42f57f8396caf8494ece
    • Instruction Fuzzy Hash: 5411A1B2D0020477DB107BB69C469AF7B2C8B55728F04416EF91573243E97C6A4947AB
    APIs
      • Part of subcall function 0046F3C1: IsWindow.USER32(00000000), ref: 0046F3F1
    • GetWindowLongW.USER32(?,000000EC), ref: 0047A2DF
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A2FA
    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 0047A312
    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002,?,000000EC,00000000,?,000000EC,?,00000001), ref: 0047A321
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$Long$AttributesLayered
    • String ID:
    • API String ID: 2169480361-0
    • Opcode ID: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
    • Instruction ID: 4b457c036b32d13d4d6aa44b7b333d7b15c6210fa1ac615a770d46c951a2b689
    • Opcode Fuzzy Hash: 53dc7990cfeb01f65bcc542d15cac6368a2c86d5c8ae23ecc65d9f578e391a7a
    • Instruction Fuzzy Hash: E321C3322045146BD310AB19EC45F9BB798EF81334F20862BF859E72D1C779A855C7AC
    APIs
      • Part of subcall function 00434C09: lstrlenW.KERNEL32(?), ref: 00434C1C
      • Part of subcall function 00434C09: lstrcpyW.KERNEL32(00000000,?), ref: 00434C44
      • Part of subcall function 00434C09: lstrcmpiW.KERNEL32(00000000,00000000), ref: 00434C78
    • lstrlenW.KERNEL32(?), ref: 00434CF6
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • lstrcpyW.KERNEL32(00000000,?), ref: 00434D1E
    • lstrcmpiW.KERNEL32(00000002,cdecl), ref: 00434D64
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: lstrcmpilstrcpylstrlen$_malloc
    • String ID: cdecl
    • API String ID: 3850814276-3896280584
    • Opcode ID: 818b11212cfde82049dda77138f98929de94c0963b7dd4b784d4e9916be89644
    • Instruction ID: b4b7f9d7485e9dcc41445171e378d0673d7e4b3d8a31a27b28546bfa00bfc119
    • Opcode Fuzzy Hash: 818b11212cfde82049dda77138f98929de94c0963b7dd4b784d4e9916be89644
    • Instruction Fuzzy Hash: 1521D276200301ABD710AF25DC45AEBB3A9FF99354F10583FF90687250EB39E945C7A9
    APIs
      • Part of subcall function 0045F645: WideCharToMultiByte.KERNEL32(00000000,00000000,5004C483,D29EE858,00000000,00000000,00000000,00000000,?,?,?,00467B75,?,00473BB8,00473BB8,?), ref: 0045F661
    • gethostbyname.WSOCK32(?,00000000,?,?), ref: 0046D42D
    • WSAGetLastError.WSOCK32(00000000), ref: 0046D439
    • _memmove.LIBCMT ref: 0046D475
    • inet_ntoa.WSOCK32(?), ref: 0046D481
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ByteCharErrorLastMultiWide_memmovegethostbynameinet_ntoa
    • String ID:
    • API String ID: 2502553879-0
    • Opcode ID: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
    • Instruction ID: 24c3f219ec43f49587972b4c28f02db1d16d05b11a5808876a7c02c26e676da9
    • Opcode Fuzzy Hash: c217391507a75a633327f3eae623a7fb2dd57c89b178c2547ebfa016f7fa05d4
    • Instruction Fuzzy Hash: A7216F769001046BC700FBA6DD85C9FB7BCEF48318B10486BFC01B7241DA39EE058BA5
    APIs
    • SendMessageW.USER32 ref: 00448C69
    • GetWindowLongW.USER32(?,000000EC), ref: 00448C91
    • SendMessageW.USER32(?,0000104C,00000000,?), ref: 00448CCA
    • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00448D13
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend$LongWindow
    • String ID:
    • API String ID: 312131281-0
    • Opcode ID: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
    • Instruction ID: 9d65767971b32091eca868ce8e4b461936feaca2c152e776436a997c982fc1ac
    • Opcode Fuzzy Hash: aa9ba785652a5e2d68973233cc9ee5be9ec2ae113b50a66827928a68bf1dc890
    • Instruction Fuzzy Hash: 782186711193009BE3209F18DD88B9FB7E4FBD5325F140B1EF994962D0DBB58448C755
    APIs
    • select.WSOCK32(00000000,?,00000000,00000000,?), ref: 00458ABD
    • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00458ACF
    • accept.WSOCK32(00000000,00000000,00000000), ref: 00458ADE
    • WSAGetLastError.WSOCK32(00000000), ref: 00458B03
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorLastacceptselect
    • String ID:
    • API String ID: 385091864-0
    • Opcode ID: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
    • Instruction ID: 6dce411450cb473f00463c700f03c36a20fe0f69cdcaeecb298670ce0bdbd9a3
    • Opcode Fuzzy Hash: feb2d603c895e760471213290e220df4c8c9e23c071c6cdae6f1f3a6ceb811dc
    • Instruction Fuzzy Hash: 032192716002049FD714EF69DD45BAAB7E8EB94310F10866EF988DB380DBB4A9808B94
    APIs
    • SendMessageW.USER32(?,000000B0,?,?), ref: 004368C2
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368D5
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004368EC
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00436904
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
    • Instruction ID: 15055718653181d31d708d6839b45d2b231db9ad4f5f2f8f789da6f3b04ac486
    • Opcode Fuzzy Hash: 236e71af2ab5509716104e28957e7b962cfbcf4ba6a1ba9531cfd5eb7baefe48
    • Instruction Fuzzy Hash: A7111275640208BFDB10DF68DC85F9AB7E8EF98750F11815AFD48DB340D6B1A9418FA0
    APIs
    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00430242
    • GetStockObject.GDI32(00000011), ref: 00430258
    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00430262
    • ShowWindow.USER32(00000000,00000000), ref: 0043027D
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Window$CreateMessageObjectSendShowStock
    • String ID:
    • API String ID: 1358664141-0
    • Opcode ID: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
    • Instruction ID: 87b955557270564ac2446a75def7de819d41fbc8528d619d8765837e6f615a12
    • Opcode Fuzzy Hash: ad6f98361a8c00dabf9f53bae98ff29a7c8ddeda354316ac2ad0817ad8c48d31
    • Instruction Fuzzy Hash: BD115172600504ABD755CF99DC59FDBB769AF8DB10F148319BA08932A0D774EC41CBA8
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00443CA6
    • MessageBoxW.USER32(?,?,?,?), ref: 00443CDC
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00443CF2
    • CloseHandle.KERNEL32(00000000), ref: 00443CF9
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
    • String ID:
    • API String ID: 2880819207-0
    • Opcode ID: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
    • Instruction ID: e6f874550e00e623fb34483f391c95d80eb5f5bc6ce026338450b862d26ff76c
    • Opcode Fuzzy Hash: 229c650092e78496607f1920186e21dd31435e443465a7f1ce6d350790d3a3c2
    • Instruction Fuzzy Hash: 48112572804114ABD710CF68ED08ADF3FACDF99721F10026AFC0493381D6B09A1083E9
    APIs
    • GetWindowRect.USER32(?,?), ref: 00430BA2
    • ScreenToClient.USER32(?,?), ref: 00430BC1
    • ScreenToClient.USER32(?,?), ref: 00430BE2
    • InvalidateRect.USER32(?,?,?,?,?), ref: 00430BFB
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ClientRectScreen$InvalidateWindow
    • String ID:
    • API String ID: 357397906-0
    • Opcode ID: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
    • Instruction ID: ace0395ef2957b48f9d17fb026497d1a369c9e3160b5fb36bd9a4683c33ce433
    • Opcode Fuzzy Hash: ae0d0d06dcef6ed583fb9704f0ef5e529f18a40629d10526419e4a4e3dd97404
    • Instruction Fuzzy Hash: 561174B9D00209AFCB14DF98C8849AEFBB9FF98310F10855EE855A3304D774AA41CFA0
    APIs
    • __wsplitpath.LIBCMT ref: 0043392E
      • Part of subcall function 00413A0E: __wsplitpath_helper.LIBCMT ref: 00413A50
    • __wsplitpath.LIBCMT ref: 00433950
    • __wcsicoll.LIBCMT ref: 00433974
    • __wcsicoll.LIBCMT ref: 0043398A
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __wcsicoll__wsplitpath$__wsplitpath_helper
    • String ID:
    • API String ID: 1187119602-0
    • Opcode ID: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
    • Instruction ID: cee1712abd0eced5cc96ea34974ed2185298bb9760f8079e64959bf12be8e646
    • Opcode Fuzzy Hash: 68e3b32a9464b28f7030a0941ccdc911afb24839bc46986435f1213a6174ca5b
    • Instruction Fuzzy Hash: 650121B2C0011DAACB14DF95DC41DEEB37CAB48314F04869EA60956040EA759BD88FE4
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
    • Instruction ID: fa6d01852bb983edeafff486d0019367465e9530caf48e469f9bea5953271079
    • Opcode Fuzzy Hash: 4bdea013960d862e58fdc3211a87ed6cb7384f6b6b2695c697ae8ee222476223
    • Instruction Fuzzy Hash: FE11727250005DFBCF125E85EC41CEE3F22BB28394B9A8416FE1858131C73AC9B1AB85
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _wcslen$_malloc_wcscat_wcscpy
    • String ID:
    • API String ID: 1597257046-0
    • Opcode ID: e84782c9ce3e64a79064aa2773422545b6e0e3fd375b973334bdb2b18397f17e
    • Instruction ID: 3a313011a65081929a098f39c1c59cfda42f2cbb237f2651e2b7e76e77134880
    • Opcode Fuzzy Hash: e84782c9ce3e64a79064aa2773422545b6e0e3fd375b973334bdb2b18397f17e
    • Instruction Fuzzy Hash: 40016271200604BFC714EB66D885EABF3EDEFC9354B00852EFA168B651DB39E841C764
    APIs
    • GetEnvironmentStringsW.KERNEL32(00000000,00416513), ref: 0041F587
    • __malloc_crt.LIBCMT ref: 0041F5B6
    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0041F5C3
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: EnvironmentStrings$Free__malloc_crt
    • String ID:
    • API String ID: 237123855-0
    • Opcode ID: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
    • Instruction ID: d6a98a4ee5591e13f27bf8bfb2f7094eea62761642478a01f8f101a8eeefaa10
    • Opcode Fuzzy Hash: 07fe547740a9b68c76983245d8bba65816afc234b1fe2171e551a8e4c438482c
    • Instruction Fuzzy Hash: D1F08277505220BB8A25BF35BC458DB277ADAD536531A443BF407C3206F66C8ECB82B9
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: DeleteDestroyObject$IconWindow
    • String ID:
    • API String ID: 3349847261-0
    • Opcode ID: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
    • Instruction ID: b40ecd1d224a0eee13877c21127d2214a34fa415f2bf64fab3c1d23e87691ec4
    • Opcode Fuzzy Hash: 7c154be5abaa40db753a7e31a7690d619ba9064fd0fbdb090dba25900d6c1ce3
    • Instruction Fuzzy Hash: 60F03C74200601DBC720EF66EDD892B77ACEF49762B00452AFD01D7256D738DC49CB69
    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 0044B5F5
    • InterlockedExchange.KERNEL32(?,?), ref: 0044B603
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B61A
    • LeaveCriticalSection.KERNEL32(?), ref: 0044B62C
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CriticalSection$Leave$EnterExchangeInterlocked
    • String ID:
    • API String ID: 2223660684-0
    • Opcode ID: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
    • Instruction ID: 403f3527bf09fa8cde02bf077099102ce48e3ba47acdf7e4c6f4aa39df9fcef1
    • Opcode Fuzzy Hash: f874c154f8023f3ba0c2945d1949571bb5db8163ed48ea6956c7f1527a392a8b
    • Instruction Fuzzy Hash: 78F05E36241104AF96145F59FD488EBB3ACEBE96317005A3FE5418361087A6E845CBB5
    APIs
      • Part of subcall function 0044719B: DeleteObject.GDI32(00000000), ref: 004471D8
      • Part of subcall function 0044719B: ExtCreatePen.GDI32(?,?,?,00000000,00000000), ref: 00447218
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447228
      • Part of subcall function 0044719B: BeginPath.GDI32(?), ref: 0044723D
      • Part of subcall function 0044719B: SelectObject.GDI32(?,00000000), ref: 00447266
    • MoveToEx.GDI32(?,?,?,00000000), ref: 00447317
    • LineTo.GDI32(?,?,?), ref: 00447326
    • EndPath.GDI32(?), ref: 00447336
    • StrokePath.GDI32(?), ref: 00447344
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ObjectPath$Select$BeginCreateDeleteLineMoveStroke
    • String ID:
    • API String ID: 2783949968-0
    • Opcode ID: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
    • Instruction ID: af9b10de2b5e1f20f757a647655db97b0f5a8bbb123370319d9b3a4020b10ea9
    • Opcode Fuzzy Hash: 4ed419099ee229fcfe9d8e0d6407f17218ff084d459cc4b150d2894610f6bb04
    • Instruction Fuzzy Hash: EBF06770105258BBE721AF54ED4EFAF3B9CAB06310F108119FE01622D1C7B86A02CBA9
    APIs
    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00436489
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043649C
    • GetCurrentThreadId.KERNEL32 ref: 004364A3
    • AttachThreadInput.USER32(00000000), ref: 004364AA
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
    • String ID:
    • API String ID: 2710830443-0
    • Opcode ID: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
    • Instruction ID: 8dfc3faa83ebd232c18032ab1719f084f6ac8c8028b438e2b3a9de4cfe148046
    • Opcode Fuzzy Hash: 1738b650cb43453f600e53b83a6833ccb1a076b1e6f33d9371cddf7c9876f8ab
    • Instruction Fuzzy Hash: 61F06D7168470477EB209BA09D0EFDF379CAB18B11F10C41ABB04BA0C0C6F8B50087AD
    APIs
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00436C38
    • UnloadUserProfile.USERENV(?,?,?,000000FF), ref: 00436C46
    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C56
    • CloseHandle.KERNEL32(?,?,000000FF), ref: 00436C5B
      • Part of subcall function 00436BA9: GetProcessHeap.KERNEL32(00000000,?), ref: 00436BB6
      • Part of subcall function 00436BA9: HeapFree.KERNEL32(00000000), ref: 00436BBD
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
    • String ID:
    • API String ID: 146765662-0
    • Opcode ID: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
    • Instruction ID: 8fc8aea04bb3fa9100768a89291620bc24087d812574934f99790ad9b639e1d9
    • Opcode Fuzzy Hash: b977b2fe1054b7dcb1d3ac6099765c2a2cefd6419b68de81ef4d64d3a5db7b42
    • Instruction Fuzzy Hash: D9E0C97A510215ABC720EBA6DC48C5BB7ACEF99330311892EFD9683750DA74F840CFA4
    APIs
    • GetDesktopWindow.USER32 ref: 00472B63
    • GetDC.USER32(00000000), ref: 00472B6C
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00472B78
    • ReleaseDC.USER32(00000000,?), ref: 00472B99
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
    • Instruction ID: 759e45c534ddacfdadb557a06d932f9b55f62470d77a370046d272fbe6975a9a
    • Opcode Fuzzy Hash: 25b4e9c05087b9933bd86976477b7eaa0c4512bf79646aedece74daf711fda7f
    • Instruction Fuzzy Hash: BFF03071900205AFDB00EFB5DA4DA5DB7F4FB44315B10887EFD05D7251EAB59900DB54
    APIs
    • GetDesktopWindow.USER32 ref: 00472BB2
    • GetDC.USER32(00000000), ref: 00472BBB
    • GetDeviceCaps.GDI32(00000000,00000074), ref: 00472BC7
    • ReleaseDC.USER32(00000000,?), ref: 00472BE8
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
    • Instruction ID: 439663e17c05eb9dd95bc161916493026628bcc8c78d0f5787bb5213a8e6c1b3
    • Opcode Fuzzy Hash: cc3434de2b8b5abc20458b04240aea2a6e15dc869db4e5eb232345cc1bf11604
    • Instruction Fuzzy Hash: FAF03075900205AFCB00EFB5DA8856DB7F4FB84315B10887EFD05D7250DB7999019B94
    APIs
    • __getptd_noexit.LIBCMT ref: 00415150
      • Part of subcall function 004179F0: GetLastError.KERNEL32(?,?,00417F7C,00413644,?,?,004115F6,?,00401BAC,?,?,?), ref: 004179F4
      • Part of subcall function 004179F0: ___set_flsgetvalue.LIBCMT ref: 00417A02
      • Part of subcall function 004179F0: __calloc_crt.LIBCMT ref: 00417A16
      • Part of subcall function 004179F0: GetCurrentThreadId.KERNEL32 ref: 00417A46
      • Part of subcall function 004179F0: SetLastError.KERNEL32(00000000,?,004115F6,?,00401BAC,?,?,?), ref: 00417A5E
    • CloseHandle.KERNEL32(?,?,0041519B), ref: 00415164
    • __freeptd.LIBCMT ref: 0041516B
    • ExitThread.KERNEL32 ref: 00415173
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ErrorLastThread$CloseCurrentExitHandle___set_flsgetvalue__calloc_crt__freeptd__getptd_noexit
    • String ID:
    • API String ID: 1454798553-0
    • Opcode ID: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
    • Instruction ID: f82a1693998e09e6351869d5e4a2ded823041337c12103c56f11d560ed0c89ab
    • Opcode Fuzzy Hash: 061228abfcaf70d0abda61f2bc5ea784a59968e7eaac298a3a03e2daddecc56e
    • Instruction Fuzzy Hash: BCD0A732805E10A7C122273D5C0DBDF26655F40735B140B09FC25872D1CBACDDC143AC
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _strncmp
    • String ID: Q\E
    • API String ID: 909875538-2189900498
    • Opcode ID: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
    • Instruction ID: ec78d02982e52cebfc3c5ce94050df53d12509a5c8006a296af1ac46f88178f7
    • Opcode Fuzzy Hash: 065ac9b34865f8fc92d580161c5db786cff1d7033ea8ce1a4bef46ec8c054806
    • Instruction Fuzzy Hash: 34C1A070A04279ABDF318E58A4507ABBBB5AF59310FE441BFD8D493341D2784D8ACB89
    APIs
    • OleSetContainedObject.OLE32(00000000,00000001), ref: 00460F3E
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
      • Part of subcall function 00445660: OleSetContainedObject.OLE32(?,00000000), ref: 004456DD
      • Part of subcall function 00451B42: GetLastError.KERNEL32(?,?,00000000), ref: 00451BA0
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451BF8
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C0E
      • Part of subcall function 00451B42: VariantCopy.OLEAUT32(?,?), ref: 00451C27
      • Part of subcall function 00451B42: VariantClear.OLEAUT32(?), ref: 00451CA1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Variant$Copy$ContainedObject$ClearErrorLast_malloc
    • String ID: AutoIt3GUI$Container
    • API String ID: 2652923123-3941886329
    • Opcode ID: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
    • Instruction ID: 68a0a4eee7c61d0b7a6187be62517e39d581686f9474de6139c94a20f06104f0
    • Opcode Fuzzy Hash: 8072d5a6eeba690fa35a4ade7926f5ea60e583888e5bb087a82b37f5ec0490ad
    • Instruction Fuzzy Hash: 68A15D746006059FDB10DF69C881B6BB7E4FF88704F24896AEA09CB351EB75E841CB65
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove_strncmp
    • String ID: U$\
    • API String ID: 2666721431-100911408
    • Opcode ID: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
    • Instruction ID: d3eef72359a6f1828d14317ef8b56b8bfbdd52bf5bc7584d89ae5f72f5b530e1
    • Opcode Fuzzy Hash: a4fdddafd13fd2658ce45903ac35fff56edfd8920f85f030d52c4513684e2ed7
    • Instruction Fuzzy Hash: 13718F70E00245CFEF24CFA9C9906AEFBF2AF99304F24826ED445A7345D778A946CB15
    APIs
      • Part of subcall function 00410160: _wcslen.LIBCMT ref: 00410162
      • Part of subcall function 00410160: _wcscpy.LIBCMT ref: 00410182
    • __wcsnicmp.LIBCMT ref: 00467288
    • WNetUseConnectionW.MPR(00000000,?,00000000,?,00000000,?,00000000,?), ref: 0046732E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Connection__wcsnicmp_wcscpy_wcslen
    • String ID: LPT
    • API String ID: 3035604524-1350329615
    • Opcode ID: 8e2456e5c24cdd82ea1ba0c33fa18974f5c0f42ceb987109207d96c422488140
    • Instruction ID: cd88b7ab87c5f5a0ce5478f82160e7cdfa8c7cefd9f65e810a8a3337a25aa570
    • Opcode Fuzzy Hash: 8e2456e5c24cdd82ea1ba0c33fa18974f5c0f42ceb987109207d96c422488140
    • Instruction Fuzzy Hash: FB51E675A04204ABDB10DF54CC81FAFB7B5AB84708F10855EF905AB381E778EE85CB99
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \$h
    • API String ID: 4104443479-677774858
    • Opcode ID: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
    • Instruction ID: de34c7bb2fe7d28e42aef252d9636822906cf09101983ade98a7172327fa6e04
    • Opcode Fuzzy Hash: a8076df7cf2e4be12816d18a067c44a6d5606508540493043604d0ea2b9ab827
    • Instruction Fuzzy Hash: F551A370E002098FDF18CFA9C980AAEB7F2BFC9304F28826AD405AB345D7389D45CB55
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memcmp
    • String ID: &
    • API String ID: 2931989736-1010288
    • Opcode ID: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
    • Instruction ID: 5cd53615f07abd051f481cac668b43ae4088e938354b3ed51608dfeeaf990cc9
    • Opcode Fuzzy Hash: a81d5415846f9cf6a42c700ef8b5aeadd08d018be41d214ef7d3fe054b701e0f
    • Instruction Fuzzy Hash: EC517BB1A0011A9FDB18CF95D891ABFB7B5FF88300F14915AE815A7344D278AE42CBA4
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: \
    • API String ID: 4104443479-2967466578
    • Opcode ID: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
    • Instruction ID: e0e732097d18f8f10327b86eac3a97b4532b2e4be511d275227a7a0ca48fbcca
    • Opcode Fuzzy Hash: 59d63d8f709c00c8b633315d640480ed85dcad38184220530ca382b626518ab4
    • Instruction Fuzzy Hash: 2451C570E002498FEF24CFA9C8902AEFBB2BF95314F28826BD45597385D7395D86CB45
    APIs
    • _wcslen.LIBCMT ref: 00466825
    • InternetCrackUrlW.WININET(?,00000000,?), ref: 0046682F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CrackInternet_wcslen
    • String ID: |
    • API String ID: 596671847-2343686810
    • Opcode ID: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
    • Instruction ID: c4ea99685e293915e64884ba1c360efc28696701351dc191072b09a6dd262d67
    • Opcode Fuzzy Hash: 629f28f3e202f2691df4b53306abf03f6cbb1f7e83fd6186c7c4399916927608
    • Instruction Fuzzy Hash: B1415076E10209ABDB00EFA5D881BEEB7B8FF58314F00002AE604A7291D7757916CBE5
    APIs
    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00448446
    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0044845F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: '
    • API String ID: 3850602802-1997036262
    • Opcode ID: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
    • Instruction ID: ddf1801fc3b7a37e921bcadc6f33ff454999d78e89978ed9e0859c1643e2593c
    • Opcode Fuzzy Hash: 21874a52306f08f821648492a7afc6200e27140433d35547b734f0a4523aa872
    • Instruction Fuzzy Hash: 46418E71A002099FDB04CF98D880AEEB7B5FF59300F14816EED04AB341DB756952CFA5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: Error:
    • API String ID: 4104443479-232661952
    • Opcode ID: d24672fe7a816a5076cfec2a9dae66f9baa693b8fe05e9c221c070e3fa950dbd
    • Instruction ID: 2c658176ab693071ca67d4d31bd2fe4acf4d59654e7b744331f3a235cb1e2e29
    • Opcode Fuzzy Hash: d24672fe7a816a5076cfec2a9dae66f9baa693b8fe05e9c221c070e3fa950dbd
    • Instruction Fuzzy Hash: 0D3191716006059FC324DF29C881AA7B3E6EF84314B24853FE95AC7791EB79E941CBD8
    APIs
    • _strlen.LIBCMT ref: 0040F858
      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8C9
      • Part of subcall function 0040F880: _memmove.LIBCMT ref: 0040F8E3
    • _sprintf.LIBCMT ref: 0040F9AE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove$_sprintf_strlen
    • String ID: %02X
    • API String ID: 1921645428-436463671
    • Opcode ID: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
    • Instruction ID: e5a937a20bc973e7022889ba35624413ac66f4a4f80aeb0e2d5e31f1d02bff57
    • Opcode Fuzzy Hash: 767cb60b44986bc828a60f9d0ec6f7d4d26665b5612a1b4657e1e4afb2f114d1
    • Instruction Fuzzy Hash: 3E21287270021436D724B66E8C82FDAB39CAF55744F50007FF501A76C1EABCBA1983AD
    APIs
    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0045109A
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004510A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: Combobox
    • API String ID: 3850602802-2096851135
    • Opcode ID: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
    • Instruction ID: 528d1b292af097fd122ed4be4541c74d7578eb88e117dd2fe935d7ad7cd5862b
    • Opcode Fuzzy Hash: 1b8a1482498e59a9e674e96fd5fabaeacd2ddbb1f8abcd0cc85bd7074ae773d5
    • Instruction Fuzzy Hash: 0A21A5716102096BEB10DE68DC85FDB3398EB59734F20431AFA24A72D1D3B9EC958768
    APIs
    • GetWindowTextLengthW.USER32(00000000), ref: 0045134A
    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0045135A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: LengthMessageSendTextWindow
    • String ID: edit
    • API String ID: 2978978980-2167791130
    • Opcode ID: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
    • Instruction ID: 5a0e340068a0ba28dc4d1c90c86d8b7761b767731f3a1bde811fb9e5560a91dc
    • Opcode Fuzzy Hash: 458bf78cb5436efb918afa53a1743a3d6784074bbf07c1e17ba5dfdf6e920bd9
    • Instruction Fuzzy Hash: BB2190761102056BEB108F68D894FEB33ADEB89339F10471AFD64D36E1C279DC458B68
    APIs
    • Sleep.KERNEL32(00000000), ref: 00476CB0
    • GlobalMemoryStatusEx.KERNEL32 ref: 00476CC3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: GlobalMemorySleepStatus
    • String ID: @
    • API String ID: 2783356886-2766056989
    • Opcode ID: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
    • Instruction ID: 7847cb5f82098321599ebf91c79b9dffd15eff11c36c925ad8cec94a5f412430
    • Opcode Fuzzy Hash: e336f3d3cf010bdb765bf3cd25e4316ec625df5f035adc8ff92848a8f4c166eb
    • Instruction Fuzzy Hash: 67217130508F0497C211BF6AAC4AB5E7BB8AF84B15F01886DF9C8A14D1DF745528C76F
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: htonsinet_addr
    • String ID: 255.255.255.255
    • API String ID: 3832099526-2422070025
    • Opcode ID: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
    • Instruction ID: fb726eff09ff94cff080b531f734a3fd27281744828c6f3d0166551fa69e616e
    • Opcode Fuzzy Hash: bffbf838f8b6926ef71edb3efae5563a838ccfa537518f0e0f8b175b1623bbd9
    • Instruction Fuzzy Hash: 5211E732600304ABCF10DF69EC85FAA73A8EF45324F04455BF9049B392D635E4518B59
    APIs
    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004425F8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: InternetOpen
    • String ID: <local>
    • API String ID: 2038078732-4266983199
    • Opcode ID: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
    • Instruction ID: 93d8b03a482712ff69e4757b1f2b0d1c201104d099b6cd2898bf81ba059b6d15
    • Opcode Fuzzy Hash: 84bf365b150010c194f632228c20f1475d6fe654e04a12f862fc2198fde258ef
    • Instruction Fuzzy Hash: 9311C270680710BAF720CB548E62FBA77E8BB24B01F50844BF9429B6C0D6F4B944D7A9
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(00000000,000001A2,000000FF,00000000), ref: 00469F45
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 547829025-1403004172
    • Opcode ID: 7c603411a5222602cdcfe3af15c4e08234e094dc848fc6b68a26e5d012d1898d
    • Instruction ID: 9c74662f9608889423dda9af8a150397af45232da82e66dff643b54ec21f234b
    • Opcode Fuzzy Hash: 7c603411a5222602cdcfe3af15c4e08234e094dc848fc6b68a26e5d012d1898d
    • Instruction Fuzzy Hash: 34012531600154A7CB00BE698C45A9F775D9B86330F10826FF918AB3C2DA789D8583A6
    APIs
    • SafeArrayCreateVector.OLEAUT32(00000013,00000000), ref: 0044CE78
    • _memmove.LIBCMT ref: 0044CE9F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: ArrayCreateSafeVector_memmove
    • String ID: crts
    • API String ID: 564309351-3724388283
    • Opcode ID: 7e754992b260b6e72dbf0ba7770114a121c02481734c5380321d1baa9379aa27
    • Instruction ID: ae18a0e6088bde325f2b8f87e65bbb2aaade0ee39655e70765b31d945e00dc0b
    • Opcode Fuzzy Hash: 7e754992b260b6e72dbf0ba7770114a121c02481734c5380321d1baa9379aa27
    • Instruction Fuzzy Hash: 7B0122B390010CABD700DF5AEC41E9B77A8EB84300F00412BFA08D7241EB31EA52C7E0
    APIs
      • Part of subcall function 00401B10: _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 00401B10: _memmove.LIBCMT ref: 00401B57
    • SendMessageW.USER32(00000182,00000182,?,00000000), ref: 00469FD4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend_memmove_wcslen
    • String ID: ComboBox$ListBox
    • API String ID: 547829025-1403004172
    • Opcode ID: 0e325451c43fc7f70be1918c47cd55933b25efa0ffc993eea719a8abd039539f
    • Instruction ID: 915c6be262c944f3857b3f41bddee0575e1aa44dc928e753307ac2ed03b09582
    • Opcode Fuzzy Hash: 0e325451c43fc7f70be1918c47cd55933b25efa0ffc993eea719a8abd039539f
    • Instruction Fuzzy Hash: DA01B53170015877CB10BAAA9C45BDF7B5C9B86320F41C46BB908E7282D678DE8983A9
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: __fread_nolock_memmove
    • String ID: EA06
    • API String ID: 1988441806-3962188686
    • Opcode ID: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
    • Instruction ID: b3ef0f2836274d974f80c1c05754fec17bf4118f678989acdc9742ef3c25ced0
    • Opcode Fuzzy Hash: e45c56eab20c3bcfe4a359df8a9ba3729120cfe0f4e9d091ae644268b7df8977
    • Instruction Fuzzy Hash: 7D014971904228ABCF18DB99DC56EFEBBF49F55301F00859EF59793281D578A708CBA0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: u,D
    • API String ID: 4104443479-3858472334
    • Opcode ID: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
    • Instruction ID: 1e149f93898fe9afff494952afced4f728167d7c2cca3c00b97e401526751dc1
    • Opcode Fuzzy Hash: a09dc1741948e98e7df597fac067bc9d4c41fa761799cf9fa5b02ea5b7d8fd51
    • Instruction Fuzzy Hash: 4FF04C722007045AE3149E6ADC41FD7B7ECDBD8714F50442EF74997241E1B8A9858764
    APIs
    • _wcslen.LIBCMT ref: 00401B11
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • _memmove.LIBCMT ref: 00401B57
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411626
      • Part of subcall function 004115D7: std::exception::exception.LIBCMT ref: 00411640
      • Part of subcall function 004115D7: __CxxThrowException@8.LIBCMT ref: 00411651
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: std::exception::exception$Exception@8Throw_malloc_memmove_wcslen
    • String ID: @EXITCODE
    • API String ID: 2734553683-3436989551
    • Opcode ID: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
    • Instruction ID: 16ac7666fc6b8d0cd4c8082de1062d74cbdf630d8e5b0a9ec9a55ac2b86b5c72
    • Opcode Fuzzy Hash: d09de110ff079f104ffdf991df362542016b83ce61c8771042b9fd4bbac4f926
    • Instruction Fuzzy Hash: D5F0CDF2B00641AFD720DB36DC02B6775E49B84308F04883EA24BC6795FA7DE4828B14
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: _memmove
    • String ID: Error:
    • API String ID: 4104443479-232661952
    • Opcode ID: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
    • Instruction ID: e6e9f2aa443a554b8bda50df2a041f2c42dbd20d32390c21629c974d0e28b4a3
    • Opcode Fuzzy Hash: 47c0561e29c226fab9e20f11d30fc4033f42905d42d91430649e8e798f40a5ad
    • Instruction Fuzzy Hash: 2101EFB6200115ABC704DF49D981D6AF7A9FF88710708855AF819CB302D774FD20CBA4
    APIs
    • SendMessageW.USER32(?,00001001,00000000,?), ref: 004560FE
      • Part of subcall function 004115D7: _malloc.LIBCMT ref: 004115F1
    • wsprintfW.USER32 ref: 0045612A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: MessageSend_mallocwsprintf
    • String ID: %d/%02d/%02d
    • API String ID: 1262938277-328681919
    • Opcode ID: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
    • Instruction ID: 953f6dd97ce98099cbba652085d0304866be84a46252058ffc4865c1a62d2123
    • Opcode Fuzzy Hash: 7568e53d503701dc6c53574dfbed37be0c9226c9331a2ec32bea4e30f7db6fe8
    • Instruction Fuzzy Hash: 9DF0823274022866D7109BD9AD42FBEB3A8DB49762F00416BFE08E9180E6694854C3B9
    APIs
    • InternetCloseHandle.WININET(?), ref: 00442663
    • InternetCloseHandle.WININET ref: 00442668
      • Part of subcall function 004319AC: WaitForSingleObject.KERNEL32(aeB,?,?,00442688,aeB,00002710,?,?,00426561,?,?,0040F19D), ref: 004319BD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: CloseHandleInternet$ObjectSingleWait
    • String ID: aeB
    • API String ID: 857135153-906807131
    • Opcode ID: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
    • Instruction ID: 0fa74210230a71b56b5a48e3a0e63043fcf8dca502afcbd281d0c2380f7acdeb
    • Opcode Fuzzy Hash: c8224cb77d174d98af0e1b6511dcd9cd22ae279780c4dc09588970c0e039578a
    • Instruction Fuzzy Hash: 46E0E67650071467D310AF9ADC00B4BF7DC9F95724F11482FEA4497650C6B5B4408BA4
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441BFE
    • PostMessageW.USER32(00000000), ref: 00441C05
      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
    • Instruction ID: aba4e04af0122a293c2d26b46e7c49f9db856b5fc79b6d6ac13cebee95b63d36
    • Opcode Fuzzy Hash: 45e518b183cc50fc9cae19d0f51122c68363ee0c98c893ad2541c3bd761d7025
    • Instruction Fuzzy Hash: EFD0A772BC13013BFA6077745D0FF8B66145B14711F000C3A7B42E61C1D4F8E4018758
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00441C2A
    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00441C3D
      • Part of subcall function 004331A2: Sleep.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,004A8178), ref: 004331B9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
    • Instruction ID: e91d5bd0f3095d95abf168919443ed1e5ef8457e9bc9ee6dadeb2d3358a759b2
    • Opcode Fuzzy Hash: 2c92ce268d6dea70ed1d9c93ac972332f86dd545b3a9023bb22b3be85c6f7e29
    • Instruction Fuzzy Hash: 61D0A772B843017BFA6077745D0FF8B66145B14711F000C3A7B46A61C1D4F8D4018758
    APIs
    • GetTempPathW.KERNEL32(00000104,?), ref: 00431E34
    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00431E4C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Temp$FileNamePath
    • String ID: aut
    • API String ID: 3285503233-3010740371
    • Opcode ID: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
    • Instruction ID: 5bfe3c05d54daaccf8cad0b894ff223c4051d717a215ac0b7ff4b7edb98d8c84
    • Opcode Fuzzy Hash: b5938d8baa24fa8bd6c9fd2b7d62684d192cfd552bf23c00763a11c17351aebe
    • Instruction Fuzzy Hash: A8D05EB95403086BD324EB90ED4EFA9777CE744700F508AE9BE14461D1AAF06A54CBE9
    APIs
    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004370D1
      • Part of subcall function 004118DA: _doexit.LIBCMT ref: 004118E6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2962147776.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2962137547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962180829.0000000000482000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962194033.0000000000490000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962205357.0000000000491000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.0000000000492000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962217893.00000000004A8000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2962242567.00000000004AB000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_vRMcwg3RuY.jbxd
    Similarity
    • API ID: Message_doexit
    • String ID: AutoIt$Error allocating memory.
    • API String ID: 1993061046-4017498283
    • Opcode ID: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
    • Instruction ID: aa36ec6b1cc278624b5c670a1a0522bf80bf1016c56dd6686bcadf549e8ac499
    • Opcode Fuzzy Hash: a805162a0f5c9c87f8277766c6d2ca4cce7c6123580b1b409358537ccd51af94
    • Instruction Fuzzy Hash: F1B092323C030627E50437910D0BF9D26003B64F02F220C067324280D204C90090131D