Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
01_extracted.exe

Overview

General Information

Sample name:01_extracted.exe
Analysis ID:1538176
MD5:4af13587ab5e2b2b7a19282da972396f
SHA1:638deb78a4feba29c2efd1e4d3d168ac8c30528b
SHA256:a53c7b06ef5d3fd8bd441323f55e201cef90753849674d8cfa3e8b2f626f4f19
Tags:exeuser-Racco42
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
OS version to string mapping found (often used in BOTs)
One or more processes crash
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 01_extracted.exe (PID: 7096 cmdline: "C:\Users\user\Desktop\01_extracted.exe" MD5: 4AF13587AB5E2B2B7A19282DA972396F)
    • WerFault.exe (PID: 1900 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7096 -s 652 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 01_extracted.exeReversingLabs: Detection: 57%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
Source: 01_extracted.exeJoe Sandbox ML: detected
Source: 01_extracted.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_00C8449B
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00C8C7E8
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8C75D FindFirstFileW,FindClose,0_2_00C8C75D
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C8F021
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C8F17E
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00C8F47F
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C83833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C83833
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C83B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C83B56
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00C8BD48
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C92404 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00C92404
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C9407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C9407C
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C9427A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00C9427A
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C9407C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00C9407C
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8003A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00C8003A
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00CACB26 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00CACB26

System Summary

barindex
Source: C:\Users\user\Desktop\01_extracted.exeCode function: This is a third-party compiled AutoIt script.0_2_00C23B4C
Source: 01_extracted.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: 01_extracted.exe, 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_2ab603ed-b
Source: 01_extracted.exe, 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_2dcf8300-e
Source: 01_extracted.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_c86d27c2-8
Source: 01_extracted.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer"memstr_9d491f07-2
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8A279: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00C8A279
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C78638 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00C78638
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C85264 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00C85264
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C2E8000_2_00C2E800
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C2E0600_2_00C2E060
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C341400_2_00C34140
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C423450_2_00C42345
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C564520_2_00C56452
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00CA04650_2_00CA0465
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C525AE0_2_00C525AE
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4277A0_2_00C4277A
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00CA08E20_2_00CA08E2
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C368410_2_00C36841
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C569C40_2_00C569C4
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C389680_2_00C38968
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C5890F0_2_00C5890F
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C7E9280_2_00C7E928
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C889320_2_00C88932
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4CCA10_2_00C4CCA1
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C56F360_2_00C56F36
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C370FE0_2_00C370FE
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C331900_2_00C33190
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C212870_2_00C21287
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4F3590_2_00C4F359
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C433070_2_00C43307
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C356800_2_00C35680
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C416040_2_00C41604
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C358C00_2_00C358C0
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C478130_2_00C47813
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4DAF50_2_00C4DAF5
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C41AF80_2_00C41AF8
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C59C350_2_00C59C35
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C2FE400_2_00C2FE40
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00CA7E0D0_2_00CA7E0D
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C41F100_2_00C41F10
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4BF260_2_00C4BF26
Source: C:\Users\user\Desktop\01_extracted.exeCode function: String function: 00C48A80 appears 42 times
Source: C:\Users\user\Desktop\01_extracted.exeCode function: String function: 00C40C63 appears 70 times
Source: C:\Users\user\Desktop\01_extracted.exeCode function: String function: 00C27F41 appears 35 times
Source: C:\Users\user\Desktop\01_extracted.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7096 -s 652
Source: 01_extracted.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.evad.winEXE@2/6@0/0
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8A0F4 GetLastError,FormatMessageW,0_2_00C8A0F4
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C784F3 AdjustTokenPrivileges,CloseHandle,0_2_00C784F3
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C78AA3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00C78AA3
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8B3BF SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00C8B3BF
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C9EF21 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00C9EF21
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C984D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00C984D0
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C24FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00C24FE9
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7096
Source: C:\Users\user\Desktop\01_extracted.exeFile created: C:\Users\user\AppData\Local\Temp\indivisibilityJump to behavior
Source: 01_extracted.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\01_extracted.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 01_extracted.exeReversingLabs: Detection: 57%
Source: unknownProcess created: C:\Users\user\Desktop\01_extracted.exe "C:\Users\user\Desktop\01_extracted.exe"
Source: C:\Users\user\Desktop\01_extracted.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7096 -s 652
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeSection loaded: wldp.dllJump to behavior
Source: 01_extracted.exeStatic file information: File size 1564160 > 1048576
Source: 01_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 01_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 01_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 01_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 01_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 01_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 01_extracted.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 01_extracted.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: 01_extracted.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: 01_extracted.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: 01_extracted.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: 01_extracted.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C9C104 LoadLibraryA,GetProcAddress,0_2_00C9C104
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C702D4 push ecx; ret 0_2_00C703D0
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C703D6 push ecx; ret 0_2_00C703D8
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C703D2 push ecx; ret 0_2_00C703D4
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C88538 push FFFFFF8Bh; iretd 0_2_00C8853A
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4E88F push edi; ret 0_2_00C4E891
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4E9A8 push esi; ret 0_2_00C4E9AA
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C48AC5 push ecx; ret 0_2_00C48AD8
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4EB83 push esi; ret 0_2_00C4EB85
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4EC6C push edi; ret 0_2_00C4EC6E
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C311AD push cs; ret 0_2_00C311AE
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C311B0 push cs; ret 0_2_00C311B6
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C31118 push cs; ret 0_2_00C3111E
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C31120 push cs; ret 0_2_00C311AA
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C354D4 push edx; ret 0_2_00C354EA
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C3548B push ebx; ret 0_2_00C354A6
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C354A7 push eax; ret 0_2_00C354B6
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C35474 push ebx; ret 0_2_00C3548A
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C35404 push ebx; ret 0_2_00C35436
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C35543 push ebx; ret 0_2_00C3554A
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C3554B push ebx; ret 0_2_00C3554E
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C35501 push edx; ret 0_2_00C35516
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C35518 push eax; ret 0_2_00C35542
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C317E3 push ss; ret 0_2_00C317EC
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C317ED push ss; ret 0_2_00C317F0
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C317FD push ss; ret 0_2_00C31800
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C24A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00C24A35
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00CA53DF IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00CA53DF
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C43307 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00C43307
Source: C:\Users\user\Desktop\01_extracted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeAPI coverage: 3.6 %
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8449B GetFileAttributesW,FindFirstFileW,FindClose,0_2_00C8449B
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8C7E8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00C8C7E8
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8C75D FindFirstFileW,FindClose,0_2_00C8C75D
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8F021 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C8F021
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8F17E SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00C8F17E
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8F47F FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00C8F47F
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C83833 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C83833
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C83B56 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00C83B56
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C8BD48 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00C8BD48
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C24AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C24AFE
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\01_extracted.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C9401F BlockInput,0_2_00C9401F
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C23B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00C23B4C
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C55BFC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00C55BFC
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C9C104 LoadLibraryA,GetProcAddress,0_2_00C9C104
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C781D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00C781D4
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4A2D5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00C4A2D5
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C4A2A4 SetUnhandledExceptionFilter,0_2_00C4A2A4
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C78A73 LogonUserW,0_2_00C78A73
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C23B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00C23B4C
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C24A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00C24A35
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C84CCE mouse_event,0_2_00C84CCE
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C781D4 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00C781D4
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C84A08 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00C84A08
Source: 01_extracted.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: 01_extracted.exeBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C487AB cpuid 0_2_00C487AB
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C55007 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00C55007
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C6215F GetUserNameW,0_2_00C6215F
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C540BA __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00C540BA
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C24AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00C24AFE
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
Source: 01_extracted.exeBinary or memory string: WIN_81
Source: 01_extracted.exeBinary or memory string: WIN_XP
Source: 01_extracted.exeBinary or memory string: WIN_XPe
Source: 01_extracted.exeBinary or memory string: WIN_VISTA
Source: 01_extracted.exeBinary or memory string: WIN_7
Source: 01_extracted.exeBinary or memory string: WIN_8
Source: 01_extracted.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 2USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C96399 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00C96399
Source: C:\Users\user\Desktop\01_extracted.exeCode function: 0_2_00C9685D socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00C9685D
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Valid Accounts
1
Native API
2
Valid Accounts
2
Valid Accounts
2
Valid Accounts
21
Input Capture
2
System Time Discovery
Remote Services21
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
LSASS Memory51
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)21
Access Token Manipulation
1
Virtualization/Sandbox Evasion
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
Process Injection
21
Access Token Manipulation
NTDS2
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
DLL Side-Loading
2
Process Injection
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Deobfuscate/Decode Files or Information
Cached Domain Credentials1
Account Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
Obfuscated Files or Information
DCSync1
System Owner/User Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Side-Loading
Proc Filesystem1
File and Directory Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow15
System Information Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
01_extracted.exe58%ReversingLabsWin32.Trojan.AutoitInject
01_extracted.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1538176
Start date and time:2024-10-20 18:16:14 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 40s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:8
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:01_extracted.exe
Detection:MAL
Classification:mal60.evad.winEXE@2/6@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 41
  • Number of non-executed functions: 287
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.22
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • VT rate limit hit for: 01_extracted.exe
TimeTypeDescription
12:17:15API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8874379147041797
Encrypted:false
SSDEEP:96:mJFyd7k03es/h3oI7JfPQXIDcQvc6QcEVcw3cE/v+HbHgFe8BRTf3TFYe5PTEz6F:uUd7k03et0BU/ojJ6czuiF4Z24IO8Hs
MD5:27E525E9A832862EC5EE1020E90A011B
SHA1:A62103EC62A163CE3E730FC73EDB54D73A0C3E09
SHA-256:E188AFC3C52B9BCB610A7C25E0983BD211DFD6D43E47A370FDB7197E5F59F5CF
SHA-512:00CB6BE87F5268A20DD5FE40588F39021F6529B231BA650AA60D8DA582E7398C13442F314E1A78C8EA355F2D800B5795B557447F398DCD5F7152B3EB5534FA85
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.3.9.1.4.6.2.8.8.2.9.9.4.2.4.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.3.9.1.4.6.2.9.3.2.9.9.4.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.8.0.2.2.c.4.e.-.a.d.0.c.-.4.9.a.2.-.a.9.5.9.-.7.5.b.d.8.8.1.b.c.8.f.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.3.2.4.d.3.7.c.-.2.d.d.2.-.4.b.f.6.-.8.e.1.5.-.8.a.f.6.a.5.2.0.8.4.0.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.0.1._.e.x.t.r.a.c.t.e.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.b.8.-.0.0.0.1.-.0.0.1.4.-.d.c.b.4.-.b.4.8.2.0.b.2.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.3.2.c.f.2.1.c.2.e.4.0.f.0.1.b.3.8.e.b.b.6.a.d.c.3.2.5.c.c.a.9.0.0.0.0.0.9.0.8.!.0.0.0.0.6.3.8.d.e.b.7.8.a.4.f.e.b.a.2.9.c.2.e.f.d.1.e.4.d.3.d.1.6.8.a.c.8.c.3.0.5.2.8.b.!.0.1._.e.x.t.r.a.c.t.e.d...e.x.e.....T.a.r.g.e.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Sun Oct 20 16:17:09 2024, 0x1205a4 type
Category:dropped
Size (bytes):184094
Entropy (8bit):0.9337560195582066
Encrypted:false
SSDEEP:384:Dpjs98THl7Bny/jR/EotF9f8ueGSDncjd:Dq9QHl7RybR/Eovh8u/a8d
MD5:EF8BD627A58D42E755E47A5E781E1CB9
SHA1:AAA50D27A2DE0438906947ED1AF7ADE6D92A4A26
SHA-256:59029AF9C1980F90F2E462AD986EDE012BEE6A216D05B7C111221E1C40A28F6A
SHA-512:3B12E9E2E2A025C0B180F1553150F645A7DE68134F5E421CFA1E43F172D631F642AE09A6CC28E84EC974A08C5AAFD898FAA98D4236F35394AEB905ED01C02A46
Malicious:false
Reputation:low
Preview:MDMP..a..... ........-.g........................x...........$...0-..........T.......8...........T...........x...............D...........0...............................................................................eJ..............GenuineIntel............T............-.g.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8356
Entropy (8bit):3.698529511672116
Encrypted:false
SSDEEP:192:R6l7wVeJrz6Itz6Y9vSU9G4gmffSprH89b9Vsfpfm:R6lXJ/6Itz6Y1SU9G4gmfff9ufs
MD5:C387928DC724864DC0BF5C11F2E8F7ED
SHA1:01827E27412FA168C9207518FE41688DCA2E7AF8
SHA-256:5860465882353C36D710C3F66E083902B95EE57BCA92E2A7BD36D9DC9F8F8847
SHA-512:082211600DFE3F183431C9F91046EB01FDB897154A393C687260441001D60064FAA6BBFCF3E9F71F71C001E4B98C5DD0FD9B101BD2D52963025C28D84B0AB08A
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.0.9.6.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4634
Entropy (8bit):4.48247100752367
Encrypted:false
SSDEEP:48:cvIwWl8zssJg77aI9UvWpW8VYEYm8M4JCqFNk+q8HUHmHWu93d:uIjfqI7S+7VoJ+HHmHWy3d
MD5:BD1368006E9FF71D652110760F3068E6
SHA1:2FCDF832E14F0962FD93E962BB5230F9B4756259
SHA-256:94F12A125524294657A7746311C945EDB1797A5E6B86C4D89B803ADF020E6C20
SHA-512:39D44BB6160AB63D96A61AB00B177432AB455573F648FC95052F4B231896DD03490F27DB9482EFDD75E9D94C5891D4492598F8BDB602AF003329801BCDFE540D
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="551959" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Users\user\Desktop\01_extracted.exe
File Type:AmigaOS outline font
Category:dropped
Size (bytes):288256
Entropy (8bit):7.994040822080327
Encrypted:true
SSDEEP:6144:yC+Qqah2kjTSg5rYU/m3zjXae0TSx51oppOMHIwCfCQB:yCdqaNSglY/bv0mojlo
MD5:2C562AD1ACF3F577C4759FCF9945A73B
SHA1:A5419E009B17B31EE5F9D67C6A0689E90A2B1023
SHA-256:FD3F28FFEEDEDD264CA12AEFCDDFDA862607F0E7FE814AABA7DABCAFCBA5786F
SHA-512:87FA0AC36B674DE8825D0E7E9C713C36AC413612AEF86870E0624265CCDB2D27196D0FBEBAB29B3636109A30A24A13A7E10A866EDCBC422A9AC2272AD0697285
Malicious:false
Reputation:low
Preview:..s..BUQM..<.....WA...aA]...TN5M3HY8MWBY6HIBUQMPTN5M3HY8MW.Y6HG]._M.]...2....?+*.8;-2#,=t-T#]'-./2b+C&i+;q...nX"W-w5@]fY6HIBUQ4Q]..-T.dX*..9Q.S...w03./.eX*.X...u"2..97&.-T.Y8MWBY6H..UQ.QUN.c..Y8MWBY6H.BWPFQ_N5.7HY8MWBY6H.QUQM@TN5=7HY8.WBI6HI@UQKPTN5M3H_8MWBY6HI2QQMRTN5M3H[8..BY&HIRUQMPDN5]3HY8MWRY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN.9V0-8MW6.2HIRUQM.PN5]3HY8MWBY6HIBUQmPT.5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MWBY6HIBUQMPTN5M3HY8MW
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.465423977313325
Encrypted:false
SSDEEP:6144:nIXfpi67eLPU9skLmb0b4+WSPKaJG8nAgejZMMhA2gX4WABl0uNsdwBCswSby:IXD94+WlLZMM6YFHi+y
MD5:4A49A35AEAE112A41359DCA7E80F0AA6
SHA1:09255849C4CDED113894F2AE82072AAB3D22C880
SHA-256:7B73EFDAB96A86520F725199830CBE4D0068D5F46F214D4971A5BBF158C2E6DE
SHA-512:0290B138742D8673B25407D4E9165207183F13491523ACD800184ECF923A78901D974A19286FBF0DB5F17E5527735AB42DD6F70D04EB8CAB7D70729C80D80ABA
Malicious:false
Reputation:low
Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmr....#...............................................................................................................................................................................................................................................................................................................................................c..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.458236277046196
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:01_extracted.exe
File size:1'564'160 bytes
MD5:4af13587ab5e2b2b7a19282da972396f
SHA1:638deb78a4feba29c2efd1e4d3d168ac8c30528b
SHA256:a53c7b06ef5d3fd8bd441323f55e201cef90753849674d8cfa3e8b2f626f4f19
SHA512:e4fd6c24fa97283c4cb09e4988c3b938cf1e15bab2ddc304585d2121fc705b9ac7e07897d535520424bd9e3091dc97638c05c4debf413001f1e95c513e58e4ee
SSDEEP:24576:fCdxte/80jYLT3U1jfsWaX0vCrS6QlmGMt7CXbE98vN8AJaJjUPcH3wpMrQ:+w80cTsjkWaXt7GmyWAUJYP2wp1
TLSH:A375D02273DDC370CB769173BF6AB7012EBB7C614630B95B1F880D79A950262162DB63
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
Icon Hash:aaf3e3e3938382a0
Entrypoint:0x427f4a
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
Time Stamp:0x6711EE75 [Fri Oct 18 05:13:25 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:afcdf79be1557326c854b6e20cb900a7
Instruction
call 00007F3008D766FDh
jmp 00007F3008D694C4h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
push edi
push esi
mov esi, dword ptr [esp+10h]
mov ecx, dword ptr [esp+14h]
mov edi, dword ptr [esp+0Ch]
mov eax, ecx
mov edx, ecx
add eax, esi
cmp edi, esi
jbe 00007F3008D6964Ah
cmp edi, eax
jc 00007F3008D699AEh
bt dword ptr [004C31FCh], 01h
jnc 00007F3008D69649h
rep movsb
jmp 00007F3008D6995Ch
cmp ecx, 00000080h
jc 00007F3008D69814h
mov eax, edi
xor eax, esi
test eax, 0000000Fh
jne 00007F3008D69650h
bt dword ptr [004BE324h], 01h
jc 00007F3008D69B20h
bt dword ptr [004C31FCh], 00000000h
jnc 00007F3008D697EDh
test edi, 00000003h
jne 00007F3008D697FEh
test esi, 00000003h
jne 00007F3008D697DDh
bt edi, 02h
jnc 00007F3008D6964Fh
mov eax, dword ptr [esi]
sub ecx, 04h
lea esi, dword ptr [esi+04h]
mov dword ptr [edi], eax
lea edi, dword ptr [edi+04h]
bt edi, 03h
jnc 00007F3008D69653h
movq xmm1, qword ptr [esi]
sub ecx, 08h
lea esi, dword ptr [esi+08h]
movq qword ptr [edi], xmm1
lea edi, dword ptr [edi+08h]
test esi, 00000007h
je 00007F3008D696A5h
bt esi, 03h
Programming Language:
  • [ASM] VS2013 build 21005
  • [ C ] VS2013 build 21005
  • [C++] VS2013 build 21005
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2013 UPD5 build 40629
  • [RES] VS2013 build 21005
  • [LNK] VS2013 UPD5 build 40629
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000xb5444.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x17d0000x7130.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x8dd2e0x8de00c2c2260508750422d20cd5cbb116b146False0.5729952505506608data6.675875439961112IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x8f0000x2e10e0x2e2004513b58651e3d8d87c81a396e5b2f1d1False0.3353340955284553OpenPGP Public Key5.760731648769018IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xbe0000x8f740x5200c2de4a3d214eae7e87c7bfc06bd79775False0.1017530487804878data1.1988106744719143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xc70000xb54440xb56000d802df1466d9e8b34bfdcb8cdc355ddFalse0.9636605681426602data7.963652357983153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x17d0000x71300x72001254908a9a03d2bcf12045d49cd572b9False0.7703536184210527data6.782377328042204IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
RT_RCDATA0xcf7b80xac70adata1.0003199710043975
RT_GROUP_ICON0x17bec40x76dataEnglishGreat Britain0.6610169491525424
RT_GROUP_ICON0x17bf3c0x14dataEnglishGreat Britain1.25
RT_GROUP_ICON0x17bf500x14dataEnglishGreat Britain1.15
RT_GROUP_ICON0x17bf640x14dataEnglishGreat Britain1.25
RT_VERSION0x17bf780xdcdataEnglishGreat Britain0.6181818181818182
RT_MANIFEST0x17c0540x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
DLLImport
WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
PSAPI.DLLGetProcessMemoryInfo
IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
UxTheme.dllIsThemeActive
KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
Language of compilation systemCountry where language is spokenMap
EnglishGreat Britain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:12:17:08
Start date:20/10/2024
Path:C:\Users\user\Desktop\01_extracted.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\01_extracted.exe"
Imagebase:0xc20000
File size:1'564'160 bytes
MD5 hash:4AF13587AB5E2B2B7A19282DA972396F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:3
Start time:12:17:08
Start date:20/10/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7096 -s 652
Imagebase:0x4f0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:2.8%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:5.2%
    Total number of Nodes:1858
    Total number of Limit Nodes:125
    execution_graph 96587 c23633 96588 c2366a 96587->96588 96589 c236e7 96588->96589 96590 c23688 96588->96590 96631 c236e5 96588->96631 96591 c5d24c 96589->96591 96592 c236ed 96589->96592 96593 c23695 96590->96593 96594 c2375d PostQuitMessage 96590->96594 96637 c311d0 10 API calls Mailbox 96591->96637 96596 c236f2 96592->96596 96597 c23715 SetTimer RegisterWindowMessageW 96592->96597 96598 c236a0 96593->96598 96599 c5d2bf 96593->96599 96601 c236d8 96594->96601 96595 c236ca DefWindowProcW 96595->96601 96602 c5d1ef 96596->96602 96603 c236f9 KillTimer 96596->96603 96597->96601 96604 c2373e CreatePopupMenu 96597->96604 96605 c23767 96598->96605 96606 c236a8 96598->96606 96652 c8281f 71 API calls _memset 96599->96652 96609 c5d1f4 96602->96609 96610 c5d228 MoveWindow 96602->96610 96632 c244cb Shell_NotifyIconW _memset 96603->96632 96604->96601 96635 c24531 64 API calls _memset 96605->96635 96612 c5d2a4 96606->96612 96613 c236b3 96606->96613 96608 c5d273 96638 c311f3 275 API calls Mailbox 96608->96638 96617 c5d217 SetFocus 96609->96617 96618 c5d1f8 96609->96618 96610->96601 96612->96595 96651 c77f5e 59 API calls Mailbox 96612->96651 96620 c2374b 96613->96620 96621 c236be 96613->96621 96614 c5d2d1 96614->96595 96614->96601 96617->96601 96618->96621 96623 c5d201 96618->96623 96619 c2370c 96633 c23114 DeleteObject DestroyWindow Mailbox 96619->96633 96634 c245df 81 API calls _memset 96620->96634 96621->96595 96639 c244cb Shell_NotifyIconW _memset 96621->96639 96622 c2375b 96622->96601 96636 c311d0 10 API calls Mailbox 96623->96636 96629 c5d298 96640 c243db 96629->96640 96631->96595 96632->96619 96633->96601 96634->96622 96635->96622 96636->96601 96637->96608 96638->96621 96639->96629 96641 c24406 _memset 96640->96641 96653 c24213 96641->96653 96644 c2448b 96646 c244c1 Shell_NotifyIconW 96644->96646 96647 c244a5 Shell_NotifyIconW 96644->96647 96648 c244b3 96646->96648 96647->96648 96657 c2410d 96648->96657 96650 c244ba 96650->96631 96651->96631 96652->96614 96654 c24227 96653->96654 96655 c5d568 96653->96655 96654->96644 96679 c8302e 62 API calls _W_store_winword 96654->96679 96655->96654 96656 c5d571 DestroyIcon 96655->96656 96656->96654 96658 c24129 96657->96658 96678 c24200 Mailbox 96657->96678 96680 c27b76 96658->96680 96661 c24144 96685 c27d2c 96661->96685 96662 c5d50d LoadStringW 96665 c5d527 96662->96665 96664 c24159 96664->96665 96666 c2416a 96664->96666 96667 c27c8e 59 API calls 96665->96667 96668 c24174 96666->96668 96669 c24205 96666->96669 96672 c5d531 96667->96672 96694 c27c8e 96668->96694 96703 c281a7 96669->96703 96674 c2417e _memset _wcscpy 96672->96674 96707 c27e0b 96672->96707 96677 c241e6 Shell_NotifyIconW 96674->96677 96675 c5d553 96676 c27e0b 59 API calls 96675->96676 96676->96674 96677->96678 96678->96650 96679->96644 96714 c40f36 96680->96714 96682 c27b9b 96724 c28189 96682->96724 96686 c27da5 96685->96686 96687 c27d38 __NMSG_WRITE 96685->96687 96756 c27e8c 96686->96756 96689 c27d73 96687->96689 96690 c27d4e 96687->96690 96692 c28189 59 API calls 96689->96692 96755 c28087 59 API calls Mailbox 96690->96755 96693 c27d56 _memmove 96692->96693 96693->96664 96695 c5efc4 96694->96695 96696 c27ca0 96694->96696 96770 c77f03 59 API calls _memmove 96695->96770 96764 c27bb1 96696->96764 96699 c27cac 96699->96674 96700 c5efce 96701 c281a7 59 API calls 96700->96701 96702 c5efd6 Mailbox 96701->96702 96704 c281b2 96703->96704 96705 c281ba 96703->96705 96771 c280d7 59 API calls 2 library calls 96704->96771 96705->96674 96708 c5f0a3 96707->96708 96709 c27e1f 96707->96709 96711 c28189 59 API calls 96708->96711 96772 c27db0 96709->96772 96713 c5f0ae __NMSG_WRITE _memmove 96711->96713 96712 c27e2a 96712->96675 96716 c40f3e 96714->96716 96717 c40f58 96716->96717 96719 c40f5c std::exception::exception 96716->96719 96727 c4588c 96716->96727 96744 c43521 DecodePointer 96716->96744 96717->96682 96745 c4871b RaiseException 96719->96745 96721 c40f86 96746 c48651 58 API calls _free 96721->96746 96723 c40f98 96723->96682 96725 c40f36 Mailbox 59 API calls 96724->96725 96726 c24137 96725->96726 96726->96661 96726->96662 96728 c45907 96727->96728 96735 c45898 96727->96735 96753 c43521 DecodePointer 96728->96753 96730 c4590d 96754 c48ca8 58 API calls __getptd_noexit 96730->96754 96733 c458cb RtlAllocateHeap 96733->96735 96743 c458ff 96733->96743 96735->96733 96736 c458f3 96735->96736 96740 c458f1 96735->96740 96741 c458a3 96735->96741 96750 c43521 DecodePointer 96735->96750 96751 c48ca8 58 API calls __getptd_noexit 96736->96751 96752 c48ca8 58 API calls __getptd_noexit 96740->96752 96741->96735 96747 c4a2eb 58 API calls __NMSG_WRITE 96741->96747 96748 c4a348 58 API calls 6 library calls 96741->96748 96749 c4321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 96741->96749 96743->96716 96744->96716 96745->96721 96746->96723 96747->96741 96748->96741 96750->96735 96751->96740 96752->96743 96753->96730 96754->96743 96755->96693 96757 c27e9a 96756->96757 96759 c27ea3 _memmove 96756->96759 96757->96759 96760 c27faf 96757->96760 96759->96693 96761 c27fc2 96760->96761 96763 c27fbf _memmove 96760->96763 96762 c40f36 Mailbox 59 API calls 96761->96762 96762->96763 96763->96759 96765 c27bbf 96764->96765 96766 c27be5 _memmove 96764->96766 96765->96766 96767 c40f36 Mailbox 59 API calls 96765->96767 96766->96699 96768 c27c34 96767->96768 96769 c40f36 Mailbox 59 API calls 96768->96769 96769->96766 96770->96700 96771->96705 96773 c27dbf __NMSG_WRITE 96772->96773 96774 c28189 59 API calls 96773->96774 96775 c27dd0 _memmove 96773->96775 96776 c5f060 _memmove 96774->96776 96775->96712 96777 c60155 96784 c2ae4f Mailbox 96777->96784 96778 c2b6d1 96893 c89ed4 89 API calls 4 library calls 96778->96893 96780 c60bb5 96894 c763f2 59 API calls Mailbox 96780->96894 96782 c60bbe 96784->96778 96784->96780 96784->96782 96785 c600e9 VariantClear 96784->96785 96790 c9e037 96784->96790 96793 ca22fe 96784->96793 96798 c8d106 96784->96798 96845 c8d107 96784->96845 96892 c29df0 59 API calls Mailbox 96784->96892 96785->96784 96895 c9cbf1 96790->96895 96792 c9e047 96792->96784 97036 c7f713 96793->97036 96795 ca230a 97055 c29b9c 59 API calls Mailbox 96795->97055 96797 ca2326 Mailbox 96797->96784 96799 c8d126 96798->96799 96800 c8d131 96798->96800 97071 c29c9c 59 API calls 96799->97071 96804 c277c7 59 API calls 96800->96804 96841 c8d20b Mailbox 96800->96841 96802 c40f36 Mailbox 59 API calls 96803 c8d254 96802->96803 96806 c8d260 96803->96806 97076 c25906 60 API calls Mailbox 96803->97076 96805 c8d155 96804->96805 96807 c277c7 59 API calls 96805->96807 96810 c29997 84 API calls 96806->96810 96809 c8d15e 96807->96809 96811 c29997 84 API calls 96809->96811 96812 c8d278 96810->96812 96813 c8d16a 96811->96813 97060 c25956 96812->97060 97072 c246f9 59 API calls Mailbox 96813->97072 96817 c8d17f 96820 c27c8e 59 API calls 96817->96820 96818 c8d28b GetLastError 96821 c8d2a4 96818->96821 96819 c8d2bf 96822 c8d2ea 96819->96822 96823 c8d321 96819->96823 96824 c8d1b2 96820->96824 96840 c8d214 Mailbox 96821->96840 97077 c25a1a CloseHandle 96821->97077 96826 c40f36 Mailbox 59 API calls 96822->96826 96825 c40f36 Mailbox 59 API calls 96823->96825 96827 c8d204 96824->96827 97073 c83c7b GetFileAttributesW FindFirstFileW FindClose 96824->97073 96828 c8d326 96825->96828 96830 c8d2ef 96826->96830 97075 c29c9c 59 API calls 96827->97075 96835 c277c7 59 API calls 96828->96835 96828->96840 96833 c8d300 96830->96833 96836 c277c7 59 API calls 96830->96836 97078 c8f656 59 API calls 2 library calls 96833->97078 96834 c8d1c2 96834->96827 96837 c8d1c6 96834->96837 96835->96840 96836->96833 96838 c27f41 59 API calls 96837->96838 96842 c8d1d3 96838->96842 96840->96784 96841->96802 96841->96840 97074 c83a6e 63 API calls Mailbox 96842->97074 96844 c8d1dc Mailbox 96844->96827 96846 c8d126 96845->96846 96848 c8d131 96845->96848 97106 c29c9c 59 API calls 96846->97106 96851 c277c7 59 API calls 96848->96851 96890 c8d20b Mailbox 96848->96890 96849 c40f36 Mailbox 59 API calls 96850 c8d254 96849->96850 96853 c8d260 96850->96853 97111 c25906 60 API calls Mailbox 96850->97111 96852 c8d155 96851->96852 96854 c277c7 59 API calls 96852->96854 96857 c29997 84 API calls 96853->96857 96856 c8d15e 96854->96856 96858 c29997 84 API calls 96856->96858 96859 c8d278 96857->96859 96860 c8d16a 96858->96860 96861 c25956 67 API calls 96859->96861 97107 c246f9 59 API calls Mailbox 96860->97107 96863 c8d287 96861->96863 96865 c8d28b GetLastError 96863->96865 96866 c8d2bf 96863->96866 96864 c8d17f 96867 c27c8e 59 API calls 96864->96867 96868 c8d2a4 96865->96868 96869 c8d2ea 96866->96869 96870 c8d321 96866->96870 96871 c8d1b2 96867->96871 96887 c8d214 Mailbox 96868->96887 97112 c25a1a CloseHandle 96868->97112 96873 c40f36 Mailbox 59 API calls 96869->96873 96872 c40f36 Mailbox 59 API calls 96870->96872 96874 c8d204 96871->96874 97108 c83c7b GetFileAttributesW FindFirstFileW FindClose 96871->97108 96875 c8d326 96872->96875 96877 c8d2ef 96873->96877 97110 c29c9c 59 API calls 96874->97110 96882 c277c7 59 API calls 96875->96882 96875->96887 96880 c8d300 96877->96880 96883 c277c7 59 API calls 96877->96883 97113 c8f656 59 API calls 2 library calls 96880->97113 96881 c8d1c2 96881->96874 96884 c8d1c6 96881->96884 96882->96887 96883->96880 96885 c27f41 59 API calls 96884->96885 96888 c8d1d3 96885->96888 96887->96784 97109 c83a6e 63 API calls Mailbox 96888->97109 96890->96849 96890->96887 96891 c8d1dc Mailbox 96891->96874 96892->96784 96893->96780 96894->96782 96933 c29997 96895->96933 96899 c9cecd 96900 c9d042 96899->96900 96904 c9cedb 96899->96904 97001 c9d9dc 92 API calls Mailbox 96900->97001 96903 c9d051 96903->96904 96906 c9d05d 96903->96906 96964 c9ca82 96904->96964 96905 c29997 84 API calls 96921 c9ccc6 Mailbox 96905->96921 96916 c9cc75 Mailbox 96906->96916 96911 c9cf14 96979 c40d88 96911->96979 96914 c9cf2e 96985 c89ed4 89 API calls 4 library calls 96914->96985 96915 c9cf47 96986 c2942e 96915->96986 96916->96792 96920 c9cf39 GetCurrentProcess TerminateProcess 96920->96915 96921->96899 96921->96905 96921->96916 96983 c8f656 59 API calls 2 library calls 96921->96983 96984 c9d0f3 61 API calls 2 library calls 96921->96984 96925 c9d0b8 96925->96916 96929 c9d0cc FreeLibrary 96925->96929 96926 c9cf7f 96998 c9d75d 107 API calls _free 96926->96998 96929->96916 96932 c9cf90 96932->96925 96999 c28ea0 59 API calls Mailbox 96932->96999 97000 c29e9c 60 API calls Mailbox 96932->97000 97002 c9d75d 107 API calls _free 96932->97002 96934 c299b1 96933->96934 96935 c299ab 96933->96935 96936 c5f92c __i64tow 96934->96936 96937 c299f9 96934->96937 96938 c299b7 __itow 96934->96938 96942 c5f833 96934->96942 96935->96916 96951 c9d8b9 96935->96951 97007 c43818 83 API calls 3 library calls 96937->97007 96941 c40f36 Mailbox 59 API calls 96938->96941 96943 c299d1 96941->96943 96944 c40f36 Mailbox 59 API calls 96942->96944 96946 c5f8ab Mailbox _wcscpy 96942->96946 96943->96935 97003 c27f41 96943->97003 96947 c5f878 96944->96947 97008 c43818 83 API calls 3 library calls 96946->97008 96948 c40f36 Mailbox 59 API calls 96947->96948 96949 c5f89e 96948->96949 96949->96946 96950 c27f41 59 API calls 96949->96950 96950->96946 96952 c27faf 59 API calls 96951->96952 96953 c9d8d4 CharLowerBuffW 96952->96953 97009 c7f479 96953->97009 96960 c9d924 96961 c27e8c 59 API calls 96960->96961 96962 c9d930 Mailbox 96961->96962 96963 c9d96c Mailbox 96962->96963 97022 c9d0f3 61 API calls 2 library calls 96962->97022 96963->96921 96965 c9ca9d 96964->96965 96969 c9caf2 96964->96969 96966 c40f36 Mailbox 59 API calls 96965->96966 96968 c9cabf 96966->96968 96967 c40f36 Mailbox 59 API calls 96967->96968 96968->96967 96968->96969 96970 c9db64 96969->96970 96971 c9dd8d Mailbox 96970->96971 96977 c9db87 _strcat _wcscpy __NMSG_WRITE 96970->96977 96971->96911 96972 c29cf8 59 API calls 96972->96977 96973 c29d46 59 API calls 96973->96977 96974 c29c9c 59 API calls 96974->96977 96975 c29997 84 API calls 96975->96977 96976 c4588c 58 API calls __crtCompareStringA_stat 96976->96977 96977->96971 96977->96972 96977->96973 96977->96974 96977->96975 96977->96976 97025 c8592e 61 API calls 2 library calls 96977->97025 96981 c40d9d 96979->96981 96980 c40e35 VirtualAlloc 96982 c40e03 96980->96982 96981->96980 96981->96982 96982->96914 96982->96915 96983->96921 96984->96921 96985->96920 96987 c29436 96986->96987 96988 c40f36 Mailbox 59 API calls 96987->96988 96989 c29444 96988->96989 96991 c29450 96989->96991 97026 c2935c 59 API calls Mailbox 96989->97026 96992 c291b0 96991->96992 97027 c292c0 96992->97027 96994 c291bf 96995 c40f36 Mailbox 59 API calls 96994->96995 96996 c2925b 96994->96996 96995->96996 96996->96932 96997 c28ea0 59 API calls Mailbox 96996->96997 96997->96926 96998->96932 96999->96932 97000->96932 97001->96903 97002->96932 97004 c27f50 __NMSG_WRITE _memmove 97003->97004 97005 c40f36 Mailbox 59 API calls 97004->97005 97006 c27f8e 97005->97006 97006->96935 97007->96938 97008->96936 97010 c7f4a4 __NMSG_WRITE 97009->97010 97011 c7f4e3 97010->97011 97014 c7f4d9 97010->97014 97015 c7f58a 97010->97015 97011->96962 97016 c277c7 97011->97016 97014->97011 97023 c27a24 61 API calls 97014->97023 97015->97011 97024 c27a24 61 API calls 97015->97024 97017 c40f36 Mailbox 59 API calls 97016->97017 97018 c277e8 97017->97018 97019 c40f36 Mailbox 59 API calls 97018->97019 97020 c277f6 97019->97020 97021 c279ab 59 API calls 2 library calls 97020->97021 97021->96960 97022->96963 97023->97014 97024->97015 97025->96977 97026->96991 97028 c292c9 Mailbox 97027->97028 97029 c5f4f8 97028->97029 97034 c292d3 97028->97034 97030 c40f36 Mailbox 59 API calls 97029->97030 97031 c5f504 97030->97031 97032 c292da 97032->96994 97034->97032 97035 c29df0 59 API calls Mailbox 97034->97035 97035->97034 97037 c277c7 59 API calls 97036->97037 97038 c7f726 97037->97038 97039 c27b76 59 API calls 97038->97039 97040 c7f73a 97039->97040 97041 c7f479 61 API calls 97040->97041 97048 c7f75c 97040->97048 97043 c7f756 97041->97043 97042 c7f479 61 API calls 97042->97048 97043->97048 97056 c279ab 59 API calls 2 library calls 97043->97056 97045 c7f7d6 97058 c279ab 59 API calls 2 library calls 97045->97058 97048->97042 97048->97045 97050 c27c8e 59 API calls 97048->97050 97057 c279ab 59 API calls 2 library calls 97048->97057 97049 c7f7ef 97051 c27c8e 59 API calls 97049->97051 97050->97048 97052 c7f7fb 97051->97052 97054 c7f80a Mailbox 97052->97054 97059 c280d7 59 API calls 2 library calls 97052->97059 97054->96795 97055->96797 97056->97048 97057->97048 97058->97049 97059->97054 97079 c25dcf 97060->97079 97064 c25981 97065 c259a4 97064->97065 97091 c25770 62 API calls Mailbox 97064->97091 97065->96818 97065->96819 97067 c25993 97092 c253db SetFilePointerEx SetFilePointerEx 97067->97092 97069 c2599a 97069->97065 97093 c8349e 97069->97093 97071->96800 97072->96817 97073->96834 97074->96844 97075->96841 97076->96806 97077->96840 97078->96840 97080 c25de8 97079->97080 97081 c25962 97079->97081 97080->97081 97082 c25ded CloseHandle 97080->97082 97083 c25df9 97081->97083 97082->97081 97084 c25e12 CreateFileW 97083->97084 97085 c5e0b1 97083->97085 97088 c25e34 97084->97088 97086 c5e0b7 CreateFileW 97085->97086 97085->97088 97087 c5e0dd 97086->97087 97086->97088 97096 c25c4e SetFilePointerEx SetFilePointerEx 97087->97096 97088->97064 97090 c5e0e8 97090->97088 97091->97067 97092->97069 97097 c8339d 97093->97097 97095 c834aa WriteFile 97095->97065 97096->97090 97098 c833af 97097->97098 97099 c833a4 97097->97099 97098->97095 97104 c25dae SetFilePointerEx 97099->97104 97101 c83409 SetFilePointerEx 97105 c25dae SetFilePointerEx 97101->97105 97103 c83428 97103->97095 97104->97101 97105->97103 97106->96848 97107->96864 97108->96881 97109->96891 97110->96890 97111->96853 97112->96887 97113->96887 97114 c21066 97119 c2f8cf 97114->97119 97116 c2106c 97152 c42ec0 97116->97152 97120 c2f8f0 97119->97120 97155 c40083 97120->97155 97124 c2f937 97125 c277c7 59 API calls 97124->97125 97126 c2f941 97125->97126 97127 c277c7 59 API calls 97126->97127 97128 c2f94b 97127->97128 97129 c277c7 59 API calls 97128->97129 97130 c2f955 97129->97130 97131 c277c7 59 API calls 97130->97131 97132 c2f993 97131->97132 97133 c277c7 59 API calls 97132->97133 97134 c2fa5e 97133->97134 97165 c360e7 97134->97165 97138 c2fa90 97139 c277c7 59 API calls 97138->97139 97140 c2fa9a 97139->97140 97193 c3ff1e 97140->97193 97142 c2fae1 97143 c2faf1 GetStdHandle 97142->97143 97144 c64904 97143->97144 97145 c2fb3d 97143->97145 97144->97145 97147 c6490d 97144->97147 97146 c2fb45 OleInitialize 97145->97146 97146->97116 97200 c86be1 64 API calls Mailbox 97147->97200 97149 c64914 97201 c872b0 CreateThread 97149->97201 97151 c64920 CloseHandle 97151->97146 97214 c42dc4 97152->97214 97154 c21076 97202 c4015c 97155->97202 97158 c4015c 59 API calls 97159 c400c5 97158->97159 97160 c277c7 59 API calls 97159->97160 97161 c400d1 97160->97161 97162 c27d2c 59 API calls 97161->97162 97163 c2f8f6 97162->97163 97164 c402e2 6 API calls 97163->97164 97164->97124 97166 c277c7 59 API calls 97165->97166 97167 c360f7 97166->97167 97168 c277c7 59 API calls 97167->97168 97169 c360ff 97168->97169 97209 c35bfd 97169->97209 97172 c35bfd 59 API calls 97173 c3610f 97172->97173 97174 c277c7 59 API calls 97173->97174 97175 c3611a 97174->97175 97176 c40f36 Mailbox 59 API calls 97175->97176 97177 c2fa68 97176->97177 97178 c36259 97177->97178 97179 c36267 97178->97179 97180 c277c7 59 API calls 97179->97180 97181 c36272 97180->97181 97182 c277c7 59 API calls 97181->97182 97183 c3627d 97182->97183 97184 c277c7 59 API calls 97183->97184 97185 c36288 97184->97185 97186 c277c7 59 API calls 97185->97186 97187 c36293 97186->97187 97188 c35bfd 59 API calls 97187->97188 97189 c3629e 97188->97189 97190 c40f36 Mailbox 59 API calls 97189->97190 97191 c362a5 RegisterWindowMessageW 97190->97191 97191->97138 97194 c75ac5 97193->97194 97195 c3ff2e 97193->97195 97212 c89b90 60 API calls 97194->97212 97196 c40f36 Mailbox 59 API calls 97195->97196 97199 c3ff36 97196->97199 97198 c75ad0 97199->97142 97200->97149 97201->97151 97213 c87296 65 API calls 97201->97213 97203 c277c7 59 API calls 97202->97203 97204 c40167 97203->97204 97205 c277c7 59 API calls 97204->97205 97206 c4016f 97205->97206 97207 c277c7 59 API calls 97206->97207 97208 c400bb 97207->97208 97208->97158 97210 c277c7 59 API calls 97209->97210 97211 c35c05 97210->97211 97211->97172 97212->97198 97215 c42dd0 _doexit 97214->97215 97222 c43397 97215->97222 97221 c42df7 _doexit 97221->97154 97239 c49d8b 97222->97239 97224 c42dd9 97225 c42e08 DecodePointer DecodePointer 97224->97225 97226 c42e35 97225->97226 97227 c42de5 97225->97227 97226->97227 97285 c48924 59 API calls __filbuf 97226->97285 97236 c42e02 97227->97236 97229 c42e98 EncodePointer EncodePointer 97229->97227 97230 c42e47 97230->97229 97231 c42e6c 97230->97231 97286 c489e4 61 API calls 2 library calls 97230->97286 97231->97227 97234 c42e86 EncodePointer 97231->97234 97287 c489e4 61 API calls 2 library calls 97231->97287 97234->97229 97235 c42e80 97235->97227 97235->97234 97288 c433a0 97236->97288 97240 c49d9c 97239->97240 97241 c49daf EnterCriticalSection 97239->97241 97246 c49e13 97240->97246 97241->97224 97243 c49da2 97243->97241 97270 c43235 58 API calls 3 library calls 97243->97270 97247 c49e1f _doexit 97246->97247 97248 c49e40 97247->97248 97249 c49e28 97247->97249 97257 c49e61 _doexit 97248->97257 97274 c4899d 58 API calls 2 library calls 97248->97274 97271 c4a2eb 58 API calls __NMSG_WRITE 97249->97271 97252 c49e2d 97272 c4a348 58 API calls 6 library calls 97252->97272 97253 c49e55 97255 c49e5c 97253->97255 97256 c49e6b 97253->97256 97275 c48ca8 58 API calls __getptd_noexit 97255->97275 97260 c49d8b __lock 58 API calls 97256->97260 97257->97243 97258 c49e34 97273 c4321f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97258->97273 97262 c49e72 97260->97262 97264 c49e97 97262->97264 97265 c49e7f 97262->97265 97277 c42ed5 97264->97277 97276 c49fab InitializeCriticalSectionAndSpinCount 97265->97276 97268 c49e8b 97283 c49eb3 LeaveCriticalSection _doexit 97268->97283 97271->97252 97272->97258 97274->97253 97275->97257 97276->97268 97278 c42ede RtlFreeHeap 97277->97278 97279 c42f07 __dosmaperr 97277->97279 97278->97279 97280 c42ef3 97278->97280 97279->97268 97284 c48ca8 58 API calls __getptd_noexit 97280->97284 97282 c42ef9 GetLastError 97282->97279 97283->97257 97284->97282 97285->97230 97286->97231 97287->97235 97291 c49ef5 LeaveCriticalSection 97288->97291 97290 c42e07 97290->97221 97291->97290 97292 c21016 97297 c24ad2 97292->97297 97295 c42ec0 __cinit 67 API calls 97296 c21025 97295->97296 97298 c40f36 Mailbox 59 API calls 97297->97298 97299 c24ada 97298->97299 97300 c2101b 97299->97300 97304 c24a94 97299->97304 97300->97295 97305 c24aaf 97304->97305 97306 c24a9d 97304->97306 97308 c24afe 97305->97308 97307 c42ec0 __cinit 67 API calls 97306->97307 97307->97305 97309 c277c7 59 API calls 97308->97309 97310 c24b16 GetVersionExW 97309->97310 97311 c27d2c 59 API calls 97310->97311 97312 c24b59 97311->97312 97313 c27e8c 59 API calls 97312->97313 97322 c24b86 97312->97322 97314 c24b7a 97313->97314 97336 c27886 97314->97336 97316 c24bf1 GetCurrentProcess IsWow64Process 97317 c24c0a 97316->97317 97319 c24c20 97317->97319 97320 c24c89 GetSystemInfo 97317->97320 97318 c5dbbd 97332 c24c95 97319->97332 97321 c24c56 97320->97321 97321->97300 97322->97316 97322->97318 97325 c24c32 97328 c24c95 2 API calls 97325->97328 97326 c24c7d GetSystemInfo 97327 c24c47 97326->97327 97327->97321 97329 c24c4d FreeLibrary 97327->97329 97330 c24c3a GetNativeSystemInfo 97328->97330 97329->97321 97330->97327 97333 c24c2e 97332->97333 97334 c24c9e LoadLibraryA 97332->97334 97333->97325 97333->97326 97334->97333 97335 c24caf GetProcAddress 97334->97335 97335->97333 97337 c27894 97336->97337 97338 c27e8c 59 API calls 97337->97338 97339 c278a4 97338->97339 97339->97322 97340 c21055 97345 c22649 97340->97345 97343 c42ec0 __cinit 67 API calls 97344 c21064 97343->97344 97346 c277c7 59 API calls 97345->97346 97347 c226b7 97346->97347 97352 c23582 97347->97352 97350 c22754 97351 c2105a 97350->97351 97355 c23416 59 API calls 2 library calls 97350->97355 97351->97343 97356 c235b0 97352->97356 97355->97350 97357 c235a1 97356->97357 97358 c235bd 97356->97358 97357->97350 97358->97357 97359 c235c4 RegOpenKeyExW 97358->97359 97359->97357 97360 c235de RegQueryValueExW 97359->97360 97361 c23614 RegCloseKey 97360->97361 97362 c235ff 97360->97362 97361->97357 97362->97361 97363 c47dd3 97364 c47ddf _doexit 97363->97364 97400 c49f88 GetStartupInfoW 97364->97400 97366 c47de4 97402 c48cfc GetProcessHeap 97366->97402 97368 c47e3c 97369 c47e47 97368->97369 97485 c47f23 58 API calls 3 library calls 97368->97485 97403 c49c66 97369->97403 97372 c47e4d 97373 c47e58 __RTC_Initialize 97372->97373 97486 c47f23 58 API calls 3 library calls 97372->97486 97424 c4d752 97373->97424 97376 c47e67 97377 c47e73 GetCommandLineW 97376->97377 97487 c47f23 58 API calls 3 library calls 97376->97487 97443 c550a3 GetEnvironmentStringsW 97377->97443 97380 c47e72 97380->97377 97383 c47e8d 97384 c47e98 97383->97384 97488 c43235 58 API calls 3 library calls 97383->97488 97453 c54ed8 97384->97453 97387 c47e9e 97388 c47ea9 97387->97388 97489 c43235 58 API calls 3 library calls 97387->97489 97467 c4326f 97388->97467 97391 c47eb1 97392 c47ebc __wwincmdln 97391->97392 97490 c43235 58 API calls 3 library calls 97391->97490 97473 c2492e 97392->97473 97395 c47ed0 97396 c47edf 97395->97396 97491 c434d8 58 API calls _doexit 97395->97491 97492 c43260 58 API calls _doexit 97396->97492 97399 c47ee4 _doexit 97401 c49f9e 97400->97401 97401->97366 97402->97368 97493 c43307 36 API calls 2 library calls 97403->97493 97405 c49c6b 97494 c49ebc InitializeCriticalSectionAndSpinCount __mtinitlocknum 97405->97494 97407 c49c70 97408 c49c74 97407->97408 97496 c49f0a TlsAlloc 97407->97496 97495 c49cdc 61 API calls 2 library calls 97408->97495 97411 c49c86 97411->97408 97413 c49c91 97411->97413 97412 c49c79 97412->97372 97497 c48955 97413->97497 97416 c49cd3 97505 c49cdc 61 API calls 2 library calls 97416->97505 97419 c49cb2 97419->97416 97421 c49cb8 97419->97421 97420 c49cd8 97420->97372 97504 c49bb3 58 API calls 4 library calls 97421->97504 97423 c49cc0 GetCurrentThreadId 97423->97372 97425 c4d75e _doexit 97424->97425 97426 c49d8b __lock 58 API calls 97425->97426 97427 c4d765 97426->97427 97428 c48955 __calloc_crt 58 API calls 97427->97428 97429 c4d776 97428->97429 97430 c4d7e1 GetStartupInfoW 97429->97430 97431 c4d781 _doexit @_EH4_CallFilterFunc@8 97429->97431 97437 c4d7f6 97430->97437 97440 c4d925 97430->97440 97431->97376 97432 c4d9ed 97519 c4d9fd LeaveCriticalSection _doexit 97432->97519 97434 c48955 __calloc_crt 58 API calls 97434->97437 97435 c4d972 GetStdHandle 97435->97440 97436 c4d985 GetFileType 97436->97440 97437->97434 97438 c4d844 97437->97438 97437->97440 97439 c4d878 GetFileType 97438->97439 97438->97440 97517 c49fab InitializeCriticalSectionAndSpinCount 97438->97517 97439->97438 97440->97432 97440->97435 97440->97436 97518 c49fab InitializeCriticalSectionAndSpinCount 97440->97518 97444 c550b4 97443->97444 97445 c47e83 97443->97445 97520 c4899d 58 API calls 2 library calls 97444->97520 97449 c54c9b GetModuleFileNameW 97445->97449 97447 c550da _memmove 97448 c550f0 FreeEnvironmentStringsW 97447->97448 97448->97445 97450 c54ccf _wparse_cmdline 97449->97450 97452 c54d0f _wparse_cmdline 97450->97452 97521 c4899d 58 API calls 2 library calls 97450->97521 97452->97383 97454 c54ef1 __NMSG_WRITE 97453->97454 97458 c54ee9 97453->97458 97455 c48955 __calloc_crt 58 API calls 97454->97455 97463 c54f1a __NMSG_WRITE 97455->97463 97456 c54f71 97457 c42ed5 _free 58 API calls 97456->97457 97457->97458 97458->97387 97459 c48955 __calloc_crt 58 API calls 97459->97463 97460 c54f96 97462 c42ed5 _free 58 API calls 97460->97462 97462->97458 97463->97456 97463->97458 97463->97459 97463->97460 97464 c54fad 97463->97464 97522 c54787 58 API calls __filbuf 97463->97522 97523 c48f46 IsProcessorFeaturePresent 97464->97523 97466 c54fb9 97466->97387 97468 c4327b __IsNonwritableInCurrentImage 97467->97468 97546 c4a651 97468->97546 97470 c43299 __initterm_e 97471 c42ec0 __cinit 67 API calls 97470->97471 97472 c432b8 _doexit __IsNonwritableInCurrentImage 97470->97472 97471->97472 97472->97391 97474 c24948 97473->97474 97484 c249e7 97473->97484 97475 c24982 IsThemeActive 97474->97475 97549 c434ec 97475->97549 97479 c249ae 97561 c24a5b SystemParametersInfoW SystemParametersInfoW 97479->97561 97481 c249ba 97562 c23b4c 97481->97562 97483 c249c2 SystemParametersInfoW 97483->97484 97484->97395 97485->97369 97486->97373 97487->97380 97491->97396 97492->97399 97493->97405 97494->97407 97495->97412 97496->97411 97500 c4895c 97497->97500 97499 c48997 97499->97416 97503 c49f66 TlsSetValue 97499->97503 97500->97499 97502 c4897a 97500->97502 97506 c55376 97500->97506 97502->97499 97502->97500 97514 c4a2b2 Sleep 97502->97514 97503->97419 97504->97423 97505->97420 97507 c55381 97506->97507 97510 c5539c 97506->97510 97508 c5538d 97507->97508 97507->97510 97515 c48ca8 58 API calls __getptd_noexit 97508->97515 97511 c553ac HeapAlloc 97510->97511 97512 c55392 97510->97512 97516 c43521 DecodePointer 97510->97516 97511->97510 97511->97512 97512->97500 97514->97502 97515->97512 97516->97510 97517->97438 97518->97440 97519->97431 97520->97447 97521->97452 97522->97463 97524 c48f51 97523->97524 97529 c48dd9 97524->97529 97528 c48f6c 97528->97466 97530 c48df3 _memset __call_reportfault 97529->97530 97531 c48e13 IsDebuggerPresent 97530->97531 97537 c4a2d5 SetUnhandledExceptionFilter UnhandledExceptionFilter 97531->97537 97534 c48efa 97536 c4a2c0 GetCurrentProcess TerminateProcess 97534->97536 97535 c48ed7 __call_reportfault 97538 c4c776 97535->97538 97536->97528 97537->97535 97539 c4c780 IsProcessorFeaturePresent 97538->97539 97540 c4c77e 97538->97540 97542 c55a8a 97539->97542 97540->97534 97545 c55a39 5 API calls 2 library calls 97542->97545 97544 c55b6d 97544->97534 97545->97544 97547 c4a654 EncodePointer 97546->97547 97547->97547 97548 c4a66e 97547->97548 97548->97470 97550 c49d8b __lock 58 API calls 97549->97550 97551 c434f7 DecodePointer EncodePointer 97550->97551 97614 c49ef5 LeaveCriticalSection 97551->97614 97553 c249a7 97554 c43554 97553->97554 97555 c4355e 97554->97555 97556 c43578 97554->97556 97555->97556 97615 c48ca8 58 API calls __getptd_noexit 97555->97615 97556->97479 97558 c43568 97616 c48f36 9 API calls __filbuf 97558->97616 97560 c43573 97560->97479 97561->97481 97563 c23b59 __ftell_nolock 97562->97563 97564 c277c7 59 API calls 97563->97564 97565 c23b63 GetCurrentDirectoryW 97564->97565 97617 c23778 97565->97617 97567 c23b8c IsDebuggerPresent 97568 c5d3dd MessageBoxA 97567->97568 97569 c23b9a 97567->97569 97572 c5d3f7 97568->97572 97570 c23c73 97569->97570 97569->97572 97573 c23bb7 97569->97573 97571 c23c7a SetCurrentDirectoryW 97570->97571 97576 c23c87 Mailbox 97571->97576 97816 c27373 59 API calls Mailbox 97572->97816 97698 c273e5 97573->97698 97576->97483 97577 c5d407 97582 c5d41d SetCurrentDirectoryW 97577->97582 97579 c23bd5 GetFullPathNameW 97580 c27d2c 59 API calls 97579->97580 97581 c23c10 97580->97581 97714 c30a8d 97581->97714 97582->97576 97585 c23c2e 97586 c23c38 97585->97586 97817 c84a08 AllocateAndInitializeSid CheckTokenMembership FreeSid 97585->97817 97730 c23a58 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 97586->97730 97589 c5d43a 97589->97586 97593 c5d44b 97589->97593 97592 c23c42 97594 c23c55 97592->97594 97597 c243db 68 API calls 97592->97597 97818 c24864 97593->97818 97738 c30b30 97594->97738 97596 c5d453 97599 c27f41 59 API calls 97596->97599 97597->97594 97601 c5d460 97599->97601 97600 c23c60 97600->97570 97815 c244cb Shell_NotifyIconW _memset 97600->97815 97602 c5d48f 97601->97602 97603 c5d46a 97601->97603 97606 c27e0b 59 API calls 97602->97606 97605 c27e0b 59 API calls 97603->97605 97607 c5d475 97605->97607 97608 c5d48b GetForegroundWindow ShellExecuteW 97606->97608 97609 c27c8e 59 API calls 97607->97609 97612 c5d4bf Mailbox 97608->97612 97611 c5d482 97609->97611 97613 c27e0b 59 API calls 97611->97613 97612->97570 97613->97608 97614->97553 97615->97558 97616->97560 97618 c277c7 59 API calls 97617->97618 97619 c2378e 97618->97619 97825 c23d43 97619->97825 97621 c237ac 97622 c24864 61 API calls 97621->97622 97623 c237c0 97622->97623 97624 c27f41 59 API calls 97623->97624 97625 c237cd 97624->97625 97839 c24f3d 97625->97839 97628 c5d2de 97895 c89604 97628->97895 97629 c237ee Mailbox 97632 c281a7 59 API calls 97629->97632 97635 c23801 97632->97635 97633 c5d2fd 97634 c42ed5 _free 58 API calls 97633->97634 97637 c5d30a 97634->97637 97863 c293ea 97635->97863 97639 c24faa 84 API calls 97637->97639 97641 c5d313 97639->97641 97645 c23ee2 59 API calls 97641->97645 97642 c27f41 59 API calls 97643 c2381a 97642->97643 97866 c28620 97643->97866 97647 c5d32e 97645->97647 97646 c2382c Mailbox 97648 c27f41 59 API calls 97646->97648 97649 c23ee2 59 API calls 97647->97649 97650 c23852 97648->97650 97651 c5d34a 97649->97651 97652 c28620 69 API calls 97650->97652 97653 c24864 61 API calls 97651->97653 97655 c23861 Mailbox 97652->97655 97654 c5d36f 97653->97654 97656 c23ee2 59 API calls 97654->97656 97658 c277c7 59 API calls 97655->97658 97657 c5d37b 97656->97657 97659 c281a7 59 API calls 97657->97659 97660 c2387f 97658->97660 97661 c5d389 97659->97661 97870 c23ee2 97660->97870 97663 c23ee2 59 API calls 97661->97663 97665 c5d398 97663->97665 97671 c281a7 59 API calls 97665->97671 97667 c23899 97667->97641 97668 c238a3 97667->97668 97669 c4307d _W_store_winword 60 API calls 97668->97669 97670 c238ae 97669->97670 97670->97647 97672 c238b8 97670->97672 97673 c5d3ba 97671->97673 97674 c4307d _W_store_winword 60 API calls 97672->97674 97675 c23ee2 59 API calls 97673->97675 97676 c238c3 97674->97676 97677 c5d3c7 97675->97677 97676->97651 97678 c238cd 97676->97678 97677->97677 97679 c4307d _W_store_winword 60 API calls 97678->97679 97680 c238d8 97679->97680 97680->97665 97681 c23919 97680->97681 97683 c23ee2 59 API calls 97680->97683 97681->97665 97682 c23926 97681->97682 97685 c2942e 59 API calls 97682->97685 97684 c238fc 97683->97684 97686 c281a7 59 API calls 97684->97686 97687 c23936 97685->97687 97688 c2390a 97686->97688 97689 c291b0 59 API calls 97687->97689 97690 c23ee2 59 API calls 97688->97690 97691 c23944 97689->97691 97690->97681 97886 c29040 97691->97886 97693 c293ea 59 API calls 97695 c23961 97693->97695 97694 c29040 60 API calls 97694->97695 97695->97693 97695->97694 97696 c23ee2 59 API calls 97695->97696 97697 c239a7 Mailbox 97695->97697 97696->97695 97697->97567 97699 c273f2 __ftell_nolock 97698->97699 97700 c2740b 97699->97700 97701 c5ed7b _memset 97699->97701 98428 c248ae 97700->98428 97703 c5ed97 GetOpenFileNameW 97701->97703 97705 c5ede6 97703->97705 97707 c27d2c 59 API calls 97705->97707 97709 c5edfb 97707->97709 97709->97709 97711 c27429 98456 c269ca 97711->98456 97715 c30a9a __ftell_nolock 97714->97715 98648 c26ee0 97715->98648 97717 c30a9f 97729 c23c26 97717->97729 98659 c312fe 89 API calls 97717->98659 97719 c30aac 97719->97729 98660 c34047 91 API calls Mailbox 97719->98660 97721 c30ab5 97722 c30ab9 GetFullPathNameW 97721->97722 97721->97729 97723 c27d2c 59 API calls 97722->97723 97724 c30ae5 97723->97724 97725 c27d2c 59 API calls 97724->97725 97726 c30af2 97725->97726 97727 c27d2c 59 API calls 97726->97727 97728 c65004 _wcscat 97726->97728 97727->97729 97729->97577 97729->97585 97731 c23ac2 LoadImageW RegisterClassExW 97730->97731 97732 c5d3cc 97730->97732 98663 c23041 7 API calls 97731->98663 98664 c248fe LoadImageW EnumResourceNamesW 97732->98664 97735 c23b46 97737 c239e7 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97735->97737 97736 c5d3d5 97737->97592 97739 c6501c 97738->97739 97751 c30b55 97738->97751 98728 c89ed4 89 API calls 4 library calls 97739->98728 97741 c30e5a 97741->97600 97743 c31044 97743->97741 97745 c31051 97743->97745 98726 c311f3 275 API calls Mailbox 97745->98726 97746 c30bab PeekMessageW 97814 c30b65 Mailbox 97746->97814 97749 c31058 LockWindowUpdate DestroyWindow GetMessageW 97749->97741 97753 c3108a 97749->97753 97750 c30e44 97750->97741 98725 c311d0 10 API calls Mailbox 97750->98725 97751->97814 98729 c29fbd 60 API calls 97751->98729 98730 c7669f 275 API calls 97751->98730 97752 c651da Sleep 97752->97814 97755 c65fb1 TranslateMessage DispatchMessageW GetMessageW 97753->97755 97755->97755 97756 c65fe1 97755->97756 97756->97741 97757 c30fa3 PeekMessageW 97757->97814 97758 c31005 TranslateMessage DispatchMessageW 97758->97757 97759 c650a9 TranslateAcceleratorW 97759->97757 97759->97814 97760 c65b78 WaitForSingleObject 97766 c65b95 GetExitCodeProcess CloseHandle 97760->97766 97760->97814 97762 c30e73 timeGetTime 97762->97814 97763 c30fbf Sleep 97799 c30fd0 Mailbox 97763->97799 97764 c281a7 59 API calls 97764->97814 97765 c277c7 59 API calls 97765->97799 97798 c310f5 97766->97798 97767 c65e51 Sleep 97767->97799 97769 c40f36 59 API calls Mailbox 97769->97814 97771 c4034a timeGetTime 97771->97799 97772 c310ae timeGetTime 98727 c29fbd 60 API calls 97772->98727 97775 c65ee8 GetExitCodeProcess 97778 c65f14 CloseHandle 97775->97778 97779 c65efe WaitForSingleObject 97775->97779 97776 c29997 84 API calls 97776->97814 97777 c2b93d 109 API calls 97777->97799 97778->97799 97779->97778 97779->97814 97782 ca5f8e 110 API calls 97782->97799 97783 c29fbd 60 API calls 97783->97814 97784 c65bcd 97784->97798 97785 c65f70 Sleep 97785->97814 97786 c653d1 Sleep 97786->97814 97788 c27f41 59 API calls 97788->97799 97792 c2a000 248 API calls 97792->97814 97798->97600 97799->97765 97799->97771 97799->97775 97799->97777 97799->97782 97799->97784 97799->97785 97799->97786 97799->97788 97799->97798 97799->97814 98737 c82700 60 API calls 97799->98737 98738 c29fbd 60 API calls 97799->98738 98739 c28b13 69 API calls Mailbox 97799->98739 98740 c2b89c 275 API calls 97799->98740 98741 c76830 60 API calls 97799->98741 98742 c852eb QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97799->98742 98743 c83c99 66 API calls Mailbox 97799->98743 97800 c89ed4 89 API calls 97800->97814 97802 c28620 69 API calls 97802->97814 97803 c27f41 59 API calls 97803->97814 97804 c29df0 59 API calls Mailbox 97804->97814 97805 c2b89c 248 API calls 97805->97814 97807 c763f2 59 API calls Mailbox 97807->97814 97808 c28b13 69 API calls 97808->97814 97809 c6592e VariantClear 97809->97814 97810 c659c4 VariantClear 97810->97814 97811 c65772 VariantClear 97811->97814 97812 c771e5 59 API calls 97812->97814 97813 c28e34 59 API calls Mailbox 97813->97814 97814->97746 97814->97750 97814->97752 97814->97757 97814->97758 97814->97759 97814->97760 97814->97762 97814->97763 97814->97764 97814->97767 97814->97769 97814->97772 97814->97776 97814->97783 97814->97792 97814->97798 97814->97799 97814->97800 97814->97802 97814->97803 97814->97804 97814->97805 97814->97807 97814->97808 97814->97809 97814->97810 97814->97811 97814->97812 97814->97813 98665 c2e580 97814->98665 98672 c2e800 97814->98672 98705 c2f5c0 97814->98705 98723 c2fe40 275 API calls 2 library calls 97814->98723 98724 c231ce IsDialogMessageW GetClassLongW 97814->98724 98731 ca6081 59 API calls 97814->98731 98732 c89abe 59 API calls Mailbox 97814->98732 98733 c7d801 59 API calls 97814->98733 98734 c76363 59 API calls 2 library calls 97814->98734 98735 c28561 59 API calls 97814->98735 98736 c2843f 59 API calls Mailbox 97814->98736 97815->97570 97816->97577 97817->97589 97819 c51ac0 __ftell_nolock 97818->97819 97820 c24871 GetModuleFileNameW 97819->97820 97821 c27f41 59 API calls 97820->97821 97822 c24897 97821->97822 97823 c248ae 60 API calls 97822->97823 97824 c248a1 Mailbox 97823->97824 97824->97596 97826 c23d50 __ftell_nolock 97825->97826 97827 c27d2c 59 API calls 97826->97827 97829 c23eb6 Mailbox 97826->97829 97830 c23d82 97827->97830 97829->97621 97837 c23db8 Mailbox 97830->97837 97936 c27b52 97830->97936 97831 c23e89 97831->97829 97832 c27f41 59 API calls 97831->97832 97834 c23eaa 97832->97834 97833 c27f41 59 API calls 97833->97837 97835 c23f84 59 API calls 97834->97835 97835->97829 97837->97829 97837->97831 97837->97833 97838 c27b52 59 API calls 97837->97838 97939 c23f84 97837->97939 97838->97837 97945 c24d13 97839->97945 97844 c5dc3f 97846 c24faa 84 API calls 97844->97846 97845 c24f68 LoadLibraryExW 97955 c24cc8 97845->97955 97848 c5dc46 97846->97848 97851 c24cc8 3 API calls 97848->97851 97853 c5dc4e 97851->97853 97852 c24f8f 97852->97853 97854 c24f9b 97852->97854 97981 c2506b 97853->97981 97855 c24faa 84 API calls 97854->97855 97857 c237e6 97855->97857 97857->97628 97857->97629 97860 c5dc75 97989 c25027 97860->97989 97862 c5dc82 97864 c40f36 Mailbox 59 API calls 97863->97864 97865 c2380d 97864->97865 97865->97642 97867 c2862b 97866->97867 97869 c28652 97867->97869 98243 c28b13 69 API calls Mailbox 97867->98243 97869->97646 97871 c23f05 97870->97871 97872 c23eec 97870->97872 97874 c27d2c 59 API calls 97871->97874 97873 c281a7 59 API calls 97872->97873 97875 c2388b 97873->97875 97874->97875 97876 c4307d 97875->97876 97877 c430fe 97876->97877 97878 c43089 97876->97878 98246 c43110 60 API calls 3 library calls 97877->98246 97885 c430ae 97878->97885 98244 c48ca8 58 API calls __getptd_noexit 97878->98244 97881 c4310b 97881->97667 97882 c43095 98245 c48f36 9 API calls __filbuf 97882->98245 97884 c430a0 97884->97667 97885->97667 97887 c5f4d5 97886->97887 97894 c29057 97886->97894 97887->97894 98248 c28d3b 59 API calls Mailbox 97887->98248 97889 c2915f 97889->97695 97890 c291a0 98247 c29e9c 60 API calls Mailbox 97890->98247 97891 c29158 97892 c40f36 Mailbox 59 API calls 97891->97892 97892->97889 97894->97889 97894->97890 97894->97891 97896 c25045 85 API calls 97895->97896 97897 c89673 97896->97897 98249 c897dd 97897->98249 97900 c2506b 74 API calls 97901 c896a0 97900->97901 97902 c2506b 74 API calls 97901->97902 97903 c896b0 97902->97903 97904 c2506b 74 API calls 97903->97904 97905 c896cb 97904->97905 97906 c2506b 74 API calls 97905->97906 97907 c896e6 97906->97907 97908 c25045 85 API calls 97907->97908 97909 c896fd 97908->97909 97910 c4588c __crtCompareStringA_stat 58 API calls 97909->97910 97911 c89704 97910->97911 97912 c4588c __crtCompareStringA_stat 58 API calls 97911->97912 97913 c8970e 97912->97913 97914 c2506b 74 API calls 97913->97914 97915 c89722 97914->97915 97916 c891b2 GetSystemTimeAsFileTime 97915->97916 97917 c89735 97916->97917 97918 c8974a 97917->97918 97919 c8975f 97917->97919 97922 c42ed5 _free 58 API calls 97918->97922 97920 c897c4 97919->97920 97921 c89765 97919->97921 97924 c42ed5 _free 58 API calls 97920->97924 98255 c88baf 97921->98255 97925 c89750 97922->97925 97929 c5d2f1 97924->97929 97927 c42ed5 _free 58 API calls 97925->97927 97927->97929 97928 c42ed5 _free 58 API calls 97928->97929 97929->97633 97930 c24faa 97929->97930 97931 c24fb4 97930->97931 97932 c24fbb 97930->97932 97933 c45516 __fcloseall 83 API calls 97931->97933 97934 c24fca 97932->97934 97935 c24fdb FreeLibrary 97932->97935 97933->97932 97934->97633 97935->97934 97937 c27faf 59 API calls 97936->97937 97938 c27b5d 97937->97938 97938->97830 97940 c23f92 97939->97940 97944 c23fb4 _memmove 97939->97944 97942 c40f36 Mailbox 59 API calls 97940->97942 97941 c40f36 Mailbox 59 API calls 97943 c23fc8 97941->97943 97942->97944 97943->97837 97944->97941 97994 c24d61 97945->97994 97948 c24d3a 97949 c24d53 97948->97949 97950 c24d4a FreeLibrary 97948->97950 97952 c453cb 97949->97952 97950->97949 97951 c24d61 2 API calls 97951->97948 97998 c453e0 97952->97998 97954 c24f5c 97954->97844 97954->97845 98158 c24d94 97955->98158 97958 c24ced 97960 c24d08 97958->97960 97961 c24cff FreeLibrary 97958->97961 97959 c24d94 2 API calls 97959->97958 97962 c24dd0 97960->97962 97961->97960 97963 c40f36 Mailbox 59 API calls 97962->97963 97964 c24de5 97963->97964 98162 c2538e 97964->98162 97966 c24df1 _memmove 97967 c24e2c 97966->97967 97969 c24f21 97966->97969 97970 c24ee9 97966->97970 97968 c25027 69 API calls 97967->97968 97973 c24e35 97968->97973 98176 c899c4 95 API calls 97969->98176 98165 c24fe9 CreateStreamOnHGlobal 97970->98165 97974 c2506b 74 API calls 97973->97974 97976 c24ec9 97973->97976 97977 c5dc00 97973->97977 98171 c25045 97973->98171 97974->97973 97976->97852 97978 c25045 85 API calls 97977->97978 97979 c5dc14 97978->97979 97980 c2506b 74 API calls 97979->97980 97980->97976 97982 c5dd26 97981->97982 97983 c2507d 97981->97983 98200 c45752 97983->98200 97986 c891b2 98220 c89008 97986->98220 97988 c891c8 97988->97860 97990 c25036 97989->97990 97991 c5dce9 97989->97991 98225 c45dd0 97990->98225 97993 c2503e 97993->97862 97995 c24d2e 97994->97995 97996 c24d6a LoadLibraryA 97994->97996 97995->97948 97995->97951 97996->97995 97997 c24d7b GetProcAddress 97996->97997 97997->97995 98000 c453ec _doexit 97998->98000 97999 c453ff 98047 c48ca8 58 API calls __getptd_noexit 97999->98047 98000->97999 98002 c45430 98000->98002 98017 c50668 98002->98017 98003 c45404 98048 c48f36 9 API calls __filbuf 98003->98048 98006 c45435 98007 c4543e 98006->98007 98008 c4544b 98006->98008 98049 c48ca8 58 API calls __getptd_noexit 98007->98049 98010 c45475 98008->98010 98011 c45455 98008->98011 98032 c50787 98010->98032 98050 c48ca8 58 API calls __getptd_noexit 98011->98050 98016 c4540f _doexit @_EH4_CallFilterFunc@8 98016->97954 98018 c50674 _doexit 98017->98018 98019 c49d8b __lock 58 API calls 98018->98019 98020 c50682 98019->98020 98021 c506fd 98020->98021 98027 c49e13 __mtinitlocknum 58 API calls 98020->98027 98030 c506f6 98020->98030 98055 c46dcd 59 API calls __lock 98020->98055 98056 c46e37 LeaveCriticalSection LeaveCriticalSection _doexit 98020->98056 98057 c4899d 58 API calls 2 library calls 98021->98057 98024 c50773 _doexit 98024->98006 98025 c50704 98025->98030 98058 c49fab InitializeCriticalSectionAndSpinCount 98025->98058 98027->98020 98029 c5072a EnterCriticalSection 98029->98030 98052 c5077e 98030->98052 98040 c507a7 __wopenfile 98032->98040 98033 c507c1 98063 c48ca8 58 API calls __getptd_noexit 98033->98063 98035 c507c6 98064 c48f36 9 API calls __filbuf 98035->98064 98037 c45480 98051 c454a2 LeaveCriticalSection LeaveCriticalSection __wfsopen 98037->98051 98038 c509df 98060 c58721 98038->98060 98040->98033 98046 c5097c 98040->98046 98065 c4394b 60 API calls 2 library calls 98040->98065 98042 c50975 98042->98046 98066 c4394b 60 API calls 2 library calls 98042->98066 98044 c50994 98044->98046 98067 c4394b 60 API calls 2 library calls 98044->98067 98046->98033 98046->98038 98047->98003 98048->98016 98049->98016 98050->98016 98051->98016 98059 c49ef5 LeaveCriticalSection 98052->98059 98054 c50785 98054->98024 98055->98020 98056->98020 98057->98025 98058->98029 98059->98054 98068 c57f05 98060->98068 98062 c5873a 98062->98037 98063->98035 98064->98037 98065->98042 98066->98044 98067->98046 98069 c57f11 _doexit 98068->98069 98070 c57f27 98069->98070 98073 c57f5d 98069->98073 98155 c48ca8 58 API calls __getptd_noexit 98070->98155 98072 c57f2c 98156 c48f36 9 API calls __filbuf 98072->98156 98079 c57fce 98073->98079 98076 c57f36 _doexit 98076->98062 98077 c57f79 98157 c57fa2 LeaveCriticalSection __unlock_fhandle 98077->98157 98080 c57fee 98079->98080 98081 c4465a __wsopen_nolock 58 API calls 98080->98081 98084 c5800a 98081->98084 98082 c48f46 __invoke_watson 8 API calls 98083 c58720 98082->98083 98086 c57f05 __wsopen_helper 103 API calls 98083->98086 98085 c58044 98084->98085 98089 c58067 98084->98089 98102 c58141 98084->98102 98088 c48c74 __read_nolock 58 API calls 98085->98088 98087 c5873a 98086->98087 98087->98077 98090 c58049 98088->98090 98094 c58125 98089->98094 98100 c58103 98089->98100 98091 c48ca8 __filbuf 58 API calls 98090->98091 98092 c58056 98091->98092 98093 c48f36 __filbuf 9 API calls 98092->98093 98095 c58060 98093->98095 98096 c48c74 __read_nolock 58 API calls 98094->98096 98095->98077 98097 c5812a 98096->98097 98098 c48ca8 __filbuf 58 API calls 98097->98098 98099 c58137 98098->98099 98101 c48f36 __filbuf 9 API calls 98099->98101 98103 c4d414 __alloc_osfhnd 61 API calls 98100->98103 98101->98102 98102->98082 98104 c581d1 98103->98104 98105 c581fe 98104->98105 98106 c581db 98104->98106 98107 c57e7d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98105->98107 98108 c48c74 __read_nolock 58 API calls 98106->98108 98118 c58220 98107->98118 98109 c581e0 98108->98109 98111 c48ca8 __filbuf 58 API calls 98109->98111 98110 c5829e GetFileType 98112 c582a9 GetLastError 98110->98112 98113 c582eb 98110->98113 98115 c581ea 98111->98115 98117 c48c87 __dosmaperr 58 API calls 98112->98117 98125 c4d6aa __set_osfhnd 59 API calls 98113->98125 98114 c5826c GetLastError 98119 c48c87 __dosmaperr 58 API calls 98114->98119 98116 c48ca8 __filbuf 58 API calls 98115->98116 98116->98095 98120 c582d0 CloseHandle 98117->98120 98118->98110 98118->98114 98121 c57e7d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98118->98121 98122 c58291 98119->98122 98120->98122 98123 c582de 98120->98123 98124 c58261 98121->98124 98127 c48ca8 __filbuf 58 API calls 98122->98127 98126 c48ca8 __filbuf 58 API calls 98123->98126 98124->98110 98124->98114 98130 c58309 98125->98130 98128 c582e3 98126->98128 98127->98102 98128->98122 98129 c584c4 98129->98102 98132 c58697 CloseHandle 98129->98132 98130->98129 98131 c51a41 __lseeki64_nolock 60 API calls 98130->98131 98148 c5838a 98130->98148 98133 c58373 98131->98133 98134 c57e7d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98132->98134 98136 c48c74 __read_nolock 58 API calls 98133->98136 98153 c58392 98133->98153 98135 c586be 98134->98135 98138 c586c6 GetLastError 98135->98138 98139 c5854e 98135->98139 98136->98148 98137 c50fdb 70 API calls __read_nolock 98137->98153 98140 c48c87 __dosmaperr 58 API calls 98138->98140 98139->98102 98142 c586d2 98140->98142 98141 c51a41 60 API calls __lseeki64_nolock 98141->98153 98145 c4d5bd __free_osfhnd 59 API calls 98142->98145 98143 c50c5d __close_nolock 61 API calls 98143->98153 98144 c59922 __chsize_nolock 82 API calls 98144->98153 98145->98139 98146 c4da06 __write 78 API calls 98146->98148 98147 c51a41 60 API calls __lseeki64_nolock 98147->98148 98148->98129 98148->98146 98148->98147 98148->98153 98149 c58541 98150 c50c5d __close_nolock 61 API calls 98149->98150 98152 c58548 98150->98152 98151 c5852a 98151->98129 98154 c48ca8 __filbuf 58 API calls 98152->98154 98153->98137 98153->98141 98153->98143 98153->98144 98153->98148 98153->98149 98153->98151 98154->98139 98155->98072 98156->98076 98157->98076 98159 c24ce1 98158->98159 98160 c24d9d LoadLibraryA 98158->98160 98159->97958 98159->97959 98160->98159 98161 c24dae GetProcAddress 98160->98161 98161->98159 98163 c40f36 Mailbox 59 API calls 98162->98163 98164 c253a0 98163->98164 98164->97966 98166 c25003 FindResourceExW 98165->98166 98170 c25020 98165->98170 98167 c5dc8c LoadResource 98166->98167 98166->98170 98168 c5dca1 SizeofResource 98167->98168 98167->98170 98169 c5dcb5 LockResource 98168->98169 98168->98170 98169->98170 98170->97967 98172 c5dd04 98171->98172 98173 c25054 98171->98173 98177 c459bd 98173->98177 98175 c25062 98175->97973 98176->97967 98178 c459c9 _doexit 98177->98178 98179 c459db 98178->98179 98180 c45a01 98178->98180 98190 c48ca8 58 API calls __getptd_noexit 98179->98190 98192 c46d8e 98180->98192 98183 c459e0 98191 c48f36 9 API calls __filbuf 98183->98191 98184 c45a07 98198 c4592e 83 API calls 4 library calls 98184->98198 98187 c45a16 98199 c45a38 LeaveCriticalSection LeaveCriticalSection __wfsopen 98187->98199 98189 c459eb _doexit 98189->98175 98190->98183 98191->98189 98193 c46dc0 EnterCriticalSection 98192->98193 98194 c46d9e 98192->98194 98196 c46db6 98193->98196 98194->98193 98195 c46da6 98194->98195 98197 c49d8b __lock 58 API calls 98195->98197 98196->98184 98197->98196 98198->98187 98199->98189 98203 c4576d 98200->98203 98202 c2508e 98202->97986 98204 c45779 _doexit 98203->98204 98205 c457bc 98204->98205 98206 c457b4 _doexit 98204->98206 98208 c4578f _memset 98204->98208 98207 c46d8e __lock_file 59 API calls 98205->98207 98206->98202 98209 c457c2 98207->98209 98216 c48ca8 58 API calls __getptd_noexit 98208->98216 98218 c4558d 72 API calls 4 library calls 98209->98218 98212 c457a9 98217 c48f36 9 API calls __filbuf 98212->98217 98213 c457d8 98219 c457f6 LeaveCriticalSection LeaveCriticalSection __wfsopen 98213->98219 98216->98212 98217->98206 98218->98213 98219->98206 98223 c4537a GetSystemTimeAsFileTime 98220->98223 98222 c89017 98222->97988 98224 c453a8 __aulldiv 98223->98224 98224->98222 98226 c45ddc _doexit 98225->98226 98227 c45e03 98226->98227 98228 c45dee 98226->98228 98230 c46d8e __lock_file 59 API calls 98227->98230 98239 c48ca8 58 API calls __getptd_noexit 98228->98239 98232 c45e09 98230->98232 98231 c45df3 98240 c48f36 9 API calls __filbuf 98231->98240 98241 c45a40 67 API calls 5 library calls 98232->98241 98235 c45e14 98242 c45e34 LeaveCriticalSection LeaveCriticalSection __wfsopen 98235->98242 98236 c45dfe _doexit 98236->97993 98238 c45e26 98238->98236 98239->98231 98240->98236 98241->98235 98242->98238 98243->97869 98244->97882 98245->97884 98246->97881 98247->97889 98248->97894 98252 c897f1 __tzset_nolock _wcscmp 98249->98252 98250 c891b2 GetSystemTimeAsFileTime 98250->98252 98251 c89685 98251->97900 98251->97929 98252->98250 98252->98251 98253 c2506b 74 API calls 98252->98253 98254 c25045 85 API calls 98252->98254 98253->98252 98254->98252 98256 c88bc8 98255->98256 98257 c88bba 98255->98257 98259 c88c0d 98256->98259 98260 c453cb 115 API calls 98256->98260 98285 c88bd1 98256->98285 98258 c453cb 115 API calls 98257->98258 98258->98256 98286 c88e3a 74 API calls 3 library calls 98259->98286 98262 c88bf2 98260->98262 98262->98259 98264 c88bfb 98262->98264 98263 c88c51 98265 c88c55 98263->98265 98266 c88c76 98263->98266 98264->98285 98296 c45516 98264->98296 98269 c88c62 98265->98269 98271 c45516 __fcloseall 83 API calls 98265->98271 98287 c88a52 98266->98287 98274 c45516 __fcloseall 83 API calls 98269->98274 98269->98285 98271->98269 98272 c88ca4 98309 c88cd4 90 API calls 98272->98309 98273 c88c84 98275 c88c91 98273->98275 98278 c45516 __fcloseall 83 API calls 98273->98278 98274->98285 98280 c45516 __fcloseall 83 API calls 98275->98280 98275->98285 98277 c88cab 98310 c88db6 58 API calls _free 98277->98310 98278->98275 98280->98285 98281 c88cb2 98282 c88cbf 98281->98282 98283 c45516 __fcloseall 83 API calls 98281->98283 98284 c45516 __fcloseall 83 API calls 98282->98284 98282->98285 98283->98282 98284->98285 98285->97928 98286->98263 98288 c4588c __crtCompareStringA_stat 58 API calls 98287->98288 98289 c88a61 98288->98289 98290 c4588c __crtCompareStringA_stat 58 API calls 98289->98290 98291 c88a75 98290->98291 98292 c4588c __crtCompareStringA_stat 58 API calls 98291->98292 98293 c88a89 98292->98293 98295 c88a9c 98293->98295 98311 c88db6 58 API calls _free 98293->98311 98295->98272 98295->98273 98297 c45522 _doexit 98296->98297 98298 c45536 98297->98298 98299 c4554e 98297->98299 98328 c48ca8 58 API calls __getptd_noexit 98298->98328 98302 c45546 _doexit 98299->98302 98303 c46d8e __lock_file 59 API calls 98299->98303 98301 c4553b 98329 c48f36 9 API calls __filbuf 98301->98329 98302->98285 98305 c45560 98303->98305 98312 c454aa 98305->98312 98309->98277 98310->98281 98311->98295 98313 c454cd 98312->98313 98314 c454b9 98312->98314 98321 c454c9 98313->98321 98331 c44bad 98313->98331 98374 c48ca8 58 API calls __getptd_noexit 98314->98374 98317 c454be 98375 c48f36 9 API calls __filbuf 98317->98375 98330 c45585 LeaveCriticalSection LeaveCriticalSection __wfsopen 98321->98330 98324 c454e7 98348 c50b82 98324->98348 98326 c454ed 98326->98321 98327 c42ed5 _free 58 API calls 98326->98327 98327->98321 98328->98301 98329->98302 98330->98302 98332 c44bc0 98331->98332 98336 c44be4 98331->98336 98333 c44856 __filbuf 58 API calls 98332->98333 98332->98336 98334 c44bdd 98333->98334 98376 c4da06 78 API calls 6 library calls 98334->98376 98337 c50cf7 98336->98337 98338 c454e1 98337->98338 98339 c50d04 98337->98339 98341 c44856 98338->98341 98339->98338 98340 c42ed5 _free 58 API calls 98339->98340 98340->98338 98342 c44875 98341->98342 98343 c44860 98341->98343 98342->98324 98377 c48ca8 58 API calls __getptd_noexit 98343->98377 98345 c44865 98378 c48f36 9 API calls __filbuf 98345->98378 98347 c44870 98347->98324 98349 c50b8e _doexit 98348->98349 98350 c50bb2 98349->98350 98351 c50b9b 98349->98351 98353 c50c3d 98350->98353 98355 c50bc2 98350->98355 98403 c48c74 58 API calls __getptd_noexit 98351->98403 98408 c48c74 58 API calls __getptd_noexit 98353->98408 98354 c50ba0 98404 c48ca8 58 API calls __getptd_noexit 98354->98404 98358 c50be0 98355->98358 98359 c50bea 98355->98359 98405 c48c74 58 API calls __getptd_noexit 98358->98405 98379 c4d386 98359->98379 98361 c50be5 98409 c48ca8 58 API calls __getptd_noexit 98361->98409 98364 c50bf0 98366 c50c03 98364->98366 98367 c50c0e 98364->98367 98365 c50c49 98410 c48f36 9 API calls __filbuf 98365->98410 98388 c50c5d 98366->98388 98406 c48ca8 58 API calls __getptd_noexit 98367->98406 98370 c50ba7 _doexit 98370->98326 98372 c50c09 98407 c50c35 LeaveCriticalSection __unlock_fhandle 98372->98407 98374->98317 98375->98321 98376->98336 98377->98345 98378->98347 98380 c4d392 _doexit 98379->98380 98381 c4d3e1 EnterCriticalSection 98380->98381 98383 c49d8b __lock 58 API calls 98380->98383 98382 c4d407 _doexit 98381->98382 98382->98364 98384 c4d3b7 98383->98384 98387 c4d3cf 98384->98387 98411 c49fab InitializeCriticalSectionAndSpinCount 98384->98411 98412 c4d40b LeaveCriticalSection _doexit 98387->98412 98413 c4d643 98388->98413 98390 c50cc1 98426 c4d5bd 59 API calls 2 library calls 98390->98426 98392 c50c6b 98392->98390 98394 c4d643 __lseek_nolock 58 API calls 98392->98394 98402 c50c9f 98392->98402 98393 c50cc9 98401 c50ceb 98393->98401 98427 c48c87 58 API calls 3 library calls 98393->98427 98396 c50c96 98394->98396 98395 c4d643 __lseek_nolock 58 API calls 98397 c50cab CloseHandle 98395->98397 98399 c4d643 __lseek_nolock 58 API calls 98396->98399 98397->98390 98400 c50cb7 GetLastError 98397->98400 98399->98402 98400->98390 98401->98372 98402->98390 98402->98395 98403->98354 98404->98370 98405->98361 98406->98372 98407->98370 98408->98361 98409->98365 98410->98370 98411->98387 98412->98381 98414 c4d64e 98413->98414 98417 c4d663 98413->98417 98415 c48c74 __read_nolock 58 API calls 98414->98415 98416 c4d653 98415->98416 98419 c48ca8 __filbuf 58 API calls 98416->98419 98418 c48c74 __read_nolock 58 API calls 98417->98418 98420 c4d688 98417->98420 98421 c4d692 98418->98421 98422 c4d65b 98419->98422 98420->98392 98423 c48ca8 __filbuf 58 API calls 98421->98423 98422->98392 98424 c4d69a 98423->98424 98425 c48f36 __filbuf 9 API calls 98424->98425 98425->98422 98426->98393 98427->98401 98490 c51ac0 98428->98490 98431 c248f7 98492 c27eec 98431->98492 98432 c248da 98433 c27d2c 59 API calls 98432->98433 98435 c248e6 98433->98435 98436 c27886 59 API calls 98435->98436 98437 c248f2 98436->98437 98438 c40911 98437->98438 98439 c51ac0 __ftell_nolock 98438->98439 98440 c4091e GetLongPathNameW 98439->98440 98441 c27d2c 59 API calls 98440->98441 98442 c2741d 98441->98442 98443 c2716b 98442->98443 98444 c277c7 59 API calls 98443->98444 98445 c2717d 98444->98445 98446 c248ae 60 API calls 98445->98446 98447 c27188 98446->98447 98448 c27193 98447->98448 98452 c5ebde 98447->98452 98450 c23f84 59 API calls 98448->98450 98451 c2719f 98450->98451 98496 c234c2 98451->98496 98454 c5ebf8 98452->98454 98502 c27a68 61 API calls 98452->98502 98455 c271b2 Mailbox 98455->97711 98457 c24f3d 136 API calls 98456->98457 98458 c269ef 98457->98458 98459 c5e38a 98458->98459 98461 c24f3d 136 API calls 98458->98461 98460 c89604 122 API calls 98459->98460 98462 c5e39f 98460->98462 98463 c26a03 98461->98463 98464 c5e3c0 98462->98464 98465 c5e3a3 98462->98465 98463->98459 98466 c26a0b 98463->98466 98470 c40f36 Mailbox 59 API calls 98464->98470 98469 c24faa 84 API calls 98465->98469 98467 c26a17 98466->98467 98468 c5e3ab 98466->98468 98503 c26bec 98467->98503 98618 c84339 90 API calls _wprintf 98468->98618 98469->98468 98489 c5e405 Mailbox 98470->98489 98474 c5e3b9 98474->98464 98475 c5e5b9 98476 c42ed5 _free 58 API calls 98475->98476 98477 c5e5c1 98476->98477 98478 c24faa 84 API calls 98477->98478 98483 c5e5ca 98478->98483 98482 c42ed5 _free 58 API calls 98482->98483 98483->98482 98484 c24faa 84 API calls 98483->98484 98620 c7fad2 89 API calls 4 library calls 98483->98620 98484->98483 98486 c27f41 59 API calls 98486->98489 98489->98475 98489->98483 98489->98486 98595 c7fa6e 98489->98595 98598 c87428 98489->98598 98604 c2766f 98489->98604 98612 c274bd 98489->98612 98619 c7f98f 61 API calls 2 library calls 98489->98619 98491 c248bb GetFullPathNameW 98490->98491 98491->98431 98491->98432 98493 c27f06 98492->98493 98495 c27ef9 98492->98495 98494 c40f36 Mailbox 59 API calls 98493->98494 98494->98495 98495->98435 98497 c234d4 98496->98497 98501 c234f3 _memmove 98496->98501 98499 c40f36 Mailbox 59 API calls 98497->98499 98498 c40f36 Mailbox 59 API calls 98500 c2350a 98498->98500 98499->98501 98500->98455 98501->98498 98502->98452 98504 c5e777 98503->98504 98505 c26c15 98503->98505 98638 c7fad2 89 API calls 4 library calls 98504->98638 98626 c25906 60 API calls Mailbox 98505->98626 98508 c5e78a 98639 c7fad2 89 API calls 4 library calls 98508->98639 98509 c26c37 98510 c25956 67 API calls 98509->98510 98511 c26c4c 98510->98511 98511->98508 98513 c26c54 98511->98513 98515 c277c7 59 API calls 98513->98515 98514 c5e7a6 98518 c26cc1 98514->98518 98516 c26c60 98515->98516 98627 c40ad7 60 API calls __ftell_nolock 98516->98627 98520 c5e7b9 98518->98520 98521 c26ccf 98518->98521 98519 c26c6c 98522 c277c7 59 API calls 98519->98522 98523 c25dcf CloseHandle 98520->98523 98524 c277c7 59 API calls 98521->98524 98525 c26c78 98522->98525 98526 c5e7c5 98523->98526 98527 c26cd8 98524->98527 98528 c248ae 60 API calls 98525->98528 98529 c24f3d 136 API calls 98526->98529 98530 c277c7 59 API calls 98527->98530 98531 c26c86 98528->98531 98532 c5e7e1 98529->98532 98533 c26ce1 98530->98533 98628 c259b0 ReadFile SetFilePointerEx 98531->98628 98536 c5e80a 98532->98536 98540 c89604 122 API calls 98532->98540 98630 c246f9 59 API calls Mailbox 98533->98630 98640 c7fad2 89 API calls 4 library calls 98536->98640 98537 c26cf8 98541 c27c8e 59 API calls 98537->98541 98539 c26cb2 98629 c25c4e SetFilePointerEx SetFilePointerEx 98539->98629 98543 c5e7fd 98540->98543 98546 c26d09 SetCurrentDirectoryW 98541->98546 98544 c5e805 98543->98544 98545 c5e826 98543->98545 98547 c24faa 84 API calls 98544->98547 98548 c24faa 84 API calls 98545->98548 98552 c26d1c Mailbox 98546->98552 98547->98536 98550 c5e82b 98548->98550 98549 c26e6c Mailbox 98621 c25934 98549->98621 98551 c40f36 Mailbox 59 API calls 98550->98551 98557 c5e85f 98551->98557 98554 c40f36 Mailbox 59 API calls 98552->98554 98556 c26d2f 98554->98556 98555 c23bcd 98555->97570 98555->97579 98558 c2538e 59 API calls 98556->98558 98559 c2766f 59 API calls 98557->98559 98584 c26d3a Mailbox __NMSG_WRITE 98558->98584 98592 c5e8a8 Mailbox 98559->98592 98560 c26e47 98562 c25dcf CloseHandle 98560->98562 98561 c5ea99 98643 c87388 59 API calls Mailbox 98561->98643 98564 c26e53 SetCurrentDirectoryW 98562->98564 98564->98549 98567 c5eabb 98644 c8f656 59 API calls 2 library calls 98567->98644 98570 c5eac8 98572 c42ed5 _free 58 API calls 98570->98572 98571 c5eb32 98647 c7fad2 89 API calls 4 library calls 98571->98647 98572->98549 98575 c2766f 59 API calls 98575->98592 98576 c5eb4b 98576->98560 98578 c5eb2a 98646 c7f928 59 API calls 4 library calls 98578->98646 98581 c27f41 59 API calls 98581->98584 98583 c7fa6e 59 API calls 98583->98592 98584->98560 98584->98571 98584->98578 98584->98581 98631 c259cd 67 API calls _wcscpy 98584->98631 98632 c270bd GetStringTypeW 98584->98632 98633 c2702c 60 API calls __wcsnicmp 98584->98633 98634 c2710a GetStringTypeW __NMSG_WRITE 98584->98634 98635 c437bd GetStringTypeW _iswctype 98584->98635 98636 c26a3c 165 API calls 3 library calls 98584->98636 98637 c27373 59 API calls Mailbox 98584->98637 98585 c27f41 59 API calls 98585->98592 98586 c87428 59 API calls 98586->98592 98589 c5eaeb 98645 c7fad2 89 API calls 4 library calls 98589->98645 98591 c5eb04 98593 c42ed5 _free 58 API calls 98591->98593 98592->98561 98592->98575 98592->98583 98592->98585 98592->98586 98592->98589 98641 c7f98f 61 API calls 2 library calls 98592->98641 98642 c27373 59 API calls Mailbox 98592->98642 98594 c5e821 98593->98594 98594->98549 98596 c40f36 Mailbox 59 API calls 98595->98596 98597 c7fa9e _memmove 98596->98597 98597->98489 98599 c87433 98598->98599 98600 c40f36 Mailbox 59 API calls 98599->98600 98602 c8744a 98600->98602 98601 c87459 98601->98489 98602->98601 98603 c27f41 59 API calls 98602->98603 98603->98601 98605 c2770f 98604->98605 98609 c27682 _memmove 98604->98609 98607 c40f36 Mailbox 59 API calls 98605->98607 98606 c40f36 Mailbox 59 API calls 98608 c27689 98606->98608 98607->98609 98610 c40f36 Mailbox 59 API calls 98608->98610 98611 c276b2 98608->98611 98609->98606 98610->98611 98611->98489 98613 c274d0 98612->98613 98616 c2757e 98612->98616 98615 c40f36 Mailbox 59 API calls 98613->98615 98617 c27502 98613->98617 98614 c40f36 59 API calls Mailbox 98614->98617 98615->98617 98616->98489 98617->98614 98617->98616 98618->98474 98619->98489 98620->98483 98622 c25dcf CloseHandle 98621->98622 98623 c2593c Mailbox 98622->98623 98624 c25dcf CloseHandle 98623->98624 98625 c2594b 98624->98625 98625->98555 98626->98509 98627->98519 98628->98539 98629->98518 98630->98537 98631->98584 98632->98584 98633->98584 98634->98584 98635->98584 98636->98584 98637->98584 98638->98508 98639->98514 98640->98594 98641->98592 98642->98592 98643->98567 98644->98570 98645->98591 98646->98571 98647->98576 98649 c26ef5 98648->98649 98653 c27009 98648->98653 98650 c40f36 Mailbox 59 API calls 98649->98650 98649->98653 98652 c26f1c 98650->98652 98651 c40f36 Mailbox 59 API calls 98654 c26f91 98651->98654 98652->98651 98653->97717 98654->98653 98657 c274bd 59 API calls 98654->98657 98658 c2766f 59 API calls 98654->98658 98661 c263a0 94 API calls 2 library calls 98654->98661 98662 c768a9 59 API calls Mailbox 98654->98662 98657->98654 98658->98654 98659->97719 98660->97721 98661->98654 98662->98654 98663->97735 98664->97736 98666 c2e59d 98665->98666 98668 c2e5b1 98665->98668 98744 c2e060 275 API calls 2 library calls 98666->98744 98745 c89ed4 89 API calls 4 library calls 98668->98745 98669 c2e5a8 98669->97814 98671 c63dfd 98671->98671 98673 c2e835 98672->98673 98674 c63e02 98673->98674 98676 c2e89f 98673->98676 98689 c2e8f9 98673->98689 98747 c2a000 98674->98747 98675 c2ebe1 98679 c277c7 59 API calls 98675->98679 98703 c2ead0 Mailbox 98675->98703 98676->98675 98682 c277c7 59 API calls 98676->98682 98676->98689 98678 c63e17 98678->98703 98770 c89ed4 89 API calls 4 library calls 98678->98770 98680 c63e96 98679->98680 98683 c42ec0 __cinit 67 API calls 98680->98683 98684 c63e5d 98682->98684 98683->98703 98686 c42ec0 __cinit 67 API calls 98684->98686 98685 c63e7f 98685->97814 98686->98689 98687 c89ed4 89 API calls 98687->98703 98688 c28620 69 API calls 98688->98703 98689->98675 98689->98685 98692 c2eaba 98689->98692 98689->98703 98690 c2a000 275 API calls 98690->98703 98692->98703 98771 c89ed4 89 API calls 4 library calls 98692->98771 98696 c2f2f5 98775 c89ed4 89 API calls 4 library calls 98696->98775 98697 c6417e 98697->97814 98698 c28ea0 59 API calls 98698->98703 98703->98687 98703->98688 98703->98690 98703->98696 98703->98698 98704 c2ebd8 98703->98704 98746 c280d7 59 API calls 2 library calls 98703->98746 98772 c771e5 59 API calls 98703->98772 98773 c9c6d7 275 API calls 98703->98773 98774 c9b651 275 API calls Mailbox 98703->98774 98776 c29df0 59 API calls Mailbox 98703->98776 98777 c994db 275 API calls Mailbox 98703->98777 98704->97814 98706 c2f7b0 98705->98706 98707 c2f61a 98705->98707 98710 c27f41 59 API calls 98706->98710 98708 c64777 98707->98708 98709 c2f626 98707->98709 98789 c9bd80 275 API calls Mailbox 98708->98789 98787 c2f3f0 275 API calls 2 library calls 98709->98787 98716 c2f6ec Mailbox 98710->98716 98712 c64785 98717 c2f790 98712->98717 98790 c89ed4 89 API calls 4 library calls 98712->98790 98715 c2f65d 98715->98712 98715->98716 98715->98717 98721 c25dcf CloseHandle 98716->98721 98722 c9e037 130 API calls 98716->98722 98784 c8dee9 98716->98784 98717->97814 98719 c2f743 98719->98717 98788 c29df0 59 API calls Mailbox 98719->98788 98721->98719 98722->98719 98723->97814 98724->97814 98725->97743 98726->97749 98727->97814 98728->97751 98729->97751 98730->97751 98731->97814 98732->97814 98733->97814 98734->97814 98735->97814 98736->97814 98737->97799 98738->97799 98739->97799 98740->97799 98741->97799 98742->97799 98743->97799 98744->98669 98745->98671 98746->98703 98748 c2a01f 98747->98748 98768 c2a04d Mailbox 98747->98768 98749 c40f36 Mailbox 59 API calls 98748->98749 98749->98768 98750 c2b5da 98783 c89ed4 89 API calls 4 library calls 98750->98783 98751 c2b5d5 98752 c281a7 59 API calls 98751->98752 98753 c2a1b7 98752->98753 98753->98678 98754 c771e5 59 API calls 98754->98768 98755 c277c7 59 API calls 98755->98768 98756 c40f36 59 API calls Mailbox 98756->98768 98759 c281a7 59 API calls 98759->98768 98760 c42ec0 67 API calls __cinit 98760->98768 98762 c603ae 98780 c89ed4 89 API calls 4 library calls 98762->98780 98765 c603bd 98765->98678 98766 c60d2f 98782 c89ed4 89 API calls 4 library calls 98766->98782 98768->98750 98768->98751 98768->98753 98768->98754 98768->98755 98768->98756 98768->98759 98768->98760 98768->98762 98768->98766 98769 c2a6ba 98768->98769 98778 c2ca20 275 API calls 2 library calls 98768->98778 98779 c2ba60 60 API calls Mailbox 98768->98779 98781 c89ed4 89 API calls 4 library calls 98769->98781 98770->98703 98771->98703 98772->98703 98773->98703 98774->98703 98775->98697 98776->98703 98777->98703 98778->98768 98779->98768 98780->98765 98781->98753 98782->98750 98783->98753 98791 c8f2c6 98784->98791 98786 c8def9 98786->98719 98787->98715 98788->98719 98789->98712 98790->98717 98792 c8f33b 98791->98792 98793 c8f2e1 98791->98793 98834 c8f600 59 API calls 98792->98834 98794 c40f36 Mailbox 59 API calls 98793->98794 98796 c8f2e8 98794->98796 98798 c8f2f4 98796->98798 98832 c25906 60 API calls Mailbox 98796->98832 98797 c8f348 98801 c8f414 98797->98801 98802 c8f322 98797->98802 98808 c8f388 98797->98808 98800 c29997 84 API calls 98798->98800 98804 c8f306 98800->98804 98828 c887be 98801->98828 98802->98786 98806 c25956 67 API calls 98804->98806 98805 c8f41b 98811 c8349e 3 API calls 98805->98811 98807 c8f312 98806->98807 98807->98797 98810 c8f316 98807->98810 98809 c29997 84 API calls 98808->98809 98816 c8f38f 98809->98816 98810->98802 98833 c25a1a CloseHandle 98810->98833 98827 c8f3f7 Mailbox 98811->98827 98813 c8f40a 98836 c834ed 66 API calls Mailbox 98813->98836 98814 c8f3c3 98817 c27b76 59 API calls 98814->98817 98816->98813 98816->98814 98819 c8f3d3 98817->98819 98818 c25dcf CloseHandle 98820 c8f469 98818->98820 98821 c281a7 59 API calls 98819->98821 98820->98802 98837 c25a1a CloseHandle 98820->98837 98822 c8f3dd 98821->98822 98824 c27e0b 59 API calls 98822->98824 98825 c8f3eb 98824->98825 98835 c834ed 66 API calls Mailbox 98825->98835 98827->98802 98827->98818 98829 c887cc 98828->98829 98830 c887c7 98828->98830 98829->98805 98838 c8785c 61 API calls 2 library calls 98830->98838 98832->98798 98833->98802 98834->98797 98835->98827 98836->98827 98837->98802 98838->98829 98839 c2e70b 98842 c2d260 98839->98842 98841 c2e719 98843 c2d27d 98842->98843 98871 c2d4dd 98842->98871 98844 c629ea 98843->98844 98845 c62a39 98843->98845 98874 c2d2a4 98843->98874 98848 c629ed 98844->98848 98856 c62a08 98844->98856 98886 c9a4fb 275 API calls __cinit 98845->98886 98849 c629f9 98848->98849 98848->98874 98884 c9ab0f 275 API calls 98849->98884 98850 c42ec0 __cinit 67 API calls 98850->98874 98853 c2d594 98878 c28bb2 68 API calls 98853->98878 98854 c62c0e 98854->98854 98855 c2d6ab 98855->98841 98856->98871 98885 c9afb7 275 API calls 3 library calls 98856->98885 98860 c2d5a3 98860->98841 98861 c62b55 98890 c9a866 89 API calls 98861->98890 98864 c28620 69 API calls 98864->98874 98871->98855 98891 c89ed4 89 API calls 4 library calls 98871->98891 98872 c2a000 275 API calls 98872->98874 98873 c281a7 59 API calls 98873->98874 98874->98850 98874->98853 98874->98855 98874->98861 98874->98864 98874->98871 98874->98872 98874->98873 98876 c288a0 68 API calls __cinit 98874->98876 98877 c286a2 68 API calls 98874->98877 98879 c2859a 68 API calls 98874->98879 98880 c2d0dc 275 API calls 98874->98880 98881 c29f3a 59 API calls Mailbox 98874->98881 98882 c2d060 89 API calls 98874->98882 98883 c2cedd 275 API calls 98874->98883 98887 c28bb2 68 API calls 98874->98887 98888 c29e9c 60 API calls Mailbox 98874->98888 98889 c76ae3 60 API calls 98874->98889 98876->98874 98877->98874 98878->98860 98879->98874 98880->98874 98881->98874 98882->98874 98883->98874 98884->98855 98885->98871 98886->98874 98887->98874 98888->98874 98889->98874 98890->98871 98891->98854 98892 c644c8 98896 c7625a 98892->98896 98894 c644d3 98895 c7625a 85 API calls 98894->98895 98895->98894 98902 c76294 98896->98902 98904 c76267 98896->98904 98897 c76296 98908 c29488 84 API calls Mailbox 98897->98908 98898 c7629b 98900 c29997 84 API calls 98898->98900 98901 c762a2 98900->98901 98903 c27c8e 59 API calls 98901->98903 98902->98894 98903->98902 98904->98897 98904->98898 98904->98902 98905 c7628e 98904->98905 98907 c29700 59 API calls _wcsstr 98905->98907 98907->98902 98908->98898 98909 c2107d 98914 c271eb 98909->98914 98911 c2108c 98912 c42ec0 __cinit 67 API calls 98911->98912 98913 c21096 98912->98913 98915 c271fb __ftell_nolock 98914->98915 98916 c277c7 59 API calls 98915->98916 98917 c272b1 98916->98917 98918 c24864 61 API calls 98917->98918 98919 c272ba 98918->98919 98945 c4068b 98919->98945 98922 c27e0b 59 API calls 98923 c272d3 98922->98923 98924 c23f84 59 API calls 98923->98924 98925 c272e2 98924->98925 98926 c277c7 59 API calls 98925->98926 98927 c272eb 98926->98927 98928 c27eec 59 API calls 98927->98928 98929 c272f4 RegOpenKeyExW 98928->98929 98930 c5ec0a RegQueryValueExW 98929->98930 98934 c27316 Mailbox 98929->98934 98931 c5ec27 98930->98931 98932 c5ec9c RegCloseKey 98930->98932 98933 c40f36 Mailbox 59 API calls 98931->98933 98932->98934 98944 c5ecae _wcscat Mailbox __NMSG_WRITE 98932->98944 98935 c5ec40 98933->98935 98934->98911 98937 c2538e 59 API calls 98935->98937 98936 c27b52 59 API calls 98936->98944 98938 c5ec4b RegQueryValueExW 98937->98938 98939 c5ec68 98938->98939 98941 c5ec82 98938->98941 98940 c27d2c 59 API calls 98939->98940 98940->98941 98941->98932 98942 c27f41 59 API calls 98942->98944 98943 c23f84 59 API calls 98943->98944 98944->98934 98944->98936 98944->98942 98944->98943 98946 c51ac0 __ftell_nolock 98945->98946 98947 c40698 GetFullPathNameW 98946->98947 98948 c406ba 98947->98948 98949 c27d2c 59 API calls 98948->98949 98950 c272c5 98949->98950 98950->98922

    Control-flow Graph

    APIs
    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C23B7A
    • IsDebuggerPresent.KERNEL32 ref: 00C23B8C
    • GetFullPathNameW.KERNEL32(00007FFF,?,?,00CE52F8,00CE52E0,?,?), ref: 00C23BFD
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
      • Part of subcall function 00C30A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00C23C26,00CE52F8,?,?,?), ref: 00C30ACE
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C23C81
    • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00CD7770,00000010), ref: 00C5D3EC
    • SetCurrentDirectoryW.KERNEL32(?,00CE52F8,?,?,?), ref: 00C5D424
    • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00CD4260,00CE52F8,?,?,?), ref: 00C5D4AA
    • ShellExecuteW.SHELL32(00000000,?,?), ref: 00C5D4B1
      • Part of subcall function 00C23A58: GetSysColorBrush.USER32(0000000F), ref: 00C23A62
      • Part of subcall function 00C23A58: LoadCursorW.USER32(00000000,00007F00), ref: 00C23A71
      • Part of subcall function 00C23A58: LoadIconW.USER32(00000063), ref: 00C23A88
      • Part of subcall function 00C23A58: LoadIconW.USER32(000000A4), ref: 00C23A9A
      • Part of subcall function 00C23A58: LoadIconW.USER32(000000A2), ref: 00C23AAC
      • Part of subcall function 00C23A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00C23AD2
      • Part of subcall function 00C23A58: RegisterClassExW.USER32(?), ref: 00C23B28
      • Part of subcall function 00C239E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C23A15
      • Part of subcall function 00C239E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C23A36
      • Part of subcall function 00C239E7: ShowWindow.USER32(00000000,?,?), ref: 00C23A4A
      • Part of subcall function 00C239E7: ShowWindow.USER32(00000000,?,?), ref: 00C23A53
      • Part of subcall function 00C243DB: _memset.LIBCMT ref: 00C24401
      • Part of subcall function 00C243DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C244A6
    Strings
    • This is a third-party compiled AutoIt script., xrefs: 00C5D3E4
    • runas, xrefs: 00C5D4A5
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
    • String ID: This is a third-party compiled AutoIt script.$runas
    • API String ID: 529118366-3287110873
    • Opcode ID: 552fa4581517543344b7846765113dee4982b7431d1ea607cdaabb28b58efede
    • Instruction ID: 6095337cbfa458b10e73c381f8ac9d39d6f4b99307eb4d296cdd3a59236e54b7
    • Opcode Fuzzy Hash: 552fa4581517543344b7846765113dee4982b7431d1ea607cdaabb28b58efede
    • Instruction Fuzzy Hash: EB5128719042D8AECF12EBF4FC85BFD7B74AF05308B004269FA51BA5A1DA744746EB21

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 845 c24afe-c24b5e call c277c7 GetVersionExW call c27d2c 850 c24b64 845->850 851 c24c69-c24c6b 845->851 853 c24b67-c24b6c 850->853 852 c5dac0-c5dacc 851->852 854 c5dacd-c5dad1 852->854 855 c24b72 853->855 856 c24c70-c24c71 853->856 858 c5dad4-c5dae0 854->858 859 c5dad3 854->859 857 c24b73-c24baa call c27e8c call c27886 855->857 856->857 867 c24bb0-c24bb1 857->867 868 c5dbbd-c5dbc0 857->868 858->854 861 c5dae2-c5dae7 858->861 859->858 861->853 863 c5daed-c5daf4 861->863 863->852 865 c5daf6 863->865 869 c5dafb-c5dafe 865->869 867->869 870 c24bb7-c24bc2 867->870 871 c5dbc2 868->871 872 c5dbd9-c5dbdd 868->872 873 c5db04-c5db22 869->873 874 c24bf1-c24c08 GetCurrentProcess IsWow64Process 869->874 875 c5db43-c5db49 870->875 876 c24bc8-c24bca 870->876 877 c5dbc5 871->877 879 c5dbdf-c5dbe8 872->879 880 c5dbc8-c5dbd1 872->880 873->874 878 c5db28-c5db2e 873->878 881 c24c0a 874->881 882 c24c0d-c24c1e 874->882 887 c5db53-c5db59 875->887 888 c5db4b-c5db4e 875->888 883 c24bd0-c24bd3 876->883 884 c5db5e-c5db6a 876->884 877->880 885 c5db30-c5db33 878->885 886 c5db38-c5db3e 878->886 879->877 889 c5dbea-c5dbed 879->889 880->872 881->882 890 c24c20-c24c30 call c24c95 882->890 891 c24c89-c24c93 GetSystemInfo 882->891 892 c24bd9-c24be8 883->892 893 c5db8a-c5db8d 883->893 895 c5db74-c5db7a 884->895 896 c5db6c-c5db6f 884->896 885->874 886->874 887->874 888->874 889->880 902 c24c32-c24c3f call c24c95 890->902 903 c24c7d-c24c87 GetSystemInfo 890->903 894 c24c56-c24c66 891->894 898 c5db7f-c5db85 892->898 899 c24bee 892->899 893->874 901 c5db93-c5dba8 893->901 895->874 896->874 898->874 899->874 904 c5dbb2-c5dbb8 901->904 905 c5dbaa-c5dbad 901->905 910 c24c41-c24c45 GetNativeSystemInfo 902->910 911 c24c76-c24c7b 902->911 906 c24c47-c24c4b 903->906 904->874 905->874 906->894 908 c24c4d-c24c50 FreeLibrary 906->908 908->894 910->906 911->910
    APIs
    • GetVersionExW.KERNEL32(?), ref: 00C24B2B
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
    • GetCurrentProcess.KERNEL32(?,00CAFAEC,00000000,00000000,?), ref: 00C24BF8
    • IsWow64Process.KERNEL32(00000000), ref: 00C24BFF
    • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00C24C45
    • FreeLibrary.KERNEL32(00000000), ref: 00C24C50
    • GetSystemInfo.KERNEL32(00000000), ref: 00C24C81
    • GetSystemInfo.KERNEL32(00000000), ref: 00C24C8D
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
    • String ID:
    • API String ID: 1986165174-0
    • Opcode ID: ea1d364f8e2af6a3e5b82fe4e0b9b2cd855edc4ebe08b6fc73fcc2cbfff1446d
    • Instruction ID: b31b3a8b558d5ff65e38df6733d22d2a0abe51fad35d6ca2fcbdf98b74c8e2fb
    • Opcode Fuzzy Hash: ea1d364f8e2af6a3e5b82fe4e0b9b2cd855edc4ebe08b6fc73fcc2cbfff1446d
    • Instruction Fuzzy Hash: 3D91F63154ABD0DFC735CB68A4512AAFFE5AF26300B484A9DE4DB93E01D230EA48D75D

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 912 c24fe9-c25001 CreateStreamOnHGlobal 913 c25003-c2501a FindResourceExW 912->913 914 c25021-c25026 912->914 915 c25020 913->915 916 c5dc8c-c5dc9b LoadResource 913->916 915->914 916->915 917 c5dca1-c5dcaf SizeofResource 916->917 917->915 918 c5dcb5-c5dcc0 LockResource 917->918 918->915 919 c5dcc6-c5dcce 918->919 920 c5dcd2-c5dce4 919->920 920->915
    APIs
    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00C24EEE,?,?,00000000,00000000), ref: 00C24FF9
    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00C24EEE,?,?,00000000,00000000), ref: 00C25010
    • LoadResource.KERNEL32(?,00000000,?,?,00C24EEE,?,?,00000000,00000000,?,?,?,?,?,?,00C24F8F), ref: 00C5DC90
    • SizeofResource.KERNEL32(?,00000000,?,?,00C24EEE,?,?,00000000,00000000,?,?,?,?,?,?,00C24F8F), ref: 00C5DCA5
    • LockResource.KERNEL32(00C24EEE,?,?,00C24EEE,?,?,00000000,00000000,?,?,?,?,?,?,00C24F8F,00000000), ref: 00C5DCB8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
    • String ID: SCRIPT
    • API String ID: 3051347437-3967369404
    • Opcode ID: a8c037809707dd8f0f290b57a88e76dd4a832f8b7fe24ff8f85aa84d3b5ad259
    • Instruction ID: 59e828a1de066463479609ba76adee0e027502f3fc3a868b701edcfd47a457b9
    • Opcode Fuzzy Hash: a8c037809707dd8f0f290b57a88e76dd4a832f8b7fe24ff8f85aa84d3b5ad259
    • Instruction Fuzzy Hash: 8E117075240701BFD7218B65EC48F6B7BB9EBCAB15F10426CF416C7650DB71EC418660
    Strings
    • Variable must be of type 'Object'., xrefs: 00C641BB
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID: Variable must be of type 'Object'.
    • API String ID: 0-109567571
    • Opcode ID: b12f938cc9f134317058f8ef62f317653b7ae0754aa8b245421e44fd32250c3b
    • Instruction ID: fd9bfbc2609cd310e83b3d557aa230ae136ca5f945a7d47133dbc6747d9d5a0e
    • Opcode Fuzzy Hash: b12f938cc9f134317058f8ef62f317653b7ae0754aa8b245421e44fd32250c3b
    • Instruction Fuzzy Hash: FBA28074A00229CFCB24CF99D4C0AAEB7B1FF59310F648069E916AB751D775ED82CB90
    APIs
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C30BBB
    • timeGetTime.WINMM ref: 00C30E76
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C30FB3
    • Sleep.KERNEL32(0000000A), ref: 00C30FC1
    • LockWindowUpdate.USER32(00000000,?,?), ref: 00C3105A
    • DestroyWindow.USER32 ref: 00C31066
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00C31080
    • Sleep.KERNEL32(0000000A,?,?), ref: 00C651DC
    • TranslateMessage.USER32(?), ref: 00C65FB9
    • DispatchMessageW.USER32(?), ref: 00C65FC7
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00C65FDB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
    • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
    • API String ID: 4212290369-3242690629
    • Opcode ID: 24a2dfabe78246fc2226fd509107615ad4d1c2052b29a4c48db70d7112c91509
    • Instruction ID: db87bbb0d1acfd5ae481a5fc4fc14267068fcbe6004f9f380a5ecaae6e023653
    • Opcode Fuzzy Hash: 24a2dfabe78246fc2226fd509107615ad4d1c2052b29a4c48db70d7112c91509
    • Instruction Fuzzy Hash: D2B2EC70618741DFDB38DF24C894BAEB7E4BF84304F24491DE59A8B2A1CB71E945DB82

    Control-flow Graph

    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 00C23074
    • RegisterClassExW.USER32(00000030), ref: 00C2309E
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C230AF
    • InitCommonControlsEx.COMCTL32(?), ref: 00C230CC
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C230DC
    • LoadIconW.USER32(000000A9), ref: 00C230F2
    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C23101
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
    • API String ID: 2914291525-1005189915
    • Opcode ID: b31b101fca8de878ac807be79d44bd085b03afda47573e74b9d7507c04b47a95
    • Instruction ID: 075fdc07850b3897c135ccfa83da66501955b54eb9dbaf6505fb6b601b001bb3
    • Opcode Fuzzy Hash: b31b101fca8de878ac807be79d44bd085b03afda47573e74b9d7507c04b47a95
    • Instruction Fuzzy Hash: 6031F6B1841359AFDB508FE4E888BCDBBF4FB09318F10412AE580EA2A0D7B54586CF90

    Control-flow Graph

    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 00C23074
    • RegisterClassExW.USER32(00000030), ref: 00C2309E
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C230AF
    • InitCommonControlsEx.COMCTL32(?), ref: 00C230CC
    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C230DC
    • LoadIconW.USER32(000000A9), ref: 00C230F2
    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C23101
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
    • API String ID: 2914291525-1005189915
    • Opcode ID: d22585d15ac728ae695d2893bc5da48aa0c354f7fb2e952f5a4df25facec3f31
    • Instruction ID: 200d57ec7fbf9b4fcad532c01b9e683178e72307111b186fcb06fd0ab99d07b0
    • Opcode Fuzzy Hash: d22585d15ac728ae695d2893bc5da48aa0c354f7fb2e952f5a4df25facec3f31
    • Instruction Fuzzy Hash: E021C3B1D41258AFDB10DFE4E889B9DBBF4FB09708F00412AFA10EB2A0D7B145458F95

    Control-flow Graph

    APIs
      • Part of subcall function 00C24864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00CE52F8,?,00C237C0,?), ref: 00C24882
      • Part of subcall function 00C4068B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00C272C5), ref: 00C406AD
    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00C27308
    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00C5EC21
    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00C5EC62
    • RegCloseKey.ADVAPI32(?), ref: 00C5ECA0
    • _wcscat.LIBCMT ref: 00C5ECF9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
    • API String ID: 2673923337-2727554177
    • Opcode ID: 6aa9227cccc2502209d7fbc9ff274c89ffcf7a37539e0724fec158fad5fa8403
    • Instruction ID: 31ec64b046003d625d101fa211b1013281570ae9ab0df4f1ddaaa4e0e5249d67
    • Opcode Fuzzy Hash: 6aa9227cccc2502209d7fbc9ff274c89ffcf7a37539e0724fec158fad5fa8403
    • Instruction Fuzzy Hash: FF718F715193519EC704DF65E881A9FBBF8FFA4390F40092EF545CB1A0EB309A48DB55

    Control-flow Graph

    APIs
    • GetSysColorBrush.USER32(0000000F), ref: 00C23A62
    • LoadCursorW.USER32(00000000,00007F00), ref: 00C23A71
    • LoadIconW.USER32(00000063), ref: 00C23A88
    • LoadIconW.USER32(000000A4), ref: 00C23A9A
    • LoadIconW.USER32(000000A2), ref: 00C23AAC
    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00C23AD2
    • RegisterClassExW.USER32(?), ref: 00C23B28
      • Part of subcall function 00C23041: GetSysColorBrush.USER32(0000000F), ref: 00C23074
      • Part of subcall function 00C23041: RegisterClassExW.USER32(00000030), ref: 00C2309E
      • Part of subcall function 00C23041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C230AF
      • Part of subcall function 00C23041: InitCommonControlsEx.COMCTL32(?), ref: 00C230CC
      • Part of subcall function 00C23041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00C230DC
      • Part of subcall function 00C23041: LoadIconW.USER32(000000A9), ref: 00C230F2
      • Part of subcall function 00C23041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00C23101
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
    • String ID: #$0$AutoIt v3
    • API String ID: 423443420-4155596026
    • Opcode ID: 33a4a1f1c14728b41b12e2d6af438750f8b2b44ffb05342312c5b5759753ec5e
    • Instruction ID: 6b62b1392f2703820bb2e95eb13029a1f996d83f9e8ee768cd1ef52a566acf6d
    • Opcode Fuzzy Hash: 33a4a1f1c14728b41b12e2d6af438750f8b2b44ffb05342312c5b5759753ec5e
    • Instruction Fuzzy Hash: A9212771D00358AFEB10DFA4EC89B9D7BB4FB08719F10012AF604EB2A1D7B55A519F94

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 670 c23633-c23681 672 c23683-c23686 670->672 673 c236e1-c236e3 670->673 674 c236e7 672->674 675 c23688-c2368f 672->675 673->672 676 c236e5 673->676 677 c5d24c-c5d27a call c311d0 call c311f3 674->677 678 c236ed-c236f0 674->678 679 c23695-c2369a 675->679 680 c2375d-c23765 PostQuitMessage 675->680 681 c236ca-c236d2 DefWindowProcW 676->681 717 c5d27f-c5d286 677->717 682 c236f2-c236f3 678->682 683 c23715-c2373c SetTimer RegisterWindowMessageW 678->683 684 c236a0-c236a2 679->684 685 c5d2bf-c5d2d3 call c8281f 679->685 688 c23711-c23713 680->688 687 c236d8-c236de 681->687 689 c5d1ef-c5d1f2 682->689 690 c236f9-c2370c KillTimer call c244cb call c23114 682->690 683->688 691 c2373e-c23749 CreatePopupMenu 683->691 692 c23767-c23776 call c24531 684->692 693 c236a8-c236ad 684->693 685->688 710 c5d2d9 685->710 688->687 696 c5d1f4-c5d1f6 689->696 697 c5d228-c5d247 MoveWindow 689->697 690->688 691->688 692->688 699 c5d2a4-c5d2ab 693->699 700 c236b3-c236b8 693->700 704 c5d217-c5d223 SetFocus 696->704 705 c5d1f8-c5d1fb 696->705 697->688 699->681 707 c5d2b1-c5d2ba call c77f5e 699->707 708 c2374b-c2375b call c245df 700->708 709 c236be-c236c4 700->709 704->688 705->709 713 c5d201-c5d212 call c311d0 705->713 707->681 708->688 709->681 709->717 710->681 713->688 717->681 721 c5d28c-c5d29f call c244cb call c243db 717->721 721->681
    APIs
    • DefWindowProcW.USER32(?,?,?,?), ref: 00C236D2
    • KillTimer.USER32(?,00000001), ref: 00C236FC
    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C2371F
    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00C2372A
    • CreatePopupMenu.USER32 ref: 00C2373E
    • PostQuitMessage.USER32(00000000), ref: 00C2375F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
    • String ID: TaskbarCreated
    • API String ID: 129472671-2362178303
    • Opcode ID: 91b562cfe85cff1e16e92a4761edfed12ff8500e6310baa631f9771c5119641e
    • Instruction ID: cff6857d0f59fa5b496b46613736988551bff81706c9e0911a750740ea0ffd1b
    • Opcode Fuzzy Hash: 91b562cfe85cff1e16e92a4761edfed12ff8500e6310baa631f9771c5119641e
    • Instruction Fuzzy Hash: D94146F22006E5ABDF245F68FD49B7D3759FB00304F140128FA12CAAE1CA798F41A761

    Control-flow Graph

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
    • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
    • API String ID: 1825951767-3513169116
    • Opcode ID: 7fd5147b075818c63334591ec06f5a2595f00d6a2b23579bd82cbec625a52685
    • Instruction ID: 3acaeda7e3321e5431eb2f313a06e81025849e626b44da0f57c07925f9b19e51
    • Opcode Fuzzy Hash: 7fd5147b075818c63334591ec06f5a2595f00d6a2b23579bd82cbec625a52685
    • Instruction Fuzzy Hash: 5CA16C72D102699ACF14EBA0EC96AEEB778BF14304F40052AF512B7591EF749A09DB60

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 922 c239e7-c23a57 CreateWindowExW * 2 ShowWindow * 2
    APIs
    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00C23A15
    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00C23A36
    • ShowWindow.USER32(00000000,?,?), ref: 00C23A4A
    • ShowWindow.USER32(00000000,?,?), ref: 00C23A53
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$CreateShow
    • String ID: AutoIt v3$edit
    • API String ID: 1584632944-3779509399
    • Opcode ID: b1e8b27d9fffafb6176d775da310171f66bad7f4a651df31066d10f648e5aeef
    • Instruction ID: 6ec02e9f94c0e65916433309f66d69fdceca039bcb295ff84acf3c6bba136bcd
    • Opcode Fuzzy Hash: b1e8b27d9fffafb6176d775da310171f66bad7f4a651df31066d10f648e5aeef
    • Instruction Fuzzy Hash: E6F017746002907EEA205763AC88F6F3E7DD7C7F58B01002EBA00AA171C6710841DAB0

    Control-flow Graph

    APIs
    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00C5D51C
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
    • _memset.LIBCMT ref: 00C2418D
    • _wcscpy.LIBCMT ref: 00C241E1
    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00C241F1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
    • String ID: Line:
    • API String ID: 3942752672-1585850449
    • Opcode ID: 9b08846a662253e684c64ee7d56ff0141144eba907728bc451db26487c38d159
    • Instruction ID: 9ef3e6710cc816c56b83f1b74f7d66583a62a1bf45acf63e0fcc287c73221b45
    • Opcode Fuzzy Hash: 9b08846a662253e684c64ee7d56ff0141144eba907728bc451db26487c38d159
    • Instruction Fuzzy Hash: B5310271008364AFD725EBA0EC86FDF77E8AF44304F104A1EF295964A1EF70A658D792

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 958 c269ca-c269f1 call c24f3d 961 c269f7-c26a05 call c24f3d 958->961 962 c5e38a-c5e39a call c89604 958->962 961->962 969 c26a0b-c26a11 961->969 965 c5e39f-c5e3a1 962->965 967 c5e3c0-c5e408 call c40f36 965->967 968 c5e3a3-c5e3a6 call c24faa 965->968 979 c5e42d 967->979 980 c5e40a-c5e414 967->980 971 c5e3ab-c5e3ba call c84339 968->971 970 c26a17-c26a39 call c26bec 969->970 969->971 971->967 982 c5e42f-c5e442 979->982 981 c5e428-c5e429 980->981 983 c5e416-c5e425 981->983 984 c5e42b 981->984 985 c5e5b9-c5e5bc call c42ed5 982->985 986 c5e448 982->986 983->981 984->982 989 c5e5c1-c5e5ca call c24faa 985->989 988 c5e44f-c5e452 call c275e0 986->988 992 c5e457-c5e479 call c25f12 call c87492 988->992 995 c5e5cc-c5e5dc call c27776 call c25efb 989->995 1002 c5e48d-c5e497 call c8747c 992->1002 1003 c5e47b-c5e488 992->1003 1011 c5e5e1-c5e611 call c7fad2 call c40fac call c42ed5 call c24faa 995->1011 1009 c5e4b1-c5e4bb call c87466 1002->1009 1010 c5e499-c5e4ac 1002->1010 1005 c5e580-c5e590 call c2766f 1003->1005 1005->992 1015 c5e596-c5e5a0 call c274bd 1005->1015 1019 c5e4bd-c5e4ca 1009->1019 1020 c5e4cf-c5e4d9 call c25f8a 1009->1020 1010->1005 1011->995 1022 c5e5a5-c5e5b3 1015->1022 1019->1005 1020->1005 1028 c5e4df-c5e4f7 call c7fa6e 1020->1028 1022->985 1022->988 1033 c5e4f9-c5e518 call c27f41 call c25a64 1028->1033 1034 c5e51a-c5e51d 1028->1034 1057 c5e53b-c5e549 call c25f12 1033->1057 1035 c5e51f-c5e522 call c27f41 1034->1035 1036 c5e54b-c5e54e 1034->1036 1043 c5e527-c5e53a call c26999 call c25a64 1035->1043 1040 c5e550-c5e559 call c7f98f 1036->1040 1041 c5e56e-c5e571 call c87428 1036->1041 1040->1011 1050 c5e55f-c5e569 call c40fac 1040->1050 1048 c5e576-c5e57f call c40fac 1041->1048 1043->1057 1048->1005 1050->992 1057->1048
    APIs
      • Part of subcall function 00C24F3D: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00CE52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00C24F6F
    • _free.LIBCMT ref: 00C5E5BC
    • _free.LIBCMT ref: 00C5E603
      • Part of subcall function 00C26BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00C26D0D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _free$CurrentDirectoryLibraryLoad
    • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
    • API String ID: 2861923089-1757145024
    • Opcode ID: 9b70cca7aa3e3c7d4f93f84557d0c2d5e30350c6f69427cdda8845514627dbb9
    • Instruction ID: 2c3c59523f96be38fc8047f0b369ddbf871a754107cfaf9cc8657a7c0a3dfd31
    • Opcode Fuzzy Hash: 9b70cca7aa3e3c7d4f93f84557d0c2d5e30350c6f69427cdda8845514627dbb9
    • Instruction Fuzzy Hash: EB918171914229AFCF08EFA4D8919EDB7B4FF08314F104429F815AB2A1EB309A49DF64

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1062 c235b0-c235bb 1063 c2362f-c23631 1062->1063 1064 c235bd-c235c2 1062->1064 1065 c23620-c23625 1063->1065 1064->1063 1066 c235c4-c235dc RegOpenKeyExW 1064->1066 1066->1063 1067 c235de-c235fd RegQueryValueExW 1066->1067 1068 c23614-c2361f RegCloseKey 1067->1068 1069 c235ff-c2360a 1067->1069 1068->1065 1070 c23626-c2362d 1069->1070 1071 c2360c-c2360e 1069->1071 1072 c23612 1070->1072 1071->1072 1072->1068
    APIs
    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00C235A1,SwapMouseButtons,00000004,?), ref: 00C235D4
    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00C235A1,SwapMouseButtons,00000004,?,?,?,?,00C22754), ref: 00C235F5
    • RegCloseKey.KERNELBASE(00000000,?,?,00C235A1,SwapMouseButtons,00000004,?,?,?,?,00C22754), ref: 00C23617
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CloseOpenQueryValue
    • String ID: Control Panel\Mouse
    • API String ID: 3677997916-824357125
    • Opcode ID: 9818bfb9cddc11c7c4293e9e39d454ca701b82b4a5c4660207cfb5545eb575d8
    • Instruction ID: 6f70d9ecd90f347b6fb930384128d87cdde285c0240ef6dec30a6d667b14a221
    • Opcode Fuzzy Hash: 9818bfb9cddc11c7c4293e9e39d454ca701b82b4a5c4660207cfb5545eb575d8
    • Instruction Fuzzy Hash: BD114571610268BFDB208FA8EC80AEEBBBCFF05744F018469F805D7210E2719F419BA4

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1073 c89604-c89687 call c25045 call c897dd 1078 c89689 1073->1078 1079 c89691-c89748 call c2506b * 4 call c25045 call c4588c * 2 call c2506b call c891b2 call c889fc 1073->1079 1080 c8968b-c8968c 1078->1080 1102 c8974a-c8975a call c42ed5 * 2 1079->1102 1103 c8975f-c89763 1079->1103 1082 c897d4-c897da 1080->1082 1102->1080 1104 c897c4-c897ca call c42ed5 1103->1104 1105 c89765-c897bd call c88baf call c42ed5 1103->1105 1114 c897cc-c897d2 1104->1114 1116 c897c2 1105->1116 1114->1082 1116->1114
    APIs
      • Part of subcall function 00C25045: _fseek.LIBCMT ref: 00C2505D
      • Part of subcall function 00C897DD: _wcscmp.LIBCMT ref: 00C898CD
      • Part of subcall function 00C897DD: _wcscmp.LIBCMT ref: 00C898E0
    • _free.LIBCMT ref: 00C8974B
    • _free.LIBCMT ref: 00C89752
    • _free.LIBCMT ref: 00C897BD
      • Part of subcall function 00C42ED5: RtlFreeHeap.NTDLL(00000000,00000000,?,00C49BA4), ref: 00C42EE9
      • Part of subcall function 00C42ED5: GetLastError.KERNEL32(00000000,?,00C49BA4), ref: 00C42EFB
    • _free.LIBCMT ref: 00C897C5
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
    • String ID:
    • API String ID: 1552873950-0
    • Opcode ID: 06f46c1fceb8d5b17a5c3841cb1f24f72943730a4dd95fd49ea67a1a9e5beba0
    • Instruction ID: 178d68710019c9a3bbcff1cf3cc64e938c8bc37b5bb1cf5367362b521425336d
    • Opcode Fuzzy Hash: 06f46c1fceb8d5b17a5c3841cb1f24f72943730a4dd95fd49ea67a1a9e5beba0
    • Instruction Fuzzy Hash: E25161B1D04218AFDF249F64DC81AAEBBB9FF48304F14049EF609A7251DB715A80DF58

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1117 c273e5-c27405 call c51ac0 1120 c2740b-c27438 call c248ae call c40911 call c2716b call c269ca 1117->1120 1121 c5ed7b-c5ede4 call c42f60 GetOpenFileNameW 1117->1121 1126 c5ede6 1121->1126 1127 c5eded-c5edf6 call c27d2c 1121->1127 1126->1127 1131 c5edfb 1127->1131 1131->1131
    APIs
    • _memset.LIBCMT ref: 00C5ED92
    • GetOpenFileNameW.COMDLG32(?), ref: 00C5EDDC
      • Part of subcall function 00C248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C248A1,?,?,00C237C0,?), ref: 00C248CE
      • Part of subcall function 00C40911: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C40930
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Name$Path$FileFullLongOpen_memset
    • String ID: X
    • API String ID: 3777226403-3081909835
    • Opcode ID: bcc9eee24f93b264aff39ba8de6085a65687732c34db49b2830102d78e6b5c2d
    • Instruction ID: 58be64a6a207cd507c0f456bdfa9531df4dadc680be60f6a2e265d934a7fc729
    • Opcode Fuzzy Hash: bcc9eee24f93b264aff39ba8de6085a65687732c34db49b2830102d78e6b5c2d
    • Instruction Fuzzy Hash: FA21C371A002589BDF05DF94D845BEE7BF9AF48704F10401AE908AB342DFB45A8D9FA1
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 05d10b218a1095188bead97fd718ced623cc48149a48c7eabf227fef4c5ea249
    • Instruction ID: 55c94727f41e4b3f28017725e337560ed69e1e6269a5ccd7ef60dfecb7aa8e5c
    • Opcode Fuzzy Hash: 05d10b218a1095188bead97fd718ced623cc48149a48c7eabf227fef4c5ea249
    • Instruction Fuzzy Hash: BEF13A715083019FCB14DF28C485A6ABBE5FF88314F54892EF89A9B351D731E945CF82
    APIs
      • Part of subcall function 00C402E2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C40313
      • Part of subcall function 00C402E2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00C4031B
      • Part of subcall function 00C402E2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C40326
      • Part of subcall function 00C402E2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C40331
      • Part of subcall function 00C402E2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00C40339
      • Part of subcall function 00C402E2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00C40341
      • Part of subcall function 00C36259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00C2FA90), ref: 00C362B4
    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00C2FB2D
    • OleInitialize.OLE32(00000000), ref: 00C2FBAA
    • CloseHandle.KERNEL32(00000000), ref: 00C64921
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
    • String ID:
    • API String ID: 1986988660-0
    • Opcode ID: c35fb5a7fa3795af7d107c6594a040e1241c1fe9f692d42b5754f242f17d3469
    • Instruction ID: 95095f12e492670b7bfb4bb3e574d058ac8473fd11c679b0e72feec9f1745e09
    • Opcode Fuzzy Hash: c35fb5a7fa3795af7d107c6594a040e1241c1fe9f692d42b5754f242f17d3469
    • Instruction Fuzzy Hash: 5781B8B1911BC08FC785DF7AA9C171D7AE5FB8830E750812EA519CF2B2EBB044858F61
    APIs
    • _memset.LIBCMT ref: 00C24401
    • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00C244A6
    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00C244C3
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: IconNotifyShell_$_memset
    • String ID:
    • API String ID: 1505330794-0
    • Opcode ID: 29daaec7b051c95d3a4c5d974a7d35e33d1e99772d0a61575e7b17839baa37c9
    • Instruction ID: a7744f9a6f529b178d1586eda419e4412b2b275733e8aa5691b244405bceb80c
    • Opcode Fuzzy Hash: 29daaec7b051c95d3a4c5d974a7d35e33d1e99772d0a61575e7b17839baa37c9
    • Instruction Fuzzy Hash: 273181B0504751CFD725EF64E88479BBBF8FB49308F00092EF69A87641D771AA44CB92
    APIs
    • __FF_MSGBANNER.LIBCMT ref: 00C458A3
      • Part of subcall function 00C4A2EB: __NMSG_WRITE.LIBCMT ref: 00C4A312
      • Part of subcall function 00C4A2EB: __NMSG_WRITE.LIBCMT ref: 00C4A31C
    • __NMSG_WRITE.LIBCMT ref: 00C458AA
      • Part of subcall function 00C4A348: GetModuleFileNameW.KERNEL32(00000000,00CE33BA,00000104,?,00000001,00000000), ref: 00C4A3DA
      • Part of subcall function 00C4A348: ___crtMessageBoxW.LIBCMT ref: 00C4A488
      • Part of subcall function 00C4321F: ___crtCorExitProcess.LIBCMT ref: 00C43225
      • Part of subcall function 00C4321F: ExitProcess.KERNEL32 ref: 00C4322E
      • Part of subcall function 00C48CA8: __getptd_noexit.LIBCMT ref: 00C48CA8
    • RtlAllocateHeap.NTDLL(01520000,00000000,00000001,00000000,?,?,?,00C40F53,?), ref: 00C458CF
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
    • String ID:
    • API String ID: 1372826849-0
    • Opcode ID: 7bd5ed9e546c934afd2dece9fb89e72478be3a0005203ecb3bd28714de343fe6
    • Instruction ID: cb2df1a0267a1e904f723ab695af89ba435b41037dfd0f1e405b23e63c15b03b
    • Opcode Fuzzy Hash: 7bd5ed9e546c934afd2dece9fb89e72478be3a0005203ecb3bd28714de343fe6
    • Instruction Fuzzy Hash: D9012432280B419BE6113BB5EC82B2E7358FF82770F100039F921AB1D3DFB59E016A61
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID: CALL
    • API String ID: 0-4196123274
    • Opcode ID: df203fa877e8d5bceac4b70f14e198b82ee32aba745b441b90720692cbbf9a58
    • Instruction ID: 6ce381743e9a726fe21b3e9dd64d37e1e7ce45fd56b55296625a9eef7769b312
    • Opcode Fuzzy Hash: df203fa877e8d5bceac4b70f14e198b82ee32aba745b441b90720692cbbf9a58
    • Instruction Fuzzy Hash: 44225770508321CFDB28DF14D495B2AB7E1BF84304F24896DE89A9B761DB31ED85DB82
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove
    • String ID: EA06
    • API String ID: 4104443479-3962188686
    • Opcode ID: 100136aac0b9870431202864f210ae992a1882031298a01302e1ec52b77b41f2
    • Instruction ID: ea830b3cbbbe2e7fbea2f3685d36eb39230c6616dfa6c8ad9093e6f97ba3d02e
    • Opcode Fuzzy Hash: 100136aac0b9870431202864f210ae992a1882031298a01302e1ec52b77b41f2
    • Instruction Fuzzy Hash: 3E41B031A042785BEF299B64EC517BFBFA6AF41300F294074EC42DB582C6309E84D7E1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove
    • String ID:
    • API String ID: 4104443479-0
    • Opcode ID: 79ae0bb1cd2abe0d9b669038cfbb43928e6be93af8b008abed3dc31d02f90a03
    • Instruction ID: 8e43b7d3502578a1564f38e05875da3b8102a44b3c145321d750b9d7e1b08a26
    • Opcode Fuzzy Hash: 79ae0bb1cd2abe0d9b669038cfbb43928e6be93af8b008abed3dc31d02f90a03
    • Instruction Fuzzy Hash: 3231F4B1604516AFC714DF78E8D1E69F3A8FF483207248729E925CB691DB70E920CB90
    APIs
    • IsThemeActive.UXTHEME ref: 00C24992
      • Part of subcall function 00C434EC: __lock.LIBCMT ref: 00C434F2
      • Part of subcall function 00C434EC: DecodePointer.KERNEL32(00000001,?,00C249A7,00C77F9C), ref: 00C434FE
      • Part of subcall function 00C434EC: EncodePointer.KERNEL32(?,?,00C249A7,00C77F9C), ref: 00C43509
      • Part of subcall function 00C24A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00C24A73
      • Part of subcall function 00C24A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00C24A88
      • Part of subcall function 00C23B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C23B7A
      • Part of subcall function 00C23B4C: IsDebuggerPresent.KERNEL32 ref: 00C23B8C
      • Part of subcall function 00C23B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00CE52F8,00CE52E0,?,?), ref: 00C23BFD
      • Part of subcall function 00C23B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00C23C81
    • SystemParametersInfoW.USER32(00002001,00000000,?,00000002), ref: 00C249D2
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
    • String ID:
    • API String ID: 1438897964-0
    • Opcode ID: ebba58f55e643ebdbdc318190e0404573e0a18e70adf03e22c89be808f3d76cc
    • Instruction ID: 9e214a407e55e42ac819c96dbb75327d9ac4a7285892a033741aed57b48220c8
    • Opcode Fuzzy Hash: ebba58f55e643ebdbdc318190e0404573e0a18e70adf03e22c89be808f3d76cc
    • Instruction Fuzzy Hash: 6C119D718143619FC300EF69E886B0EFFE8EB94754F10851EF1458B2B1DB709645DB92
    APIs
    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00C25981,?,?,?,?), ref: 00C25E27
    • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00C25981,?,?,?,?), ref: 00C5E0CC
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: ce271b3160769e3b0f4e0c554d7b362df0e05b61fa4ddefcd71a3de5e0391b8b
    • Instruction ID: f4801bb2b48305f121191be8a4394112bbfa6e797aa6a79dfcca1c8b5b6d2760
    • Opcode Fuzzy Hash: ce271b3160769e3b0f4e0c554d7b362df0e05b61fa4ddefcd71a3de5e0391b8b
    • Instruction Fuzzy Hash: 0401B570244718BEF7341E24DC8AF773A9CEB05768F108318BAF55A1E0C6B85F898B14
    APIs
      • Part of subcall function 00C4588C: __FF_MSGBANNER.LIBCMT ref: 00C458A3
      • Part of subcall function 00C4588C: __NMSG_WRITE.LIBCMT ref: 00C458AA
      • Part of subcall function 00C4588C: RtlAllocateHeap.NTDLL(01520000,00000000,00000001,00000000,?,?,?,00C40F53,?), ref: 00C458CF
    • std::exception::exception.LIBCMT ref: 00C40F6C
    • __CxxThrowException@8.LIBCMT ref: 00C40F81
      • Part of subcall function 00C4871B: RaiseException.KERNEL32(?,?,?,00CD9E78,00000000,?,?,?,?,00C40F86,?,00CD9E78,?,00000001), ref: 00C48770
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
    • String ID:
    • API String ID: 3902256705-0
    • Opcode ID: 69189aa6f2d6322d95f13c475f6fb442213ff479fd04807a9527df936c6ef936
    • Instruction ID: 73d4b3fc0d70efbf202b2d1e47fa7551a8d0ac04e1c8c0b1740e75b8ccaa1ad8
    • Opcode Fuzzy Hash: 69189aa6f2d6322d95f13c475f6fb442213ff479fd04807a9527df936c6ef936
    • Instruction Fuzzy Hash: 9AF0C87154421D66DB20FAE8EC129DE7BACFF00311F200876FE1896282EF709B58E6D5
    APIs
      • Part of subcall function 00C48CA8: __getptd_noexit.LIBCMT ref: 00C48CA8
    • __lock_file.LIBCMT ref: 00C4555B
      • Part of subcall function 00C46D8E: __lock.LIBCMT ref: 00C46DB1
    • __fclose_nolock.LIBCMT ref: 00C45566
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
    • String ID:
    • API String ID: 2800547568-0
    • Opcode ID: 055c527eeea99ac9fd9dacc53b1e5709626f4c9b1c7225ab951276bb714b2445
    • Instruction ID: 8f9789d517c917ca0c379eff0a018b4f3909462e4cb651572a73bf838c0546be
    • Opcode Fuzzy Hash: 055c527eeea99ac9fd9dacc53b1e5709626f4c9b1c7225ab951276bb714b2445
    • Instruction Fuzzy Hash: 54F05471901A059BD7107B75880677E77A27F41331F158209F425AB1C2CB7C4A45BF52
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove
    • String ID:
    • API String ID: 4104443479-0
    • Opcode ID: 25640ea70a19961a3ee3642c4dd4939aa7249cf99a5976f617b39fe3c739ff9c
    • Instruction ID: 7675a2f6a20d52efd00ee684ec4306b127dd1eb46a291a71ab4ff0cef842e260
    • Opcode Fuzzy Hash: 25640ea70a19961a3ee3642c4dd4939aa7249cf99a5976f617b39fe3c739ff9c
    • Instruction Fuzzy Hash: FE31B479208A22DFD7249F19E4D1921F7E0FF09720714C66DE9998BB65E730EC81DB84
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID:
    • API String ID: 1473721057-0
    • Opcode ID: c036ef1eaadf1f8eee68999b243a32e8c818d0f689644625c73d7da54a2867cf
    • Instruction ID: 08dd8f7060d94ecb8729fa2a1342a6155fe70a9f4f875e0f0cf4e4fbd34295f3
    • Opcode Fuzzy Hash: c036ef1eaadf1f8eee68999b243a32e8c818d0f689644625c73d7da54a2867cf
    • Instruction Fuzzy Hash: B94109745083518FDB24DF14C484B1ABBE1BF89318F1988ACE9955B762C732EC46DF52
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove
    • String ID:
    • API String ID: 4104443479-0
    • Opcode ID: 45b44920c4107b42cced9378cf49f270fbc2b10c1b1e23699e3242c0b223a846
    • Instruction ID: 22dcbd81151b992ecb1fa30dde6b569d7e25c5639be920701715d16380274a37
    • Opcode Fuzzy Hash: 45b44920c4107b42cced9378cf49f270fbc2b10c1b1e23699e3242c0b223a846
    • Instruction Fuzzy Hash: 4D219772604A18EBDB188F22FC8176E3BB8FF54352F25852EE886C4491EB30C1D5D309
    APIs
      • Part of subcall function 00C24D13: FreeLibrary.KERNEL32(00000000,?), ref: 00C24D4D
      • Part of subcall function 00C453CB: __wfsopen.LIBCMT ref: 00C453D6
    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00CE52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00C24F6F
      • Part of subcall function 00C24CC8: FreeLibrary.KERNEL32(00000000), ref: 00C24D02
      • Part of subcall function 00C24DD0: _memmove.LIBCMT ref: 00C24E1A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Library$Free$Load__wfsopen_memmove
    • String ID:
    • API String ID: 1396898556-0
    • Opcode ID: 32cdc4f1f9269c7f675d399e134914a9298aa5bcd58cb3ad46a5b73f68b9d7b8
    • Instruction ID: 94ddbb8a7b50c75cf2555d9a4e4fa285e5927d9b14988d6210247210803bff5f
    • Opcode Fuzzy Hash: 32cdc4f1f9269c7f675d399e134914a9298aa5bcd58cb3ad46a5b73f68b9d7b8
    • Instruction Fuzzy Hash: 2E110D31600325ABCF24BFB4ED16F6E77A59F40701F10842DF941975C1DA715A05A750
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID:
    • API String ID: 1473721057-0
    • Opcode ID: 8eb715909a1b07ba5f1360de4389a9384ce8919321167e5df1aa7cef954ab971
    • Instruction ID: c4eae52c6436f2b4c747ee24fab63693acf2962927a5539677ff511099117e68
    • Opcode Fuzzy Hash: 8eb715909a1b07ba5f1360de4389a9384ce8919321167e5df1aa7cef954ab971
    • Instruction Fuzzy Hash: A4212FB0508311DFDB24DF54C884A1ABBE0BF88314F05896CE99A57B21D731E81ADB93
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove
    • String ID:
    • API String ID: 4104443479-0
    • Opcode ID: 30ae08df22f3e24278386962e51b07d78d9970315b294ff5bcc8b6b01ce6d83e
    • Instruction ID: f91bdd12264a8de01b1ebedb6cd7a38c6a3ce1ec2deefa05ba9b8b0ce44ee5a0
    • Opcode Fuzzy Hash: 30ae08df22f3e24278386962e51b07d78d9970315b294ff5bcc8b6b01ce6d83e
    • Instruction Fuzzy Hash: 9E01F9726487116ED7209F79DC02F67BBA4EF44760F10863EFA5ACA5D1EA31E5009B90
    APIs
    • FreeLibrary.KERNEL32(?,?,00CE52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00C24FDE
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FreeLibrary
    • String ID:
    • API String ID: 3664257935-0
    • Opcode ID: 8e5d28e1fb1336096a9d3cdd8694b2cc41f41612effca6ed9f8ee2d6504e1ab8
    • Instruction ID: 4216a5dfa4fdd84f1832c3317f65a5cd3af35fcba0760dc646c4c0a32c7d710c
    • Opcode Fuzzy Hash: 8e5d28e1fb1336096a9d3cdd8694b2cc41f41612effca6ed9f8ee2d6504e1ab8
    • Instruction Fuzzy Hash: F3F03975505722CFCB389FA5E594826BBE1BF443293208A3EE1E683A10C731A940DF40
    APIs
    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00C40930
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: LongNamePath_memmove
    • String ID:
    • API String ID: 2514874351-0
    • Opcode ID: 728f26c9250ba2126e0cfac7b49d07797b53fefe7e351994853bc35bb8d91f73
    • Instruction ID: e81f936b079b66d523df230c023f2ecab4c6ede12c4c263355e2c923f3aab5a4
    • Opcode Fuzzy Hash: 728f26c9250ba2126e0cfac7b49d07797b53fefe7e351994853bc35bb8d91f73
    • Instruction Fuzzy Hash: 6FE0CD3690512857C721D6989C05FFA77EDDFC9791F0402B5FC4CD7205D9705C819690
    APIs
      • Part of subcall function 00C8339D: SetFilePointerEx.KERNEL32(?,?,?,00000000,00000001,?,?,00C834AA,?,?,?,00C5DF90,00CD55C0,00000002,?,?), ref: 00C8341B
    • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00C5DF90,00CD55C0,00000002,?,?,?,?), ref: 00C834B8
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: File$PointerWrite
    • String ID:
    • API String ID: 539440098-0
    • Opcode ID: 646a6a66b27f28374e650594519c48d94e495413cb9ce6fdc49e6cd7d38280ed
    • Instruction ID: e28d2441ad266a17ac70d600c35cc07a77bf928ba2a4de60e1483be535605b0d
    • Opcode Fuzzy Hash: 646a6a66b27f28374e650594519c48d94e495413cb9ce6fdc49e6cd7d38280ed
    • Instruction Fuzzy Hash: FFE04636400208FBDB20AF94D805FDAB7BCEB05320F00065AFA4082111DBB2AE24ABA0
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __wfsopen
    • String ID:
    • API String ID: 197181222-0
    • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
    • Instruction ID: c8b071b3b8e4883a10bb0439cfb1d4e6c2e57f007fdaa16f7c286752cb2ce069
    • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
    • Instruction Fuzzy Hash: 9EB0927654020C77CE012E82EC02A493B59AB407A4F408020FB0C185B2A6B3A660A689
    APIs
    • GetLastError.KERNEL32(00000002,00000000), ref: 00C8D28B
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorLast
    • String ID:
    • API String ID: 1452528299-0
    • Opcode ID: c10d6b8bd5aa3efeedf78c0fa6e7582bfeaf1a7a7c4553f677a22077d6537173
    • Instruction ID: ee7cfc1e3929fd54c95e9b92b9a6a82bc5131dcd110501712f32e7e7b6f6347e
    • Opcode Fuzzy Hash: c10d6b8bd5aa3efeedf78c0fa6e7582bfeaf1a7a7c4553f677a22077d6537173
    • Instruction Fuzzy Hash: 03716030204312CFCB14EF64D591A6AB7E0AF89718F04496DF4969B6A2DB30EE09DB56
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
    • Instruction ID: cf4cb431ed6e6f8a084619502ea4bbff67855ea88c343cee1de911a1ff34a5dc
    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
    • Instruction Fuzzy Hash: 5531F374A401059BC718DF59C480969FBB2FF89300B788AA9E54ACB355DB31EED1CB80
    APIs
    • CloseHandle.KERNELBASE(?,?,?,00C25921,?,00C26C37), ref: 00C25DEF
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CloseHandle
    • String ID:
    • API String ID: 2962429428-0
    • Opcode ID: 02ce40ec871343f666f0322561012ae47f0324f5f44c7a741080c03b034ad4ec
    • Instruction ID: c7b594654c469b01cb7b1a07fa9683d58aa40ad2f713f2131979729e132d4fd3
    • Opcode Fuzzy Hash: 02ce40ec871343f666f0322561012ae47f0324f5f44c7a741080c03b034ad4ec
    • Instruction Fuzzy Hash: B7E09279501A11CEC7314F1AE908426FBE4FEE13613204A2ED4E682A64D3B1598A8B50
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00CACBA1
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00CACBFF
    • GetWindowLongW.USER32(?,000000F0), ref: 00CACC40
    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00CACC6A
    • SendMessageW.USER32 ref: 00CACC93
    • _wcsncpy.LIBCMT ref: 00CACCFF
    • GetKeyState.USER32(00000011), ref: 00CACD20
    • GetKeyState.USER32(00000009), ref: 00CACD2D
    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00CACD43
    • GetKeyState.USER32(00000010), ref: 00CACD4D
    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00CACD76
    • SendMessageW.USER32 ref: 00CACD9D
    • SendMessageW.USER32(?,00001030,?,00CAB37C), ref: 00CACEA1
    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00CACEB7
    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00CACECA
    • SetCapture.USER32(?), ref: 00CACED3
    • ClientToScreen.USER32(?,?), ref: 00CACF38
    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00CACF45
    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00CACF5F
    • ReleaseCapture.USER32 ref: 00CACF6A
    • GetCursorPos.USER32(?), ref: 00CACFA4
    • ScreenToClient.USER32(?,?), ref: 00CACFB1
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00CAD00D
    • SendMessageW.USER32 ref: 00CAD03B
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00CAD078
    • SendMessageW.USER32 ref: 00CAD0A7
    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00CAD0C8
    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00CAD0D7
    • GetCursorPos.USER32(?), ref: 00CAD0F7
    • ScreenToClient.USER32(?,?), ref: 00CAD104
    • GetParent.USER32(?), ref: 00CAD124
    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00CAD18D
    • SendMessageW.USER32 ref: 00CAD1BE
    • ClientToScreen.USER32(?,?), ref: 00CAD21C
    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00CAD24C
    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00CAD276
    • SendMessageW.USER32 ref: 00CAD299
    • ClientToScreen.USER32(?,?), ref: 00CAD2EB
    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00CAD31F
      • Part of subcall function 00C225DB: GetWindowLongW.USER32(?,000000EB), ref: 00C225EC
    • GetWindowLongW.USER32(?,000000F0), ref: 00CAD3BB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
    • String ID: @GUI_DRAGID$F
    • API String ID: 3977979337-4164748364
    • Opcode ID: 3da6cfd617fc02641ddb5aa5895a00b7f5c68029e43604617f03517557a1b586
    • Instruction ID: 81a41be1d02aa3894f6bb0974fe22520e94fc79c012159cdc90a9cd643bb7614
    • Opcode Fuzzy Hash: 3da6cfd617fc02641ddb5aa5895a00b7f5c68029e43604617f03517557a1b586
    • Instruction Fuzzy Hash: 5A429F34604342AFDB20CF64D884BAABBE5FF4A318F14091DF566972B1C732D951DB91
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove$_memset
    • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
    • API String ID: 1357608183-1798697756
    • Opcode ID: 23032218e18da3445ba738de33bba51e46dd0fdf3b4b7125a591e5733f5ec79c
    • Instruction ID: 592cdaff7c240052b96c357a39e157cb3651c74867d36d4b20d016ea7e1fe3fe
    • Opcode Fuzzy Hash: 23032218e18da3445ba738de33bba51e46dd0fdf3b4b7125a591e5733f5ec79c
    • Instruction Fuzzy Hash: 1093A275A00219DFDF24CF99C881BADB7B1FF48710F24816AE959EB291E7709E81DB40
    APIs
    • GetForegroundWindow.USER32(00000000,?), ref: 00C24A3D
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00C5D9BE
    • IsIconic.USER32(?), ref: 00C5D9C7
    • ShowWindow.USER32(?,00000009), ref: 00C5D9D4
    • SetForegroundWindow.USER32(?), ref: 00C5D9DE
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C5D9F4
    • GetCurrentThreadId.KERNEL32 ref: 00C5D9FB
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C5DA07
    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00C5DA18
    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00C5DA20
    • AttachThreadInput.USER32(00000000,?,00000001), ref: 00C5DA28
    • SetForegroundWindow.USER32(?), ref: 00C5DA2B
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C5DA40
    • keybd_event.USER32(00000012,00000000), ref: 00C5DA4B
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C5DA55
    • keybd_event.USER32(00000012,00000000), ref: 00C5DA5A
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C5DA63
    • keybd_event.USER32(00000012,00000000), ref: 00C5DA68
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C5DA72
    • keybd_event.USER32(00000012,00000000), ref: 00C5DA77
    • SetForegroundWindow.USER32(?), ref: 00C5DA7A
    • AttachThreadInput.USER32(?,?,00000000), ref: 00C5DAA1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
    • String ID: Shell_TrayWnd
    • API String ID: 4125248594-2988720461
    • Opcode ID: 8bfc43991665d7c86c86f1544b4e865b00cf3034b35b1fd687e6f7d2e3b0dc07
    • Instruction ID: 47e705db9363ac3b7bfe1848f046841b9673c671a0b71325369c4147791df264
    • Opcode Fuzzy Hash: 8bfc43991665d7c86c86f1544b4e865b00cf3034b35b1fd687e6f7d2e3b0dc07
    • Instruction Fuzzy Hash: D1315075A40318BAEB306FA19C49F7F7E6CEB45B51F104029FE05EB190DAB05941AAA4
    APIs
      • Part of subcall function 00C78AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C78AED
      • Part of subcall function 00C78AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C78B1A
      • Part of subcall function 00C78AA3: GetLastError.KERNEL32 ref: 00C78B27
    • _memset.LIBCMT ref: 00C7867B
    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00C786CD
    • CloseHandle.KERNEL32(?), ref: 00C786DE
    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00C786F5
    • GetProcessWindowStation.USER32 ref: 00C7870E
    • SetProcessWindowStation.USER32(00000000), ref: 00C78718
    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00C78732
      • Part of subcall function 00C784F3: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C78631), ref: 00C78508
      • Part of subcall function 00C784F3: CloseHandle.KERNEL32(?,?,00C78631), ref: 00C7851A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
    • String ID: $default$winsta0
    • API String ID: 2063423040-1027155976
    • Opcode ID: 82b1b518c6a24eb51541bf9d429b1a76717a57f2786ffdf6000bb7b1716d88f2
    • Instruction ID: 9be7084c0315d919b1677f5a67c08596c815987f04789ade227579d2ad5f351a
    • Opcode Fuzzy Hash: 82b1b518c6a24eb51541bf9d429b1a76717a57f2786ffdf6000bb7b1716d88f2
    • Instruction Fuzzy Hash: 87816D71980209EFDF119FA4CC49AEE7B78FF05304F548169FA28A71A1DB318E19DB61
    APIs
    • OpenClipboard.USER32(00CAF910), ref: 00C940A6
    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00C940B4
    • GetClipboardData.USER32(0000000D), ref: 00C940BC
    • CloseClipboard.USER32 ref: 00C940C8
    • GlobalLock.KERNEL32(00000000), ref: 00C940E4
    • CloseClipboard.USER32 ref: 00C940EE
    • GlobalUnlock.KERNEL32(00000000), ref: 00C94103
    • IsClipboardFormatAvailable.USER32(00000001), ref: 00C94110
    • GetClipboardData.USER32(00000001), ref: 00C94118
    • GlobalLock.KERNEL32(00000000), ref: 00C94125
    • GlobalUnlock.KERNEL32(00000000), ref: 00C94159
    • CloseClipboard.USER32 ref: 00C94269
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
    • String ID:
    • API String ID: 3222323430-0
    • Opcode ID: 8646feea5de1e1c497a64e740420ed44179ab5ac478718fef7b6affd39b7821c
    • Instruction ID: 92c56ce9f82198c45dbf8453963c5fbcc8c8517b27589fea5874179e9697b00b
    • Opcode Fuzzy Hash: 8646feea5de1e1c497a64e740420ed44179ab5ac478718fef7b6affd39b7821c
    • Instruction Fuzzy Hash: 30518D35204702ABDB14EFA0EC8AF6F77A8AB85B05F00452DF556D31E1DF70D9069B62
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 00C8C819
    • FindClose.KERNEL32(00000000), ref: 00C8C86D
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C8C892
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00C8C8A9
    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00C8C8D0
    • __swprintf.LIBCMT ref: 00C8C91C
    • __swprintf.LIBCMT ref: 00C8C95F
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
    • __swprintf.LIBCMT ref: 00C8C9B3
      • Part of subcall function 00C43818: __woutput_l.LIBCMT ref: 00C43871
    • __swprintf.LIBCMT ref: 00C8CA01
      • Part of subcall function 00C43818: __flsbuf.LIBCMT ref: 00C43893
      • Part of subcall function 00C43818: __flsbuf.LIBCMT ref: 00C438AB
    • __swprintf.LIBCMT ref: 00C8CA50
    • __swprintf.LIBCMT ref: 00C8CA9F
    • __swprintf.LIBCMT ref: 00C8CAEE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
    • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
    • API String ID: 3953360268-2428617273
    • Opcode ID: 24366e111528d97c54722bdffff680681b2cdaad8e7c0167079312f13a7e7a80
    • Instruction ID: b47a56d5aec6d62c9c50d5b32af143c8bf810f36810733c2aeecca06b2674e23
    • Opcode Fuzzy Hash: 24366e111528d97c54722bdffff680681b2cdaad8e7c0167079312f13a7e7a80
    • Instruction Fuzzy Hash: CCA13EB1408314ABC700FBA4D886EAFB7ECFF94704F404929F596C3191EA74DA08DB62
    APIs
    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00C8F042
    • _wcscmp.LIBCMT ref: 00C8F057
    • _wcscmp.LIBCMT ref: 00C8F06E
    • GetFileAttributesW.KERNEL32(?), ref: 00C8F080
    • SetFileAttributesW.KERNEL32(?,?), ref: 00C8F09A
    • FindNextFileW.KERNEL32(00000000,?), ref: 00C8F0B2
    • FindClose.KERNEL32(00000000), ref: 00C8F0BD
    • FindFirstFileW.KERNEL32(*.*,?), ref: 00C8F0D9
    • _wcscmp.LIBCMT ref: 00C8F100
    • _wcscmp.LIBCMT ref: 00C8F117
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C8F129
    • SetCurrentDirectoryW.KERNEL32(00CD8920), ref: 00C8F147
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C8F151
    • FindClose.KERNEL32(00000000), ref: 00C8F15E
    • FindClose.KERNEL32(00000000), ref: 00C8F170
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
    • String ID: *.*
    • API String ID: 1803514871-438819550
    • Opcode ID: e54aff53256c5f7d37bb308b2ecb3ecbf782cc4fe5cb720b1a869787d6bc4a75
    • Instruction ID: 1928fc13563af08f9038b48b16dd54c7e156af1b94834113ed44b8a77c4cfa45
    • Opcode Fuzzy Hash: e54aff53256c5f7d37bb308b2ecb3ecbf782cc4fe5cb720b1a869787d6bc4a75
    • Instruction Fuzzy Hash: 5231B632500219AADB10ABB4DC59BEF77ACAF49368F104179F955E31A0DB30DE46CB68
    APIs
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA09DE
    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00CAF910,00000000,?,00000000,?,?), ref: 00CA0A4C
    • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00CA0A94
    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00CA0B1D
    • RegCloseKey.ADVAPI32(?), ref: 00CA0E3D
    • RegCloseKey.ADVAPI32(00000000), ref: 00CA0E4A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Close$ConnectCreateRegistryValue
    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
    • API String ID: 536824911-966354055
    • Opcode ID: ee387dc4aed5696b97d8395c44fa7613e6d1faeb20f907e104790a76f00bde2e
    • Instruction ID: 93200cc1d008cdba8776b9978fa2d3e1b19ca155740120e38622c4ee6532a96e
    • Opcode Fuzzy Hash: ee387dc4aed5696b97d8395c44fa7613e6d1faeb20f907e104790a76f00bde2e
    • Instruction Fuzzy Hash: FC02BF356006119FCB14EF24D881E2AB7E5FF89324F14895DF89A9B7A2CB31ED41DB81
    APIs
    • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00C8F19F
    • _wcscmp.LIBCMT ref: 00C8F1B4
    • _wcscmp.LIBCMT ref: 00C8F1CB
      • Part of subcall function 00C843C6: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00C843E1
    • FindNextFileW.KERNEL32(00000000,?), ref: 00C8F1FA
    • FindClose.KERNEL32(00000000), ref: 00C8F205
    • FindFirstFileW.KERNEL32(*.*,?), ref: 00C8F221
    • _wcscmp.LIBCMT ref: 00C8F248
    • _wcscmp.LIBCMT ref: 00C8F25F
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C8F271
    • SetCurrentDirectoryW.KERNEL32(00CD8920), ref: 00C8F28F
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C8F299
    • FindClose.KERNEL32(00000000), ref: 00C8F2A6
    • FindClose.KERNEL32(00000000), ref: 00C8F2B8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
    • String ID: *.*
    • API String ID: 1824444939-438819550
    • Opcode ID: d18a732327727cd4e4a9679186e958a16f33e7a4aef54cbee01c254c3f13d92e
    • Instruction ID: 8a28a2be0e0852d7256e1e8a0efa1ff0d64355aac523cb008f42af6979158d26
    • Opcode Fuzzy Hash: d18a732327727cd4e4a9679186e958a16f33e7a4aef54cbee01c254c3f13d92e
    • Instruction Fuzzy Hash: 2431E33650125A6ACF10ABA4EC58BDE73ACAF45328F10017AF950E31A0DB30DF47CB68
    APIs
    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00C8A299
    • __swprintf.LIBCMT ref: 00C8A2BB
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C8A2F8
    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00C8A31D
    • _memset.LIBCMT ref: 00C8A33C
    • _wcsncpy.LIBCMT ref: 00C8A378
    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00C8A3AD
    • CloseHandle.KERNEL32(00000000), ref: 00C8A3B8
    • RemoveDirectoryW.KERNEL32(?), ref: 00C8A3C1
    • CloseHandle.KERNEL32(00000000), ref: 00C8A3CB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
    • String ID: :$\$\??\%s
    • API String ID: 2733774712-3457252023
    • Opcode ID: dc35a0ea7c6b7128be7dd37c9f235cf5ab7c78f2fb23259738a12a941438cf4a
    • Instruction ID: 21eff01233c3531d6a0aeffbbcaae81d02c0ea9e7b02ffc3a8d0c6bce481ebb3
    • Opcode Fuzzy Hash: dc35a0ea7c6b7128be7dd37c9f235cf5ab7c78f2fb23259738a12a941438cf4a
    • Instruction Fuzzy Hash: 4C319D75900109ABEB219FA0DC49FAF73BCEF89704F1041BAFA18D2160EB7097458B24
    APIs
      • Part of subcall function 00C7852A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C78546
      • Part of subcall function 00C7852A: GetLastError.KERNEL32(?,00C7800A,?,?,?), ref: 00C78550
      • Part of subcall function 00C7852A: GetProcessHeap.KERNEL32(00000008,?,?,00C7800A,?,?,?), ref: 00C7855F
      • Part of subcall function 00C7852A: HeapAlloc.KERNEL32(00000000,?,00C7800A,?,?,?), ref: 00C78566
      • Part of subcall function 00C7852A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C7857D
      • Part of subcall function 00C785C7: GetProcessHeap.KERNEL32(00000008,00C78020,00000000,00000000,?,00C78020,?), ref: 00C785D3
      • Part of subcall function 00C785C7: HeapAlloc.KERNEL32(00000000,?,00C78020,?), ref: 00C785DA
      • Part of subcall function 00C785C7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00C78020,?), ref: 00C785EB
    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00C78238
    • _memset.LIBCMT ref: 00C7824D
    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00C7826C
    • GetLengthSid.ADVAPI32(?), ref: 00C7827D
    • GetAce.ADVAPI32(?,00000000,?), ref: 00C782BA
    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00C782D6
    • GetLengthSid.ADVAPI32(?), ref: 00C782F3
    • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00C78302
    • HeapAlloc.KERNEL32(00000000), ref: 00C78309
    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00C7832A
    • CopySid.ADVAPI32(00000000), ref: 00C78331
    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00C78362
    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00C78388
    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00C7839C
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
    • String ID:
    • API String ID: 3996160137-0
    • Opcode ID: 088968e6078fc272b8e150ba6eb49787803fc42fe76ab61c29564b7d0814abef
    • Instruction ID: e0f270bbf05e8ce31aed2fc88494ba2c166524dd25cd08683e3ad7c0a589376a
    • Opcode Fuzzy Hash: 088968e6078fc272b8e150ba6eb49787803fc42fe76ab61c29564b7d0814abef
    • Instruction Fuzzy Hash: A4616E7194020AEFDF10CFA4DC49AEEBB79FF05705F048129FA29A7251DB359A09DB60
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
    • API String ID: 0-4052911093
    • Opcode ID: a2e27eaaa82228b003565479783a838fa226fa98a6884ea43760d08685678a06
    • Instruction ID: f550da8b0f238069a93cca09cf6d8418b4950208425020ee9e1dd23e4c31e274
    • Opcode Fuzzy Hash: a2e27eaaa82228b003565479783a838fa226fa98a6884ea43760d08685678a06
    • Instruction Fuzzy Hash: B9725F75E10219DBDF14CF59C8807AEB7B5FF44710F28816AE959EB290EB309E81DB90
    APIs
      • Part of subcall function 00CA0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9FE38,?,?), ref: 00CA0EBC
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA0537
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00CA05D6
    • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00CA066E
    • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00CA08AD
    • RegCloseKey.ADVAPI32(00000000), ref: 00CA08BA
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
    • String ID:
    • API String ID: 1240663315-0
    • Opcode ID: 6ca06c71f33de6e4c38fb66283ab906cf8e1629121354be277aac6def636e3cd
    • Instruction ID: 9f2283eb8600c000b192929463ba314092bdd6d11660d1bb486affccddbd7bbf
    • Opcode Fuzzy Hash: 6ca06c71f33de6e4c38fb66283ab906cf8e1629121354be277aac6def636e3cd
    • Instruction Fuzzy Hash: 21E17E30604211AFCB14DF65C881E2ABBE4EF89758F14896DF45ADB2A2DB30ED01DB91
    APIs
    • GetKeyboardState.USER32(?), ref: 00C80062
    • GetAsyncKeyState.USER32(000000A0), ref: 00C800E3
    • GetKeyState.USER32(000000A0), ref: 00C800FE
    • GetAsyncKeyState.USER32(000000A1), ref: 00C80118
    • GetKeyState.USER32(000000A1), ref: 00C8012D
    • GetAsyncKeyState.USER32(00000011), ref: 00C80145
    • GetKeyState.USER32(00000011), ref: 00C80157
    • GetAsyncKeyState.USER32(00000012), ref: 00C8016F
    • GetKeyState.USER32(00000012), ref: 00C80181
    • GetAsyncKeyState.USER32(0000005B), ref: 00C80199
    • GetKeyState.USER32(0000005B), ref: 00C801AB
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: 2bf9100fefa4fba4c3b10f659218be290a431b9ffb9c71a7d6323f088f81d3ac
    • Instruction ID: 36c967487e8cdcc2630a0050778fee1a50619ad2e592cf891d499f9e485066e3
    • Opcode Fuzzy Hash: 2bf9100fefa4fba4c3b10f659218be290a431b9ffb9c71a7d6323f088f81d3ac
    • Instruction Fuzzy Hash: B841EC34A047C96DFFB0AA6088183B9BEA06F1235CF28405DD5D6575C2DBA49FCCC796
    APIs
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    • CoInitialize.OLE32 ref: 00C98518
    • CoUninitialize.OLE32 ref: 00C98523
    • CoCreateInstance.OLE32(?,00000000,00000017,00CB2BEC,?), ref: 00C98583
    • IIDFromString.OLE32(?,?), ref: 00C985F6
    • VariantInit.OLEAUT32(?), ref: 00C98690
    • VariantClear.OLEAUT32(?), ref: 00C986F1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
    • API String ID: 834269672-1287834457
    • Opcode ID: f2ec302c4685cf8ce7cc26bfbd4a3468d8a819bbf78224b25b610febf9c36889
    • Instruction ID: e10372ff32b1c0e010b483f8ec7dd1daaa3872c895a5bbb52f393dda6c51486e
    • Opcode Fuzzy Hash: f2ec302c4685cf8ce7cc26bfbd4a3468d8a819bbf78224b25b610febf9c36889
    • Instruction Fuzzy Hash: 27618C70208311AFDB10DF65C849B6EBBE8AF4A714F04491DF9959B291DB70EE4CCB92
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
    • String ID:
    • API String ID: 1737998785-0
    • Opcode ID: 8ccf865b689aede7ddd7c1b6cc8639641b18067f0a90178b569fe51c5ddc0703
    • Instruction ID: dc676224b2370115871706ccc9b2514c68058d5020d0b2ca1995e2a392028ab6
    • Opcode Fuzzy Hash: 8ccf865b689aede7ddd7c1b6cc8639641b18067f0a90178b569fe51c5ddc0703
    • Instruction Fuzzy Hash: D621D1352006209FDB14AFA0EC4AF6D7BA8FF05314F14802AF946DB2B1DB30AD02DB55
    APIs
      • Part of subcall function 00C248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C248A1,?,?,00C237C0,?), ref: 00C248CE
      • Part of subcall function 00C84AD8: GetFileAttributesW.KERNEL32(?,00C8374F), ref: 00C84AD9
    • FindFirstFileW.KERNEL32(?,?), ref: 00C838E7
    • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00C8398F
    • MoveFileW.KERNEL32(?,?), ref: 00C839A2
    • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00C839BF
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C839E1
    • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00C839FD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
    • String ID: \*.*
    • API String ID: 4002782344-1173974218
    • Opcode ID: 6031e41ff4813ecba8692849289ba1c25d514a6f75e1d8738945573d4367a2a5
    • Instruction ID: 84686f0eaec8ad169ee960f7e244236f737a9db3fd791478ab35c9721728801e
    • Opcode Fuzzy Hash: 6031e41ff4813ecba8692849289ba1c25d514a6f75e1d8738945573d4367a2a5
    • Instruction Fuzzy Hash: B151AF318052599ACF15FBA0DD92AFEB778AF14704F644269E44277091EF306F09EB64
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
    • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00C8F4CC
    • Sleep.KERNEL32(0000000A), ref: 00C8F4FC
    • _wcscmp.LIBCMT ref: 00C8F510
    • _wcscmp.LIBCMT ref: 00C8F52B
    • FindNextFileW.KERNEL32(?,?), ref: 00C8F5C9
    • FindClose.KERNEL32(00000000), ref: 00C8F5DF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
    • String ID: *.*
    • API String ID: 713712311-438819550
    • Opcode ID: 5f60a01febbd32e6cdaee435c3ba1dfc5b6e78eba58ee4e349f7e07af4e74346
    • Instruction ID: d768fc6a9ba3f03609bfcfad0c585c40984b6c48570615a5eb4b74c666000ac9
    • Opcode Fuzzy Hash: 5f60a01febbd32e6cdaee435c3ba1dfc5b6e78eba58ee4e349f7e07af4e74346
    • Instruction Fuzzy Hash: 0A41927190021AAFCF10EFA4CC59AEE7BB4FF05314F14416AE855A3291EB309F46DB64
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
    • API String ID: 0-1546025612
    • Opcode ID: f2301bf0e5b901123f36fd99f6b93365d007c83eed79d94396a2ab032495425b
    • Instruction ID: 05079993f01bfe4ebab0c7759c51739f76e1ae3767f02479a9443c3ac5df67d1
    • Opcode Fuzzy Hash: f2301bf0e5b901123f36fd99f6b93365d007c83eed79d94396a2ab032495425b
    • Instruction Fuzzy Hash: A4A2A070E1421ACBDF38CF58C9807ADB7B1BF55314F2486A9E865A7280D734AE85CF91
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove
    • String ID:
    • API String ID: 4104443479-0
    • Opcode ID: 3425f9ea32eabc7da20043cde241721ae8305ed56fb02d836dce0e72ee2d0687
    • Instruction ID: 716d6748e992cc4349e9816e02657c4a1ddab674c025ac716c6f2a330029706b
    • Opcode Fuzzy Hash: 3425f9ea32eabc7da20043cde241721ae8305ed56fb02d836dce0e72ee2d0687
    • Instruction Fuzzy Hash: 2B12AC70A00609DFDF14DFA5D981AEEB7F5FF48300F208529E80AA7291EB35AE15DB50
    APIs
      • Part of subcall function 00C248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C248A1,?,?,00C237C0,?), ref: 00C248CE
      • Part of subcall function 00C84AD8: GetFileAttributesW.KERNEL32(?,00C8374F), ref: 00C84AD9
    • FindFirstFileW.KERNEL32(?,?), ref: 00C83BCD
    • DeleteFileW.KERNEL32(?,?,?,?), ref: 00C83C1D
    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00C83C2E
    • FindClose.KERNEL32(00000000), ref: 00C83C45
    • FindClose.KERNEL32(00000000), ref: 00C83C4E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
    • String ID: \*.*
    • API String ID: 2649000838-1173974218
    • Opcode ID: d515becd89abf56ae2f058dd670f5c359358da701cc06e00b267f116ccbea74e
    • Instruction ID: 59161ac2d6263e178d43096314dfb3357ee844745c7ac2b7d67c8d2ed7a22356
    • Opcode Fuzzy Hash: d515becd89abf56ae2f058dd670f5c359358da701cc06e00b267f116ccbea74e
    • Instruction Fuzzy Hash: 3D319E310093919BC305FB64D8959AFB7E8BE95708F444E2DF4E193191EB309B09D766
    APIs
      • Part of subcall function 00C78AA3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C78AED
      • Part of subcall function 00C78AA3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C78B1A
      • Part of subcall function 00C78AA3: GetLastError.KERNEL32 ref: 00C78B27
    • ExitWindowsEx.USER32(?,00000000), ref: 00C852A0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
    • String ID: $@$SeShutdownPrivilege
    • API String ID: 2234035333-194228
    • Opcode ID: d02acaf7751cb7eccbf61813c11c2edc99e203b2c8de4aef6497edbcba3b7068
    • Instruction ID: aca19cbc8c74e3e0d2c13e84f8cd0f2e7b08a209677e5629ba21404a7f9da019
    • Opcode Fuzzy Hash: d02acaf7751cb7eccbf61813c11c2edc99e203b2c8de4aef6497edbcba3b7068
    • Instruction Fuzzy Hash: 8B012B31A906166BE72836B89C4BBBA7258EB0575AF240535FD57D20D2DEE05D0093DC
    APIs
    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00C963F2
    • WSAGetLastError.WSOCK32(00000000), ref: 00C96401
    • bind.WSOCK32(00000000,?,00000010), ref: 00C9641D
    • listen.WSOCK32(00000000,00000005), ref: 00C9642C
    • WSAGetLastError.WSOCK32(00000000), ref: 00C96446
    • closesocket.WSOCK32(00000000,00000000), ref: 00C9645A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorLast$bindclosesocketlistensocket
    • String ID:
    • API String ID: 1279440585-0
    • Opcode ID: 753729d334655a58b66a8cdbc8b570ffa6df710e55ec7e600b2865e77cfaa552
    • Instruction ID: 978481d7ab3936651f4a2887048440894a9c1ed900d41b5e30e2f707c3082e10
    • Opcode Fuzzy Hash: 753729d334655a58b66a8cdbc8b570ffa6df710e55ec7e600b2865e77cfaa552
    • Instruction Fuzzy Hash: AC21DD306002109FDF10EFA4D949B2EB7E9EF45724F108168F86AA73D1CB30AD01EB51
    APIs
      • Part of subcall function 00C40F36: std::exception::exception.LIBCMT ref: 00C40F6C
      • Part of subcall function 00C40F36: __CxxThrowException@8.LIBCMT ref: 00C40F81
    • _memmove.LIBCMT ref: 00C705AE
    • _memmove.LIBCMT ref: 00C706C3
    • _memmove.LIBCMT ref: 00C7076A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove$Exception@8Throwstd::exception::exception
    • String ID:
    • API String ID: 1300846289-0
    • Opcode ID: 080aa01f52b379324f269ab5b7b77db7332107bb0bd2a107d5afd6313693b198
    • Instruction ID: 6d6645505f542e1ada2cb47972de81bded41d8bc58659db3f8b630e924387125
    • Opcode Fuzzy Hash: 080aa01f52b379324f269ab5b7b77db7332107bb0bd2a107d5afd6313693b198
    • Instruction Fuzzy Hash: 6D02C270A10209DFDF04DF65D982AAEBBB5FF44300F24C069E80ADB295EB31DA55DB91
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00C219FA
    • GetSysColor.USER32(0000000F), ref: 00C21A4E
    • SetBkColor.GDI32(?,00000000), ref: 00C21A61
      • Part of subcall function 00C21290: DefDlgProcW.USER32(?,00000020,?), ref: 00C212D8
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ColorProc$LongWindow
    • String ID:
    • API String ID: 3744519093-0
    • Opcode ID: 611e0235860f575993c3d83084a9195329dd0e86f12350ca3db6cdee09779569
    • Instruction ID: 725047883da4b046660cb84dcd15dacdc6e1ffefdc45df5585cc71a34d48ea8b
    • Opcode Fuzzy Hash: 611e0235860f575993c3d83084a9195329dd0e86f12350ca3db6cdee09779569
    • Instruction Fuzzy Hash: D0A19C711015A5FFD738AB2A6C85F7F399DDB62346B1C0109FC22D69C1CE268E41B2B5
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 00C8BD72
    • _wcscmp.LIBCMT ref: 00C8BDA2
    • _wcscmp.LIBCMT ref: 00C8BDB7
    • FindNextFileW.KERNEL32(00000000,?), ref: 00C8BDC8
    • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00C8BDF8
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Find$File_wcscmp$CloseFirstNext
    • String ID:
    • API String ID: 2387731787-0
    • Opcode ID: 5b3112e82715452e42ed288646d374cb18e21ba7dcd69cc00bd09b215995e611
    • Instruction ID: 56304aafd3a9ae95d74429900c61fcf013884d3c4a4d30ac9f598c350aacbacd
    • Opcode Fuzzy Hash: 5b3112e82715452e42ed288646d374cb18e21ba7dcd69cc00bd09b215995e611
    • Instruction Fuzzy Hash: 1C51AD356046029FD714EF68D490EAAB3E4FF49328F10462DFA6A873A1DB30ED05DB95
    APIs
      • Part of subcall function 00C97EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C97ECB
    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00C968B4
    • WSAGetLastError.WSOCK32(00000000), ref: 00C968DD
    • bind.WSOCK32(00000000,?,00000010), ref: 00C96916
    • WSAGetLastError.WSOCK32(00000000), ref: 00C96923
    • closesocket.WSOCK32(00000000,00000000), ref: 00C96937
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorLast$bindclosesocketinet_addrsocket
    • String ID:
    • API String ID: 99427753-0
    • Opcode ID: 3fed6ea4e7ed4f0f7a0fbc331fcde6747e7eec9703875eab50d63402b0be7006
    • Instruction ID: e9fb5fddf06ca4a2239647f361717e970469797fd4fdf8481dbf72b11f8aa7f8
    • Opcode Fuzzy Hash: 3fed6ea4e7ed4f0f7a0fbc331fcde6747e7eec9703875eab50d63402b0be7006
    • Instruction Fuzzy Hash: 7641D675A00220AFEB10AF64EC86F6E77A9DF09724F04805CF95AAB3D2DA749D019791
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$EnabledForegroundIconicVisibleZoomed
    • String ID:
    • API String ID: 292994002-0
    • Opcode ID: 7ad20040082b539b863aeca5a1177900f90ecbcf1c053503e5cf39b7ceb8716b
    • Instruction ID: 3dbd8a1593d3ba9b8ba7b1fbbb390475c1e510603690e502cf2e6e03c48f40fd
    • Opcode Fuzzy Hash: 7ad20040082b539b863aeca5a1177900f90ecbcf1c053503e5cf39b7ceb8716b
    • Instruction Fuzzy Hash: F811E731700A226FE7216F66DC44B6E7799FF4A726B04C42CF846D7251CB70DD82CAA5
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,?,00C61CB7,?), ref: 00C9C112
    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C9C124
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetSystemWow64DirectoryW$kernel32.dll
    • API String ID: 2574300362-1816364905
    • Opcode ID: bea2553c5db753dcbd17ed02c344276ade4aeac425eed7c40b33f3100b1538d0
    • Instruction ID: 8b863e742ec2c3f2202430969da316a8aa069333f359422049e8752dfe995260
    • Opcode Fuzzy Hash: bea2553c5db753dcbd17ed02c344276ade4aeac425eed7c40b33f3100b1538d0
    • Instruction Fuzzy Hash: 36E08C78200723CFDB205BA5D888B4A76E4EF09349B40843DE8A5C2260E774D882C724
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __itow__swprintf
    • String ID:
    • API String ID: 674341424-0
    • Opcode ID: 1a01160a9722ba63f30d97891145944854b4f273e927bd781a602bc03c55e193
    • Instruction ID: bcd26f670894b173e1901823f198ae6da65d6410dd721ba9b23c39621be95d49
    • Opcode Fuzzy Hash: 1a01160a9722ba63f30d97891145944854b4f273e927bd781a602bc03c55e193
    • Instruction Fuzzy Hash: 7822A9716183419FD724DF24C881BAFB7E4BF84304F104A2DF89A97291DB31EA05DB92
    APIs
    • CreateToolhelp32Snapshot.KERNEL32 ref: 00C9EF51
    • Process32FirstW.KERNEL32(00000000,?), ref: 00C9EF5F
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
    • Process32NextW.KERNEL32(00000000,?), ref: 00C9F01F
    • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00C9F02E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
    • String ID:
    • API String ID: 2576544623-0
    • Opcode ID: 8fa83036a2d9e71d68fe18f8dab4d1f0ec80da73b70b8fc0085a97cd968c4667
    • Instruction ID: a8eaec899da974805f346c3e32e3029e73a393f89100f94b8b7955fa3d3243b3
    • Opcode Fuzzy Hash: 8fa83036a2d9e71d68fe18f8dab4d1f0ec80da73b70b8fc0085a97cd968c4667
    • Instruction Fuzzy Hash: DC516C715083119FD710EF20DC86E6FB7E8EF98710F10492DF59597291EB70AA09DB92
    APIs
    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00C7E93A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: lstrlen
    • String ID: ($|
    • API String ID: 1659193697-1631851259
    • Opcode ID: a81186c50fa935b5e5b9be88f62ec40e46b062f3323f98980438029440f3a39a
    • Instruction ID: c5f0ca21d1faecb47e2debdc53b98b8b1acdeebb882e293b51086101338d6d45
    • Opcode Fuzzy Hash: a81186c50fa935b5e5b9be88f62ec40e46b062f3323f98980438029440f3a39a
    • Instruction Fuzzy Hash: 65321676A006059FD728DF29C48196AB7F1FF48320B15C5AEE5AADB3A1E770E941CB40
    APIs
    • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00C91920,00000000), ref: 00C924F7
    • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00C9252E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Internet$AvailableDataFileQueryRead
    • String ID:
    • API String ID: 599397726-0
    • Opcode ID: 031cff1705f118fbfc67ab65ae72e534782c2a10dd9622d91c820b5984605f30
    • Instruction ID: 95ceda761d46d21e1f4cd2d686d4f5ce0785d6f6c3600bd8939c722df6af29ef
    • Opcode Fuzzy Hash: 031cff1705f118fbfc67ab65ae72e534782c2a10dd9622d91c820b5984605f30
    • Instruction Fuzzy Hash: 0B41C471504209BFEF20DE95DC89EBFB7BCEB40724F10406EF685A7141EA709F41AA60
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 00C8B3CF
    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00C8B429
    • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00C8B476
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorMode$DiskFreeSpace
    • String ID:
    • API String ID: 1682464887-0
    • Opcode ID: 0312f3afcb382e1de142d579795f2ef8d9a070a979b1de5262cf053c3313379e
    • Instruction ID: 828abb6b828f85e355890b33876a7ef17ae99ef0f91783c7aa099d4bd30d841c
    • Opcode Fuzzy Hash: 0312f3afcb382e1de142d579795f2ef8d9a070a979b1de5262cf053c3313379e
    • Instruction Fuzzy Hash: 89216035A00618EFCB00EFA5E881BAEBBB8FF49314F1480A9E905AB351DB319915DB51
    APIs
      • Part of subcall function 00C40F36: std::exception::exception.LIBCMT ref: 00C40F6C
      • Part of subcall function 00C40F36: __CxxThrowException@8.LIBCMT ref: 00C40F81
    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00C78AED
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00C78B1A
    • GetLastError.KERNEL32 ref: 00C78B27
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
    • String ID:
    • API String ID: 1922334811-0
    • Opcode ID: 3d4d162027a75a9187c81ca1737a0f7521eb4483f93105b921af4e606423668a
    • Instruction ID: 0ed177eb6ceda500ad4f030a52a7add4a73466b7e4f23bb07e8b9d1b91d68f88
    • Opcode Fuzzy Hash: 3d4d162027a75a9187c81ca1737a0f7521eb4483f93105b921af4e606423668a
    • Instruction Fuzzy Hash: 6411BFB1554205AFE7289FA4DCCAE2BB7B8FB44314B20C16EF55993241EB70AC05CA60
    APIs
    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00C84A31
    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00C84A48
    • FreeSid.ADVAPI32(?), ref: 00C84A58
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AllocateCheckFreeInitializeMembershipToken
    • String ID:
    • API String ID: 3429775523-0
    • Opcode ID: 85e113e7a4bc97a3f01f0bf28f0b36a143ac88231ccd3f3cd2400ba81029e45d
    • Instruction ID: 894f0665d584c00aa0c699329d2921f724216bf6e06edeacd8d6c4ae6632e530
    • Opcode Fuzzy Hash: 85e113e7a4bc97a3f01f0bf28f0b36a143ac88231ccd3f3cd2400ba81029e45d
    • Instruction Fuzzy Hash: F7F04975A5130DBFDF04DFF0DC89AAEBBBCEF08205F0044A9A901E3181E7706A049B50
    APIs
    • GetFileAttributesW.KERNEL32(?,00C5E6F1), ref: 00C844AB
    • FindFirstFileW.KERNEL32(?,?), ref: 00C844BC
    • FindClose.KERNEL32(00000000), ref: 00C844CC
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FileFind$AttributesCloseFirst
    • String ID:
    • API String ID: 48322524-0
    • Opcode ID: 7b26cd2ecd3adb3af32de3d48e59ab572508956c0ccf81126a262f61bbd9e76a
    • Instruction ID: a88d49d6b3e13e6874b3e47865a503b06db8e8e66cd8bb1d25da709acf055ecf
    • Opcode Fuzzy Hash: 7b26cd2ecd3adb3af32de3d48e59ab572508956c0ccf81126a262f61bbd9e76a
    • Instruction Fuzzy Hash: C5E0D832810401574214B778EC0D7ED779CAE4633DF100719F935C20E0E7745E108699
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3003f38534618ff0ee17b9dde9852d93ec7a99896c51251d24a6a07f65b4f821
    • Instruction ID: c99ed3392bbb0114030d8cbf4287d69839ff2cf5d842b483591888529c7a0908
    • Opcode Fuzzy Hash: 3003f38534618ff0ee17b9dde9852d93ec7a99896c51251d24a6a07f65b4f821
    • Instruction Fuzzy Hash: 7E22C170900225DFDB24DF94E481ABEB7F0FF04310F148169E966AB751E374AE85DB91
    APIs
    • FindFirstFileW.KERNEL32(?,?), ref: 00C8C787
    • FindClose.KERNEL32(00000000), ref: 00C8C7B7
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Find$CloseFileFirst
    • String ID:
    • API String ID: 2295610775-0
    • Opcode ID: c3013703e9943f982d7e386319e105dc49104b96b6bb1c21c8143fd3165e5feb
    • Instruction ID: 8e68bc7dbd4e7cbc485eddacc6dc109fab30407e2ab00a8c2e455889489a29c2
    • Opcode Fuzzy Hash: c3013703e9943f982d7e386319e105dc49104b96b6bb1c21c8143fd3165e5feb
    • Instruction Fuzzy Hash: C911A1326106109FD710EF69D885A2AF7E8FF84324F00851EF9A9D77A0DB30AC01DB91
    APIs
    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00C9957D,?,00CAFB84,?), ref: 00C8A121
    • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00C9957D,?,00CAFB84,?), ref: 00C8A133
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorFormatLastMessage
    • String ID:
    • API String ID: 3479602957-0
    • Opcode ID: e0161d236ed9ff5b03e6d7ce99e905a6874b3fd16387c74b6c0023fb6d365f44
    • Instruction ID: c8cca92f04d45b5f236a694a5928652f0bbb8a6453b0af98f0d5254865428ec0
    • Opcode Fuzzy Hash: e0161d236ed9ff5b03e6d7ce99e905a6874b3fd16387c74b6c0023fb6d365f44
    • Instruction Fuzzy Hash: 0AF0BE3510522DABDB10AAA4CC48FEE736CAF09362F00426AB90993180DA709940CBA1
    APIs
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00C78631), ref: 00C78508
    • CloseHandle.KERNEL32(?,?,00C78631), ref: 00C7851A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AdjustCloseHandlePrivilegesToken
    • String ID:
    • API String ID: 81990902-0
    • Opcode ID: 77bf5176b5a57ef9f636250b25b93ffc56f867779dd47a4a1d4c13f540dbc4b3
    • Instruction ID: 2ab9da9c76b98a8f9639f5a87a54e4aafebcb31c85324cd9a48ef9021ea90ea8
    • Opcode Fuzzy Hash: 77bf5176b5a57ef9f636250b25b93ffc56f867779dd47a4a1d4c13f540dbc4b3
    • Instruction Fuzzy Hash: A4E04F31014500AEF7212BA4EC09E7777A9FB40314720842DB99581430DB715C91DB50
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00C48ED7,?,?,?,00000001), ref: 00C4A2DA
    • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00C4A2E3
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 5eb7b0a60ce4fc28f2875a96dbb31379cccf7592c09c232226e7918044425d26
    • Instruction ID: 4e53ea655d0227f3e52aaf8b81d5d77004409a4d8e6c9e57cb63653d64a50a9d
    • Opcode Fuzzy Hash: 5eb7b0a60ce4fc28f2875a96dbb31379cccf7592c09c232226e7918044425d26
    • Instruction Fuzzy Hash: D1B09231055208ABCF002BD1EC59B8C3F68EB46AAAF404024F60D86070CBB254528A91
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d2f4ab5f0fdcce883bf6cb04a5e74f2ef05149d992bae3cee1d7013ef2951645
    • Instruction ID: 9a1a4cac4ab9f2fc2dc9a24f335df4c1c93201d29f012fe8f7669912ccb583d8
    • Opcode Fuzzy Hash: d2f4ab5f0fdcce883bf6cb04a5e74f2ef05149d992bae3cee1d7013ef2951645
    • Instruction Fuzzy Hash: 7B320531D29F414EDB239635D83233AA649BFB73C4F15D73BE829B59A6EB28C5834101
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a7d1c36ce49db769d8528405afb425ceb078f1c6f5abd5fff5ccd86964d941bc
    • Instruction ID: 96a93db656bef9743d7a579bafdf0ed0826da69c47704bf25b228441702d712b
    • Opcode Fuzzy Hash: a7d1c36ce49db769d8528405afb425ceb078f1c6f5abd5fff5ccd86964d941bc
    • Instruction Fuzzy Hash: D6B1F021D2AF404DD7239639883133ABA9CAFBB6C5F51E71BFC6674D62EB2185C34141
    APIs
    • __time64.LIBCMT ref: 00C88944
      • Part of subcall function 00C4537A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00C89017,00000000,?,?,?,?,00C891C8,00000000,?), ref: 00C45383
      • Part of subcall function 00C4537A: __aulldiv.LIBCMT ref: 00C453A3
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Time$FileSystem__aulldiv__time64
    • String ID:
    • API String ID: 2893107130-0
    • Opcode ID: 3acb7befd1bc0a9172d913f5e702299646cd3960ad78cc0587bff9142f664900
    • Instruction ID: 968d05f821ee81014f194545bc6a2b1b6c885d89e0c2c15087735c6d4ac7c849
    • Opcode Fuzzy Hash: 3acb7befd1bc0a9172d913f5e702299646cd3960ad78cc0587bff9142f664900
    • Instruction Fuzzy Hash: 4B21B472635650CBC729CF25D881B66B3E1EBA5310B688E6CD1F5CF2D0CA74B905CB54
    APIs
    • BlockInput.USER32(00000001), ref: 00C9403A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BlockInput
    • String ID:
    • API String ID: 3456056419-0
    • Opcode ID: 1f7355b2e6d42b2f7572937d8813b721b8cc9aa277dfc931369641599d163a30
    • Instruction ID: 9f2b8319f6c8b778d10f9e6497737e8b1c02bd6ccbc4355fea6b4c990f32eb54
    • Opcode Fuzzy Hash: 1f7355b2e6d42b2f7572937d8813b721b8cc9aa277dfc931369641599d163a30
    • Instruction Fuzzy Hash: 56E048312002149FD714DF59E445E5AFBD9EF64760F008015FD4AC7751DA70E8419B91
    APIs
    • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00C84CF1
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: mouse_event
    • String ID:
    • API String ID: 2434400541-0
    • Opcode ID: 7f6c20378bf7561c1ae5b448ec20614970a974d7e511f2a6ec0355fa13a4cb50
    • Instruction ID: 3b97d9b7746db600b145ddd106383f7e6720d94b617140ef91e1a230d0603117
    • Opcode Fuzzy Hash: 7f6c20378bf7561c1ae5b448ec20614970a974d7e511f2a6ec0355fa13a4cb50
    • Instruction Fuzzy Hash: 53D09EAD162607B9ED5C2760DD2FF76120CF30178EFA44149B112851C1DAA16D856239
    APIs
    • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00C786B1), ref: 00C78A93
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: LogonUser
    • String ID:
    • API String ID: 1244722697-0
    • Opcode ID: 4ee6e3149753b9b78f78bcc46bc7805d201d4239552a996a3fe81e85d038e07d
    • Instruction ID: 9f353ecb36a79f4127ce251b1641cc1b252dda701583e4f55384ed5d9abb5e02
    • Opcode Fuzzy Hash: 4ee6e3149753b9b78f78bcc46bc7805d201d4239552a996a3fe81e85d038e07d
    • Instruction Fuzzy Hash: 7ED05E322A050EABEF018EA4DC01EAE3B69EB04B01F408111FE15C60A1C775D835AB60
    APIs
    • GetUserNameW.ADVAPI32(?,?), ref: 00C62171
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: NameUser
    • String ID:
    • API String ID: 2645101109-0
    • Opcode ID: 892f5755f1e4af89ad0c58a63b6e5261c2305b3589307b4535f9bc5065fb6f7b
    • Instruction ID: e2a2f6c4fbf0a652252155739f36dc92920682c3a035f83d29cf64b21a6c2cc0
    • Opcode Fuzzy Hash: 892f5755f1e4af89ad0c58a63b6e5261c2305b3589307b4535f9bc5065fb6f7b
    • Instruction Fuzzy Hash: B7C048F1811509DBCB15DBE1DA88EEEBBBCAB08309F2840AAA542F2101D7749B449B71
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00C4A2AA
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: b2bb3a47191434f22a200cc348037cc9ec2fa58b4dfd278eda713314872ef49e
    • Instruction ID: 70ca8e2b0b051b0975c6d36cc52265962e8e6f8a730e52bea7e507c43922f765
    • Opcode Fuzzy Hash: b2bb3a47191434f22a200cc348037cc9ec2fa58b4dfd278eda713314872ef49e
    • Instruction Fuzzy Hash: 94A0123000010CA78F001BC1EC045487F5CD6011947004020F40C41031873254114580
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0b0fed11ca0842a75d1544a0bf5b0918dec88cd23fb8ee7a2a431cdce09d2078
    • Instruction ID: 2129c5e8cffea258b84761cfb31c90f1079486e4251489153d9023ab508f4620
    • Opcode Fuzzy Hash: 0b0fed11ca0842a75d1544a0bf5b0918dec88cd23fb8ee7a2a431cdce09d2078
    • Instruction Fuzzy Hash: 4C223870910757CBCF388B29C89477CB7A1FB01308F68C46AF86A9B5A1DB749E89D750
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
    • Instruction ID: a5f6117e501e938b88d48521c79641dc463bea8a7a96aada7d3bba12467c19b4
    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
    • Instruction Fuzzy Hash: F5C174322150530AEB2D467A843513EBEB17AA27B239E175DF8F3CB1D5EF10C669D620
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
    • Instruction ID: cd57d5b06af66cc177168d9b82fd2baa42e6b036a7ca48830bf6bc6e56e6d8dd
    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
    • Instruction Fuzzy Hash: DAC1743221519309EB2D463A843513EBFA17AA27B239E075DF8F2DB1D4EF10C669D620
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
    • Instruction ID: 76ec1d361a38806565623007f59dcbabdea25fa67543559d153cbbaa2a088f5f
    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
    • Instruction Fuzzy Hash: B5C183726451930DEB2D467A847413EBEA17AA27B235E075DECF2CB1C4EF20C6A99610
    APIs
    • DeleteObject.GDI32(00000000), ref: 00C97970
    • DeleteObject.GDI32(00000000), ref: 00C97982
    • DestroyWindow.USER32 ref: 00C97990
    • GetDesktopWindow.USER32 ref: 00C979AA
    • GetWindowRect.USER32(00000000), ref: 00C979B1
    • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00C97AF2
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00C97B02
    • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97B4A
    • GetClientRect.USER32(00000000,?), ref: 00C97B56
    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00C97B90
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97BB2
    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97BC5
    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97BD0
    • GlobalLock.KERNEL32(00000000), ref: 00C97BD9
    • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97BE8
    • GlobalUnlock.KERNEL32(00000000), ref: 00C97BF1
    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97BF8
    • GlobalFree.KERNEL32(00000000), ref: 00C97C03
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97C15
    • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00CB2CAC,00000000), ref: 00C97C2B
    • GlobalFree.KERNEL32(00000000), ref: 00C97C3B
    • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00C97C61
    • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00C97C80
    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97CA2
    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00C97E8F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
    • String ID: $AutoIt v3$DISPLAY$static
    • API String ID: 2211948467-2373415609
    • Opcode ID: 97e343fff29e78bbf7d64d720380d281f84ace29e4549227e05ac3841ef0c2b6
    • Instruction ID: 37cd3964562cfde68c6cc697c2ef006203e0351fa2077b2cc75c40b64f24eb54
    • Opcode Fuzzy Hash: 97e343fff29e78bbf7d64d720380d281f84ace29e4549227e05ac3841ef0c2b6
    • Instruction Fuzzy Hash: 7C023771910119EFDF14DFA4DC89FAE7BB9EB49314F148668F915AB2A1CB30AD01CB60
    APIs
    • CharUpperBuffW.USER32(?,?,00CAF910), ref: 00CA3690
    • IsWindowVisible.USER32(?), ref: 00CA36B4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BuffCharUpperVisibleWindow
    • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
    • API String ID: 4105515805-45149045
    • Opcode ID: 99253b8cabad3104272d73de438aeb590bb486fb3c72446d9d4080e34b9344aa
    • Instruction ID: 4dabe4afce1487722e15d4de59084ca747c027296b74a962a01c5919061fb9f5
    • Opcode Fuzzy Hash: 99253b8cabad3104272d73de438aeb590bb486fb3c72446d9d4080e34b9344aa
    • Instruction Fuzzy Hash: F3D1B674204352DBCB14EF10C4E1A6E77A1EF95348F148859F9965B3E2CB31DE0AEB82
    APIs
    • SetTextColor.GDI32(?,00000000), ref: 00CAA662
    • GetSysColorBrush.USER32(0000000F), ref: 00CAA693
    • GetSysColor.USER32(0000000F), ref: 00CAA69F
    • SetBkColor.GDI32(?,000000FF), ref: 00CAA6B9
    • SelectObject.GDI32(?,00000000), ref: 00CAA6C8
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00CAA6F3
    • GetSysColor.USER32(00000010), ref: 00CAA6FB
    • CreateSolidBrush.GDI32(00000000), ref: 00CAA702
    • FrameRect.USER32(?,?,00000000), ref: 00CAA711
    • DeleteObject.GDI32(00000000), ref: 00CAA718
    • InflateRect.USER32(?,000000FE,000000FE), ref: 00CAA763
    • FillRect.USER32(?,?,00000000), ref: 00CAA795
    • GetWindowLongW.USER32(?,000000F0), ref: 00CAA7C0
      • Part of subcall function 00CAA8FC: GetSysColor.USER32(00000012), ref: 00CAA935
      • Part of subcall function 00CAA8FC: SetTextColor.GDI32(?,?), ref: 00CAA939
      • Part of subcall function 00CAA8FC: GetSysColorBrush.USER32(0000000F), ref: 00CAA94F
      • Part of subcall function 00CAA8FC: GetSysColor.USER32(0000000F), ref: 00CAA95A
      • Part of subcall function 00CAA8FC: GetSysColor.USER32(00000011), ref: 00CAA977
      • Part of subcall function 00CAA8FC: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CAA985
      • Part of subcall function 00CAA8FC: SelectObject.GDI32(?,00000000), ref: 00CAA996
      • Part of subcall function 00CAA8FC: SetBkColor.GDI32(?,00000000), ref: 00CAA99F
      • Part of subcall function 00CAA8FC: SelectObject.GDI32(?,?), ref: 00CAA9AC
      • Part of subcall function 00CAA8FC: InflateRect.USER32(?,000000FF,000000FF), ref: 00CAA9CB
      • Part of subcall function 00CAA8FC: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CAA9E2
      • Part of subcall function 00CAA8FC: GetWindowLongW.USER32(00000000,000000F0), ref: 00CAA9F7
      • Part of subcall function 00CAA8FC: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CAAA1F
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
    • String ID:
    • API String ID: 3521893082-0
    • Opcode ID: 92cfdc8dc3286dd6f64a334c83247d30aaebc7225ecc89e0262e56b82b5e369d
    • Instruction ID: fc8142ea5b805b410f896359388a42375223a2837e14ce4930543b8efd60597c
    • Opcode Fuzzy Hash: 92cfdc8dc3286dd6f64a334c83247d30aaebc7225ecc89e0262e56b82b5e369d
    • Instruction Fuzzy Hash: A3916D71408301AFD7119FA4DC08B5F7BB9FB8A329F100B2DF5A2961A0D771D946CB52
    APIs
    • DestroyWindow.USER32(?,?,?), ref: 00C22CA2
    • DeleteObject.GDI32(00000000), ref: 00C22CE8
    • DeleteObject.GDI32(00000000), ref: 00C22CF3
    • DestroyIcon.USER32(00000000,?,?,?), ref: 00C22CFE
    • DestroyWindow.USER32(00000000,?,?,?), ref: 00C22D09
    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00C5C5BB
    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00C5C5F4
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00C5CA1D
      • Part of subcall function 00C21B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C22036,?,00000000,?,?,?,?,00C216CB,00000000,?), ref: 00C21B9A
    • SendMessageW.USER32(?,00001053), ref: 00C5CA5A
    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00C5CA71
    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00C5CA87
    • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00C5CA92
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
    • String ID: 0
    • API String ID: 464785882-4108050209
    • Opcode ID: 2b5b1e0153473fcd4dd8e7d688a967504cd09dc0f510f665df51e0f3a8d2f8d7
    • Instruction ID: d1829408c655ce5bda9ef143154c535c064f40488e1a5aa4e0652cd690b41d29
    • Opcode Fuzzy Hash: 2b5b1e0153473fcd4dd8e7d688a967504cd09dc0f510f665df51e0f3a8d2f8d7
    • Instruction Fuzzy Hash: D812AD34600211EFDB20CF24D8C4BA9BBE1FF09312F544569F8A5DB662CB31E986DB95
    APIs
    • DestroyWindow.USER32(00000000), ref: 00C975F3
    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00C976B2
    • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00C976F0
    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00C97702
    • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00C97748
    • GetClientRect.USER32(00000000,?), ref: 00C97754
    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00C97798
    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00C977A7
    • GetStockObject.GDI32(00000011), ref: 00C977B7
    • SelectObject.GDI32(00000000,00000000), ref: 00C977BB
    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00C977CB
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C977D4
    • DeleteDC.GDI32(00000000), ref: 00C977DD
    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00C97809
    • SendMessageW.USER32(00000030,00000000,00000001), ref: 00C97820
    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00C9785B
    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00C9786F
    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00C97880
    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00C978B0
    • GetStockObject.GDI32(00000011), ref: 00C978BB
    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00C978C6
    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00C978D0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
    • API String ID: 2910397461-517079104
    • Opcode ID: 2ef35ecd2f2a46c08338feeaec57a019a14eadb1515d7d3fbac25ed227c1027c
    • Instruction ID: 9cfb3b23ca0625a804db4919afd69a995c6ec20edff7016f7c91e9836faf62cd
    • Opcode Fuzzy Hash: 2ef35ecd2f2a46c08338feeaec57a019a14eadb1515d7d3fbac25ed227c1027c
    • Instruction Fuzzy Hash: 1FA162B1A40615BFEB14DFA4DC4AFAE7BB9EB45714F004218FA15AB2E0C770AD01CB64
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 00C8ADAA
    • GetDriveTypeW.KERNEL32(?,00CAFAC0,?,\\.\,00CAF910), ref: 00C8AE87
    • SetErrorMode.KERNEL32(00000000,00CAFAC0,?,\\.\,00CAF910), ref: 00C8AFE5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorMode$DriveType
    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
    • API String ID: 2907320926-4222207086
    • Opcode ID: cbb3aa1fe89d4fa497df6dba4970ba0e92c3ee87d1b5dfaec27e911d271ba16d
    • Instruction ID: 6bc371c662493ce0f96d421407b187879325a4393b90f6eb019cd6a4764e8ac4
    • Opcode Fuzzy Hash: cbb3aa1fe89d4fa497df6dba4970ba0e92c3ee87d1b5dfaec27e911d271ba16d
    • Instruction Fuzzy Hash: AD5193B4648605BBDB00FB91CD9297DB370EB047087204467FB16A7290CB71DE46EB9B
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
    • API String ID: 1038674560-86951937
    • Opcode ID: a222d04a6c4fa6c836fea46d6e44498f6ebf13f531c33727fd8c3e163ff721f5
    • Instruction ID: 2abb78558aa9d051ac648eeba475a1f5994da40b57f9abc40f86d7fce1ad21bf
    • Opcode Fuzzy Hash: a222d04a6c4fa6c836fea46d6e44498f6ebf13f531c33727fd8c3e163ff721f5
    • Instruction Fuzzy Hash: 43814770644225BBCB24AF61EC83FAF7768AF25740F040035FD45AA582EB70DB55E2B4
    APIs
    • GetSysColor.USER32(00000012), ref: 00CAA935
    • SetTextColor.GDI32(?,?), ref: 00CAA939
    • GetSysColorBrush.USER32(0000000F), ref: 00CAA94F
    • GetSysColor.USER32(0000000F), ref: 00CAA95A
    • CreateSolidBrush.GDI32(?), ref: 00CAA95F
    • GetSysColor.USER32(00000011), ref: 00CAA977
    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00CAA985
    • SelectObject.GDI32(?,00000000), ref: 00CAA996
    • SetBkColor.GDI32(?,00000000), ref: 00CAA99F
    • SelectObject.GDI32(?,?), ref: 00CAA9AC
    • InflateRect.USER32(?,000000FF,000000FF), ref: 00CAA9CB
    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00CAA9E2
    • GetWindowLongW.USER32(00000000,000000F0), ref: 00CAA9F7
    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00CAAA1F
    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00CAAA46
    • InflateRect.USER32(?,000000FD,000000FD), ref: 00CAAA64
    • DrawFocusRect.USER32(?,?), ref: 00CAAA6F
    • GetSysColor.USER32(00000011), ref: 00CAAA7D
    • SetTextColor.GDI32(?,00000000), ref: 00CAAA85
    • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00CAAA99
    • SelectObject.GDI32(?,00CAA62C), ref: 00CAAAB0
    • DeleteObject.GDI32(?), ref: 00CAAABB
    • SelectObject.GDI32(?,?), ref: 00CAAAC1
    • DeleteObject.GDI32(?), ref: 00CAAAC6
    • SetTextColor.GDI32(?,?), ref: 00CAAACC
    • SetBkColor.GDI32(?,?), ref: 00CAAAD6
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
    • String ID:
    • API String ID: 1996641542-0
    • Opcode ID: 03f1b34f8555d2b82c945ac02c69a0e5720fd15dd461e76763ab79be2507fb1f
    • Instruction ID: 3f5ffd29970107d03968908c474cb02138b4a088f9e0d1b514c3114dc20e49ba
    • Opcode Fuzzy Hash: 03f1b34f8555d2b82c945ac02c69a0e5720fd15dd461e76763ab79be2507fb1f
    • Instruction Fuzzy Hash: 11514D71900209FFDB109FA4DC48FAE7BB9EF09324F114229FA11AB2A1D7719A41DF90
    APIs
    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00CA8AF3
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CA8B04
    • CharNextW.USER32(0000014E), ref: 00CA8B33
    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00CA8B74
    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00CA8B8A
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CA8B9B
    • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00CA8BB8
    • SetWindowTextW.USER32(?,0000014E), ref: 00CA8C0A
    • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00CA8C20
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CA8C51
    • _memset.LIBCMT ref: 00CA8C76
    • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00CA8CBF
    • _memset.LIBCMT ref: 00CA8D1E
    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00CA8D48
    • SendMessageW.USER32(?,00001074,?,00000001), ref: 00CA8DA0
    • SendMessageW.USER32(?,0000133D,?,?), ref: 00CA8E4D
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00CA8E6F
    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00CA8EB9
    • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00CA8EE6
    • DrawMenuBar.USER32(?), ref: 00CA8EF5
    • SetWindowTextW.USER32(?,0000014E), ref: 00CA8F1D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
    • String ID: 0
    • API String ID: 1073566785-4108050209
    • Opcode ID: 5e50b6760b34398ed0c77fc88715bfd64f61d72cfc968f77f9a5b5a41858b567
    • Instruction ID: 25a8a9dbda0c79aefeabd9316a0e953ef3d35d072acf8a74b532f69d59ee8499
    • Opcode Fuzzy Hash: 5e50b6760b34398ed0c77fc88715bfd64f61d72cfc968f77f9a5b5a41858b567
    • Instruction Fuzzy Hash: 4CE1827490120AAFDF209F91CC84EEE7B79FF06758F10815AFA259B190DB708A85DF60
    APIs
    • GetCursorPos.USER32(?), ref: 00CA4A33
    • GetDesktopWindow.USER32 ref: 00CA4A48
    • GetWindowRect.USER32(00000000), ref: 00CA4A4F
    • GetWindowLongW.USER32(?,000000F0), ref: 00CA4AB1
    • DestroyWindow.USER32(?), ref: 00CA4ADD
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00CA4B06
    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CA4B24
    • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00CA4B4A
    • SendMessageW.USER32(?,00000421,?,?), ref: 00CA4B5F
    • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00CA4B72
    • IsWindowVisible.USER32(?), ref: 00CA4B92
    • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00CA4BAD
    • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00CA4BC1
    • GetWindowRect.USER32(?,?), ref: 00CA4BD9
    • MonitorFromPoint.USER32(?,?,00000002), ref: 00CA4BFF
    • GetMonitorInfoW.USER32(00000000,?), ref: 00CA4C19
    • CopyRect.USER32(?,?), ref: 00CA4C30
    • SendMessageW.USER32(?,00000412,00000000), ref: 00CA4C9B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
    • String ID: ($0$tooltips_class32
    • API String ID: 698492251-4156429822
    • Opcode ID: dd7600717cb4b8c82adacbe6d09a6ffcf6a71261e8e3efe00cceb478a376cac1
    • Instruction ID: f58cbadb792542f4fcd48f6e21416245d17dde7b7ed076ae80b948d75d54a235
    • Opcode Fuzzy Hash: dd7600717cb4b8c82adacbe6d09a6ffcf6a71261e8e3efe00cceb478a376cac1
    • Instruction Fuzzy Hash: D3B1AB70604301AFDB08DF64C888B6ABBE4FF89318F00891CF5999B291D7B0ED05DB96
    APIs
    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C228BC
    • GetSystemMetrics.USER32(00000007), ref: 00C228C4
    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00C228EF
    • GetSystemMetrics.USER32(00000008), ref: 00C228F7
    • GetSystemMetrics.USER32(00000004), ref: 00C2291C
    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00C22939
    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00C22949
    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00C2297C
    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00C22990
    • GetClientRect.USER32(00000000,000000FF), ref: 00C229AE
    • GetStockObject.GDI32(00000011), ref: 00C229CA
    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00C229D5
      • Part of subcall function 00C22344: GetCursorPos.USER32(?), ref: 00C22357
      • Part of subcall function 00C22344: ScreenToClient.USER32(00CE57B0,?), ref: 00C22374
      • Part of subcall function 00C22344: GetAsyncKeyState.USER32(00000001), ref: 00C22399
      • Part of subcall function 00C22344: GetAsyncKeyState.USER32(00000002), ref: 00C223A7
    • SetTimer.USER32(00000000,00000000,00000028,00C21256), ref: 00C229FC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
    • String ID: AutoIt v3 GUI
    • API String ID: 1458621304-248962490
    • Opcode ID: f1bf786e9435abe04ee0667ac90cf2d301d9fd36c2feafcba01d9ebc4b3565b4
    • Instruction ID: 79d7f190d2765c98eb9d5d284596f4b8443b718301c03ee25069b373c0e24d8c
    • Opcode Fuzzy Hash: f1bf786e9435abe04ee0667ac90cf2d301d9fd36c2feafcba01d9ebc4b3565b4
    • Instruction Fuzzy Hash: 9EB17B75A0021AEFDB24DFA8DC85BAD7BB4FB08315F104229FA15AB2E0DB74D951CB50
    APIs
    • GetClassNameW.USER32(?,?,00000100), ref: 00C7A885
    • __swprintf.LIBCMT ref: 00C7A926
    • _wcscmp.LIBCMT ref: 00C7A939
    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00C7A98E
    • _wcscmp.LIBCMT ref: 00C7A9CA
    • GetClassNameW.USER32(?,?,00000400), ref: 00C7AA01
    • GetDlgCtrlID.USER32(?), ref: 00C7AA53
    • GetWindowRect.USER32(?,?), ref: 00C7AA89
    • GetParent.USER32(?), ref: 00C7AAA7
    • ScreenToClient.USER32(00000000), ref: 00C7AAAE
    • GetClassNameW.USER32(?,?,00000100), ref: 00C7AB28
    • _wcscmp.LIBCMT ref: 00C7AB3C
    • GetWindowTextW.USER32(?,?,00000400), ref: 00C7AB62
    • _wcscmp.LIBCMT ref: 00C7AB76
      • Part of subcall function 00C437AC: _iswctype.LIBCMT ref: 00C437B4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
    • String ID: %s%u
    • API String ID: 3744389584-679674701
    • Opcode ID: 5b5029fa9475e01de1d628875ab608d28b9bdbd13d9d2e41c9bbf4bbdcc81a9d
    • Instruction ID: edbb924590a8aa6c1e5f01b4655c9ac48865e4ff44b2b4087c1f720fae5f383b
    • Opcode Fuzzy Hash: 5b5029fa9475e01de1d628875ab608d28b9bdbd13d9d2e41c9bbf4bbdcc81a9d
    • Instruction Fuzzy Hash: B0A1CF71204606AFD718DF64C884FAEB7E9FF84354F108629F9ADC2190D730EA56CB92
    APIs
    • GetClassNameW.USER32(00000008,?,00000400), ref: 00C7B1DA
    • _wcscmp.LIBCMT ref: 00C7B1EB
    • GetWindowTextW.USER32(00000001,?,00000400), ref: 00C7B213
    • CharUpperBuffW.USER32(?,00000000), ref: 00C7B230
    • _wcscmp.LIBCMT ref: 00C7B24E
    • _wcsstr.LIBCMT ref: 00C7B25F
    • GetClassNameW.USER32(00000018,?,00000400), ref: 00C7B297
    • _wcscmp.LIBCMT ref: 00C7B2A7
    • GetWindowTextW.USER32(00000002,?,00000400), ref: 00C7B2CE
    • GetClassNameW.USER32(00000018,?,00000400), ref: 00C7B317
    • _wcscmp.LIBCMT ref: 00C7B327
    • GetClassNameW.USER32(00000010,?,00000400), ref: 00C7B34F
    • GetWindowRect.USER32(00000004,?), ref: 00C7B3B8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
    • String ID: @$ThumbnailClass
    • API String ID: 1788623398-1539354611
    • Opcode ID: d921c1c9ac730d688a97011a52af78b16adb0c9d6feec0017720312da0195618
    • Instruction ID: 897efd9870b736d4239c77432e625985344f2b087c7644f3b4fdc40fa9110e00
    • Opcode Fuzzy Hash: d921c1c9ac730d688a97011a52af78b16adb0c9d6feec0017720312da0195618
    • Instruction Fuzzy Hash: D8819E710082469FDB04DF14C985FAA7BE8FF84318F04C56AFD999A0A6DB34DE46CB61
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
    • API String ID: 1038674560-1810252412
    • Opcode ID: ebe95bc89b6c0ddbe872a1a8a83785fb7db9a9c7c6cf59004ff431c7e064c070
    • Instruction ID: e2a2ce8446f0fe3e31540ebe6fee6646a22d007dd0329790b9c4e124ee07e6b4
    • Opcode Fuzzy Hash: ebe95bc89b6c0ddbe872a1a8a83785fb7db9a9c7c6cf59004ff431c7e064c070
    • Instruction Fuzzy Hash: 6831E131A48219AADB20FA60DD83FAF77A4AF20710F60062AF529711D2FF716F04E650
    APIs
    • LoadIconW.USER32(00000063), ref: 00C7C2D3
    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00C7C2E5
    • SetWindowTextW.USER32(?,?), ref: 00C7C2FC
    • GetDlgItem.USER32(?,000003EA), ref: 00C7C311
    • SetWindowTextW.USER32(00000000,?), ref: 00C7C317
    • GetDlgItem.USER32(?,000003E9), ref: 00C7C327
    • SetWindowTextW.USER32(00000000,?), ref: 00C7C32D
    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00C7C34E
    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00C7C368
    • GetWindowRect.USER32(?,?), ref: 00C7C371
    • SetWindowTextW.USER32(?,?), ref: 00C7C3DC
    • GetDesktopWindow.USER32 ref: 00C7C3E2
    • GetWindowRect.USER32(00000000), ref: 00C7C3E9
    • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00C7C435
    • GetClientRect.USER32(?,?), ref: 00C7C442
    • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00C7C467
    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00C7C492
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
    • String ID:
    • API String ID: 3869813825-0
    • Opcode ID: 4390f2eeb09dd2400ebaa73f06687c999b125fcfb08f53e0f907429fb950f02b
    • Instruction ID: 5106b7c5bc99964cba8ab6e6ec3b953765e24c65a46759925b49125d3be5f7e7
    • Opcode Fuzzy Hash: 4390f2eeb09dd2400ebaa73f06687c999b125fcfb08f53e0f907429fb950f02b
    • Instruction Fuzzy Hash: 45514C3190070AEFDB209FA8DD85BAEBBB5FF04709F00852CE696A35A0C774A955DB50
    APIs
    • LoadCursorW.USER32(00000000,00007F8A), ref: 00C95129
    • LoadCursorW.USER32(00000000,00007F00), ref: 00C95134
    • LoadCursorW.USER32(00000000,00007F03), ref: 00C9513F
    • LoadCursorW.USER32(00000000,00007F8B), ref: 00C9514A
    • LoadCursorW.USER32(00000000,00007F01), ref: 00C95155
    • LoadCursorW.USER32(00000000,00007F81), ref: 00C95160
    • LoadCursorW.USER32(00000000,00007F88), ref: 00C9516B
    • LoadCursorW.USER32(00000000,00007F80), ref: 00C95176
    • LoadCursorW.USER32(00000000,00007F86), ref: 00C95181
    • LoadCursorW.USER32(00000000,00007F83), ref: 00C9518C
    • LoadCursorW.USER32(00000000,00007F85), ref: 00C95197
    • LoadCursorW.USER32(00000000,00007F82), ref: 00C951A2
    • LoadCursorW.USER32(00000000,00007F84), ref: 00C951AD
    • LoadCursorW.USER32(00000000,00007F04), ref: 00C951B8
    • LoadCursorW.USER32(00000000,00007F02), ref: 00C951C3
    • LoadCursorW.USER32(00000000,00007F89), ref: 00C951CE
    • GetCursorInfo.USER32(?), ref: 00C951DE
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Cursor$Load$Info
    • String ID:
    • API String ID: 2577412497-0
    • Opcode ID: 05118533838b9c9ebf4474228e4fd8ddb213754bb29e0a5963ce53887bfba13a
    • Instruction ID: 9db81b9e9fd4a42fa7eb2d160581236cc58140c8893b9042b8ce29ac45ff5bb6
    • Opcode Fuzzy Hash: 05118533838b9c9ebf4474228e4fd8ddb213754bb29e0a5963ce53887bfba13a
    • Instruction Fuzzy Hash: D13135B0D48719AADF109FB68C8996FBEE8FF04750F50452AE51DE7280DA7865008FA1
    APIs
    • _memset.LIBCMT ref: 00CAA28B
    • DestroyWindow.USER32(00000000,?), ref: 00CAA305
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00CAA37F
    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00CAA3A1
    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CAA3B4
    • DestroyWindow.USER32(00000000), ref: 00CAA3D6
    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00C20000,00000000), ref: 00CAA40D
    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00CAA426
    • GetDesktopWindow.USER32 ref: 00CAA43F
    • GetWindowRect.USER32(00000000), ref: 00CAA446
    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00CAA45E
    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00CAA476
      • Part of subcall function 00C225DB: GetWindowLongW.USER32(?,000000EB), ref: 00C225EC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
    • String ID: 0$tooltips_class32
    • API String ID: 1297703922-3619404913
    • Opcode ID: 7771f6284b8610b91cdf0d923244dbd38c5471a4337b37b3dcfbc516334c256e
    • Instruction ID: 52f542af3bea1476e68452a8ab8b1c69b8f09539147bd219f3c58255d8bda963
    • Opcode Fuzzy Hash: 7771f6284b8610b91cdf0d923244dbd38c5471a4337b37b3dcfbc516334c256e
    • Instruction Fuzzy Hash: 4171CD70140645AFDB20CF28DC48F6A77E5FB8A708F04052DF9968B2A1D770EA02DF62
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • DragQueryPoint.SHELL32(?,?), ref: 00CAC691
      • Part of subcall function 00CAAB69: ClientToScreen.USER32(?,?), ref: 00CAAB92
      • Part of subcall function 00CAAB69: GetWindowRect.USER32(?,?), ref: 00CAAC08
      • Part of subcall function 00CAAB69: PtInRect.USER32(?,?,00CAC07E), ref: 00CAAC18
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00CAC6FA
    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00CAC705
    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00CAC728
    • _wcscat.LIBCMT ref: 00CAC758
    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00CAC76F
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00CAC788
    • SendMessageW.USER32(?,000000B1,?,?), ref: 00CAC79F
    • SendMessageW.USER32(?,000000B1,?,?), ref: 00CAC7C1
    • DragFinish.SHELL32(?), ref: 00CAC7C8
    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00CAC8BB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
    • API String ID: 169749273-3440237614
    • Opcode ID: 353174237d8029bbceee1bf271b18f697a4b481ca6de7fa4ed914096c421e87f
    • Instruction ID: 2baef257ba3d868fccf66bf6b86b67688f883a752bc8c2373323d55bbdd4dc08
    • Opcode Fuzzy Hash: 353174237d8029bbceee1bf271b18f697a4b481ca6de7fa4ed914096c421e87f
    • Instruction Fuzzy Hash: 5B616C71108311AFC710EFA4DC85E9FBBE8EB89714F00092EF691971A1DB709A09DB92
    APIs
    • VariantInit.OLEAUT32(00000000), ref: 00C87E08
    • VariantCopy.OLEAUT32(00000000,?), ref: 00C87E11
    • VariantClear.OLEAUT32(00000000), ref: 00C87E1D
    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00C87F0B
    • __swprintf.LIBCMT ref: 00C87F3B
    • VarR8FromDec.OLEAUT32(?,?), ref: 00C87F67
    • VariantInit.OLEAUT32(?), ref: 00C88018
    • SysFreeString.OLEAUT32(00000016), ref: 00C880AC
    • VariantClear.OLEAUT32(?), ref: 00C88106
    • VariantClear.OLEAUT32(?), ref: 00C88115
    • VariantInit.OLEAUT32(00000000), ref: 00C88153
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
    • String ID: %4d%02d%02d%02d%02d%02d$Default
    • API String ID: 3730832054-3931177956
    • Opcode ID: 45a1f3b61691258a6d37e086904a4e1f2286c307ea7870b6d58ed83d06e3d284
    • Instruction ID: ae0f7e26c73ec557b06a3acef7afeb214ef18ea6489b536778d713cbe9849e00
    • Opcode Fuzzy Hash: 45a1f3b61691258a6d37e086904a4e1f2286c307ea7870b6d58ed83d06e3d284
    • Instruction Fuzzy Hash: A0D10731608526DFDB20BFA6D884B6AB7B4FF05308F3482A9F4159B590EB30DD44EB65
    APIs
    • CharUpperBuffW.USER32(?,?), ref: 00CA448D
    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CA44D8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BuffCharMessageSendUpper
    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
    • API String ID: 3974292440-4258414348
    • Opcode ID: cb2052de8e402a67eb69a15ee54a053b2e0abacb6aa8f483cd9b8f8b3c2fadea
    • Instruction ID: af747df31301f56fab29e2e07bf5688f8b9b9d5074768dc99541680d59474b71
    • Opcode Fuzzy Hash: cb2052de8e402a67eb69a15ee54a053b2e0abacb6aa8f483cd9b8f8b3c2fadea
    • Instruction Fuzzy Hash: 90919374204712DFCB18EF10C491A6DB7A1EF85314F14885DF89A5B7A2CB71ED4AEB82
    APIs
    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00CAB8E8
    • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00CA6B43,?), ref: 00CAB944
    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CAB97D
    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00CAB9C0
    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00CAB9F7
    • FreeLibrary.KERNEL32(?), ref: 00CABA03
    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00CABA13
    • DestroyIcon.USER32(?), ref: 00CABA22
    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00CABA3F
    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00CABA4B
      • Part of subcall function 00C4307D: __wcsicmp_l.LIBCMT ref: 00C43106
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
    • String ID: .dll$.exe$.icl
    • API String ID: 1212759294-1154884017
    • Opcode ID: ba44623bd9d74a9b54318f828f95182bfbf0bfda4fdfeee27b04bc848487f82b
    • Instruction ID: bba899f18b237bc749b135057ec235e26daad209c79621f91ad4a7615b71e563
    • Opcode Fuzzy Hash: ba44623bd9d74a9b54318f828f95182bfbf0bfda4fdfeee27b04bc848487f82b
    • Instruction Fuzzy Hash: B361F07190061ABAEB24DF64DC41BBE77A8FF0A714F10411AF925D61C1DB74AE81E7A0
    APIs
    • GetLocalTime.KERNEL32(?), ref: 00C8DD68
    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00C8DD78
    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00C8DD84
    • __wsplitpath.LIBCMT ref: 00C8DDE2
    • _wcscat.LIBCMT ref: 00C8DDFA
    • _wcscat.LIBCMT ref: 00C8DE0C
    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C8DE21
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C8DE35
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C8DE67
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C8DE88
    • _wcscpy.LIBCMT ref: 00C8DE94
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00C8DED3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
    • String ID: *.*
    • API String ID: 3566783562-438819550
    • Opcode ID: b8cfbd2ba3691c043ca270a728c8d6666e3e87d53257132bd8874c85ff94dce4
    • Instruction ID: 10409ea39630ec5cf3acfa83ccf6bcf3e91a42f430ded8e71ee5dca173d2ed89
    • Opcode Fuzzy Hash: b8cfbd2ba3691c043ca270a728c8d6666e3e87d53257132bd8874c85ff94dce4
    • Instruction Fuzzy Hash: 1C61AD765043159FCB10EF60D881AAEB3E8FF89314F04492EF99AC7251DB31EA45CB96
    APIs
    • GetDC.USER32(00000000), ref: 00C974A4
    • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00C974B0
    • CreateCompatibleDC.GDI32(?), ref: 00C974BC
    • SelectObject.GDI32(00000000,?), ref: 00C974C9
    • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,es-mx), ref: 00C9751D
    • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00C97559
    • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00C9757D
    • SelectObject.GDI32(00000006,?), ref: 00C97585
    • DeleteObject.GDI32(?), ref: 00C9758E
    • DeleteDC.GDI32(00000006), ref: 00C97595
    • ReleaseDC.USER32(00000000,?), ref: 00C975A0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
    • String ID: ($es-mx
    • API String ID: 2598888154-1799561661
    • Opcode ID: d3c6c45c720d8e7216cf59e879901cd9764336c307991bb9dac55edd7dcd14ee
    • Instruction ID: 112944a279f6bc9c5fd56cfa794d4d950d1f2d4d2e9bb18aec3eb21afb631442
    • Opcode Fuzzy Hash: d3c6c45c720d8e7216cf59e879901cd9764336c307991bb9dac55edd7dcd14ee
    • Instruction Fuzzy Hash: AD514A71904209EFCB25CFA8CC89FAEBBB9EF49310F14852DF99A97211D731A941CB50
    APIs
    • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 00C89D09
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00C89D2A
    • __swprintf.LIBCMT ref: 00C89D83
    • __swprintf.LIBCMT ref: 00C89D9C
    • _wprintf.LIBCMT ref: 00C89E43
    • _wprintf.LIBCMT ref: 00C89E61
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: LoadString__swprintf_wprintf$_memmove
    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
    • API String ID: 311963372-3080491070
    • Opcode ID: 7aa62f0a50779b8ec1f300bcc24b9e1c7970176a7dc7e667b63f7bed7174c189
    • Instruction ID: 4188ce56663d7506a80f4aeda8d391ce6485543db54ea0f90fc18b336bdac1d6
    • Opcode Fuzzy Hash: 7aa62f0a50779b8ec1f300bcc24b9e1c7970176a7dc7e667b63f7bed7174c189
    • Instruction Fuzzy Hash: 00518071900619AACF15EBE0DD86EEEB778EF14304F140166F505721A2EF312F59EBA0
    APIs
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    • CharLowerBuffW.USER32(?,?), ref: 00C8A455
    • GetDriveTypeW.KERNEL32 ref: 00C8A4A2
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C8A4EA
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C8A521
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C8A54F
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
    • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
    • API String ID: 2698844021-4113822522
    • Opcode ID: f06ac6b2b2f7d8a83b229c667d5952528e18fd30ecc4950475e0ce7bc136d552
    • Instruction ID: ceced205d568826578771c2a7c73d0ea306e6b71a5a06873e7d9900585796b50
    • Opcode Fuzzy Hash: f06ac6b2b2f7d8a83b229c667d5952528e18fd30ecc4950475e0ce7bc136d552
    • Instruction Fuzzy Hash: 80515C711047149FD700EF20D8D196AB7E4FF84718F10496EF89A976A1DB31EE0ADB92
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00C5E382,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00C7FC10
    • LoadStringW.USER32(00000000,?,00C5E382,00000001), ref: 00C7FC19
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
    • GetModuleHandleW.KERNEL32(00000000,00CE5310,?,00000FFF,?,?,00C5E382,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00C7FC3B
    • LoadStringW.USER32(00000000,?,00C5E382,00000001), ref: 00C7FC3E
    • __swprintf.LIBCMT ref: 00C7FC8E
    • __swprintf.LIBCMT ref: 00C7FC9F
    • _wprintf.LIBCMT ref: 00C7FD48
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C7FD5F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
    • API String ID: 984253442-2268648507
    • Opcode ID: 393f00b7164207b8db1e6a7bf5a210eeb9019e241c9d401655b5d14758e66c7e
    • Instruction ID: f50e5344869125db5602268bba58ebf52c4d3ea6c39f32b3f09775f1ce08ba3b
    • Opcode Fuzzy Hash: 393f00b7164207b8db1e6a7bf5a210eeb9019e241c9d401655b5d14758e66c7e
    • Instruction Fuzzy Hash: 22413E72804219AACF15FBE0DDD6EEEB778AF14700F500169F60576092EE716F49EBA0
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
    • String ID:
    • API String ID: 884005220-0
    • Opcode ID: f69449a8de76ec6e47838c1f0ec4d86a25b126a9336409a4fda3be004aed04d7
    • Instruction ID: 4661f97264a8ebd3cd6a152e25d87b1737c6fa0ad40f4224f1bd66f2ce57060f
    • Opcode Fuzzy Hash: f69449a8de76ec6e47838c1f0ec4d86a25b126a9336409a4fda3be004aed04d7
    • Instruction Fuzzy Hash: 4961F57A900211EFEB205F26DD4576E77A8FF00362F104319EC119B191DB35EAC8EB9A
    APIs
    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00CABA8A
    • GetFileSize.KERNEL32(00000000,00000000), ref: 00CABAA1
    • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00CABAAC
    • CloseHandle.KERNEL32(00000000), ref: 00CABAB9
    • GlobalLock.KERNEL32(00000000), ref: 00CABAC2
    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00CABAD1
    • GlobalUnlock.KERNEL32(00000000), ref: 00CABADA
    • CloseHandle.KERNEL32(00000000), ref: 00CABAE1
    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00CABAF2
    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00CB2CAC,?), ref: 00CABB0B
    • GlobalFree.KERNEL32(00000000), ref: 00CABB1B
    • GetObjectW.GDI32(?,00000018,000000FF), ref: 00CABB3F
    • CopyImage.USER32(?,00000000,?,?,00002000), ref: 00CABB6A
    • DeleteObject.GDI32(00000000), ref: 00CABB92
    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00CABBA8
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
    • String ID:
    • API String ID: 3840717409-0
    • Opcode ID: 5104b414091ef119f1a3915cb952b367b0811b77bb3e21cbaacd5075dc7b96d7
    • Instruction ID: 557d64d36309b5a14ad6f924732401995bf8a30f65692d636ae060199863c556
    • Opcode Fuzzy Hash: 5104b414091ef119f1a3915cb952b367b0811b77bb3e21cbaacd5075dc7b96d7
    • Instruction Fuzzy Hash: E5411A75600209EFDB219FA5DC88FAE7BB8EF8A719F104168F915D7261D7309E02DB60
    APIs
    • __wsplitpath.LIBCMT ref: 00C8DA9C
    • _wcscat.LIBCMT ref: 00C8DAB4
    • _wcscat.LIBCMT ref: 00C8DAC6
    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00C8DADB
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C8DAEF
    • GetFileAttributesW.KERNEL32(?), ref: 00C8DB07
    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00C8DB21
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C8DB33
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
    • String ID: *.*
    • API String ID: 34673085-438819550
    • Opcode ID: e6e369acb7c8798772af7144d7343d2c9186610a7de6029157994979b1e09723
    • Instruction ID: d88b2a2501aac21a6f8d730fd4e22c4297d85b3e18729de3f45ea8b8b2d0bccc
    • Opcode Fuzzy Hash: e6e369acb7c8798772af7144d7343d2c9186610a7de6029157994979b1e09723
    • Instruction Fuzzy Hash: 198192715083509FCB24FF65C845AAAB7E4FB88318F28482EF497D7291DA30DE44DB56
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00CAC266
    • GetFocus.USER32 ref: 00CAC276
    • GetDlgCtrlID.USER32(00000000), ref: 00CAC281
    • _memset.LIBCMT ref: 00CAC3AC
    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00CAC3D7
    • GetMenuItemCount.USER32(?), ref: 00CAC3F7
    • GetMenuItemID.USER32(?,00000000), ref: 00CAC40A
    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00CAC43E
    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00CAC486
    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00CAC4BE
    • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00CAC4F3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
    • String ID: 0
    • API String ID: 1296962147-4108050209
    • Opcode ID: ebfaa2add2d414453492db5eb021c30d6d98f7dc8de3d46fdedb1e0d7cd72a78
    • Instruction ID: 0e3da3173d2e4bf1f55dde5604bbf78f8adaff39f803662070d60705a1781b04
    • Opcode Fuzzy Hash: ebfaa2add2d414453492db5eb021c30d6d98f7dc8de3d46fdedb1e0d7cd72a78
    • Instruction Fuzzy Hash: 1E817D71508302AFDB20CF54D894A7EBBE8FB8A718F00452DF9A5972A1D730D905DBA2
    APIs
      • Part of subcall function 00C89008: __time64.LIBCMT ref: 00C89012
      • Part of subcall function 00C25045: _fseek.LIBCMT ref: 00C2505D
    • __wsplitpath.LIBCMT ref: 00C892DD
      • Part of subcall function 00C4426E: __wsplitpath_helper.LIBCMT ref: 00C442AE
    • _wcscpy.LIBCMT ref: 00C892F0
    • _wcscat.LIBCMT ref: 00C89303
    • __wsplitpath.LIBCMT ref: 00C89328
    • _wcscat.LIBCMT ref: 00C8933E
    • _wcscat.LIBCMT ref: 00C89351
      • Part of subcall function 00C8904E: _memmove.LIBCMT ref: 00C89087
      • Part of subcall function 00C8904E: _memmove.LIBCMT ref: 00C89096
    • _wcscmp.LIBCMT ref: 00C89298
      • Part of subcall function 00C897DD: _wcscmp.LIBCMT ref: 00C898CD
      • Part of subcall function 00C897DD: _wcscmp.LIBCMT ref: 00C898E0
    • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00C894FB
    • _wcsncpy.LIBCMT ref: 00C8956E
    • DeleteFileW.KERNEL32(?,?), ref: 00C895A4
    • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00C895BA
    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C895CB
    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00C895DD
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
    • String ID:
    • API String ID: 1500180987-0
    • Opcode ID: 9c3e20e0af56f4e0c27c9312f8eaa76b2fa81f16083c070a2dfd771b84821909
    • Instruction ID: 2356892d2efe76641772def9808afe4985c46a389adc8ac8d92c5d97d872b062
    • Opcode Fuzzy Hash: 9c3e20e0af56f4e0c27c9312f8eaa76b2fa81f16083c070a2dfd771b84821909
    • Instruction Fuzzy Hash: E0C16BB1D00229AADF21EFA5CC85AEFB7BCEF44314F0440AAF609E7151DB709A449F64
    APIs
      • Part of subcall function 00C40AD7: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00C26C6C,?,00008000), ref: 00C40AF3
      • Part of subcall function 00C248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C248A1,?,?,00C237C0,?), ref: 00C248CE
    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00C26D0D
    • SetCurrentDirectoryW.KERNEL32(?), ref: 00C26E5A
      • Part of subcall function 00C259CD: _wcscpy.LIBCMT ref: 00C25A05
      • Part of subcall function 00C437BD: _iswctype.LIBCMT ref: 00C437C5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
    • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
    • API String ID: 537147316-1018226102
    • Opcode ID: dbcfdf62ce80c591ad0e053ee9b5b95a20c2b0f5983334785a47ca3b8b90e210
    • Instruction ID: e48d166fcfc19a3ce7074aabb7c612b7aaea61c10889fecd7f1b5a8359a9379c
    • Opcode Fuzzy Hash: dbcfdf62ce80c591ad0e053ee9b5b95a20c2b0f5983334785a47ca3b8b90e210
    • Instruction Fuzzy Hash: 9E02D0301083519FC724EF24D881AAFBBE5FF98314F04491DF899936A1DB30DA89EB52
    APIs
    • _memset.LIBCMT ref: 00C245F9
    • GetMenuItemCount.USER32(00CE5890), ref: 00C5D6FD
    • GetMenuItemCount.USER32(00CE5890), ref: 00C5D7AD
    • GetCursorPos.USER32(?), ref: 00C5D7F1
    • SetForegroundWindow.USER32(00000000), ref: 00C5D7FA
    • TrackPopupMenuEx.USER32(00CE5890,00000000,?,00000000,00000000,00000000), ref: 00C5D80D
    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00C5D819
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
    • String ID:
    • API String ID: 2751501086-0
    • Opcode ID: 7337b94a983a449824b1f5f1812a9af2b7c10606b8a53716a4f1ff50df652983
    • Instruction ID: fbe5a442a5cf5bcf2896f095232f7f09d14808a5897048780e5d84220d6786ec
    • Opcode Fuzzy Hash: 7337b94a983a449824b1f5f1812a9af2b7c10606b8a53716a4f1ff50df652983
    • Instruction Fuzzy Hash: 9A711334640315BFEB309F54DC89FAABF64FF05369F100216F92AAA1E0CBB15994DB58
    APIs
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
    • _memset.LIBCMT ref: 00C77B93
    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00C77BC8
    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00C77BE4
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00C77C00
    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00C77C2A
    • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00C77C52
    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C77C5D
    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00C77C62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
    • API String ID: 1411258926-22481851
    • Opcode ID: f43d5978c0e4f7d92e6d14ab2e9f2147dcef63b99c350c6b38623bd2e13aa4b2
    • Instruction ID: d8e961b50d041cabb95729d3e08b9c0461903728eee39cf6048655f385749951
    • Opcode Fuzzy Hash: f43d5978c0e4f7d92e6d14ab2e9f2147dcef63b99c350c6b38623bd2e13aa4b2
    • Instruction Fuzzy Hash: DB41F97281422DABCB21EBA4EC85DEEB778FF08700F054669E915A3161EB305E05DB90
    APIs
    • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9FE38,?,?), ref: 00CA0EBC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BuffCharUpper
    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
    • API String ID: 3964851224-909552448
    • Opcode ID: 478d9a382045bced771c7dac9aff8e49920e23545d7c14ecb5409fe5562911b2
    • Instruction ID: 847edc15ee07a4fbef1fd84f0657a9c731886304096093aeb3ca28d4d08265f1
    • Opcode Fuzzy Hash: 478d9a382045bced771c7dac9aff8e49920e23545d7c14ecb5409fe5562911b2
    • Instruction Fuzzy Hash: F3417D7414024A8FCF20EF50ECD1AEE3720FF12358F240515FD522B292DB359A5AEBA1
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00C5E5F9,00000010,?,Bad directive syntax error,00CAF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00C7FAF3
    • LoadStringW.USER32(00000000,?,00C5E5F9,00000010), ref: 00C7FAFA
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
    • _wprintf.LIBCMT ref: 00C7FB2D
    • __swprintf.LIBCMT ref: 00C7FB4F
    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00C7FBBE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
    • API String ID: 1506413516-4153970271
    • Opcode ID: b10f6a319de308c7fa815c48e5c6c09d1106b2d80999dea63feaed1715a474f5
    • Instruction ID: 3561d56147bc2a7552b2ce16e455cd3846d00c6b4c9a9291e4d279b364555aa8
    • Opcode Fuzzy Hash: b10f6a319de308c7fa815c48e5c6c09d1106b2d80999dea63feaed1715a474f5
    • Instruction Fuzzy Hash: 6621743284421EEBCF12EFA0DC9AFEE7775FF14300F04446AF615620A1DA719A19EB50
    APIs
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
      • Part of subcall function 00C27A84: _memmove.LIBCMT ref: 00C27B0D
    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00C853D7
    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00C853ED
    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00C853FE
    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00C85410
    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00C85421
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: SendString$_memmove
    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
    • API String ID: 2279737902-1007645807
    • Opcode ID: a4c1268bbb13684d073923f7fffab9d422e416cbf34b450fed3ad620c25eb22e
    • Instruction ID: be74a62bae64df739d1374c214361bcb84829bd975e31161016a153c3f221d03
    • Opcode Fuzzy Hash: a4c1268bbb13684d073923f7fffab9d422e416cbf34b450fed3ad620c25eb22e
    • Instruction Fuzzy Hash: F0119131A9013979D720B7A1DC8ADFF7BBCEBD1B54F00052AB511A21D1EEA05E4AD6B0
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
    • String ID: 0.0.0.0
    • API String ID: 208665112-3771769585
    • Opcode ID: 1763744fd53354c51cb2eaec59b1764dbb960d257e7b0638c6dc60691e8f7e00
    • Instruction ID: d922b77e6685eb35fdf75b01522efe690fed4c7113e8a13802e8023ea34fefd0
    • Opcode Fuzzy Hash: 1763744fd53354c51cb2eaec59b1764dbb960d257e7b0638c6dc60691e8f7e00
    • Instruction Fuzzy Hash: 56110231904115ABDB28BBA0DC4AFEE77BCEF03718F0101BAF50496091EF748A86DB94
    APIs
    • timeGetTime.WINMM ref: 00C85021
      • Part of subcall function 00C4034A: timeGetTime.WINMM(?,75C0B400,00C30FDB), ref: 00C4034E
    • Sleep.KERNEL32(0000000A), ref: 00C8504D
    • EnumThreadWindows.USER32(?,Function_00064FCF,00000000), ref: 00C85071
    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00C85093
    • SetActiveWindow.USER32 ref: 00C850B2
    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00C850C0
    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00C850DF
    • Sleep.KERNEL32(000000FA), ref: 00C850EA
    • IsWindow.USER32 ref: 00C850F6
    • EndDialog.USER32(00000000), ref: 00C85107
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
    • String ID: BUTTON
    • API String ID: 1194449130-3405671355
    • Opcode ID: ce70a7508aa0e82be5d31cb59d713b29e8100e582507bf3e7e4948eef3fdc1eb
    • Instruction ID: bc4f666cfa3c685fca83e97d48fa5742a8c5a60275305c84df2646783cd49689
    • Opcode Fuzzy Hash: ce70a7508aa0e82be5d31cb59d713b29e8100e582507bf3e7e4948eef3fdc1eb
    • Instruction Fuzzy Hash: 3E218E71201A49AFE7106FA0ECCDF3E3B69EB5538DB041028F611862B1DBB18D41AB65
    APIs
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    • CoInitialize.OLE32(00000000), ref: 00C8D676
    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00C8D709
    • SHGetDesktopFolder.SHELL32(?), ref: 00C8D71D
    • CoCreateInstance.OLE32(00CB2D7C,00000000,00000001,00CD8C1C,?), ref: 00C8D769
    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00C8D7D8
    • CoTaskMemFree.OLE32(?,?), ref: 00C8D830
    • _memset.LIBCMT ref: 00C8D86D
    • SHBrowseForFolderW.SHELL32(?), ref: 00C8D8A9
    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00C8D8CC
    • CoTaskMemFree.OLE32(00000000), ref: 00C8D8D3
    • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00C8D90A
    • CoUninitialize.OLE32(00000001,00000000), ref: 00C8D90C
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
    • String ID:
    • API String ID: 1246142700-0
    • Opcode ID: 7f5b9f45a311e34a2570020194b88ae9b1aca976be2c24bf3d238261a86e95e1
    • Instruction ID: 0be8b20332bcdcf87291eb8edf2b539c68d738ff022f6e4007496274a35070d9
    • Opcode Fuzzy Hash: 7f5b9f45a311e34a2570020194b88ae9b1aca976be2c24bf3d238261a86e95e1
    • Instruction Fuzzy Hash: A8B10E75A00119AFDB14EFA4C888EAEBBB9FF48304F144469F40AEB251DB30ED41CB54
    APIs
    • GetKeyboardState.USER32(?), ref: 00C803C8
    • SetKeyboardState.USER32(?), ref: 00C80433
    • GetAsyncKeyState.USER32(000000A0), ref: 00C80453
    • GetKeyState.USER32(000000A0), ref: 00C8046A
    • GetAsyncKeyState.USER32(000000A1), ref: 00C80499
    • GetKeyState.USER32(000000A1), ref: 00C804AA
    • GetAsyncKeyState.USER32(00000011), ref: 00C804D6
    • GetKeyState.USER32(00000011), ref: 00C804E4
    • GetAsyncKeyState.USER32(00000012), ref: 00C8050D
    • GetKeyState.USER32(00000012), ref: 00C8051B
    • GetAsyncKeyState.USER32(0000005B), ref: 00C80544
    • GetKeyState.USER32(0000005B), ref: 00C80552
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: State$Async$Keyboard
    • String ID:
    • API String ID: 541375521-0
    • Opcode ID: c9adea10c514d68ede992772668f55e6b71b6abb402658fdb51dfe3e144b649b
    • Instruction ID: e4781303ddf98d8a20ca67f60614cb62fcf347576bcefb599c0a20861da78046
    • Opcode Fuzzy Hash: c9adea10c514d68ede992772668f55e6b71b6abb402658fdb51dfe3e144b649b
    • Instruction Fuzzy Hash: 9351F8309087842AFB74FBB084117AEBFF49F02388F58859D99D2571D3DA649B4CCB69
    APIs
    • GetDlgItem.USER32(?,00000001), ref: 00C7C545
    • GetWindowRect.USER32(00000000,?), ref: 00C7C557
    • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00C7C5B5
    • GetDlgItem.USER32(?,00000002), ref: 00C7C5C0
    • GetWindowRect.USER32(00000000,?), ref: 00C7C5D2
    • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00C7C626
    • GetDlgItem.USER32(?,000003E9), ref: 00C7C634
    • GetWindowRect.USER32(00000000,?), ref: 00C7C645
    • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00C7C688
    • GetDlgItem.USER32(?,000003EA), ref: 00C7C696
    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00C7C6B3
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00C7C6C0
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$ItemMoveRect$Invalidate
    • String ID:
    • API String ID: 3096461208-0
    • Opcode ID: d94a46d63f65006ad44538ac00c45039b3097412c59298824a253ac1a6164004
    • Instruction ID: 5898de1c5e32dcc580ecc61ba7c9bc8f2dee5adfb451685a7e51c493aa8d77b2
    • Opcode Fuzzy Hash: d94a46d63f65006ad44538ac00c45039b3097412c59298824a253ac1a6164004
    • Instruction Fuzzy Hash: 97514371B00205AFDB18CFA9DDC5BAEBBB5EB89310F14812DF51AD7290D770AD018B50
    APIs
      • Part of subcall function 00C21B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00C22036,?,00000000,?,?,?,?,00C216CB,00000000,?), ref: 00C21B9A
    • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00C220D3
    • KillTimer.USER32(-00000001,?,?,?,?,00C216CB,00000000,?,?,00C21AE2,?,?), ref: 00C2216E
    • DestroyAcceleratorTable.USER32(00000000), ref: 00C5BE26
    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C216CB,00000000,?,?,00C21AE2,?,?), ref: 00C5BE57
    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C216CB,00000000,?,?,00C21AE2,?,?), ref: 00C5BE6E
    • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00C216CB,00000000,?,?,00C21AE2,?,?), ref: 00C5BE8A
    • DeleteObject.GDI32(00000000), ref: 00C5BE9C
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
    • String ID:
    • API String ID: 641708696-0
    • Opcode ID: d923dd5623185eb933de8f878c9a1ca278d90a54b3eb98c45170ce40682625ba
    • Instruction ID: 99fdc8117ca55d89d8028a1f8d47e5f03d9d8ed4c06be66119e5fec37188a2c1
    • Opcode Fuzzy Hash: d923dd5623185eb933de8f878c9a1ca278d90a54b3eb98c45170ce40682625ba
    • Instruction Fuzzy Hash: B9619F35500A60EFCB359F15E989B2DBBF1FB4031AF14452DEA528B9B0C7B0AD95DB80
    APIs
      • Part of subcall function 00C225DB: GetWindowLongW.USER32(?,000000EB), ref: 00C225EC
    • GetSysColor.USER32(0000000F), ref: 00C221D3
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ColorLongWindow
    • String ID:
    • API String ID: 259745315-0
    • Opcode ID: 996c942e80efb5422c00356d2648c8782ddda8b92790b1d6e738bb17f98075d0
    • Instruction ID: 16e514a2d87bbf2535092cb08ff9f2ff19ebb86e8eef53530f72f1113767ed1f
    • Opcode Fuzzy Hash: 996c942e80efb5422c00356d2648c8782ddda8b92790b1d6e738bb17f98075d0
    • Instruction Fuzzy Hash: 5641AF35000260EEDB255F68EC88BBD3B65EB46335F244365FE659B1E2C7328D82DB21
    APIs
    • CharLowerBuffW.USER32(?,?,00CAF910), ref: 00C8A995
    • GetDriveTypeW.KERNEL32(00000061,00CD89A0,00000061), ref: 00C8AA5F
    • _wcscpy.LIBCMT ref: 00C8AA89
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BuffCharDriveLowerType_wcscpy
    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
    • API String ID: 2820617543-1000479233
    • Opcode ID: 749cc649cff605c27c6357e9f55dedb5a1ab6e845ce27bf86a6ee66300332706
    • Instruction ID: 3742f0b5634d3873b74589cec98d0ca93b3f0933b088050ffecf99245240b61e
    • Opcode Fuzzy Hash: 749cc649cff605c27c6357e9f55dedb5a1ab6e845ce27bf86a6ee66300332706
    • Instruction Fuzzy Hash: 0051BD301083019FD714FF14D8D2AAEB7A5FF84308F54492EF5A6576A2DB309A09EB93
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __i64tow__itow__swprintf
    • String ID: %.15g$0x%p$False$True
    • API String ID: 421087845-2263619337
    • Opcode ID: 9f6222ac8b339036d27f3f9b29b956efe88829e6c52b78314438224e75ba5398
    • Instruction ID: 2a2479d7a8109d5c83a3aff686d5efb8ac68a17c1c03807b4147185df415a9eb
    • Opcode Fuzzy Hash: 9f6222ac8b339036d27f3f9b29b956efe88829e6c52b78314438224e75ba5398
    • Instruction Fuzzy Hash: 9A410431504215AEEB28AB74DC42E76B3E8FF45310F20447EE549D62D2EA719A86DB10
    APIs
    • _memset.LIBCMT ref: 00CA719C
    • CreateMenu.USER32 ref: 00CA71B7
    • SetMenu.USER32(?,00000000), ref: 00CA71C6
    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CA7253
    • IsMenu.USER32(?), ref: 00CA7269
    • CreatePopupMenu.USER32 ref: 00CA7273
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00CA72A0
    • DrawMenuBar.USER32 ref: 00CA72A8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
    • String ID: 0$F
    • API String ID: 176399719-3044882817
    • Opcode ID: f24e79f0c24aac407a4d0f57bc9c09cc5d479868b2947c1b849fb94fab40f810
    • Instruction ID: 38da3b14a678a70c9d4aefd1e5306766911c6b29228f9738032a84888ddef4a4
    • Opcode Fuzzy Hash: f24e79f0c24aac407a4d0f57bc9c09cc5d479868b2947c1b849fb94fab40f810
    • Instruction Fuzzy Hash: 9E412975A01206EFDB20DFA4D884B9A7BF5FF4A314F144229F955A7361D731AA10CBA0
    APIs
    • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00CA7590
    • CreateCompatibleDC.GDI32(00000000), ref: 00CA7597
    • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00CA75AA
    • SelectObject.GDI32(00000000,00000000), ref: 00CA75B2
    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00CA75BD
    • DeleteDC.GDI32(00000000), ref: 00CA75C6
    • GetWindowLongW.USER32(?,000000EC), ref: 00CA75D0
    • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00CA75E4
    • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00CA75F0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
    • String ID: static
    • API String ID: 2559357485-2160076837
    • Opcode ID: 351ba6c30ca12ce10485cfcf1adcdc00d26f82f95e45d29bd03444de1fb67c12
    • Instruction ID: a6fa92371bd42da35cb3c0a8db41a2ed66d3331e35ffccc9d5fc424adafef8e0
    • Opcode Fuzzy Hash: 351ba6c30ca12ce10485cfcf1adcdc00d26f82f95e45d29bd03444de1fb67c12
    • Instruction Fuzzy Hash: 35314C72505116ABDF129FA4DC48FDF3B69FF0A728F110328FA65A61A0C731D921DB64
    APIs
    • _memset.LIBCMT ref: 00C46FBB
      • Part of subcall function 00C48CA8: __getptd_noexit.LIBCMT ref: 00C48CA8
    • __gmtime64_s.LIBCMT ref: 00C47054
    • __gmtime64_s.LIBCMT ref: 00C4708A
    • __gmtime64_s.LIBCMT ref: 00C470A7
    • __allrem.LIBCMT ref: 00C470FD
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C47119
    • __allrem.LIBCMT ref: 00C47130
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C4714E
    • __allrem.LIBCMT ref: 00C47165
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C47183
    • __invoke_watson.LIBCMT ref: 00C471F4
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
    • String ID:
    • API String ID: 384356119-0
    • Opcode ID: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
    • Instruction ID: a93a832fd28b38cd34a774f479f74fd27ecd2d9c315b5c2d190128d8db427b4d
    • Opcode Fuzzy Hash: f1a8c047e8f29504aad4589f782c76ed1b73a3870b2d4d8a344ebdfc9c3668e8
    • Instruction Fuzzy Hash: 3071FA72A00717ABEB149F79CC42B5EB3A8BF15365F14423AFD14E7281EB70EA449790
    APIs
    • _memset.LIBCMT ref: 00C8283A
    • GetMenuItemInfoW.USER32(00CE5890,000000FF,00000000,00000030), ref: 00C8289B
    • SetMenuItemInfoW.USER32(00CE5890,00000004,00000000,00000030), ref: 00C828D1
    • Sleep.KERNEL32(000001F4), ref: 00C828E3
    • GetMenuItemCount.USER32(?), ref: 00C82927
    • GetMenuItemID.USER32(?,00000000), ref: 00C82943
    • GetMenuItemID.USER32(?,-00000001), ref: 00C8296D
    • GetMenuItemID.USER32(?,?), ref: 00C829B2
    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00C829F8
    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C82A0C
    • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C82A2D
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
    • String ID:
    • API String ID: 4176008265-0
    • Opcode ID: a3f140497e80168cb5f2a0f42797c0582465578a6a83bb224a067940f21f5dee
    • Instruction ID: 8fd7ff4c62b3160c15ea5126cb6e25670260cfa7d35283f95662267ae0e31395
    • Opcode Fuzzy Hash: a3f140497e80168cb5f2a0f42797c0582465578a6a83bb224a067940f21f5dee
    • Instruction Fuzzy Hash: DA619170900249AFDF25EFA4C88CEAE7BB9EF4530CF140059E852A7251D731AE06EB24
    APIs
    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00CA6FD7
    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00CA6FDA
    • GetWindowLongW.USER32(?,000000F0), ref: 00CA6FFE
    • _memset.LIBCMT ref: 00CA700F
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00CA7021
    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00CA7099
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$LongWindow_memset
    • String ID:
    • API String ID: 830647256-0
    • Opcode ID: 4dbb1480a3034ce30cfb9cff1dba334c3b3c87f30b15ffe91aed7f6728ce5908
    • Instruction ID: 048f25bc351e2d30e2aa491db2b77c55240cff63a620b022f5ff35bed6f96937
    • Opcode Fuzzy Hash: 4dbb1480a3034ce30cfb9cff1dba334c3b3c87f30b15ffe91aed7f6728ce5908
    • Instruction Fuzzy Hash: BE617C75A00249AFDB20DFA4CC81FEE77F8EB09718F14015AFA15AB2A1C770AE41DB50
    APIs
    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00C76F15
    • SafeArrayAllocData.OLEAUT32(?), ref: 00C76F6E
    • VariantInit.OLEAUT32(?), ref: 00C76F80
    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00C76FA0
    • VariantCopy.OLEAUT32(?,?), ref: 00C76FF3
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00C77007
    • VariantClear.OLEAUT32(?), ref: 00C7701C
    • SafeArrayDestroyData.OLEAUT32(?), ref: 00C77029
    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C77032
    • VariantClear.OLEAUT32(?), ref: 00C77044
    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00C7704F
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
    • String ID:
    • API String ID: 2706829360-0
    • Opcode ID: 7a8e789d017563bd18fb79df873ec26172661d29f6b2cd792d7ab13f2dd34974
    • Instruction ID: 145eb7dafa458c510b794538502dba067a65fbe0e2e21d9bfbb339f0ec68d8fc
    • Opcode Fuzzy Hash: 7a8e789d017563bd18fb79df873ec26172661d29f6b2cd792d7ab13f2dd34974
    • Instruction Fuzzy Hash: F5413035A042199FCB00DFA4D848EAEBBB9FF48354F00C069F959A7261DB30A946DF90
    APIs
    • WSAStartup.WSOCK32(00000101,?), ref: 00C958A9
    • inet_addr.WSOCK32(?,?,?), ref: 00C958EE
    • gethostbyname.WSOCK32(?), ref: 00C958FA
    • IcmpCreateFile.IPHLPAPI ref: 00C95908
    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00C95978
    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00C9598E
    • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00C95A03
    • WSACleanup.WSOCK32 ref: 00C95A09
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
    • String ID: Ping
    • API String ID: 1028309954-2246546115
    • Opcode ID: 1b20ecb813865eb0ba6e69cc62daef6e7e0e24ef7736c19fd059c71ac58943d4
    • Instruction ID: d5c7158e470c28d3ba0d081cc92bb0c5ec1b92c03f3a5f1df18679885e72b16c
    • Opcode Fuzzy Hash: 1b20ecb813865eb0ba6e69cc62daef6e7e0e24ef7736c19fd059c71ac58943d4
    • Instruction Fuzzy Hash: 1A517D31604700DFEB12EF65D849B2EB7E4EB49720F154529F9AADB2A1DB30ED01DB42
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 00C8B55C
    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00C8B5D2
    • GetLastError.KERNEL32 ref: 00C8B5DC
    • SetErrorMode.KERNEL32(00000000,READY), ref: 00C8B649
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Error$Mode$DiskFreeLastSpace
    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
    • API String ID: 4194297153-14809454
    • Opcode ID: 1e4235a32f4f978b75b2f1f987162bc3dbf5a909ec978a53c64d28c05f2ebf4f
    • Instruction ID: effd16aba03c60d5bbd1d07b4163654aa6615807680f9b4aa021631b4d813a30
    • Opcode Fuzzy Hash: 1e4235a32f4f978b75b2f1f987162bc3dbf5a909ec978a53c64d28c05f2ebf4f
    • Instruction Fuzzy Hash: 5131AC75A04209AFCB14EFA5D885EAEB7B4EF08308F14412AF51597291EB70AE06CB94
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00C7AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00C7AEC7
    • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00C792D6
    • GetDlgCtrlID.USER32 ref: 00C792E1
    • GetParent.USER32 ref: 00C792FD
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C79300
    • GetDlgCtrlID.USER32(?), ref: 00C79309
    • GetParent.USER32(?), ref: 00C79325
    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00C79328
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$ClassName_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 1536045017-1403004172
    • Opcode ID: 0e7114d339326d1c498f1d896148a53d4ec9bfc93fd712b87acdfca8a5f38f82
    • Instruction ID: 0ef11d5c5eb0737a3e04ffc5b8f7a630694ac62a56f6bbee225db950880b6bd0
    • Opcode Fuzzy Hash: 0e7114d339326d1c498f1d896148a53d4ec9bfc93fd712b87acdfca8a5f38f82
    • Instruction Fuzzy Hash: BC21D670940108BBDF04ABA0CC89EFEBB74EF46310F104169B561972E1DB755915EB20
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00C7AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00C7AEC7
    • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00C793BF
    • GetDlgCtrlID.USER32 ref: 00C793CA
    • GetParent.USER32 ref: 00C793E6
    • SendMessageW.USER32(00000000,?,00000111,?), ref: 00C793E9
    • GetDlgCtrlID.USER32(?), ref: 00C793F2
    • GetParent.USER32(?), ref: 00C7940E
    • SendMessageW.USER32(00000000,?,?,00000111), ref: 00C79411
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$CtrlParent$ClassName_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 1536045017-1403004172
    • Opcode ID: 492cb61daa29432d7676e8c811b3240f5eaa38f1bf3e0b981ca8af676d99955e
    • Instruction ID: 6259d39fcb330dff9d2aa638ef908fbed82c68d9ec324261ee004dc984b259f1
    • Opcode Fuzzy Hash: 492cb61daa29432d7676e8c811b3240f5eaa38f1bf3e0b981ca8af676d99955e
    • Instruction Fuzzy Hash: 7821B374A40208BBDF00ABA4CCC9FFEBB74EF45300F10416AB921972A5DB755916EB20
    APIs
    • GetParent.USER32 ref: 00C79431
    • GetClassNameW.USER32(00000000,?,00000100), ref: 00C79446
    • _wcscmp.LIBCMT ref: 00C79458
    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00C794D3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClassMessageNameParentSend_wcscmp
    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
    • API String ID: 1704125052-3381328864
    • Opcode ID: 972000787b5ff3b2b569c23f7a0293c46e6fb3694b8746b51f430e6dde27c9e0
    • Instruction ID: d0c6e75dfe155b768c9d03b31a3aac21d2b5b04e3aadaebc0b56687d9587bb5a
    • Opcode Fuzzy Hash: 972000787b5ff3b2b569c23f7a0293c46e6fb3694b8746b51f430e6dde27c9e0
    • Instruction Fuzzy Hash: 0511293764C307BAFA102620AC0BEA6379CDB06324F208227FA18E50E1FB7169535694
    APIs
    • VariantInit.OLEAUT32(?), ref: 00C989EC
    • CoInitialize.OLE32(00000000), ref: 00C98A19
    • CoUninitialize.OLE32 ref: 00C98A23
    • GetRunningObjectTable.OLE32(00000000,?), ref: 00C98B23
    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00C98C50
    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00CB2C0C), ref: 00C98C84
    • CoGetObject.OLE32(?,00000000,00CB2C0C,?), ref: 00C98CA7
    • SetErrorMode.KERNEL32(00000000), ref: 00C98CBA
    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00C98D3A
    • VariantClear.OLEAUT32(?), ref: 00C98D4A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
    • String ID:
    • API String ID: 2395222682-0
    • Opcode ID: e40b4c649d22f81410b693a5959e7cb3343f2a37d8e615ea125ba183b1072d0b
    • Instruction ID: 1a25b3002ca6b4c993a8fbeff7ca432171587f1dcabc7bd92584f905c062751d
    • Opcode Fuzzy Hash: e40b4c649d22f81410b693a5959e7cb3343f2a37d8e615ea125ba183b1072d0b
    • Instruction Fuzzy Hash: DEC138B12043059FDB00DF64C88892BB7E9FF8A748F04495DF58A9B251DB71ED0ACB52
    APIs
    • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00C87B15
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ArraySafeVartype
    • String ID:
    • API String ID: 1725837607-0
    • Opcode ID: 8c4477dc3c67ca830ecf4c7f81a0f5acb577c2c099cb7d1adb7b81b51941c149
    • Instruction ID: e738cc5da23fcf26665f7cc5fb0dd09e8915221a9e4fff86ed0fa6db5e77236b
    • Opcode Fuzzy Hash: 8c4477dc3c67ca830ecf4c7f81a0f5acb577c2c099cb7d1adb7b81b51941c149
    • Instruction Fuzzy Hash: 87B1C27190821A9FDB10EFA4C884BBEB7B4FF09329F34456AE510E7251E734E941DBA4
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00C81521
    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00C80599,?,00000001), ref: 00C81535
    • GetWindowThreadProcessId.USER32(00000000), ref: 00C8153C
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C80599,?,00000001), ref: 00C8154B
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C8155D
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C80599,?,00000001), ref: 00C81576
    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00C80599,?,00000001), ref: 00C81588
    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00C80599,?,00000001), ref: 00C815CD
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00C80599,?,00000001), ref: 00C815E2
    • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00C80599,?,00000001), ref: 00C815ED
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
    • String ID:
    • API String ID: 2156557900-0
    • Opcode ID: 16cc4e6faeec743f04aecbf65df2bb119be61f55296d473fe1692849b77400be
    • Instruction ID: 14158317d51bcaef3cb777af27343b6a961052dc6e3aaee4c92543c43d484bd8
    • Opcode Fuzzy Hash: 16cc4e6faeec743f04aecbf65df2bb119be61f55296d473fe1692849b77400be
    • Instruction Fuzzy Hash: DD31B171910244FFDB60AF94EC84BAD37EDABA5369F144019FD15CB1A0D7B09E428B64
    APIs
    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00C2FC06
    • OleUninitialize.OLE32(?,00000000), ref: 00C2FCA5
    • UnregisterHotKey.USER32(?), ref: 00C2FDFC
    • DestroyWindow.USER32(?), ref: 00C6492F
    • FreeLibrary.KERNEL32(?), ref: 00C64994
    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00C649C1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
    • String ID: close all
    • API String ID: 469580280-3243417748
    • Opcode ID: 0f1420ac1a93d1d2c0b1dfdc9d00c96cfd4e02827a36f9968bec25a61fc65bb9
    • Instruction ID: 8bd1a7f844887dea83a99854343751de81b180484f352b49f4994c540693d055
    • Opcode Fuzzy Hash: 0f1420ac1a93d1d2c0b1dfdc9d00c96cfd4e02827a36f9968bec25a61fc65bb9
    • Instruction Fuzzy Hash: DAA17C30701226DFCB29EF14D495A6AF764BF04700F1442BDE90AAB662DB30AE17EF50
    APIs
    • EnumChildWindows.USER32(?,00C7A844), ref: 00C7A782
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ChildEnumWindows
    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
    • API String ID: 3555792229-1603158881
    • Opcode ID: f85636783d966e32d11b8c576d085bd7c348cb79780fca127e913f9469e42dee
    • Instruction ID: 202ebe67cb76c6f297d38e5d5a98f67c0ff4bef0f47f7f18e3e6eff9ea8a2ba8
    • Opcode Fuzzy Hash: f85636783d966e32d11b8c576d085bd7c348cb79780fca127e913f9469e42dee
    • Instruction Fuzzy Hash: E9919271A00505EBCB08DF60C4D2BEDFBB4BF44304F54C119E96DA7291DB306A99DB92
    APIs
    • SetWindowLongW.USER32(?,000000EB), ref: 00C22EAE
      • Part of subcall function 00C21DB3: GetClientRect.USER32(?,?), ref: 00C21DDC
      • Part of subcall function 00C21DB3: GetWindowRect.USER32(?,?), ref: 00C21E1D
      • Part of subcall function 00C21DB3: ScreenToClient.USER32(?,?), ref: 00C21E45
    • GetDC.USER32 ref: 00C5CEB2
    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00C5CEC5
    • SelectObject.GDI32(00000000,00000000), ref: 00C5CED3
    • SelectObject.GDI32(00000000,00000000), ref: 00C5CEE8
    • ReleaseDC.USER32(?,00000000), ref: 00C5CEF0
    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00C5CF7B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
    • String ID: U
    • API String ID: 4009187628-3372436214
    • Opcode ID: 07157bdf18256a90d1703c743d3d4be785cece3c22b3f16b2b335605c4db3266
    • Instruction ID: 09df720f63f6626eac201caa513d34bd28a5e7f9babb2a97f67ae47231fe0e69
    • Opcode Fuzzy Hash: 07157bdf18256a90d1703c743d3d4be785cece3c22b3f16b2b335605c4db3266
    • Instruction Fuzzy Hash: 6771CF34400305EFCF218FA4D8C5AAA7BB6FF49326F144269FD655A2A6C7308D95EF60
    APIs
    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C91B66
    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00C91B92
    • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00C91BD4
    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00C91BE9
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C91BF6
    • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00C91C26
    • InternetCloseHandle.WININET(00000000), ref: 00C91C6D
      • Part of subcall function 00C92599: GetLastError.KERNEL32(?,?,00C9192D,00000000,00000000,00000001), ref: 00C925AE
      • Part of subcall function 00C92599: SetEvent.KERNEL32(?,?,00C9192D,00000000,00000000,00000001), ref: 00C925C3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
    • String ID:
    • API String ID: 2603140658-3916222277
    • Opcode ID: 315b3ee4d4a1e8e739dbe0f4ef31da8978bdf226fe0db93736cfb4229e108946
    • Instruction ID: 31e4519b084f15979f8b42f99c678784d19cc73476772741c40434e9a6d94cc2
    • Opcode Fuzzy Hash: 315b3ee4d4a1e8e739dbe0f4ef31da8978bdf226fe0db93736cfb4229e108946
    • Instruction Fuzzy Hash: 98416CB1540219BFEF118F90CC8AFBF7BACEB09354F04412AFE159A141E7709E459BA0
    APIs
    • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00CAF910), ref: 00C98E3D
    • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00CAF910), ref: 00C98E71
    • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00C98FEB
    • SysFreeString.OLEAUT32(?), ref: 00C99015
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Free$FileLibraryModuleNamePathQueryStringType
    • String ID:
    • API String ID: 560350794-0
    • Opcode ID: 69af2e2dc8d191a20c886a200dc0f18ace1b0a0f4af0a1c7514340c09a40c005
    • Instruction ID: 1c313d3b1976987dee63003052f61bf9705126e04803f89e422257abd42e8820
    • Opcode Fuzzy Hash: 69af2e2dc8d191a20c886a200dc0f18ace1b0a0f4af0a1c7514340c09a40c005
    • Instruction Fuzzy Hash: 65F14D71A00109EFCF14DF98C888EAEB7B9FF49315F108499F916AB251DB31AE46CB50
    APIs
    • _memset.LIBCMT ref: 00C9F7C9
    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C9F95C
    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00C9F980
    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C9F9C0
    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00C9F9E2
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C9FB5E
    • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00C9FB90
    • CloseHandle.KERNEL32(?), ref: 00C9FBBF
    • CloseHandle.KERNEL32(?), ref: 00C9FC36
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
    • String ID:
    • API String ID: 4090791747-0
    • Opcode ID: 73b52e2c0d597e15ff8f884237eb5ed3aaeb12a4787a6ca176b701df1d1a9cb7
    • Instruction ID: f35e5239e9a798bb104b4b1c3e12efab80fdef8da5db37567bda55186fd3dbec
    • Opcode Fuzzy Hash: 73b52e2c0d597e15ff8f884237eb5ed3aaeb12a4787a6ca176b701df1d1a9cb7
    • Instruction Fuzzy Hash: 8FE1BF31604201DFDB14EF24C885B6ABBE0BF85314F14896DF89A8B2A2DB31DD46DB52
    APIs
      • Part of subcall function 00C846AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C836DB,?), ref: 00C846CC
      • Part of subcall function 00C846AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C836DB,?), ref: 00C846E5
      • Part of subcall function 00C84AD8: GetFileAttributesW.KERNEL32(?,00C8374F), ref: 00C84AD9
    • lstrcmpiW.KERNEL32(?,?), ref: 00C84DE7
    • _wcscmp.LIBCMT ref: 00C84E01
    • MoveFileW.KERNEL32(?,?), ref: 00C84E1C
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
    • String ID:
    • API String ID: 793581249-0
    • Opcode ID: 5eb542eb040f7ecde8387a585a3c8e872120637295fb92a027a107cd48a7f46e
    • Instruction ID: a3467e4d386e4a4d66690d71ea70ae1e59dbce849c1e9c4fb8def9130bab9b4a
    • Opcode Fuzzy Hash: 5eb542eb040f7ecde8387a585a3c8e872120637295fb92a027a107cd48a7f46e
    • Instruction Fuzzy Hash: E35165B24083859BC724EB90D8819DFB7ECAF85304F40092EF695D3151EF74A68CD75A
    APIs
    • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00CA8731
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: InvalidateRect
    • String ID:
    • API String ID: 634782764-0
    • Opcode ID: 8f9c5ed062f9603962c3109c08055b11a4b5a6dd6b1591962f7b8b9604912c50
    • Instruction ID: 5216f3523925316d491d2777144464829c855190bff7ebfba9938f4147ff2145
    • Opcode Fuzzy Hash: 8f9c5ed062f9603962c3109c08055b11a4b5a6dd6b1591962f7b8b9604912c50
    • Instruction Fuzzy Hash: F951D370500216BFEF209B69CC89B9D7B64EB07318F604125FA25EA1E1CF75EA88DB50
    APIs
    • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00C5C477
    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00C5C499
    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00C5C4B1
    • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00C5C4CF
    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00C5C4F0
    • DestroyIcon.USER32(00000000), ref: 00C5C4FF
    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00C5C51C
    • DestroyIcon.USER32(?), ref: 00C5C52B
      • Part of subcall function 00CAA4E1: DeleteObject.GDI32(00000000), ref: 00CAA51A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
    • String ID:
    • API String ID: 2819616528-0
    • Opcode ID: aeb902b39a7144539924ad7aae20f2cd5177ab6904a91d93c56c934b423e2fb4
    • Instruction ID: 91e45941f28a44921d9e10e6ea2eb039247df8f42884ed5c206d0d5bd5f7a520
    • Opcode Fuzzy Hash: aeb902b39a7144539924ad7aae20f2cd5177ab6904a91d93c56c934b423e2fb4
    • Instruction Fuzzy Hash: 34518974600319EFDB20DF65EC85FAE37B5EB58315F100528F912A76A0DB70AE81EB50
    APIs
      • Part of subcall function 00C7AC37: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C7AC57
      • Part of subcall function 00C7AC37: GetCurrentThreadId.KERNEL32 ref: 00C7AC5E
      • Part of subcall function 00C7AC37: AttachThreadInput.USER32(00000000,?,00C79945,?,00000001), ref: 00C7AC65
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C79950
    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00C7996D
    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00C79970
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C79979
    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00C79997
    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00C7999A
    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00C799A3
    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00C799BA
    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00C799BD
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
    • String ID:
    • API String ID: 2014098862-0
    • Opcode ID: f412097c793126717c5928e681b0f454200ffd737de5d470bece93d43fd785f6
    • Instruction ID: bb6d4aa38f7bdc0d1f5fc46d313ef0ec00d873c6ee6a46e9c2717fedc9336ced
    • Opcode Fuzzy Hash: f412097c793126717c5928e681b0f454200ffd737de5d470bece93d43fd785f6
    • Instruction Fuzzy Hash: AF11CE71550218BEF6106BA1CC8AF6E7A2DEB4E759F100429F348AB0A0C9F25C129AA4
    APIs
    • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00C78864,00000B00,?,?), ref: 00C78BEC
    • HeapAlloc.KERNEL32(00000000,?,00C78864,00000B00,?,?), ref: 00C78BF3
    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00C78864,00000B00,?,?), ref: 00C78C08
    • GetCurrentProcess.KERNEL32(?,00000000,?,00C78864,00000B00,?,?), ref: 00C78C10
    • DuplicateHandle.KERNEL32(00000000,?,00C78864,00000B00,?,?), ref: 00C78C13
    • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00C78864,00000B00,?,?), ref: 00C78C23
    • GetCurrentProcess.KERNEL32(00C78864,00000000,?,00C78864,00000B00,?,?), ref: 00C78C2B
    • DuplicateHandle.KERNEL32(00000000,?,00C78864,00000B00,?,?), ref: 00C78C2E
    • CreateThread.KERNEL32(00000000,00000000,00C78C54,00000000,00000000,00000000), ref: 00C78C48
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
    • String ID:
    • API String ID: 1957940570-0
    • Opcode ID: 228b43b8e362cf110993a6e8116c1877b8bd0b9100d49ffb4b8bef8b3d1d89e4
    • Instruction ID: 3426dc1506e09a7597ccc192efdc59d7f91b60f9acf485165ce9f0efa82bf332
    • Opcode Fuzzy Hash: 228b43b8e362cf110993a6e8116c1877b8bd0b9100d49ffb4b8bef8b3d1d89e4
    • Instruction Fuzzy Hash: 2601A8B5240348FFE660ABA5DC4DFAF3BACEB89715F104425FB05DB1A1DA7098058A20
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID: NULL Pointer assignment$Not an Object type
    • API String ID: 0-572801152
    • Opcode ID: c3bb56b9cb8da02fd31700687bd5e178b0ea9ee2b2c8ec2569955dcae1f96005
    • Instruction ID: b3f92d04759905c234a9cb56aebbb3d7e27a68e2a55c5fd082f5c4cc8fcf488c
    • Opcode Fuzzy Hash: c3bb56b9cb8da02fd31700687bd5e178b0ea9ee2b2c8ec2569955dcae1f96005
    • Instruction Fuzzy Hash: A7C17271A002199FDF14DFACC889BAEB7B5FB48314F14846DE919EB281E7709E45CB60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Variant$ClearInit$_memset
    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
    • API String ID: 2862541840-625585964
    • Opcode ID: 6c0eda1a464724f70bb91fc5683e04d4660b7b70939e003174c7c4e06038c451
    • Instruction ID: f5cc909e0dcbc1cf6d843730ce879005a4ccd8af5dfb13f817bcf98f3c12d9b0
    • Opcode Fuzzy Hash: 6c0eda1a464724f70bb91fc5683e04d4660b7b70939e003174c7c4e06038c451
    • Instruction Fuzzy Hash: 6F91BE71A00219ABDF21DFA9C848FAEBBB8FF45710F10855DF515AB290D7709A46CFA0
    APIs
      • Part of subcall function 00C77432: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?,?,?,00C7777D), ref: 00C7744F
      • Part of subcall function 00C77432: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?,?), ref: 00C7746A
      • Part of subcall function 00C77432: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?,?), ref: 00C77478
      • Part of subcall function 00C77432: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?), ref: 00C77488
    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00C9991B
    • _memset.LIBCMT ref: 00C99928
    • _memset.LIBCMT ref: 00C99A6B
    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00C99A97
    • CoTaskMemFree.OLE32(?), ref: 00C99AA2
    Strings
    • NULL Pointer assignment, xrefs: 00C99AF0
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
    • String ID: NULL Pointer assignment
    • API String ID: 1300414916-2785691316
    • Opcode ID: 6e3741327d7cd9d9b77471fa2427b87a800c13b36faba5c8b339fcb1390b9274
    • Instruction ID: c87148d54f6125eb0d6c0f911cddf93120a1a8b317b0aab23abbfda73a11c7dd
    • Opcode Fuzzy Hash: 6e3741327d7cd9d9b77471fa2427b87a800c13b36faba5c8b339fcb1390b9274
    • Instruction Fuzzy Hash: C3913771D00229EBDF20DFA5DC85ADEBBB8EF08710F10415AF419A7281DB719A45DFA0
    APIs
    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00CA6E56
    • SendMessageW.USER32(?,00001036,00000000,?), ref: 00CA6E6A
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00CA6E84
    • _wcscat.LIBCMT ref: 00CA6EDF
    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00CA6EF6
    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00CA6F24
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$Window_wcscat
    • String ID: SysListView32
    • API String ID: 307300125-78025650
    • Opcode ID: ae50bfe608023a4bbf03331b6d0c5ab1965d07c72c37fdc8de4573b02139c521
    • Instruction ID: c957ca822cf52e59da21b1263faed8ba3cfd1e6266b2aced7f7e64ee38426d83
    • Opcode Fuzzy Hash: ae50bfe608023a4bbf03331b6d0c5ab1965d07c72c37fdc8de4573b02139c521
    • Instruction Fuzzy Hash: 8341A174A00349AFEB219FA4CC89BEE77F8EF09358F14042AF554E7291D2729D848B64
    APIs
      • Part of subcall function 00C83C99: CreateToolhelp32Snapshot.KERNEL32 ref: 00C83CBE
      • Part of subcall function 00C83C99: Process32FirstW.KERNEL32(00000000,?), ref: 00C83CCC
      • Part of subcall function 00C83C99: CloseHandle.KERNEL32(00000000), ref: 00C83D96
    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C9EAB8
    • GetLastError.KERNEL32 ref: 00C9EACB
    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00C9EAFA
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00C9EB77
    • GetLastError.KERNEL32(00000000), ref: 00C9EB82
    • CloseHandle.KERNEL32(00000000), ref: 00C9EBB7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
    • String ID: SeDebugPrivilege
    • API String ID: 2533919879-2896544425
    • Opcode ID: ca2310a576d8d6b9b6b561ed76c1a650822a84d43b7430b2b78889044250204b
    • Instruction ID: bb3c1b02cce67eb4ac91556c5a8ae43b5a16cffced331a05d2a89229ce2382a2
    • Opcode Fuzzy Hash: ca2310a576d8d6b9b6b561ed76c1a650822a84d43b7430b2b78889044250204b
    • Instruction Fuzzy Hash: B541BD306002119FDB14EF54CC9AF6DB7A1EF54714F08845CF9469B2D2CBB5A905EB8A
    APIs
    • LoadIconW.USER32(00000000,00007F03), ref: 00C830CD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: IconLoad
    • String ID: blank$info$question$stop$warning
    • API String ID: 2457776203-404129466
    • Opcode ID: fbcfc398796a0f7378d6b23c3282c58f6c1fcd89301d63325e9dfe2aabb058c9
    • Instruction ID: 6b2120b2d79af0f2aa806e573a4db2eaf5aab7f456dc50bb095c6ec2462a1896
    • Opcode Fuzzy Hash: fbcfc398796a0f7378d6b23c3282c58f6c1fcd89301d63325e9dfe2aabb058c9
    • Instruction Fuzzy Hash: 7111EB35608387BAE720BA55EC42D6A779C9F05B28F10002BFA10962C2EFB55F4157A9
    APIs
    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00C84353
    • LoadStringW.USER32(00000000), ref: 00C8435A
    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00C84370
    • LoadStringW.USER32(00000000), ref: 00C84377
    • _wprintf.LIBCMT ref: 00C8439D
    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00C843BB
    Strings
    • %s (%d) : ==> %s: %s %s, xrefs: 00C84398
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: HandleLoadModuleString$Message_wprintf
    • String ID: %s (%d) : ==> %s: %s %s
    • API String ID: 3648134473-3128320259
    • Opcode ID: 80f907ab894573a9f09e015fd49deb0ad02210ddd7db4dded924637dbdd818bb
    • Instruction ID: 34e1bd44a388057a4d689f8d11ef14a6363012674199a7af1b9a234444f9a8d4
    • Opcode Fuzzy Hash: 80f907ab894573a9f09e015fd49deb0ad02210ddd7db4dded924637dbdd818bb
    • Instruction Fuzzy Hash: 04014FF2940208BFE751ABE09D89FEA776CD709305F0005A9B705E3051EA749E864B74
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • GetSystemMetrics.USER32(0000000F), ref: 00CAD4E6
    • GetSystemMetrics.USER32(0000000F), ref: 00CAD506
    • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00CAD741
    • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00CAD75F
    • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00CAD780
    • ShowWindow.USER32(00000003,00000000), ref: 00CAD79F
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00CAD7C4
    • DefDlgProcW.USER32(?,00000005,?,?), ref: 00CAD7E7
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
    • String ID:
    • API String ID: 1211466189-0
    • Opcode ID: d1551562aa8ff8d8e776fac13b926ecefd69a1a7fe4dcb42c28536a3469389e3
    • Instruction ID: c0970d2de103bc89c044a71fbd6c054f29f23d784375a3f9f3b32cfca72ebfaa
    • Opcode Fuzzy Hash: d1551562aa8ff8d8e776fac13b926ecefd69a1a7fe4dcb42c28536a3469389e3
    • Instruction Fuzzy Hash: C8B19C7550021AEFDF18CF68C9C97AD7BB1BF05708F088069EC5ADBA99D730AA50CB50
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00CA0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9FE38,?,?), ref: 00CA0EBC
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00C9FE79
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BuffCharConnectRegistryUpper_memmove
    • String ID:
    • API String ID: 3479070676-0
    • Opcode ID: 1ec3e4366f14c14b8dda6b9dd523a99748ab8c2754286b21981061ef7a021dc1
    • Instruction ID: ed4c80f4b9e7256d078084c0464d9b4b341603335dab0cd00512baa749b214be
    • Opcode Fuzzy Hash: 1ec3e4366f14c14b8dda6b9dd523a99748ab8c2754286b21981061ef7a021dc1
    • Instruction Fuzzy Hash: 71A18C316042029FCB10EF54C885B6EB7E5FF85358F14881CF9968B2A2DB71E945EF82
    APIs
    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00C5C347,00000004,00000000,00000000,00000000), ref: 00C22ACF
    • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00C5C347,00000004,00000000,00000000,00000000,000000FF), ref: 00C22B17
    • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00C5C347,00000004,00000000,00000000,00000000), ref: 00C5C39A
    • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00C5C347,00000004,00000000,00000000,00000000), ref: 00C5C406
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ShowWindow
    • String ID:
    • API String ID: 1268545403-0
    • Opcode ID: c6c48db6c77dc499fa33c3ad23d8310d3432de6b93a8f3b1991bce820883baf6
    • Instruction ID: eaaf9346e9fe5d9e194c0b7481cb4cbdcbc61de83ae8b96001fc015a6c723373
    • Opcode Fuzzy Hash: c6c48db6c77dc499fa33c3ad23d8310d3432de6b93a8f3b1991bce820883baf6
    • Instruction Fuzzy Hash: 7C41F835204790FFC7358B29ACC87AE7B92AB45304F18C82DE56787D70C6759986F714
    APIs
    • InterlockedExchange.KERNEL32(?,000001F5), ref: 00C87186
      • Part of subcall function 00C40F36: std::exception::exception.LIBCMT ref: 00C40F6C
      • Part of subcall function 00C40F36: __CxxThrowException@8.LIBCMT ref: 00C40F81
    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00C871BD
    • EnterCriticalSection.KERNEL32(?), ref: 00C871D9
    • _memmove.LIBCMT ref: 00C87227
    • _memmove.LIBCMT ref: 00C87244
    • LeaveCriticalSection.KERNEL32(?), ref: 00C87253
    • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00C87268
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C87287
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
    • String ID:
    • API String ID: 256516436-0
    • Opcode ID: 56f9759d52cd5686cb693c6b082784e65f2d16b3f4321a2cebcc780439b2b3a2
    • Instruction ID: 94f8363e6b52951155c1893865a92979a4b0683ecb234db76ad9701a526db2f5
    • Opcode Fuzzy Hash: 56f9759d52cd5686cb693c6b082784e65f2d16b3f4321a2cebcc780439b2b3a2
    • Instruction Fuzzy Hash: 85317E31904205EBDB20EFA4DC85BAE7778FF45314B2441B9F904AB256E730DE15DBA4
    APIs
    • DeleteObject.GDI32(00000000), ref: 00CA621D
    • GetDC.USER32(00000000), ref: 00CA6225
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CA6230
    • ReleaseDC.USER32(00000000,00000000), ref: 00CA623C
    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00CA6278
    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00CA6289
    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00CA905C,?,?,000000FF,00000000,?,000000FF,?), ref: 00CA62C3
    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00CA62E3
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
    • String ID:
    • API String ID: 3864802216-0
    • Opcode ID: ff53634c88da90fbd75c4f38cb9fc86f0e39677e887beeceeaba672c080da56e
    • Instruction ID: ac18dc525ef188ddfa0be3f1d79f687ec3c7119f24d5aa483fa7a32355562534
    • Opcode Fuzzy Hash: ff53634c88da90fbd75c4f38cb9fc86f0e39677e887beeceeaba672c080da56e
    • Instruction Fuzzy Hash: 90316F721411147FEB114F50DC49FEA3FA9EF4A759F080169FE08DA191C6759D42CBA4
    APIs
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
      • Part of subcall function 00C3FE06: _wcscpy.LIBCMT ref: 00C3FE29
    • _wcstok.LIBCMT ref: 00C8ED20
    • _wcscpy.LIBCMT ref: 00C8EDAF
    • _memset.LIBCMT ref: 00C8EDE2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
    • String ID: X
    • API String ID: 774024439-3081909835
    • Opcode ID: 0421c653091054de79586f7b8d4b099c2b31b30aa5fefbd040007395c7b2decb
    • Instruction ID: 3c9399b876099e1fc12772439339f2ff65c9fad09bcd133471e0eb418cf65060
    • Opcode Fuzzy Hash: 0421c653091054de79586f7b8d4b099c2b31b30aa5fefbd040007395c7b2decb
    • Instruction Fuzzy Hash: 4DC1AE316083109FD724FF64D885A6AB7E0FF84314F10492DF9999B6A2DB30ED49DB82
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ced779c9e1ab8f3031efda8986c1cc25f2782f63e621e22c1e526acbca98becc
    • Instruction ID: 6a5fd0871df28c0563a550cbc86314033b2045dd94c796933259e178627aaf4c
    • Opcode Fuzzy Hash: ced779c9e1ab8f3031efda8986c1cc25f2782f63e621e22c1e526acbca98becc
    • Instruction Fuzzy Hash: DC71AC34900119EFCB04DF99DC88ABEBBB9FF85314F188159F915AB251C734AA51CFA4
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ef262e4605f5f22fbde87219dcca59d8df275b39d904d798dc6e99d70b1ff641
    • Instruction ID: 22b99a3ff330d6a7cb4aff2c2628c4ec37c722820c3e51377e46477ac7629c5e
    • Opcode Fuzzy Hash: ef262e4605f5f22fbde87219dcca59d8df275b39d904d798dc6e99d70b1ff641
    • Instruction Fuzzy Hash: AC61AA35508310ABDB10EB24DC8AF6FB7E9EB84714F104A1DF556972E2DA30EE05DB92
    APIs
    • IsWindow.USER32(01535938), ref: 00CAB41F
    • IsWindowEnabled.USER32(01535938), ref: 00CAB42B
    • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00CAB50F
    • SendMessageW.USER32(01535938,000000B0,?,?), ref: 00CAB546
    • IsDlgButtonChecked.USER32(?,?), ref: 00CAB583
    • GetWindowLongW.USER32(01535938,000000EC), ref: 00CAB5A5
    • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00CAB5BD
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSendWindow$ButtonCheckedEnabledLong
    • String ID:
    • API String ID: 4072528602-0
    • Opcode ID: 5d9f7feeff3bdb78b7c334b073ac096f1f60e52adb92b6ce5876c28c5f620ea0
    • Instruction ID: e1d6dab3f1778f4233e0e087f3b9684635f06cf6ee83da49501d891dc3f5dd79
    • Opcode Fuzzy Hash: 5d9f7feeff3bdb78b7c334b073ac096f1f60e52adb92b6ce5876c28c5f620ea0
    • Instruction Fuzzy Hash: FF71AE34A01606EFDF209F65C894FAA7BB9FF0A308F144069F965972A3C731AE51DB50
    APIs
    • _memset.LIBCMT ref: 00C9F55C
    • _memset.LIBCMT ref: 00C9F625
    • ShellExecuteExW.SHELL32(?), ref: 00C9F66A
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
      • Part of subcall function 00C3FE06: _wcscpy.LIBCMT ref: 00C3FE29
    • GetProcessId.KERNEL32(00000000), ref: 00C9F6E1
    • CloseHandle.KERNEL32(00000000), ref: 00C9F710
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
    • String ID: @
    • API String ID: 3522835683-2766056989
    • Opcode ID: 2cf7e483fe16118ddb740386eb176a505ee542e15cd27f799dd62a520dc8228b
    • Instruction ID: a26f64e2da847c4a913c6d653d61263a62c8aa4272b66078df2592a4aa162d03
    • Opcode Fuzzy Hash: 2cf7e483fe16118ddb740386eb176a505ee542e15cd27f799dd62a520dc8228b
    • Instruction Fuzzy Hash: 8261AE75A00629DFCF14EF94D4859ADBBB0FF48310F14846DE85AAB761CB30AE42DB90
    APIs
    • GetParent.USER32(?), ref: 00C812BD
    • GetKeyboardState.USER32(?), ref: 00C812D2
    • SetKeyboardState.USER32(?), ref: 00C81333
    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00C81361
    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00C81380
    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00C813C6
    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00C813E9
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: 7dcec026582d1b23d4b269c10f4c299a7bf99b370b5b1778b86a6ea954031ad0
    • Instruction ID: a8389972a1bd27f12b091c08d418d41a7602c4159859fee992f22bba32fcefe8
    • Opcode Fuzzy Hash: 7dcec026582d1b23d4b269c10f4c299a7bf99b370b5b1778b86a6ea954031ad0
    • Instruction Fuzzy Hash: 675106A09047D13EFB3662348C45BBA7EED5F46308F0C4589E8E5468D2C2E8DEC6D754
    APIs
    • GetParent.USER32(00000000), ref: 00C810D6
    • GetKeyboardState.USER32(?), ref: 00C810EB
    • SetKeyboardState.USER32(?), ref: 00C8114C
    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00C81178
    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00C81195
    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00C811D9
    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00C811FA
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessagePost$KeyboardState$Parent
    • String ID:
    • API String ID: 87235514-0
    • Opcode ID: 8bbf87fb1398d9fb8effe808c64683764a3de23f4afdba3bb2e33391a0ad1dd6
    • Instruction ID: 00228a754a84f522020df39009449b46c7f1c82aa0694389d7a85cc46d86104e
    • Opcode Fuzzy Hash: 8bbf87fb1398d9fb8effe808c64683764a3de23f4afdba3bb2e33391a0ad1dd6
    • Instruction Fuzzy Hash: 1C5119A05047D53DFB32A7648C45F7A7EED5B06308F0C458DE9E5468C2C294ED86E758
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _wcsncpy$LocalTime
    • String ID:
    • API String ID: 2945705084-0
    • Opcode ID: 03e25f79bd7a94100c1b2d1efee6284689ec22131389217a7b8d2b4a3dcdce93
    • Instruction ID: 370f0edf35ad95cb578a9d0824d0660f206a118ab4b3cb2b639e1b6464bf227c
    • Opcode Fuzzy Hash: 03e25f79bd7a94100c1b2d1efee6284689ec22131389217a7b8d2b4a3dcdce93
    • Instruction Fuzzy Hash: 2841E1A6C2061479CB11FBB49C86ACFB7B8BF45310F608466F958E3121E678A305D3E9
    APIs
      • Part of subcall function 00C846AF: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00C836DB,?), ref: 00C846CC
      • Part of subcall function 00C846AF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00C836DB,?), ref: 00C846E5
    • lstrcmpiW.KERNEL32(?,?), ref: 00C836FB
    • _wcscmp.LIBCMT ref: 00C83717
    • MoveFileW.KERNEL32(?,?), ref: 00C8372F
    • _wcscat.LIBCMT ref: 00C83777
    • SHFileOperationW.SHELL32(?), ref: 00C837E3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
    • String ID: \*.*
    • API String ID: 1377345388-1173974218
    • Opcode ID: d2b9108a545a1605c0e2674be1b52121452e973ebeec2e4d4e9a6524c8eeb69f
    • Instruction ID: dcfb1d28aa4bb86804e6bc867c94c1fe9c6f374df7d27e2098ef8185fb4aa37c
    • Opcode Fuzzy Hash: d2b9108a545a1605c0e2674be1b52121452e973ebeec2e4d4e9a6524c8eeb69f
    • Instruction Fuzzy Hash: AC41EFB2408385AEC715FF64C441ADFB7E8EF88744F40192EB49AC7151EA34D788C75A
    APIs
    • _memset.LIBCMT ref: 00CA72DC
    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00CA7383
    • IsMenu.USER32(?), ref: 00CA739B
    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00CA73E3
    • DrawMenuBar.USER32 ref: 00CA73F6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Menu$Item$DrawInfoInsert_memset
    • String ID: 0
    • API String ID: 3866635326-4108050209
    • Opcode ID: a3319820cedaac72469348b92ab3e26e939d342a5804ed53bcd6406650cd74fd
    • Instruction ID: a35905301b4ba34c14fedfb7b0f3ce5d98a6e8aa9470dbd25475ef50994689df
    • Opcode Fuzzy Hash: a3319820cedaac72469348b92ab3e26e939d342a5804ed53bcd6406650cd74fd
    • Instruction Fuzzy Hash: 4C412C75A05209EFDF20DF90D884E9ABBF8FB0A318F048129ED5697260D734AE51DF90
    APIs
    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00CA105C
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CA1086
    • FreeLibrary.KERNEL32(00000000), ref: 00CA113D
      • Part of subcall function 00CA102D: RegCloseKey.ADVAPI32(?), ref: 00CA10A3
      • Part of subcall function 00CA102D: FreeLibrary.KERNEL32(?), ref: 00CA10F5
      • Part of subcall function 00CA102D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00CA1118
    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00CA10E0
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: EnumFreeLibrary$CloseDeleteOpen
    • String ID:
    • API String ID: 395352322-0
    • Opcode ID: 37094e09a64fa7925911691fedc52edea2385d54c1ce25b1848616c94f0470dc
    • Instruction ID: b77cc145dc4f12c5734d41cd15618842e7b025041c9eced63519420bffdc433f
    • Opcode Fuzzy Hash: 37094e09a64fa7925911691fedc52edea2385d54c1ce25b1848616c94f0470dc
    • Instruction Fuzzy Hash: DA312FB191110ABFDB149BD0DC89EFFB7BCEF0A344F040169EA12A2151DA745F859BA4
    APIs
    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00CA631E
    • GetWindowLongW.USER32(01535938,000000F0), ref: 00CA6351
    • GetWindowLongW.USER32(01535938,000000F0), ref: 00CA6386
    • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00CA63B8
    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00CA63E2
    • GetWindowLongW.USER32(?,000000F0), ref: 00CA63F3
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CA640D
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: LongWindow$MessageSend
    • String ID:
    • API String ID: 2178440468-0
    • Opcode ID: beba774cd2cafe9052273d856ef3eb1505bd37a538a9aad889fc999a9af2bd41
    • Instruction ID: e5f79d6570a028e5371c4c4b84a189232b769127dabe525bea773ad3f2cc6eff
    • Opcode Fuzzy Hash: beba774cd2cafe9052273d856ef3eb1505bd37a538a9aad889fc999a9af2bd41
    • Instruction Fuzzy Hash: 1D311135645242AFDB21CF58DC84F5937E1FB4A328F1801A8F5218F2B2CB72A942DB51
    APIs
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C7DE3D
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00C7DE63
    • SysAllocString.OLEAUT32(00000000), ref: 00C7DE66
    • SysAllocString.OLEAUT32(?), ref: 00C7DE84
    • SysFreeString.OLEAUT32(?), ref: 00C7DE8D
    • StringFromGUID2.OLE32(?,?,00000028), ref: 00C7DEB2
    • SysAllocString.OLEAUT32(?), ref: 00C7DEC0
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
    • String ID:
    • API String ID: 3761583154-0
    • Opcode ID: 26d9bbddab65a19e41c6703eaab7966cf4b60b09fd3fe77632edcac469d769de
    • Instruction ID: 83dbae19dcfe82dbdb49442bc8723976c17f8d9acf789f3959d6ac28f3c1a194
    • Opcode Fuzzy Hash: 26d9bbddab65a19e41c6703eaab7966cf4b60b09fd3fe77632edcac469d769de
    • Instruction Fuzzy Hash: 42218372600219AF9B119FB8DC88DBF77ACEF19364B108529FA19DB150D6709D418B60
    APIs
      • Part of subcall function 00C97EA0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00C97ECB
    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00C962DC
    • WSAGetLastError.WSOCK32(00000000), ref: 00C962EB
    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00C96324
    • connect.WSOCK32(00000000,?,00000010), ref: 00C9632D
    • WSAGetLastError.WSOCK32 ref: 00C96337
    • closesocket.WSOCK32(00000000), ref: 00C96360
    • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00C96379
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
    • String ID:
    • API String ID: 910771015-0
    • Opcode ID: 5accfc5e42dd2fada0d8c5d76b916bb2e1adc4aa70964b92bffae82fc3ba4694
    • Instruction ID: 90ca0c5d2725b9316d3c95accf18d4222861d1aef8f12adda34a552735c7b20d
    • Opcode Fuzzy Hash: 5accfc5e42dd2fada0d8c5d76b916bb2e1adc4aa70964b92bffae82fc3ba4694
    • Instruction Fuzzy Hash: C831E231600618AFDF10AF60CC89BBE7BA9FB45724F00806DF91AD72D1DB74AD059BA1
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
    • API String ID: 1038674560-2734436370
    • Opcode ID: 67326a2a509da3794cc827ec825bdeac09c105f7ea3617389cc709dbe3f7ce30
    • Instruction ID: c78289c17758f94827ef6d8cfa18216897707f56006dbe09af300d16ec2aa7c2
    • Opcode Fuzzy Hash: 67326a2a509da3794cc827ec825bdeac09c105f7ea3617389cc709dbe3f7ce30
    • Instruction Fuzzy Hash: 7F213E3251C51176D331AA259C82FB77398EFA5320F50C03DF99D87181EB915E43F295
    APIs
      • Part of subcall function 00C21D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C21D73
      • Part of subcall function 00C21D35: GetStockObject.GDI32(00000011), ref: 00C21D87
      • Part of subcall function 00C21D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C21D91
    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00CA7664
    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00CA7671
    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00CA767C
    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00CA768B
    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00CA7697
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$CreateObjectStockWindow
    • String ID: Msctls_Progress32
    • API String ID: 1025951953-3636473452
    • Opcode ID: 8b6712c2ddec3012b1ddf603c9bc625d869a59bb11b30f97aed0a1b8923b8475
    • Instruction ID: ec6a149eec7ced38514ccf74ebb6020415035fbf7d8f37eb88b94f59a4f640f4
    • Opcode Fuzzy Hash: 8b6712c2ddec3012b1ddf603c9bc625d869a59bb11b30f97aed0a1b8923b8475
    • Instruction Fuzzy Hash: 5C11B2B255021EBFEF159F64CC85EEB7F6DEF09758F014215BA04A6090C672AC21DBA0
    APIs
    • __init_pointers.LIBCMT ref: 00C49C66
      • Part of subcall function 00C43307: EncodePointer.KERNEL32(00000000), ref: 00C4330A
      • Part of subcall function 00C43307: __initp_misc_winsig.LIBCMT ref: 00C43325
      • Part of subcall function 00C43307: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00C4A020
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00C4A034
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00C4A047
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00C4A05A
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00C4A06D
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00C4A080
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00C4A093
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00C4A0A6
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00C4A0B9
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00C4A0CC
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00C4A0DF
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00C4A0F2
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00C4A105
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00C4A118
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00C4A12B
      • Part of subcall function 00C43307: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00C4A13E
    • __mtinitlocks.LIBCMT ref: 00C49C6B
    • __mtterm.LIBCMT ref: 00C49C74
      • Part of subcall function 00C49CDC: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00C49C79,00C47E4D,00CDA0B8,00000014), ref: 00C49DD6
      • Part of subcall function 00C49CDC: _free.LIBCMT ref: 00C49DDD
      • Part of subcall function 00C49CDC: DeleteCriticalSection.KERNEL32(00CDEC00,?,?,00C49C79,00C47E4D,00CDA0B8,00000014), ref: 00C49DFF
    • __calloc_crt.LIBCMT ref: 00C49C99
    • __initptd.LIBCMT ref: 00C49CBB
    • GetCurrentThreadId.KERNEL32 ref: 00C49CC2
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
    • String ID:
    • API String ID: 3567560977-0
    • Opcode ID: 8505d93b1a240d4f35a19413c4b6a726db30932cc363352fcc65b9820d07c6da
    • Instruction ID: 3f24d47659c7ad35d6587dcbb2636ee898ce8dbb25f3f9e5bd1ae655bc2f8da6
    • Opcode Fuzzy Hash: 8505d93b1a240d4f35a19413c4b6a726db30932cc363352fcc65b9820d07c6da
    • Instruction Fuzzy Hash: 01F0903254AB3219E6747B74BC0778B2AD4FB02734B20072AF464C90E2EF3089415190
    APIs
    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00C441D2,?), ref: 00C44123
    • GetProcAddress.KERNEL32(00000000), ref: 00C4412A
    • EncodePointer.KERNEL32(00000000), ref: 00C44136
    • DecodePointer.KERNEL32(00000001,00C441D2,?), ref: 00C44153
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
    • String ID: RoInitialize$combase.dll
    • API String ID: 3489934621-340411864
    • Opcode ID: 2b8fd1561d88b2a2cd13b3df0adf3c874b29f054e58f6cc745ce3ae8fbd81e14
    • Instruction ID: ba502bc8d82b90aead038d542f45fe9a2e69fe3a05d41ad0a2672e0e655a6c75
    • Opcode Fuzzy Hash: 2b8fd1561d88b2a2cd13b3df0adf3c874b29f054e58f6cc745ce3ae8fbd81e14
    • Instruction Fuzzy Hash: 29E0E570690380AEEF116BB0EC8DB5C3AA5B756B0BF90883CB512DB0A0DAB552819A00
    APIs
    • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00C440F8), ref: 00C441F8
    • GetProcAddress.KERNEL32(00000000), ref: 00C441FF
    • EncodePointer.KERNEL32(00000000), ref: 00C4420A
    • DecodePointer.KERNEL32(00C440F8), ref: 00C44225
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
    • String ID: RoUninitialize$combase.dll
    • API String ID: 3489934621-2819208100
    • Opcode ID: d26e9539c2c9bed80d40ec18e63ffb229457c081da5cb500c8161e0284023db8
    • Instruction ID: 6437eeee60462b39b1d740309dcde44d06a27d447937cad8375071ee61fc5acb
    • Opcode Fuzzy Hash: d26e9539c2c9bed80d40ec18e63ffb229457c081da5cb500c8161e0284023db8
    • Instruction Fuzzy Hash: 02E09270681280ABEB20ABA2EC4DB4D3AA4B70574AF20452CF111EB0E0CBB65601DA10
    APIs
    • GetClientRect.USER32(?,?), ref: 00C21DDC
    • GetWindowRect.USER32(?,?), ref: 00C21E1D
    • ScreenToClient.USER32(?,?), ref: 00C21E45
    • GetClientRect.USER32(?,?), ref: 00C21F74
    • GetWindowRect.USER32(?,?), ref: 00C21F8D
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Rect$Client$Window$Screen
    • String ID:
    • API String ID: 1296646539-0
    • Opcode ID: c50a7ad1445d1356059d5419739c33fc7c50084f0b6c8fdfc543a26599c04144
    • Instruction ID: 09807b38a047d9bc29fc2c171d26dfc4a6f5d3af0ee8e459fe444b5a10a56b7d
    • Opcode Fuzzy Hash: c50a7ad1445d1356059d5419739c33fc7c50084f0b6c8fdfc543a26599c04144
    • Instruction Fuzzy Hash: 8AB15A7990024ADBDF10CFA9C5847EEBBB1FF18314F188529EC69AB654DB30AE41CB54
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove$__itow__swprintf
    • String ID:
    • API String ID: 3253778849-0
    • Opcode ID: ccb08acc44b68a1f1266914d2e7fe0522d9f1233f51541ceaad95578b7b79f9e
    • Instruction ID: 0d26776bae3125f609bed06bfcfe488ce0e32873d63727d411f9a6853c98f097
    • Opcode Fuzzy Hash: ccb08acc44b68a1f1266914d2e7fe0522d9f1233f51541ceaad95578b7b79f9e
    • Instruction Fuzzy Hash: F161BE3050066A9BDF11FF60DC82EFE37A4BF44318F044928F95A5B192EB35AD05EB94
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00CA0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9FE38,?,?), ref: 00CA0EBC
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA0348
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CA0388
    • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00CA03AB
    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00CA03D4
    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00CA0417
    • RegCloseKey.ADVAPI32(00000000), ref: 00CA0424
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
    • String ID:
    • API String ID: 4046560759-0
    • Opcode ID: d05a33ecd25353fbe762f63bba8ac1379498e7c32f401eab87246bff08cd5de2
    • Instruction ID: 9b7addd3aabcab773984f3ca86557fadadd58007195bbf451492f29e1c3c187f
    • Opcode Fuzzy Hash: d05a33ecd25353fbe762f63bba8ac1379498e7c32f401eab87246bff08cd5de2
    • Instruction Fuzzy Hash: 94519831208201AFDB10EF64D885E6FBBE8FF8A358F14492DF595872A1DB31E905DB52
    APIs
    • GetMenu.USER32(?), ref: 00CA5864
    • GetMenuItemCount.USER32(00000000), ref: 00CA589B
    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00CA58C3
    • GetMenuItemID.USER32(?,?), ref: 00CA5932
    • GetSubMenu.USER32(?,?), ref: 00CA5940
    • PostMessageW.USER32(?,00000111,?,00000000), ref: 00CA5991
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Menu$Item$CountMessagePostString
    • String ID:
    • API String ID: 650687236-0
    • Opcode ID: b742dbe9a0b22cada954db0e304fc138bc7099bde003083f82f50e3d8bdfabab
    • Instruction ID: 9ad4024ef0bf19fbff80e634856e0e39114fa2a71fea0ea66a56c1b0f0e9fa15
    • Opcode Fuzzy Hash: b742dbe9a0b22cada954db0e304fc138bc7099bde003083f82f50e3d8bdfabab
    • Instruction Fuzzy Hash: 8B51A031E00616EFCF11EFA4C845AAEB7B4EF49324F108069E955BB351DB70AE42DB90
    APIs
    • VariantInit.OLEAUT32(?), ref: 00C7F218
    • VariantClear.OLEAUT32(00000013), ref: 00C7F28A
    • VariantClear.OLEAUT32(00000000), ref: 00C7F2E5
    • _memmove.LIBCMT ref: 00C7F30F
    • VariantClear.OLEAUT32(?), ref: 00C7F35C
    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00C7F38A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Variant$Clear$ChangeInitType_memmove
    • String ID:
    • API String ID: 1101466143-0
    • Opcode ID: cc3b57bcde7ad04db27af920723fa387442919ff96f2588630c6fcdac504744d
    • Instruction ID: 590214fe5496e494d5d5249c733acfdff0d5ef82817f324c4c69dc58a34e9098
    • Opcode Fuzzy Hash: cc3b57bcde7ad04db27af920723fa387442919ff96f2588630c6fcdac504744d
    • Instruction Fuzzy Hash: C55138B5A00209AFDB14CF58C884AAAB7B8FF4D314B15856DE959DB311D730EA52CBA0
    APIs
    • _memset.LIBCMT ref: 00C82550
    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00C8259B
    • IsMenu.USER32(00000000), ref: 00C825BB
    • CreatePopupMenu.USER32 ref: 00C825EF
    • GetMenuItemCount.USER32(000000FF), ref: 00C8264D
    • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00C8267E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
    • String ID:
    • API String ID: 3311875123-0
    • Opcode ID: e83a81441bf5050e7c72d05782179fbd8774de7dec8a2db293801b18dd9a2f16
    • Instruction ID: 816ab2bbc64e1b246fa214f2ec469dea486c6b15c40f364812b623850b686136
    • Opcode Fuzzy Hash: e83a81441bf5050e7c72d05782179fbd8774de7dec8a2db293801b18dd9a2f16
    • Instruction Fuzzy Hash: 1D519E70A00205DFDF20EF68D88CBADBBF4AF4531CF14426AF86197290E7709A05CB55
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • BeginPaint.USER32(?,?,?,?,?,?), ref: 00C2179A
    • GetWindowRect.USER32(?,?), ref: 00C217FE
    • ScreenToClient.USER32(?,?), ref: 00C2181B
    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00C2182C
    • EndPaint.USER32(?,?), ref: 00C21876
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: PaintWindow$BeginClientLongRectScreenViewport
    • String ID:
    • API String ID: 1827037458-0
    • Opcode ID: 329e54b3a2c78e33fbbfa00f4d180c684e619902ff4c2126f64174cd63c1fddc
    • Instruction ID: f50c6feeb41d30014dd29da19a0aa8813a077cd8bfdb66e66d05154064a02b15
    • Opcode Fuzzy Hash: 329e54b3a2c78e33fbbfa00f4d180c684e619902ff4c2126f64174cd63c1fddc
    • Instruction Fuzzy Hash: 6741BD30104750AFC720DF25D8C4BAA7BF8EB56728F180229FAA48B2E1C7709945DB61
    APIs
    • ShowWindow.USER32(00CE57B0,00000000,01535938,?,?,00CE57B0,?,00CAB5DC,?,?), ref: 00CAB746
    • EnableWindow.USER32(?,00000000), ref: 00CAB76A
    • ShowWindow.USER32(00CE57B0,00000000,01535938,?,?,00CE57B0,?,00CAB5DC,?,?), ref: 00CAB7CA
    • ShowWindow.USER32(?,00000004,?,00CAB5DC,?,?), ref: 00CAB7DC
    • EnableWindow.USER32(?,00000001), ref: 00CAB800
    • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00CAB823
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$Show$Enable$MessageSend
    • String ID:
    • API String ID: 642888154-0
    • Opcode ID: 6010e1d21f41455d51c23b090015f984710f81c9830791a8538ee83f77565796
    • Instruction ID: 71fe4f0bd1d26bf0285cc5a57a9a21585d3a396cf1f1f7b04c68646cdd8bb4c0
    • Opcode Fuzzy Hash: 6010e1d21f41455d51c23b090015f984710f81c9830791a8538ee83f77565796
    • Instruction Fuzzy Hash: 3E414234600145EFDB22CF68C489B947BE5BB46318F1841B9E959CF2A3C771AD86CB61
    APIs
    • GetForegroundWindow.USER32(?,?,?,?,?,?,00C94F57,?,?,00000000,00000001), ref: 00C971C1
      • Part of subcall function 00C93AB6: GetWindowRect.USER32(?,?), ref: 00C93AC9
    • GetDesktopWindow.USER32 ref: 00C971EB
    • GetWindowRect.USER32(00000000), ref: 00C971F2
    • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00C97224
      • Part of subcall function 00C852EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C85363
    • GetCursorPos.USER32(?), ref: 00C97250
    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00C972AE
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
    • String ID:
    • API String ID: 4137160315-0
    • Opcode ID: 7e8570e78d95512a5dd30acc380e2584a7b4f65c8fe684a869d54df2c1e65753
    • Instruction ID: 2e22fd2b6dd0f971f256a487a6e1d067a98625aac2061e57e1644a5fecc580f8
    • Opcode Fuzzy Hash: 7e8570e78d95512a5dd30acc380e2584a7b4f65c8fe684a869d54df2c1e65753
    • Instruction Fuzzy Hash: 8C31F072519305AFCB20EF54C849B9FB7A9FF89308F000A29F49597191CB70EA09CB92
    APIs
      • Part of subcall function 00C783D1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C783E8
      • Part of subcall function 00C783D1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C783F2
      • Part of subcall function 00C783D1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C78401
      • Part of subcall function 00C783D1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C78408
      • Part of subcall function 00C783D1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C7841E
    • GetLengthSid.ADVAPI32(?,00000000,00C78757), ref: 00C78B8C
    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00C78B98
    • HeapAlloc.KERNEL32(00000000), ref: 00C78B9F
    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00C78BB8
    • GetProcessHeap.KERNEL32(00000000,00000000,00C78757), ref: 00C78BCC
    • HeapFree.KERNEL32(00000000), ref: 00C78BD3
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
    • String ID:
    • API String ID: 3008561057-0
    • Opcode ID: 2eff1c5dee59e7d4f1ac87b6a028afc1751c4aa2d3cee69f7246ccd7d1944893
    • Instruction ID: c2e7a042612cc5a75778f4d2370f257957d325754d952ffb92bcaf3b278956ea
    • Opcode Fuzzy Hash: 2eff1c5dee59e7d4f1ac87b6a028afc1751c4aa2d3cee69f7246ccd7d1944893
    • Instruction Fuzzy Hash: C211B1B1640204FFDB109FA4CC0DFAE77A9EB46319F10806DEA5997150CB319A09CBA0
    APIs
    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00C7890A
    • OpenProcessToken.ADVAPI32(00000000), ref: 00C78911
    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00C78920
    • CloseHandle.KERNEL32(00000004), ref: 00C7892B
    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00C7895A
    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00C7896E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
    • String ID:
    • API String ID: 1413079979-0
    • Opcode ID: dac398a80cc7a945c174b7b541d08da68fa79bb4f8a6b1725a56a0d75902516d
    • Instruction ID: 4b9185c85b66a85cf5ce5b3bcf57097b9ca073970632527b117fef77418cfa27
    • Opcode Fuzzy Hash: dac398a80cc7a945c174b7b541d08da68fa79bb4f8a6b1725a56a0d75902516d
    • Instruction Fuzzy Hash: DE115C72541209ABDF028FA4DD49BEE7BA9EF09308F044168FE04A2160C7718E659B61
    APIs
    • GetDC.USER32(00000000), ref: 00C7BA77
    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00C7BA88
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00C7BA8F
    • ReleaseDC.USER32(00000000,00000000), ref: 00C7BA97
    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00C7BAAE
    • MulDiv.KERNEL32(000009EC,?,?), ref: 00C7BAC0
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CapsDevice$Release
    • String ID:
    • API String ID: 1035833867-0
    • Opcode ID: e4e77f31086c3609e52baeea559556ee89c1bb70a3b6e691915f48015e9278a8
    • Instruction ID: 12ae7e4e137e902cab16486e7ad2e5b2b0cb628cb74c4259651b53573d2a23c4
    • Opcode Fuzzy Hash: e4e77f31086c3609e52baeea559556ee89c1bb70a3b6e691915f48015e9278a8
    • Instruction Fuzzy Hash: C301A775E00319BBEF109BE59D49B5EBFB8EB49365F004079FA08A7291D6309D01CFA0
    APIs
    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00C40313
    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00C4031B
    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00C40326
    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00C40331
    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00C40339
    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00C40341
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Virtual
    • String ID:
    • API String ID: 4278518827-0
    • Opcode ID: 0341254dafc94dcd0b4762e4e8067099380b9b635fd29e67c0439eefecfe6185
    • Instruction ID: abcf78e044182aa1ecc89bd9239d5ebae7e4419cd6e00599b08367c1d061dbc3
    • Opcode Fuzzy Hash: 0341254dafc94dcd0b4762e4e8067099380b9b635fd29e67c0439eefecfe6185
    • Instruction Fuzzy Hash: A10148B09017597DE3008F5A8C85B56FEA8FF19354F00411BA15847941C7B5A864CBE5
    APIs
    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00C854A0
    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00C854B6
    • GetWindowThreadProcessId.USER32(?,?), ref: 00C854C5
    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C854D4
    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C854DE
    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00C854E5
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
    • String ID:
    • API String ID: 839392675-0
    • Opcode ID: 5fbe4a5e1e5030fbca2454489cbbcfbdd4fdce28a7af5dc0d072e204ec56091d
    • Instruction ID: fc86b1d1d4db2497a4e90c00f293aab03035817af0019e9f66659f66bcbae03f
    • Opcode Fuzzy Hash: 5fbe4a5e1e5030fbca2454489cbbcfbdd4fdce28a7af5dc0d072e204ec56091d
    • Instruction Fuzzy Hash: DEF01D32241158BBE7315BE2DC0DFEF7A7CEBCBB19F00016DFA04D20A096B11A0286B5
    APIs
    • InterlockedExchange.KERNEL32(?,?), ref: 00C872EC
    • EnterCriticalSection.KERNEL32(?,?,00C31044,?,?), ref: 00C872FD
    • TerminateThread.KERNEL32(00000000,000001F6,?,00C31044,?,?), ref: 00C8730A
    • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00C31044,?,?), ref: 00C87317
      • Part of subcall function 00C86CDE: CloseHandle.KERNEL32(00000000,?,00C87324,?,00C31044,?,?), ref: 00C86CE8
    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00C8732A
    • LeaveCriticalSection.KERNEL32(?,?,00C31044,?,?), ref: 00C87331
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
    • String ID:
    • API String ID: 3495660284-0
    • Opcode ID: 459d2e59fb4320b113df801112024f75965c8200f9a2a5f9558ed8aa14f2425b
    • Instruction ID: 36f599671111154eb3c19f9e7268a103981cfc7a896e654fc226a3e074f6ce83
    • Opcode Fuzzy Hash: 459d2e59fb4320b113df801112024f75965c8200f9a2a5f9558ed8aa14f2425b
    • Instruction Fuzzy Hash: 09F05436140612EBD7612BA4ED8CBDE7729EF4630AB100635F502924B1DB755912DB50
    APIs
    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00C78C5F
    • UnloadUserProfile.USERENV(?,?), ref: 00C78C6B
    • CloseHandle.KERNEL32(?), ref: 00C78C74
    • CloseHandle.KERNEL32(?), ref: 00C78C7C
    • GetProcessHeap.KERNEL32(00000000,?), ref: 00C78C85
    • HeapFree.KERNEL32(00000000), ref: 00C78C8C
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
    • String ID:
    • API String ID: 146765662-0
    • Opcode ID: 4fbb95a978838b5934d55f5e64fc3feaffc271673fb9b217a3a78e4a0b0dbcad
    • Instruction ID: c7a855911c7335a1bea6ab52b99c8fd1013f27f0cd2891cab893adb44d5ba479
    • Opcode Fuzzy Hash: 4fbb95a978838b5934d55f5e64fc3feaffc271673fb9b217a3a78e4a0b0dbcad
    • Instruction Fuzzy Hash: 81E05276104505FFDB021FE5EC0CB5EBB69FB8A76AB508639F219C2470CB329462DB50
    APIs
    • VariantInit.OLEAUT32(?), ref: 00C98728
    • CharUpperBuffW.USER32(?,?), ref: 00C98837
    • VariantClear.OLEAUT32(?), ref: 00C989AF
      • Part of subcall function 00C8760B: VariantInit.OLEAUT32(00000000), ref: 00C8764B
      • Part of subcall function 00C8760B: VariantCopy.OLEAUT32(00000000,?), ref: 00C87654
      • Part of subcall function 00C8760B: VariantClear.OLEAUT32(00000000), ref: 00C87660
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Variant$ClearInit$BuffCharCopyUpper
    • String ID: AUTOIT.ERROR$Incorrect Parameter format
    • API String ID: 4237274167-1221869570
    • Opcode ID: 108b92f46faf371100d3c76db610cccff764cd41ba9b3afcb0bea441ea3469c5
    • Instruction ID: 0b9571f2eab93581bcb8bd370619d9a0960090bb5ccb8b6ff616a3592cb1bc29
    • Opcode Fuzzy Hash: 108b92f46faf371100d3c76db610cccff764cd41ba9b3afcb0bea441ea3469c5
    • Instruction Fuzzy Hash: 71919E75608301DFCB00EF64C48596BBBE4EF89314F14896EF89A8B361DB31E909DB52
    APIs
      • Part of subcall function 00C3FE06: _wcscpy.LIBCMT ref: 00C3FE29
    • _memset.LIBCMT ref: 00C82E7F
    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C82EAE
    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00C82F61
    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00C82F8F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ItemMenu$Info$Default_memset_wcscpy
    • String ID: 0
    • API String ID: 4152858687-4108050209
    • Opcode ID: e5b917227393e962670188ea11cbfc82e003829a31e5574c3c488bfa6df6b867
    • Instruction ID: 3352b5515c5034a477f1236e38c34cc06ab05420da8d59b56f96b843ec704465
    • Opcode Fuzzy Hash: e5b917227393e962670188ea11cbfc82e003829a31e5574c3c488bfa6df6b867
    • Instruction Fuzzy Hash: 4351C0715083219ED725AFA8C84976BB7F4EF85318F040A2DFAA5D31D0DB70CA04DB9A
    APIs
    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00C7D8E3
    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00C7D919
    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00C7D92A
    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00C7D9AC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorMode$AddressCreateInstanceProc
    • String ID: DllGetClassObject
    • API String ID: 753597075-1075368562
    • Opcode ID: bd36a38fb218b6991ad9f03a4c06719801d14160ce93c243d019a16f52e309a7
    • Instruction ID: 63e86810c28627e9f4ef36c102d59066c63f7b82440f606562f81da02206ca2c
    • Opcode Fuzzy Hash: bd36a38fb218b6991ad9f03a4c06719801d14160ce93c243d019a16f52e309a7
    • Instruction Fuzzy Hash: E2419E72600204EFDB14DF55C884B9ABBB9EF85314F1181ADEE0A9F205DBB1DE40DBA0
    APIs
    • _memset.LIBCMT ref: 00C82AB8
    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00C82AD4
    • DeleteMenu.USER32(?,00000007,00000000), ref: 00C82B1A
    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00CE5890,00000000), ref: 00C82B63
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Menu$Delete$InfoItem_memset
    • String ID: 0
    • API String ID: 1173514356-4108050209
    • Opcode ID: e0288ffbb439d5b7faf482be30e371931929476955665b395419b735ca1bafbc
    • Instruction ID: 207c28089cb9eb7d96ac19e78834379d3b5da72ba5e4d4d37c3df2efe6df974f
    • Opcode Fuzzy Hash: e0288ffbb439d5b7faf482be30e371931929476955665b395419b735ca1bafbc
    • Instruction Fuzzy Hash: 3B41C4302053019FD720EF24C889B2AB7E8EF85328F10461DF866972D1D770E905CB6A
    APIs
    • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00C9D8D9
      • Part of subcall function 00C279AB: _memmove.LIBCMT ref: 00C279F9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BuffCharLower_memmove
    • String ID: cdecl$none$stdcall$winapi
    • API String ID: 3425801089-567219261
    • Opcode ID: 3254e83af574fdf19ed8696dcfdcee260d069e6058a1e4982541e5090ec3395a
    • Instruction ID: a9b6a239c61aa6ca19f3dcd52a5d224bccf3f159f58a905714749652cafd36f5
    • Opcode Fuzzy Hash: 3254e83af574fdf19ed8696dcfdcee260d069e6058a1e4982541e5090ec3395a
    • Instruction Fuzzy Hash: 48319270504615AFCF10EFA4D8D19EEB3B4FF05710B108B6AE966A77D1DB31AA06DB80
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00C7AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00C7AEC7
    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00C791D6
    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00C791E9
    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00C79219
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$_memmove$ClassName
    • String ID: ComboBox$ListBox
    • API String ID: 365058703-1403004172
    • Opcode ID: f3fc0e8cddef4050769ad65aa3da896295512768eb597ac87a5661ed0ff12890
    • Instruction ID: e5c8d429bb0ca75ea0e11825bf53ffa29065117cb1e01bfa1b6a76ab04ea6b7a
    • Opcode Fuzzy Hash: f3fc0e8cddef4050769ad65aa3da896295512768eb597ac87a5661ed0ff12890
    • Instruction Fuzzy Hash: EE210A719441047FDB14ABB4DC8ADFFB778DF45360F148229F429671E1DB354D0AA610
    APIs
    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C91962
    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00C91988
    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00C919B8
    • InternetCloseHandle.WININET(00000000), ref: 00C919FF
      • Part of subcall function 00C92599: GetLastError.KERNEL32(?,?,00C9192D,00000000,00000000,00000001), ref: 00C925AE
      • Part of subcall function 00C92599: SetEvent.KERNEL32(?,?,00C9192D,00000000,00000000,00000001), ref: 00C925C3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
    • String ID:
    • API String ID: 3113390036-3916222277
    • Opcode ID: db39dbf109d6daa9967fca5e506511da9fef395d72313e3535085aaf623855c7
    • Instruction ID: a6dfa63770ece813532c345c376c622bb518557045c2a979b91bf262f4599500
    • Opcode Fuzzy Hash: db39dbf109d6daa9967fca5e506511da9fef395d72313e3535085aaf623855c7
    • Instruction Fuzzy Hash: 9721B0B1600209BFEB119FA4DC9AFBF76ACEB49744F15011AF845D3200EA309E05A7A1
    APIs
      • Part of subcall function 00C21D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C21D73
      • Part of subcall function 00C21D35: GetStockObject.GDI32(00000011), ref: 00C21D87
      • Part of subcall function 00C21D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C21D91
    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00CA6493
    • LoadLibraryW.KERNEL32(?), ref: 00CA649A
    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00CA64AF
    • DestroyWindow.USER32(?), ref: 00CA64B7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
    • String ID: SysAnimate32
    • API String ID: 4146253029-1011021900
    • Opcode ID: 66b3063ff2d320579c5008b5eaab3643d56097aecfecafa83f494394ffa4ed68
    • Instruction ID: 76488de2cdcd465224fb9b9ae3159388ec4d7e4314c9a4962cd5e2e10c5d3d1e
    • Opcode Fuzzy Hash: 66b3063ff2d320579c5008b5eaab3643d56097aecfecafa83f494394ffa4ed68
    • Instruction Fuzzy Hash: 40219D71600606ABEF108FA4DC80FBB77A9EF5E76CF188629FA6497190C771CC51A760
    APIs
    • GetStdHandle.KERNEL32(0000000C), ref: 00C86E65
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C86E98
    • GetStdHandle.KERNEL32(0000000C), ref: 00C86EAA
    • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00C86EE4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CreateHandle$FilePipe
    • String ID: nul
    • API String ID: 4209266947-2873401336
    • Opcode ID: fced57fa298440d6038eea69769014decad130435e85585d6fbdeaccf612917b
    • Instruction ID: 38abb19d807ccd06a320c9c9db19ea57393469baaddca3be3179f91924c2c0d0
    • Opcode Fuzzy Hash: fced57fa298440d6038eea69769014decad130435e85585d6fbdeaccf612917b
    • Instruction Fuzzy Hash: CF219078600209ABDB20AF69DC44B9EBBF4AF45728F204629FDB0D72D0DB709951CB54
    APIs
    • GetStdHandle.KERNEL32(000000F6), ref: 00C86F32
    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00C86F64
    • GetStdHandle.KERNEL32(000000F6), ref: 00C86F75
    • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00C86FAF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CreateHandle$FilePipe
    • String ID: nul
    • API String ID: 4209266947-2873401336
    • Opcode ID: cd217d8fe1aac988f50e406929a53085d6fef0a23f2ab7e4e959ab4382046173
    • Instruction ID: c9503f5b494825e7947026f03c9f9fbe067e95add104b7aa7f89de374563e161
    • Opcode Fuzzy Hash: cd217d8fe1aac988f50e406929a53085d6fef0a23f2ab7e4e959ab4382046173
    • Instruction Fuzzy Hash: 2721A171600305ABDB20AFA9AC04B9E77E8AF45328F200769FEB1D72D0D770D9418B68
    APIs
    • SetErrorMode.KERNEL32(00000001), ref: 00C8ACDE
    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00C8AD32
    • __swprintf.LIBCMT ref: 00C8AD4B
    • SetErrorMode.KERNEL32(00000000,00000001,00000000,00CAF910), ref: 00C8AD89
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorMode$InformationVolume__swprintf
    • String ID: %lu
    • API String ID: 3164766367-685833217
    • Opcode ID: f22af0021dab9d3ce427169f9062a8da4faeaee761e25cabdc16050a9a6375ae
    • Instruction ID: a5114566ff822462bacb80914352271d800ce3cd4a0fb6ee9b4d93344f73e3ee
    • Opcode Fuzzy Hash: f22af0021dab9d3ce427169f9062a8da4faeaee761e25cabdc16050a9a6375ae
    • Instruction Fuzzy Hash: 22219535A00109AFCB10EFA5DD85EAE77B8EF49708B104069F509DB351DB31EE41DB61
    APIs
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
      • Part of subcall function 00C7A15C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00C7A179
      • Part of subcall function 00C7A15C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00C7A18C
      • Part of subcall function 00C7A15C: GetCurrentThreadId.KERNEL32 ref: 00C7A193
      • Part of subcall function 00C7A15C: AttachThreadInput.USER32(00000000), ref: 00C7A19A
    • GetFocus.USER32 ref: 00C7A334
      • Part of subcall function 00C7A1A5: GetParent.USER32(?), ref: 00C7A1B3
    • GetClassNameW.USER32(?,?,00000100), ref: 00C7A37D
    • EnumChildWindows.USER32(?,00C7A3F5), ref: 00C7A3A5
    • __swprintf.LIBCMT ref: 00C7A3BF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
    • String ID: %s%d
    • API String ID: 1941087503-1110647743
    • Opcode ID: 57361c51c82a8f0e1ea7e98b82aa90d9d4425afada13d6afefd4450d26ce6d1d
    • Instruction ID: fa1fa66d8ac471e1ac032afc64468dacd43ddddf8712a602a6e44bcc80b6992c
    • Opcode Fuzzy Hash: 57361c51c82a8f0e1ea7e98b82aa90d9d4425afada13d6afefd4450d26ce6d1d
    • Instruction Fuzzy Hash: FF118771500209BBDF117F60DC85FEE777CAF85700F048079BA1C9A152DA745945DB71
    APIs
    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00C9ED1B
    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00C9ED4B
    • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00C9EE7E
    • CloseHandle.KERNEL32(?), ref: 00C9EEFF
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Process$CloseCountersHandleInfoMemoryOpen
    • String ID:
    • API String ID: 2364364464-0
    • Opcode ID: 99481e4db8b9b784f9391b53da04e6f26cf93306691af011daf156d791e8c32d
    • Instruction ID: 86397f6ca76df3dd5805b8a1a9a3305e739e5bbdcfc0737a07c173222070bd7d
    • Opcode Fuzzy Hash: 99481e4db8b9b784f9391b53da04e6f26cf93306691af011daf156d791e8c32d
    • Instruction Fuzzy Hash: 818172716003109FDB20EF29D846F2AB7E5EF58710F04881DF999DB792DB70AD419B52
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
    • String ID:
    • API String ID: 1559183368-0
    • Opcode ID: 17c9c7776e299596ed796557eca7f8bd29831e9b0e98da48d3161094909ff33f
    • Instruction ID: 7d597374c821ca1be232dd7039fe898d724901c33bcc7a5c568574da44f7396c
    • Opcode Fuzzy Hash: 17c9c7776e299596ed796557eca7f8bd29831e9b0e98da48d3161094909ff33f
    • Instruction Fuzzy Hash: 1751C170A00B05DBDB248FB9C8856AE7BB6FF41330F64872AF835962D2D7719E549B40
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00CA0EA5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00C9FE38,?,?), ref: 00CA0EBC
    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00CA0188
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00CA01C7
    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00CA020E
    • RegCloseKey.ADVAPI32(?,?), ref: 00CA023A
    • RegCloseKey.ADVAPI32(00000000), ref: 00CA0247
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
    • String ID:
    • API String ID: 3440857362-0
    • Opcode ID: b7b7b1e70c968ac222ddf64e57ad76f41dfe36a6ae0dc03db916765c943e188b
    • Instruction ID: 75edc426969bec05969a68ea00054863fadc3c2ee869932e3cb09055bc6b46e3
    • Opcode Fuzzy Hash: b7b7b1e70c968ac222ddf64e57ad76f41dfe36a6ae0dc03db916765c943e188b
    • Instruction Fuzzy Hash: 3A517831208305AFD704EBA4D885F6EB7E8FF89348F14892DB596872A1DB30E905DB52
    APIs
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00C9DA3B
    • GetProcAddress.KERNEL32(00000000,?), ref: 00C9DABE
    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00C9DADA
    • GetProcAddress.KERNEL32(00000000,?), ref: 00C9DB1B
    • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00C9DB35
      • Part of subcall function 00C25B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C8793F,?,?,00000000), ref: 00C25B8C
      • Part of subcall function 00C25B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C8793F,?,?,00000000,?,?), ref: 00C25BB0
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
    • String ID:
    • API String ID: 327935632-0
    • Opcode ID: 99d263549df2738310df088b4db3ec6a4162f39ba4dd025d7eec2b4a9f90895d
    • Instruction ID: 95e2b43b512e7d3c47ae10569a1b3928452249983a5bf638a1fa732adf2715e8
    • Opcode Fuzzy Hash: 99d263549df2738310df088b4db3ec6a4162f39ba4dd025d7eec2b4a9f90895d
    • Instruction Fuzzy Hash: 74515C35A04215DFDB00EFA8D4889ADB7F4FF19310B048069E91AAB351DB30EE45DF50
    APIs
    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00C8E6AB
    • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00C8E6D4
    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00C8E713
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00C8E738
    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00C8E740
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
    • String ID:
    • API String ID: 1389676194-0
    • Opcode ID: 049f31bfb33069401e36ef7a1cd8664c2bf3a85469684175ab5219d21803be7c
    • Instruction ID: 65f7b77ed999b2d6446c300c87924c1e3c2b97777180536329b382eed228c353
    • Opcode Fuzzy Hash: 049f31bfb33069401e36ef7a1cd8664c2bf3a85469684175ab5219d21803be7c
    • Instruction Fuzzy Hash: 23513A35A00215DFDB00EFA4C981AAEBBF5EF08314F1480A9E849AB361CB31ED51DB50
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: aa77ba409b6f4ff8e202ba982bb9ba4725cfd27dfa72b052b2b3e985ecb9d081
    • Instruction ID: 18f32677b345e28a32ec39bb0796cd02f1d9100b3e1c39079ee7eeaa90c9853c
    • Opcode Fuzzy Hash: aa77ba409b6f4ff8e202ba982bb9ba4725cfd27dfa72b052b2b3e985ecb9d081
    • Instruction Fuzzy Hash: 2841E635900146FFD720DF68CC44FADBBA5EB0B368F150169FA26A72E1C7309E41DA51
    APIs
    • GetCursorPos.USER32(?), ref: 00C22357
    • ScreenToClient.USER32(00CE57B0,?), ref: 00C22374
    • GetAsyncKeyState.USER32(00000001), ref: 00C22399
    • GetAsyncKeyState.USER32(00000002), ref: 00C223A7
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AsyncState$ClientCursorScreen
    • String ID:
    • API String ID: 4210589936-0
    • Opcode ID: 9154b103b73b5d570d535a47321ecba16dce86383bd16ea419f4323c635966fb
    • Instruction ID: d42628fa4adda52a88c3ab06add2672c1f11682efc43d000df7453b4021e9c3a
    • Opcode Fuzzy Hash: 9154b103b73b5d570d535a47321ecba16dce86383bd16ea419f4323c635966fb
    • Instruction Fuzzy Hash: 65418039904615FFCF15DF65C884AEEBBB4FB05365F10432AF835922A1C7346A94EB90
    APIs
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C7673D
    • TranslateAcceleratorW.USER32(?,?,?), ref: 00C76789
    • TranslateMessage.USER32(?), ref: 00C767B2
    • DispatchMessageW.USER32(?), ref: 00C767BC
    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00C767CB
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Message$PeekTranslate$AcceleratorDispatch
    • String ID:
    • API String ID: 2108273632-0
    • Opcode ID: 385db6f4fdac2ab8b196c4f791bc9685ba635aa28da02534b6430d629b78597d
    • Instruction ID: 4b38f8d9fbdbacf6f873b31e28a9d8b5b59b6d354daed343702a0e30e550738e
    • Opcode Fuzzy Hash: 385db6f4fdac2ab8b196c4f791bc9685ba635aa28da02534b6430d629b78597d
    • Instruction Fuzzy Hash: 8B31C531900E46AFDB288FB0CC84FBA7BECAB0134CF148169E439C71A1E7359985DB50
    APIs
    • GetWindowRect.USER32(?,?), ref: 00C78CF2
    • PostMessageW.USER32(?,00000201,00000001), ref: 00C78D9C
    • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00C78DA4
    • PostMessageW.USER32(?,00000202,00000000), ref: 00C78DB2
    • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00C78DBA
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessagePostSleep$RectWindow
    • String ID:
    • API String ID: 3382505437-0
    • Opcode ID: 42ac6710acce8da6e3ef48138f9f91396c14e9103b50a3e565c80a9ce51b60eb
    • Instruction ID: 71bb514cab683d3fdda0ec3a3fef3567a5eed30f57fbecd8cfffb7bce4b035d5
    • Opcode Fuzzy Hash: 42ac6710acce8da6e3ef48138f9f91396c14e9103b50a3e565c80a9ce51b60eb
    • Instruction Fuzzy Hash: 7F31A27150021AEFDF24CFA8D94DB9E7BB5EB25315F108229FA29E71D0C7709A14DB90
    APIs
    • IsWindowVisible.USER32(?), ref: 00C7B4C6
    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00C7B4E3
    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00C7B51B
    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00C7B541
    • _wcsstr.LIBCMT ref: 00C7B54B
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
    • String ID:
    • API String ID: 3902887630-0
    • Opcode ID: e6ca9ba72b3a422e94d53629dce8034bc65215c516880a8ca72b0b9dd281fe49
    • Instruction ID: a186760a7d5a723a3af6ed762b776fdda89257aca15b6405601736c71462310d
    • Opcode Fuzzy Hash: e6ca9ba72b3a422e94d53629dce8034bc65215c516880a8ca72b0b9dd281fe49
    • Instruction Fuzzy Hash: 2921D732604204BAEB259B799C09F7F7BA8EF49760F10803DF909DA161EB71DD41A6A0
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • GetWindowLongW.USER32(?,000000F0), ref: 00CAB1C6
    • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00CAB1EB
    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00CAB203
    • GetSystemMetrics.USER32(00000004), ref: 00CAB22C
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00C90FA5,00000000), ref: 00CAB24A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$Long$MetricsSystem
    • String ID:
    • API String ID: 2294984445-0
    • Opcode ID: 2cec4745ef6fefe85ab0858804411c6ec37aad5e6271943d83740b5d017e3ca4
    • Instruction ID: 271518a5caf047a207766d198c077ef785f6fd5f950c17dc167a2931d800b511
    • Opcode Fuzzy Hash: 2cec4745ef6fefe85ab0858804411c6ec37aad5e6271943d83740b5d017e3ca4
    • Instruction Fuzzy Hash: 0B218D72910666AFCB249F799C08B6E37A4EB06329F104739F936D72E1E7309D119B90
    APIs
    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00C795E2
      • Part of subcall function 00C27D2C: _memmove.LIBCMT ref: 00C27D66
    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00C79614
    • __itow.LIBCMT ref: 00C7962C
    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00C79654
    • __itow.LIBCMT ref: 00C79665
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$__itow$_memmove
    • String ID:
    • API String ID: 2983881199-0
    • Opcode ID: bd2deb2d9a03d9c3f0d00ddd898341bcecef46856a92e548236dd347770a0f78
    • Instruction ID: 3a8dca0591c95d8f88b1e9c2e444d09961622cb451616f12716dace5ccc9fda7
    • Opcode Fuzzy Hash: bd2deb2d9a03d9c3f0d00ddd898341bcecef46856a92e548236dd347770a0f78
    • Instruction Fuzzy Hash: 0421F931700218BFDB10ABA59C89FEE7BB8EF59724F048129FD08E7251E6708E419791
    APIs
    • IsWindow.USER32(00000000), ref: 00C95B84
    • GetForegroundWindow.USER32 ref: 00C95B9B
    • GetDC.USER32(00000000), ref: 00C95BD7
    • GetPixel.GDI32(00000000,?,00000003), ref: 00C95BE3
    • ReleaseDC.USER32(00000000,00000003), ref: 00C95C1E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$ForegroundPixelRelease
    • String ID:
    • API String ID: 4156661090-0
    • Opcode ID: b25642fbd6bbbd707c3a9ee51192aa1409f6778b4331ecf68cdd39c0ace452df
    • Instruction ID: 8ba8037762157afec6d55945bcc46f4bb0f4428223398b850f4144dcdd3b636d
    • Opcode Fuzzy Hash: b25642fbd6bbbd707c3a9ee51192aa1409f6778b4331ecf68cdd39c0ace452df
    • Instruction Fuzzy Hash: 2D219D75A00214EFDB10EFA5DD88BAEBBF5EF49315F048479F84A97662CA30AD01DB50
    APIs
    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00C2134D
    • SelectObject.GDI32(?,00000000), ref: 00C2135C
    • BeginPath.GDI32(?), ref: 00C21373
    • SelectObject.GDI32(?,00000000), ref: 00C2139C
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ObjectSelect$BeginCreatePath
    • String ID:
    • API String ID: 3225163088-0
    • Opcode ID: b9296c19045bc86398ec2363557773a4ea9428c8bcdde9bc83d72895b1198b49
    • Instruction ID: 6bf59548cbed5a70d174e8561cd47995c87b145f2a2b6c1c0c4d6b8a6031543d
    • Opcode Fuzzy Hash: b9296c19045bc86398ec2363557773a4ea9428c8bcdde9bc83d72895b1198b49
    • Instruction Fuzzy Hash: 82214C70840758EFDB20CF65EC8476D7BA9FB10329F18422AE8209A5F0D3B19991DF90
    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00C84B61
    • __beginthreadex.LIBCMT ref: 00C84B7F
    • MessageBoxW.USER32(?,?,?,?), ref: 00C84B94
    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00C84BAA
    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00C84BB1
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
    • String ID:
    • API String ID: 3824534824-0
    • Opcode ID: 86650bde282c93c8b96beb242630ad18aec0e4fb5db73e573f57d2f049d5a0a2
    • Instruction ID: 066e527762cbcc11ba31a834aca81e483285dd6d82a9fa6e78ee03c28e1a9753
    • Opcode Fuzzy Hash: 86650bde282c93c8b96beb242630ad18aec0e4fb5db73e573f57d2f049d5a0a2
    • Instruction Fuzzy Hash: 9011447290464ABBCB00AFA89C48BEE7FACAB45328F140269F924D3250C271CD0087A0
    APIs
    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00C78546
    • GetLastError.KERNEL32(?,00C7800A,?,?,?), ref: 00C78550
    • GetProcessHeap.KERNEL32(00000008,?,?,00C7800A,?,?,?), ref: 00C7855F
    • HeapAlloc.KERNEL32(00000000,?,00C7800A,?,?,?), ref: 00C78566
    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00C7857D
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
    • String ID:
    • API String ID: 842720411-0
    • Opcode ID: b6dbaaebfb779da06c4d4dbaa45002df96e5ea794b83260c6cd573fb3d837510
    • Instruction ID: bb086c1bda46a8fd9b8f53e9f22132c82bc2b68a99d398b5c4e71fb927591c79
    • Opcode Fuzzy Hash: b6dbaaebfb779da06c4d4dbaa45002df96e5ea794b83260c6cd573fb3d837510
    • Instruction Fuzzy Hash: 81014B71241204EFEB214FA6DC4CE6F7BACEF8A359B54452AF949C3220DA328D05CA60
    APIs
    • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C85307
    • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00C85315
    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C8531D
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00C85327
    • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C85363
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: PerformanceQuery$CounterSleep$Frequency
    • String ID:
    • API String ID: 2833360925-0
    • Opcode ID: af4e3e7c567c3a4406b00485677b6eab04736aa343cf43c434d8b2812062f583
    • Instruction ID: 73191c1428327bc8205cdb183024afa9e1ef1d5f5f171b9314f57634fd78d2a2
    • Opcode Fuzzy Hash: af4e3e7c567c3a4406b00485677b6eab04736aa343cf43c434d8b2812062f583
    • Instruction Fuzzy Hash: 72016D31C01A1DDBCF00AFE4E888BEDBBB8FB09315F050459E941F3190CBB05A5697A5
    APIs
    • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?,?,?,00C7777D), ref: 00C7744F
    • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?,?), ref: 00C7746A
    • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?,?), ref: 00C77478
    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?), ref: 00C77488
    • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00C7736C,80070057,?,?), ref: 00C77494
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: From$Prog$FreeStringTasklstrcmpi
    • String ID:
    • API String ID: 3897988419-0
    • Opcode ID: 14f1eaebf4defd82ee78e519120065bc4ec7526f010b6f0ccf281f30368e2413
    • Instruction ID: fbedb5da33f90107349f3891b8b6ecba9e4a4c5d4149140c48b85bcf810be5b7
    • Opcode Fuzzy Hash: 14f1eaebf4defd82ee78e519120065bc4ec7526f010b6f0ccf281f30368e2413
    • Instruction Fuzzy Hash: 93017176601308BBDB105F65DC48BAE7FADEB45756F148228F908D3220D775DD419FA0
    APIs
    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00C783E8
    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00C783F2
    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00C78401
    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00C78408
    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00C7841E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: HeapInformationToken$AllocErrorLastProcess
    • String ID:
    • API String ID: 44706859-0
    • Opcode ID: c8f01ff8c59f355aa19f6095312d9a24e99c2e24ee6cd8cbbe97cde2df3861af
    • Instruction ID: be22038e014aeb7cf2091d43bf03f47fdc43da327609f0815d650c87be7e65f3
    • Opcode Fuzzy Hash: c8f01ff8c59f355aa19f6095312d9a24e99c2e24ee6cd8cbbe97cde2df3861af
    • Instruction Fuzzy Hash: 02F0AF30244205AFEB101FA4DC9CFAF3BACEF8A759B008029FA49C3150CBB0DC46DA60
    APIs
    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C78449
    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C78453
    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C78462
    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C78469
    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C7847F
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: HeapInformationToken$AllocErrorLastProcess
    • String ID:
    • API String ID: 44706859-0
    • Opcode ID: f00b78b506d0d391da10f1efdbefd6f5e5c99693bfb8e818979f451ad6ddd0a2
    • Instruction ID: 8e5eaba439decf50feb9aa870ae59923388d1d4b9ee5f93eb3335e2925f59389
    • Opcode Fuzzy Hash: f00b78b506d0d391da10f1efdbefd6f5e5c99693bfb8e818979f451ad6ddd0a2
    • Instruction Fuzzy Hash: D7F0A430240305AFDB211FA5DC9CF6F3BACEF46759B444029FA49C3150CBB09905DA60
    APIs
    • GetDlgItem.USER32(?,000003E9), ref: 00C7C4B9
    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00C7C4D0
    • MessageBeep.USER32(00000000), ref: 00C7C4E8
    • KillTimer.USER32(?,0000040A), ref: 00C7C504
    • EndDialog.USER32(?,00000001), ref: 00C7C51E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BeepDialogItemKillMessageTextTimerWindow
    • String ID:
    • API String ID: 3741023627-0
    • Opcode ID: 709531afe56f91e621917088b6db45cc6e4c1935afac418f04eaa0d0060e205d
    • Instruction ID: a1dc1411c75b19142554ab5225d6b9022a754a7d5dd76884b0b5bbc2f96ab653
    • Opcode Fuzzy Hash: 709531afe56f91e621917088b6db45cc6e4c1935afac418f04eaa0d0060e205d
    • Instruction Fuzzy Hash: AF01D630400705ABEB215F60DC8EFAA77B8FF01709F04866DF596A20E1DBF16A458B80
    APIs
    • EndPath.GDI32(?), ref: 00C213BF
    • StrokeAndFillPath.GDI32(?,?,00C5BA08,00000000,?), ref: 00C213DB
    • SelectObject.GDI32(?,00000000), ref: 00C213EE
    • DeleteObject.GDI32 ref: 00C21401
    • StrokePath.GDI32(?), ref: 00C2141C
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Path$ObjectStroke$DeleteFillSelect
    • String ID:
    • API String ID: 2625713937-0
    • Opcode ID: cd9abeb051d6a7a2ff083317343b0f3e59d9616625cf4b6f0bf93064ac74de8a
    • Instruction ID: fb2f8412dd081b320558e4669da2fa8f71c476d666445cff28d055ca6e4e33aa
    • Opcode Fuzzy Hash: cd9abeb051d6a7a2ff083317343b0f3e59d9616625cf4b6f0bf93064ac74de8a
    • Instruction Fuzzy Hash: EDF0EC30044B48EBDB255F6AEC8C75C3FA5AB1132AF0C8228E9698D4F1C7714996DF50
    APIs
    • CoInitialize.OLE32(00000000), ref: 00C8C4BE
    • CoCreateInstance.OLE32(00CB2D6C,00000000,00000001,00CB2BDC,?), ref: 00C8C4D6
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
    • CoUninitialize.OLE32 ref: 00C8C743
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CreateInitializeInstanceUninitialize_memmove
    • String ID: .lnk
    • API String ID: 2683427295-24824748
    • Opcode ID: 7d3f401b7f0decede1bb46c2270abf976f272590e96ba003a28e9c60a2815383
    • Instruction ID: abb13a0a87ad24349118e2b70219ec056380bf6e9d560823a747789a9bc55bb9
    • Opcode Fuzzy Hash: 7d3f401b7f0decede1bb46c2270abf976f272590e96ba003a28e9c60a2815383
    • Instruction Fuzzy Hash: 31A13C71108315AFD700EF64D8D1EABB7E8EF89704F00491CF156971A2DB70EA49DB62
    APIs
      • Part of subcall function 00C40F36: std::exception::exception.LIBCMT ref: 00C40F6C
      • Part of subcall function 00C40F36: __CxxThrowException@8.LIBCMT ref: 00C40F81
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00C27BB1: _memmove.LIBCMT ref: 00C27C0B
    • __swprintf.LIBCMT ref: 00C3302D
    Strings
    • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00C32EC6
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
    • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
    • API String ID: 1943609520-557222456
    • Opcode ID: c41ee290d2c75c992c35c0623eb39ee05af34e16c94e9507d938b5d7463f3f8c
    • Instruction ID: 60cca57bb8e5a46f9a3d4729f801bb5fcaac6ba60ff006d02cb1e48c38574681
    • Opcode Fuzzy Hash: c41ee290d2c75c992c35c0623eb39ee05af34e16c94e9507d938b5d7463f3f8c
    • Instruction Fuzzy Hash: 80916C711182519FCB28EF64D8D6C6FB7A4EF85710F00491DF8969B2A1DB30EE44DB92
    APIs
      • Part of subcall function 00C248AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00C248A1,?,?,00C237C0,?), ref: 00C248CE
    • CoInitialize.OLE32(00000000), ref: 00C8BA47
    • CoCreateInstance.OLE32(00CB2D6C,00000000,00000001,00CB2BDC,?), ref: 00C8BA60
    • CoUninitialize.OLE32 ref: 00C8BA7D
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
    • String ID: .lnk
    • API String ID: 2126378814-24824748
    • Opcode ID: 94fa74403c868d4b2f3035f434d2952bfc38c03a9333be0c1becc2bb69ace92c
    • Instruction ID: 6dd21406fd5731032ccf9e57373bb9765d27c9c8b4c33fadfa4b49b246dac796
    • Opcode Fuzzy Hash: 94fa74403c868d4b2f3035f434d2952bfc38c03a9333be0c1becc2bb69ace92c
    • Instruction Fuzzy Hash: ADA168756043119FCB10EF14C894E6ABBE5FF89318F148998F89A9B3A1CB31ED45CB91
    APIs
    • __startOneArgErrorHandling.LIBCMT ref: 00C4521D
      • Part of subcall function 00C50270: __87except.LIBCMT ref: 00C502AB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorHandling__87except__start
    • String ID: pow
    • API String ID: 2905807303-2276729525
    • Opcode ID: ee83e2d3b85d1723a8e2e3c56a03dcaca86ff59ed84992f476bb9a38adb46522
    • Instruction ID: 302fe19e1e58e25e2b258d9e226649a3252012073d31b91427285ceac6160225
    • Opcode Fuzzy Hash: ee83e2d3b85d1723a8e2e3c56a03dcaca86ff59ed84992f476bb9a38adb46522
    • Instruction Fuzzy Hash: A8514A65A0C60197DB216B14C94137E3B94BB40712F344A59E8A5C61F7EB748ECCA64A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID: #$+
    • API String ID: 0-2552117581
    • Opcode ID: e56414366d28a2ff3f3baf6492a7a1d457975c8a4ed0dfbc8c31917174d78cb5
    • Instruction ID: 37a4eb4a403aa5714282ad58a08ed97fc46774572c731070f85c4771186137f4
    • Opcode Fuzzy Hash: e56414366d28a2ff3f3baf6492a7a1d457975c8a4ed0dfbc8c31917174d78cb5
    • Instruction Fuzzy Hash: 09512135504256DFCF25DF28C485AFA7BA4FF1A310F288055ECA59B2E0C7B0AE42D760
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memset$_memmove
    • String ID: ERCP
    • API String ID: 2532777613-1384759551
    • Opcode ID: c59e393511829305f37923d9c6bc0a320dee0a3188490e9068dc2ab75e47e224
    • Instruction ID: 71f6b386e5ae6be1d21f82dea6897c2134f4f4f611c106fd229f2ace69099817
    • Opcode Fuzzy Hash: c59e393511829305f37923d9c6bc0a320dee0a3188490e9068dc2ab75e47e224
    • Instruction Fuzzy Hash: 2C517E71910309EBDB24CF65C9817AAB7F4FF04714F24C56EE95ACB251E771AA84CB40
    APIs
      • Part of subcall function 00C817ED: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C79558,?,?,00000034,00000800,?,00000034), ref: 00C81817
    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00C79B01
      • Part of subcall function 00C817B8: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00C79587,?,?,00000800,?,00001073,00000000,?,?), ref: 00C817E2
      • Part of subcall function 00C8170F: GetWindowThreadProcessId.USER32(?,?), ref: 00C8173A
      • Part of subcall function 00C8170F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00C7951C,00000034,?,?,00001004,00000000,00000000), ref: 00C8174A
      • Part of subcall function 00C8170F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00C7951C,00000034,?,?,00001004,00000000,00000000), ref: 00C81760
    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C79B6E
    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00C79BBB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
    • String ID: @
    • API String ID: 4150878124-2766056989
    • Opcode ID: 96bf03aad90ff834928cbdd08ef37577aa4e16da956ef9d8f4c1ff80c675371a
    • Instruction ID: af6949e9c7a5a7a97a834f3b27aea1f84700ab648b06ecae610362a87d770625
    • Opcode Fuzzy Hash: 96bf03aad90ff834928cbdd08ef37577aa4e16da956ef9d8f4c1ff80c675371a
    • Instruction Fuzzy Hash: 48414E7690021CBFDB10EFA4CC85BDEBBB8EB09704F148099F955B7190DA716E45DBA0
    APIs
    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00CAF910,00000000,?,?,?,?), ref: 00CA7A11
    • GetWindowLongW.USER32 ref: 00CA7A2E
    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00CA7A3E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$Long
    • String ID: SysTreeView32
    • API String ID: 847901565-1698111956
    • Opcode ID: dc2204e11ec91d7f961b53587f3e2ae0c97ed33c3ce306337bcb5813ed3925c7
    • Instruction ID: 87006f6cb106630cf4e765c7d86cf2caa72662871388a380be18738c770e6267
    • Opcode Fuzzy Hash: dc2204e11ec91d7f961b53587f3e2ae0c97ed33c3ce306337bcb5813ed3925c7
    • Instruction Fuzzy Hash: 8331BE32604606ABDB219F38DC41BEB77A9FB0A328F244725F875931E0C730EE519B50
    APIs
    • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00CA7493
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00CA74A7
    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00CA74CB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$Window
    • String ID: SysMonthCal32
    • API String ID: 2326795674-1439706946
    • Opcode ID: 6613a7ccc59d92d94a4a1fa148573e11daac38117b74ed93548e4b19ce1d23e8
    • Instruction ID: db1e676413aac29fc2a6b404b47b21db726d1654df011c8073fdeb72efd69880
    • Opcode Fuzzy Hash: 6613a7ccc59d92d94a4a1fa148573e11daac38117b74ed93548e4b19ce1d23e8
    • Instruction Fuzzy Hash: 4921DE32600219BBDF228F90DC86FEA3B79FF4D728F110214FE146B190D6B5A851DBA0
    APIs
    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00CA7C7C
    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00CA7C8A
    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00CA7C91
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$DestroyWindow
    • String ID: msctls_updown32
    • API String ID: 4014797782-2298589950
    • Opcode ID: 882e4b6d77b862894a012b3e130610da303d6cdc2945081736ef3b3183ba529b
    • Instruction ID: a2cba607c2978c1456582f1e623a1f84e7f98bbb29a63540fb57002bbef983b9
    • Opcode Fuzzy Hash: 882e4b6d77b862894a012b3e130610da303d6cdc2945081736ef3b3183ba529b
    • Instruction Fuzzy Hash: 4D21AEB560020AAFDB10DF54DCC1EAB37EDFF4A368B040559FA119B2A1CB30ED419BA0
    APIs
    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00CA6D6D
    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00CA6D7D
    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00CA6DA2
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend$MoveWindow
    • String ID: Listbox
    • API String ID: 3315199576-2633736733
    • Opcode ID: c88ae7df623fbd3257f4e58d59647edd2ce8ba15ba9ddf33d63f3b6c5607cabc
    • Instruction ID: 867f50a6544ac277046e6c4ecaf923c81a17e262b10dbc2238660d39823a7b6c
    • Opcode Fuzzy Hash: c88ae7df623fbd3257f4e58d59647edd2ce8ba15ba9ddf33d63f3b6c5607cabc
    • Instruction Fuzzy Hash: 46210732B10119BFDF128F54DC84FBB3B7AEF8A758F058124F9159B190C6719C1197A0
    APIs
    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00CA77A4
    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00CA77B9
    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00CA77C6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: msctls_trackbar32
    • API String ID: 3850602802-1010561917
    • Opcode ID: 3eb196326ad828f626ed81d779602d3e940d2e55fdab18d69fc369eecf44e88f
    • Instruction ID: ee7e91f4bf16d6a05ace36e3dc89cfb7a0d51fa4bf770e681a21021537935698
    • Opcode Fuzzy Hash: 3eb196326ad828f626ed81d779602d3e940d2e55fdab18d69fc369eecf44e88f
    • Instruction Fuzzy Hash: CC11E732654209BBEF155F60CC45FEB37A9EF89718F010218FA51960D1D671A811DB20
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,?,00C24C2E), ref: 00C24CA3
    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00C24CB5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetNativeSystemInfo$kernel32.dll
    • API String ID: 2574300362-192647395
    • Opcode ID: e4b8e4016f118a31ca36f31296e755224581d09d59c7dad19705c022826c0a10
    • Instruction ID: c4d2a5482808ff0e1a7fb4273425e3ec7c747407ef54e3e8bd413d96f6dac5ae
    • Opcode Fuzzy Hash: e4b8e4016f118a31ca36f31296e755224581d09d59c7dad19705c022826c0a10
    • Instruction Fuzzy Hash: 46D0C770600323CFC7209FB4EA0870AB2E4AF02788B10883ED892C2550E670C881CA20
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,?,00C24CE1,?), ref: 00C24DA2
    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00C24DB4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
    • API String ID: 2574300362-1355242751
    • Opcode ID: 3520c98b34e8bb134650ae26171c89df89ce0ba4eb40bd2722bd03fef53a99c0
    • Instruction ID: 3616cc9c307e229209d64f792063f0411d2d339805a8a64aa0f20af373937e3e
    • Opcode Fuzzy Hash: 3520c98b34e8bb134650ae26171c89df89ce0ba4eb40bd2722bd03fef53a99c0
    • Instruction Fuzzy Hash: 9ED01731550723CFD7209FB1E848B8A76E4AF06359F11883ED9D6D6660E770D881CA60
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,?,00C24D2E,?,00C24F4F,?,00CE52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00C24D6F
    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00C24D81
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
    • API String ID: 2574300362-3689287502
    • Opcode ID: fe8843ccd11d1a25c91bde023815b105fbce53b3ece45d8f540e9882dec18ea5
    • Instruction ID: 479ab0e86358b68a3fd72e6ba860d791ddd6a29719c70f7070f17658ed99331e
    • Opcode Fuzzy Hash: fe8843ccd11d1a25c91bde023815b105fbce53b3ece45d8f540e9882dec18ea5
    • Instruction Fuzzy Hash: 15D01731510723CFD7209FB1E84875A76E8AF16356F11893ED596D6660E670D882CB60
    APIs
    • LoadLibraryA.KERNEL32(advapi32.dll,?,00CA10C1), ref: 00CA0E80
    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00CA0E92
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: RegDeleteKeyExW$advapi32.dll
    • API String ID: 2574300362-4033151799
    • Opcode ID: 20200f4592942d055c0211047b9175f5bad5090d2636fe9f9d8a2a3c115bb738
    • Instruction ID: 6817fcd96bf78526361a7974fc8627f74aa96044cb4f1eddbdf2b4198ddab62b
    • Opcode Fuzzy Hash: 20200f4592942d055c0211047b9175f5bad5090d2636fe9f9d8a2a3c115bb738
    • Instruction Fuzzy Hash: E5D01775510B23CFD7209FB5D94878AB6E4AF0639AB218C7EE6DAD2250E670D880CA50
    APIs
    • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00C98E09,?,00CAF910), ref: 00C99203
    • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00C99215
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: GetModuleHandleExW$kernel32.dll
    • API String ID: 2574300362-199464113
    • Opcode ID: 6e4ea38fb3f1cc36b2ebcaeaed70f37f3e32b30c9e389b50cc170b17ef80f41d
    • Instruction ID: e48a79418423a802168e4d7117a74c4bb085cb974101ff31b65563d9979ebd75
    • Opcode Fuzzy Hash: 6e4ea38fb3f1cc36b2ebcaeaed70f37f3e32b30c9e389b50cc170b17ef80f41d
    • Instruction Fuzzy Hash: 4BD0C730550B13DFCB309FB5DC0830A72E5AF12345B008C3ED992CA290EA70C880CB20
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: LocalTime__swprintf
    • String ID: %.3d$WIN_XPe
    • API String ID: 2070861257-2409531811
    • Opcode ID: 2ebc1aed047176ce8845588f53652caacbbc7b3892eacd73014e7c4e9acea112
    • Instruction ID: 749bc367e45ea95da05f16331b07cb14e1d88d97417d2acc2d4c3ac4d3e913ed
    • Opcode Fuzzy Hash: 2ebc1aed047176ce8845588f53652caacbbc7b3892eacd73014e7c4e9acea112
    • Instruction Fuzzy Hash: 00D01771C15129EACB20DBD288C5AFE73BCEB08702F1C4562F906A2081E2358B84BA21
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4a3534aaa0e0223afe2a532fded7decd7fd4b3e56efc1b6021aa51a7bd0eece4
    • Instruction ID: 14503ec5fab4ce68c1cd9747a3f4d508dd41863dc494d93ae1552d194c6bcd77
    • Opcode Fuzzy Hash: 4a3534aaa0e0223afe2a532fded7decd7fd4b3e56efc1b6021aa51a7bd0eece4
    • Instruction Fuzzy Hash: 95C18575A0421AEFCB15CF98C884E6EB7F9FF48714B118698E819DB251D730DE81DB90
    APIs
    • CharLowerBuffW.USER32(?,?), ref: 00C9E1D2
    • CharLowerBuffW.USER32(?,?), ref: 00C9E215
      • Part of subcall function 00C9D8B9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00C9D8D9
    • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00C9E415
    • _memmove.LIBCMT ref: 00C9E428
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: BuffCharLower$AllocVirtual_memmove
    • String ID:
    • API String ID: 3659485706-0
    • Opcode ID: 66d286890b9010bd6c23959fcdc1c12acb3f538237a8b93f9870c56882e3ba38
    • Instruction ID: 58d60ef3f4dc36084c151f46be4c9aa444a97025035a41e54da43ada754c3d97
    • Opcode Fuzzy Hash: 66d286890b9010bd6c23959fcdc1c12acb3f538237a8b93f9870c56882e3ba38
    • Instruction Fuzzy Hash: 18C16A71A08311DFCB04DF28C48496ABBE4FF99714F14896EF8999B351D731EA46CB82
    APIs
    • CoInitialize.OLE32(00000000), ref: 00C981D8
    • CoUninitialize.OLE32 ref: 00C981E3
      • Part of subcall function 00C7D87B: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00C7D8E3
    • VariantInit.OLEAUT32(?), ref: 00C981EE
    • VariantClear.OLEAUT32(?), ref: 00C984BF
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
    • String ID:
    • API String ID: 780911581-0
    • Opcode ID: 81b8f405a7b57708becce1722268b5a4db07a33a133e08369f539da36bf76952
    • Instruction ID: d9ae2be6d52b42d1b07b1f167e49831a3e37eb0c7a41aeecc14d0f533e3e8550
    • Opcode Fuzzy Hash: 81b8f405a7b57708becce1722268b5a4db07a33a133e08369f539da36bf76952
    • Instruction Fuzzy Hash: C5A135752047119FDB10EF24C495A2AB7E4FF89724F14884CF99A9B7A2CB30ED44DB86
    APIs
    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00CB2C7C,?), ref: 00C77A12
    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00CB2C7C,?), ref: 00C77A2A
    • CLSIDFromProgID.OLE32(?,?,00000000,00CAFB80,000000FF,?,00000000,00000800,00000000,?,00CB2C7C,?), ref: 00C77A4F
    • _memcmp.LIBCMT ref: 00C77A70
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FromProg$FreeTask_memcmp
    • String ID:
    • API String ID: 314563124-0
    • Opcode ID: 1102b7151444b9dbfa6cda0c9491f10e37d6388be38f8618fdb18a5358b402f8
    • Instruction ID: bfb350d0793849e9c4e299e956197bc0a4864eba94907251117658302248f9c9
    • Opcode Fuzzy Hash: 1102b7151444b9dbfa6cda0c9491f10e37d6388be38f8618fdb18a5358b402f8
    • Instruction Fuzzy Hash: F0811C71A00109EFCB04DFD4C988EEEB7B9FF89315F208599E515AB250DB71AE46CB60
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Variant$AllocClearCopyInitString
    • String ID:
    • API String ID: 2808897238-0
    • Opcode ID: 10f5a44919d6a3449ac382e33e3ed24825fba9af282ecf8abbc3af46c9892ed9
    • Instruction ID: 2110fe4291ec2487799a6d350e1eb8d39d1a6df38b19af3c9eaa8bc386815b43
    • Opcode Fuzzy Hash: 10f5a44919d6a3449ac382e33e3ed24825fba9af282ecf8abbc3af46c9892ed9
    • Instruction Fuzzy Hash: 7751B330714B029BDB30AF76D891A6DB3E5EF15310F20C82FE5AECB691DA708841A715
    APIs
    • GetWindowRect.USER32(?,?), ref: 00CA9895
    • ScreenToClient.USER32(00000002,00000002), ref: 00CA98C8
    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00CA9935
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$ClientMoveRectScreen
    • String ID:
    • API String ID: 3880355969-0
    • Opcode ID: 08a7665d72e1e730d2eb744f58571afc95f898dffc3e5c3115e210a83c4a9a96
    • Instruction ID: d00d7edecbb1d8f3d2cb0454e0cfb7b4a40d6f49d5d8c6ed0a82c8d73e27d842
    • Opcode Fuzzy Hash: 08a7665d72e1e730d2eb744f58571afc95f898dffc3e5c3115e210a83c4a9a96
    • Instruction Fuzzy Hash: C1514335900209EFCF24DF64D885AAE7BB5FF86364F14815DF8699B2A0D731AE41CB90
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
    • String ID:
    • API String ID: 2782032738-0
    • Opcode ID: 9d32a0cca31c7bb2b15b74915ad5c68f9b5270e2a37dcfa491c5b6f8e1a60b1a
    • Instruction ID: c454216c4a5dff55f4d72abeabeeb70d6690b3102565907620558e0bd2528607
    • Opcode Fuzzy Hash: 9d32a0cca31c7bb2b15b74915ad5c68f9b5270e2a37dcfa491c5b6f8e1a60b1a
    • Instruction Fuzzy Hash: 22410731A047459BDB1CCEA9C881B6F7BA9BF50360B34853DE865D7680D770DE40AB40
    APIs
    • socket.WSOCK32(00000002,00000002,00000011), ref: 00C96AE7
    • WSAGetLastError.WSOCK32(00000000), ref: 00C96AF7
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00C96B5B
    • WSAGetLastError.WSOCK32(00000000), ref: 00C96B67
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ErrorLast$__itow__swprintfsocket
    • String ID:
    • API String ID: 2214342067-0
    • Opcode ID: 51494cdf4e491b58078df0d3275745a2b5476ad8b775a83f97485a08ccf636e5
    • Instruction ID: 19db38f6d7478090d0d9cae36bb7c245e38bac4c2a4b3e07457946b92ecea673
    • Opcode Fuzzy Hash: 51494cdf4e491b58078df0d3275745a2b5476ad8b775a83f97485a08ccf636e5
    • Instruction Fuzzy Hash: D641B434740210AFEB20AF64EC87F3E77E9EF05B14F048418FA599B6D2DA749D01AB91
    APIs
    • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00CAF910), ref: 00C965BD
    • _strlen.LIBCMT ref: 00C965EF
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _strlen
    • String ID:
    • API String ID: 4218353326-0
    • Opcode ID: 64ea02ea6214a5a643716feb5fad9afb93c3088da7c1971284b4e20de228c490
    • Instruction ID: 842f53062e09f3937e96fe5971843aecf4c1aa3111974850e02ec318c171faec
    • Opcode Fuzzy Hash: 64ea02ea6214a5a643716feb5fad9afb93c3088da7c1971284b4e20de228c490
    • Instruction Fuzzy Hash: 9941B131A00114ABCF14EBA4EDD9EBEB7A9EF44310F148169F81A972D2DB30AE05DB51
    APIs
    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00C8B92A
    • GetLastError.KERNEL32(?,00000000), ref: 00C8B950
    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00C8B975
    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00C8B9A1
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CreateHardLink$DeleteErrorFileLast
    • String ID:
    • API String ID: 3321077145-0
    • Opcode ID: f2a93f90386ea20d5cf48cc470608c6940025a88ac3ea55640185524eb306edf
    • Instruction ID: f49762ef773150a295a4afc5c4dceae00f4ff2470aa31358fddc5c921dcada27
    • Opcode Fuzzy Hash: f2a93f90386ea20d5cf48cc470608c6940025a88ac3ea55640185524eb306edf
    • Instruction Fuzzy Hash: CB413839600620DFCB10EF15D485A5DBBF1EF89324F098498E89A9B762CB31FD41EB95
    APIs
    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00CA8910
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: InvalidateRect
    • String ID:
    • API String ID: 634782764-0
    • Opcode ID: a9a8d29b726e7ea77c94ea1890e89490e5e588e89a0c95d1aa05735aadee1230
    • Instruction ID: ec6da1081547a0263fe3fe6238075d346920a01d3fffb949ccb4257ab5f8f984
    • Opcode Fuzzy Hash: a9a8d29b726e7ea77c94ea1890e89490e5e588e89a0c95d1aa05735aadee1230
    • Instruction Fuzzy Hash: 4E31F23060020ABFEF249E64CC89BBE7765EB07318F544115FA61E72E1CF349A889B42
    APIs
    • ClientToScreen.USER32(?,?), ref: 00CAAB92
    • GetWindowRect.USER32(?,?), ref: 00CAAC08
    • PtInRect.USER32(?,?,00CAC07E), ref: 00CAAC18
    • MessageBeep.USER32(00000000), ref: 00CAAC89
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Rect$BeepClientMessageScreenWindow
    • String ID:
    • API String ID: 1352109105-0
    • Opcode ID: 460dfd440483778b478b201f3ae130b3b5c280f0b7ce5f1d282d2947096e85b0
    • Instruction ID: 277b4daeabb655e8608985b20c1bf49357c2f7ecaf2c0b00dd73f2b82d32cda4
    • Opcode Fuzzy Hash: 460dfd440483778b478b201f3ae130b3b5c280f0b7ce5f1d282d2947096e85b0
    • Instruction Fuzzy Hash: 95418D30640256DFEB21CF58C8C4B9D7BF5FB4A32CF1480A9E4258F261D732A945CB92
    APIs
    • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00C80E58
    • SetKeyboardState.USER32(00000080,?,00000001), ref: 00C80E74
    • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00C80EDA
    • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00C80F2C
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: KeyboardState$InputMessagePostSend
    • String ID:
    • API String ID: 432972143-0
    • Opcode ID: be68286aa48c8a0c8a95af6098c212363b813dc5cad3c9af50db2bd4b56f2dad
    • Instruction ID: 81d1e3aba16a3f60b190d7c89ea1d492f7bb0b0d99f2fc14bd4194b3c82f85c7
    • Opcode Fuzzy Hash: be68286aa48c8a0c8a95af6098c212363b813dc5cad3c9af50db2bd4b56f2dad
    • Instruction Fuzzy Hash: D4316830A40618AEFB70AA658C05BFF7BA9EB49318F38461EF4E0521D1C3758A499759
    APIs
    • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00C80F97
    • SetKeyboardState.USER32(00000080,?,00008000), ref: 00C80FB3
    • PostMessageW.USER32(00000000,00000101,00000000), ref: 00C81012
    • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00C81064
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: KeyboardState$InputMessagePostSend
    • String ID:
    • API String ID: 432972143-0
    • Opcode ID: a8f346beae4cc13a7a87e38d14ca8739691aec7eca168b25414c24fe09711cb1
    • Instruction ID: 9a08ca55600c454a6b6c9d06bd57850463e8f4537c1d44911ccfa88f234ab4f2
    • Opcode Fuzzy Hash: a8f346beae4cc13a7a87e38d14ca8739691aec7eca168b25414c24fe09711cb1
    • Instruction Fuzzy Hash: 4B315C30904298DEFF34AA658C04BFE7BEDAB45329F1C421AF8A1521D1C3744EC79769
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00C5637B
    • __isleadbyte_l.LIBCMT ref: 00C563A9
    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00C563D7
    • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00C5640D
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
    • String ID:
    • API String ID: 3058430110-0
    • Opcode ID: b84b11b587fd03b80972eea086d670b17eeaec8715d8941674870e259aa1b7ed
    • Instruction ID: da569c0e59131cdba7d158f3ab06277efac8e997e3d80bd1d97606899e431137
    • Opcode Fuzzy Hash: b84b11b587fd03b80972eea086d670b17eeaec8715d8941674870e259aa1b7ed
    • Instruction Fuzzy Hash: E431C135600286EFDB21CF65C844BAE7BA5FF41322F554129EC24871A0E730DD98EB94
    APIs
    • GetForegroundWindow.USER32 ref: 00CA4F6B
      • Part of subcall function 00C83685: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00C8369F
      • Part of subcall function 00C83685: GetCurrentThreadId.KERNEL32 ref: 00C836A6
      • Part of subcall function 00C83685: AttachThreadInput.USER32(00000000,?,00C850AC), ref: 00C836AD
    • GetCaretPos.USER32(?), ref: 00CA4F7C
    • ClientToScreen.USER32(00000000,?), ref: 00CA4FB7
    • GetForegroundWindow.USER32 ref: 00CA4FBD
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
    • String ID:
    • API String ID: 2759813231-0
    • Opcode ID: f719f293c9a4e3e0ca706a2a112ce0f80f333096b4d746864a6c966b042b921c
    • Instruction ID: 03d50658b6f8496b464c41bd03440dec92abccc8aedd53cf23df73891ce260a1
    • Opcode Fuzzy Hash: f719f293c9a4e3e0ca706a2a112ce0f80f333096b4d746864a6c966b042b921c
    • Instruction Fuzzy Hash: 01313E71D00218AFDB00EFA5D885AEFB7F9EF89304F10406AE515E7241EA759E41DBA1
    APIs
    • CreateToolhelp32Snapshot.KERNEL32 ref: 00C83CBE
    • Process32FirstW.KERNEL32(00000000,?), ref: 00C83CCC
    • Process32NextW.KERNEL32(00000000,?), ref: 00C83CEC
    • CloseHandle.KERNEL32(00000000), ref: 00C83D96
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
    • String ID:
    • API String ID: 420147892-0
    • Opcode ID: 360bd4af1733486df064d25c883fc97ef846292c6e7cc1f10a7ea1178a8439f8
    • Instruction ID: 1d9eb06210f287c1d39ab2e3fd7ad2ccc8b444d38bc847ee543dca3bde54921d
    • Opcode Fuzzy Hash: 360bd4af1733486df064d25c883fc97ef846292c6e7cc1f10a7ea1178a8439f8
    • Instruction Fuzzy Hash: 4D31B4711083419FD300EF50D8C5BAFBBE8EF95748F14092EF591871A1EB709A49DB92
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • GetCursorPos.USER32(?), ref: 00CAC53C
    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00C5BB2B,?,?,?,?,?), ref: 00CAC551
    • GetCursorPos.USER32(?), ref: 00CAC59E
    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00C5BB2B,?,?,?), ref: 00CAC5D8
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Cursor$LongMenuPopupProcTrackWindow
    • String ID:
    • API String ID: 2864067406-0
    • Opcode ID: 2f371a6ffa74e5c147f150bbea52013c81b81ddfa2f2548ff0b9f8396f3ff5f1
    • Instruction ID: 9697ff1826ab5441e05e6fcdc3ec9aac374588a51acfd9b4a22807c3aceb9b67
    • Opcode Fuzzy Hash: 2f371a6ffa74e5c147f150bbea52013c81b81ddfa2f2548ff0b9f8396f3ff5f1
    • Instruction Fuzzy Hash: 87315536900418EFCB25CF95C898FAE7BF5EB4A314F444069F9158B261D731AE51EBA0
    APIs
      • Part of subcall function 00C78432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00C78449
      • Part of subcall function 00C78432: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00C78453
      • Part of subcall function 00C78432: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C78462
      • Part of subcall function 00C78432: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00C78469
      • Part of subcall function 00C78432: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00C7847F
    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00C789CB
    • _memcmp.LIBCMT ref: 00C789EE
    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C78A24
    • HeapFree.KERNEL32(00000000), ref: 00C78A2B
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
    • String ID:
    • API String ID: 1592001646-0
    • Opcode ID: 8386e444bd89dc6018327db9508fb0837fd77199f823071200fee3553cbe07b5
    • Instruction ID: e5eba83baf947ecaaecdb2d2554a362b15178d6e1930e38a91ca4d0c85f3423c
    • Opcode Fuzzy Hash: 8386e444bd89dc6018327db9508fb0837fd77199f823071200fee3553cbe07b5
    • Instruction Fuzzy Hash: 70219071E80109EFDB10DFA4C949BEEB7B8FF44355F158059EA68A7240DB30AA09DF51
    APIs
    • __setmode.LIBCMT ref: 00C40B2E
      • Part of subcall function 00C25B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C8793F,?,?,00000000), ref: 00C25B8C
      • Part of subcall function 00C25B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C8793F,?,?,00000000,?,?), ref: 00C25BB0
    • _fprintf.LIBCMT ref: 00C40B65
    • OutputDebugStringW.KERNEL32(?), ref: 00C76111
      • Part of subcall function 00C44C1A: _flsall.LIBCMT ref: 00C44C33
    • __setmode.LIBCMT ref: 00C40B9A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
    • String ID:
    • API String ID: 521402451-0
    • Opcode ID: 81d692cf7f9f3a169c7e8f09359701386d9acb0ba30d9499c95b35f9ab7c6016
    • Instruction ID: 1fb1f6879016f5e958ab0596d733231ae7ebe3cdf92e4688aaa59b66670dee5e
    • Opcode Fuzzy Hash: 81d692cf7f9f3a169c7e8f09359701386d9acb0ba30d9499c95b35f9ab7c6016
    • Instruction Fuzzy Hash: AE113A329046147FDB08B7B4AC43ABE7B6DFF41324F344119F218971C2DE3149456799
    APIs
    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00C918B9
      • Part of subcall function 00C91943: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00C91962
      • Part of subcall function 00C91943: InternetCloseHandle.WININET(00000000), ref: 00C919FF
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Internet$CloseConnectHandleOpen
    • String ID:
    • API String ID: 1463438336-0
    • Opcode ID: d449f0ec165e697f0e93f4dca93d2653f42cedb386fbfab1416ea1cb8122c4d5
    • Instruction ID: feb9ec0428a5ff8b2c8b51b1160b6c9705ceab53ebfa64300480055d499a3563
    • Opcode Fuzzy Hash: d449f0ec165e697f0e93f4dca93d2653f42cedb386fbfab1416ea1cb8122c4d5
    • Instruction Fuzzy Hash: F1210135200606BFEF119F608C1AF7AB7A9FF49700F09402AFE51D6690CB31D912A790
    APIs
    • GetFileAttributesW.KERNEL32(?,00CAFAC0), ref: 00C83AA8
    • GetLastError.KERNEL32 ref: 00C83AB7
    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00C83AC6
    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00CAFAC0), ref: 00C83B23
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CreateDirectory$AttributesErrorFileLast
    • String ID:
    • API String ID: 2267087916-0
    • Opcode ID: fa80955f48726eaceead4445a2dac8e672e86ecd0aa71387a6558c3c612e7b9e
    • Instruction ID: 22414eb41f7cb601a03d4a897bde925ff6537ce4f0387da40e09be7568014f91
    • Opcode Fuzzy Hash: fa80955f48726eaceead4445a2dac8e672e86ecd0aa71387a6558c3c612e7b9e
    • Instruction Fuzzy Hash: 1621E7705093518F8710EF64D8809AFB7E4EE06B18F144A2DF4A9C72A1D730DF06DB86
    APIs
    • _free.LIBCMT ref: 00C55281
      • Part of subcall function 00C4588C: __FF_MSGBANNER.LIBCMT ref: 00C458A3
      • Part of subcall function 00C4588C: __NMSG_WRITE.LIBCMT ref: 00C458AA
      • Part of subcall function 00C4588C: RtlAllocateHeap.NTDLL(01520000,00000000,00000001,00000000,?,?,?,00C40F53,?), ref: 00C458CF
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: AllocateHeap_free
    • String ID:
    • API String ID: 614378929-0
    • Opcode ID: db5fc1c3ceafc88d91cb53c4b2841167f0021f05957204cd83a8a07a5ddadec0
    • Instruction ID: 6b6c4be819aeecb12bbfdae36d935b54b23a5b23f94f09be459ab56de5f60300
    • Opcode Fuzzy Hash: db5fc1c3ceafc88d91cb53c4b2841167f0021f05957204cd83a8a07a5ddadec0
    • Instruction Fuzzy Hash: EA110636902A15AFCF203FB0AC5575E3B98BF013A2F204529FD549B161DF348EC9A799
    APIs
    • _memset.LIBCMT ref: 00C24560
      • Part of subcall function 00C2410D: _memset.LIBCMT ref: 00C2418D
      • Part of subcall function 00C2410D: _wcscpy.LIBCMT ref: 00C241E1
      • Part of subcall function 00C2410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00C241F1
    • KillTimer.USER32(?,00000001,?,?), ref: 00C245B5
    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00C245C4
    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00C5D5FE
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
    • String ID:
    • API String ID: 1378193009-0
    • Opcode ID: bafbcae6909b64769157f9c3288de0ca2ca2f20127555e9d7c847aba8eaf079a
    • Instruction ID: 9023e5465d952607cf7eee29818c5fe8e5ec51b25ff8c19a4f4f54946f48fc1b
    • Opcode Fuzzy Hash: bafbcae6909b64769157f9c3288de0ca2ca2f20127555e9d7c847aba8eaf079a
    • Instruction Fuzzy Hash: 112129B49047949FEB328B24D845BEBBBEC9F0130DF04009EE6DA57241D7B41AC9CB51
    APIs
      • Part of subcall function 00C25B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00C8793F,?,?,00000000), ref: 00C25B8C
      • Part of subcall function 00C25B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00C8793F,?,?,00000000,?,?), ref: 00C25BB0
    • gethostbyname.WSOCK32(?,?,?), ref: 00C964AF
    • WSAGetLastError.WSOCK32(00000000), ref: 00C964BA
    • _memmove.LIBCMT ref: 00C964E7
    • inet_ntoa.WSOCK32(?), ref: 00C964F2
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
    • String ID:
    • API String ID: 1504782959-0
    • Opcode ID: abc5ae500e3b26e07048c2e307629e4d78b5d9b6c6d6ca2baf61f8e4aee4a69a
    • Instruction ID: b9bad380e1c0fcc2815aba14aed470edbc99b2de9347a760a88993595cadb1db
    • Opcode Fuzzy Hash: abc5ae500e3b26e07048c2e307629e4d78b5d9b6c6d6ca2baf61f8e4aee4a69a
    • Instruction Fuzzy Hash: 76112E31900119AFCF04FBE4ED86DAEB7B8EF05310B144069F506A75A1DF31AE14EB61
    APIs
    • SendMessageW.USER32(?,000000B0,?,?), ref: 00C78E23
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C78E35
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C78E4B
    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00C78E66
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 0e79d3da5afb41a07201350371dc36b6c3ac7ee767e651a619e9dd4bfddc58c1
    • Instruction ID: 43752be102de255be63d37c5e57a142c5744760d0ae1dc0d09b891a9bd983a28
    • Opcode Fuzzy Hash: 0e79d3da5afb41a07201350371dc36b6c3ac7ee767e651a619e9dd4bfddc58c1
    • Instruction Fuzzy Hash: BB113679940218BFEB10DFA5C884E9DBBB8FB08710F204095EA04B7290DB716E10DB90
    APIs
      • Part of subcall function 00C22612: GetWindowLongW.USER32(?,000000EB), ref: 00C22623
    • DefDlgProcW.USER32(?,00000020,?), ref: 00C212D8
    • GetClientRect.USER32(?,?), ref: 00C5B77B
    • GetCursorPos.USER32(?), ref: 00C5B785
    • ScreenToClient.USER32(?,?), ref: 00C5B790
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Client$CursorLongProcRectScreenWindow
    • String ID:
    • API String ID: 4127811313-0
    • Opcode ID: 517fb278f104bad1fe833c02e29ffb3f4f2edd31b2c1c9d1f6ec65568b09a39f
    • Instruction ID: 2166a9d35bf7ceb887c0a633dce29f2b769c8fe076666a5e0e0e2030fd2906cf
    • Opcode Fuzzy Hash: 517fb278f104bad1fe833c02e29ffb3f4f2edd31b2c1c9d1f6ec65568b09a39f
    • Instruction Fuzzy Hash: 1E118C35A00129FFCB10DFA8E885AFE77B8FB16304F000455F901E7640C730BA529BA5
    APIs
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00C8001E,?,00C81071,?,00008000), ref: 00C81490
    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00C8001E,?,00C81071,?,00008000), ref: 00C814B5
    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00C8001E,?,00C81071,?,00008000), ref: 00C814BF
    • Sleep.KERNEL32(?,?,?,?,?,?,?,00C8001E,?,00C81071,?,00008000), ref: 00C814F2
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CounterPerformanceQuerySleep
    • String ID:
    • API String ID: 2875609808-0
    • Opcode ID: 6bf91a6a716272cfc0f41a78d20b98be4d6f4cc3fa15fbeb22d6e945ecd63bc7
    • Instruction ID: 7b1d3972bd33a3d603ade8f5a62885e77672074377f059d086b9b888250a2556
    • Opcode Fuzzy Hash: 6bf91a6a716272cfc0f41a78d20b98be4d6f4cc3fa15fbeb22d6e945ecd63bc7
    • Instruction Fuzzy Hash: AE112A31C00529DBCF00AFE5D948BEEBBB8FF49715F054159EE81B6240CB3096928B99
    APIs
    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00C7DB5C
    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00C7DB73
    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00C7DB88
    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00C7DBA6
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Type$Register$FileLoadModuleNameUser
    • String ID:
    • API String ID: 1352324309-0
    • Opcode ID: 30f3723174ec0f8e235cf51c279653d2ce4d082ea8bc141bbd4219dce57660d1
    • Instruction ID: 2c5e1a6492be1e9c3ca9d11f6b98ac81667cc231a08e719dd511bf8ae34b6afc
    • Opcode Fuzzy Hash: 30f3723174ec0f8e235cf51c279653d2ce4d082ea8bc141bbd4219dce57660d1
    • Instruction Fuzzy Hash: 96118BB5205304EBE3208F51EC49F9ABBBCEF04B00F1085ADA65AC7040D7B0E9549BA1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
    • Instruction ID: d1458930f25c13d32e5e1e6cf9067fa76a770d72a29b10c5adc8db632786ec13
    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
    • Instruction Fuzzy Hash: 33016D3A04854ABBCF125E84EC058EE3F26BB18346B488615FE2858130C636CAF5AB85
    APIs
    • GetWindowRect.USER32(?,?), ref: 00CAB318
    • ScreenToClient.USER32(?,?), ref: 00CAB330
    • ScreenToClient.USER32(?,?), ref: 00CAB354
    • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00CAB36F
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClientRectScreen$InvalidateWindow
    • String ID:
    • API String ID: 357397906-0
    • Opcode ID: f975d182e6bb41f766340ae09c2ed55b482c001a2586be4905e157aaba85dafb
    • Instruction ID: b906f69d26bab8227a1c4b595c71b50138dbeb9d40bd179187131904432322f5
    • Opcode Fuzzy Hash: f975d182e6bb41f766340ae09c2ed55b482c001a2586be4905e157aaba85dafb
    • Instruction Fuzzy Hash: 6D114675D00209EFDB41CF98C484AEEBBB5FB09314F104166E914E3220D735AA558F90
    APIs
    • _memset.LIBCMT ref: 00CAB678
    • _memset.LIBCMT ref: 00CAB687
    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00CE6F20,00CE6F64), ref: 00CAB6B6
    • CloseHandle.KERNEL32 ref: 00CAB6C8
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _memset$CloseCreateHandleProcess
    • String ID:
    • API String ID: 3277943733-0
    • Opcode ID: 91a585f84da8791703729c39cdeee570839a5c68580e695b3d50d5f36de8a239
    • Instruction ID: 698abe5f73dfd56c0bcf686fa09da064a5dd88e50ebd97431973bf23b2770dd5
    • Opcode Fuzzy Hash: 91a585f84da8791703729c39cdeee570839a5c68580e695b3d50d5f36de8a239
    • Instruction Fuzzy Hash: 3DF082F2650354BEFB1027E1BC46FBF3A5CEB19394F404024BA08DA1A2D7715C0187A8
    APIs
    • EnterCriticalSection.KERNEL32(?), ref: 00C86C8F
      • Part of subcall function 00C8776D: _memset.LIBCMT ref: 00C877A2
    • _memmove.LIBCMT ref: 00C86CB2
    • _memset.LIBCMT ref: 00C86CBF
    • LeaveCriticalSection.KERNEL32(?), ref: 00C86CCF
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CriticalSection_memset$EnterLeave_memmove
    • String ID:
    • API String ID: 48991266-0
    • Opcode ID: 79578b5164d830ea123c1fea88be1c9e84b33b63fc37b50c4a02e47eb6c7a2c2
    • Instruction ID: af048946e68c3c89aa3735e3d94ef540acd7d6980e675a9e487867e643cfdda2
    • Opcode Fuzzy Hash: 79578b5164d830ea123c1fea88be1c9e84b33b63fc37b50c4a02e47eb6c7a2c2
    • Instruction Fuzzy Hash: 83F03A3A204104ABCF416F95DC85F8ABB2AFF45324B548065FE085F22BC731A816DBB4
    APIs
      • Part of subcall function 00C212F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00C2134D
      • Part of subcall function 00C212F3: SelectObject.GDI32(?,00000000), ref: 00C2135C
      • Part of subcall function 00C212F3: BeginPath.GDI32(?), ref: 00C21373
      • Part of subcall function 00C212F3: SelectObject.GDI32(?,00000000), ref: 00C2139C
    • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00CABDAA
    • LineTo.GDI32(00000000,?,?), ref: 00CABDB7
    • EndPath.GDI32(00000000), ref: 00CABDC7
    • StrokePath.GDI32(00000000), ref: 00CABDD5
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
    • String ID:
    • API String ID: 1539411459-0
    • Opcode ID: 10f93d8f814108d2e6201d98a67e383209a93d3a50926f1b2877d79c1d3f66a3
    • Instruction ID: 31cb384c2f6d0f3193e0286c6b57b4efe5c40f295f6b06a72806c760625dc4d4
    • Opcode Fuzzy Hash: 10f93d8f814108d2e6201d98a67e383209a93d3a50926f1b2877d79c1d3f66a3
    • Instruction Fuzzy Hash: BDF05E31041659BADB226F94AC09FCE3F59AF06318F084004FA11660E2C7B85652DFA5
    APIs
    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00C7A179
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00C7A18C
    • GetCurrentThreadId.KERNEL32 ref: 00C7A193
    • AttachThreadInput.USER32(00000000), ref: 00C7A19A
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
    • String ID:
    • API String ID: 2710830443-0
    • Opcode ID: b546533aba8a7e8870c2cc91ae1a22e3fac9ba3554c3d2948db1cfed433c65b4
    • Instruction ID: 9aab247d6e0deb10b5bba49562f69ac42d0a9cbcc5644a503e0f0269c943d357
    • Opcode Fuzzy Hash: b546533aba8a7e8870c2cc91ae1a22e3fac9ba3554c3d2948db1cfed433c65b4
    • Instruction Fuzzy Hash: C6E0C931545228FBEB205BA2DC0DFDF7F5CEF267A5F408029F60996060C6718541CBA1
    APIs
    • GetSysColor.USER32(00000008), ref: 00C22231
    • SetTextColor.GDI32(?,000000FF), ref: 00C2223B
    • SetBkMode.GDI32(?,00000001), ref: 00C22250
    • GetStockObject.GDI32(00000005), ref: 00C22258
    • GetWindowDC.USER32(?,00000000), ref: 00C5C003
    • GetPixel.GDI32(00000000,00000000,00000000), ref: 00C5C010
    • GetPixel.GDI32(00000000,?,00000000), ref: 00C5C029
    • GetPixel.GDI32(00000000,00000000,?), ref: 00C5C042
    • GetPixel.GDI32(00000000,?,?), ref: 00C5C062
    • ReleaseDC.USER32(?,00000000), ref: 00C5C06D
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
    • String ID:
    • API String ID: 1946975507-0
    • Opcode ID: d4f8a9e2c69798aa154204ca836e66954f23d8e1d90734c51d11bbe48a2208b3
    • Instruction ID: 52f91312cf217003757d2803f24b6d139176f00e66fbe8d8f8ee0968fa04a667
    • Opcode Fuzzy Hash: d4f8a9e2c69798aa154204ca836e66954f23d8e1d90734c51d11bbe48a2208b3
    • Instruction Fuzzy Hash: 2EE03932504244EAEB215FA4FC4D7DC3B20EB5633AF10836AFA79480E187724A95DB22
    APIs
    • GetCurrentThread.KERNEL32 ref: 00C78A43
    • OpenThreadToken.ADVAPI32(00000000,?,?,?,00C7860E), ref: 00C78A4A
    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00C7860E), ref: 00C78A57
    • OpenProcessToken.ADVAPI32(00000000,?,?,?,00C7860E), ref: 00C78A5E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CurrentOpenProcessThreadToken
    • String ID:
    • API String ID: 3974789173-0
    • Opcode ID: 72e5223b00115bad9ead2e7498a19408ab19f365757397d43f03b0e4d9fae849
    • Instruction ID: 3e6dfe9da684dca6207e7a4185f0ba1142e709c8212fb75a3dbea15866f80157
    • Opcode Fuzzy Hash: 72e5223b00115bad9ead2e7498a19408ab19f365757397d43f03b0e4d9fae849
    • Instruction Fuzzy Hash: A5E04F366412119FD7605FF16D0CB9A3BA8EF527A6F04882CA245CA054DA7495469750
    APIs
    • GetDesktopWindow.USER32 ref: 00C620B6
    • GetDC.USER32(00000000), ref: 00C620C0
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C620E0
    • ReleaseDC.USER32(?), ref: 00C62101
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: 66982bec3a5ad529be34016e731bb83644cb9d80d45794d232340327769801b0
    • Instruction ID: 067ca483f54d196558513ad92bc2b9396a73b0109c127cbfa0cf1013a89157fe
    • Opcode Fuzzy Hash: 66982bec3a5ad529be34016e731bb83644cb9d80d45794d232340327769801b0
    • Instruction Fuzzy Hash: 14E01A75800214EFCB219FA1D84879D7FF1EB4D315F108429F85A97260CB388142EF40
    APIs
    • GetDesktopWindow.USER32 ref: 00C620CA
    • GetDC.USER32(00000000), ref: 00C620D4
    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00C620E0
    • ReleaseDC.USER32(?), ref: 00C62101
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CapsDesktopDeviceReleaseWindow
    • String ID:
    • API String ID: 2889604237-0
    • Opcode ID: 905278a428fb10b9ce0782070d95b0e7c50dec59ead2c08b5f82a0dcb97bee86
    • Instruction ID: 70f7a799fe15fabc3f3e59492d13a8f38b02690c7742de06e06ae3d3d4a3aafd
    • Opcode Fuzzy Hash: 905278a428fb10b9ce0782070d95b0e7c50dec59ead2c08b5f82a0dcb97bee86
    • Instruction Fuzzy Hash: 3CE012B5C00214EFCB219FB0D80879D7BF1EB4D315F108029F95AA7220CB389142AF40
    APIs
    • OleSetContainedObject.OLE32(?,00000001), ref: 00C7B780
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ContainedObject
    • String ID: AutoIt3GUI$Container
    • API String ID: 3565006973-3941886329
    • Opcode ID: cd1880fdbc87321f52ad381208ecdb24ce7200c77a5cb48c8e168b7152f9a02b
    • Instruction ID: 6712a08cd80bdc722a836934ebb8d696a592b956ce121c221f5798c26d6f2ed9
    • Opcode Fuzzy Hash: cd1880fdbc87321f52ad381208ecdb24ce7200c77a5cb48c8e168b7152f9a02b
    • Instruction Fuzzy Hash: 95912971600601AFDB14DF64C884B6ABBE8FF49710F24856EF959CB691DB70ED41CB60
    APIs
      • Part of subcall function 00C3FE06: _wcscpy.LIBCMT ref: 00C3FE29
      • Part of subcall function 00C29997: __itow.LIBCMT ref: 00C299C2
      • Part of subcall function 00C29997: __swprintf.LIBCMT ref: 00C29A0C
    • __wcsnicmp.LIBCMT ref: 00C8B0B9
    • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00C8B182
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
    • String ID: LPT
    • API String ID: 3222508074-1350329615
    • Opcode ID: 1f3e2081797115826ef221cd4d66ec3949c433673983be1779626dd6775b18a0
    • Instruction ID: dc4feebd6dac33b862b4706353e7775e42f62950584442f23c111aff81e66dd7
    • Opcode Fuzzy Hash: 1f3e2081797115826ef221cd4d66ec3949c433673983be1779626dd6775b18a0
    • Instruction Fuzzy Hash: 4161A075A00215EFCB14EF98C895EAEB7B4EF08314F104069F956AB391DB70AE84DB94
    APIs
    • Sleep.KERNEL32(00000000), ref: 00C32AC8
    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00C32AE1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: GlobalMemorySleepStatus
    • String ID: @
    • API String ID: 2783356886-2766056989
    • Opcode ID: 1a562454ec81a5fb79b14ddf404f6ef9f2d63aa992f556a9c958ab8e679ade4f
    • Instruction ID: a51b6238848107fee737a38f7ae96976168940b1bb95d82d2f3b3fecf565af94
    • Opcode Fuzzy Hash: 1a562454ec81a5fb79b14ddf404f6ef9f2d63aa992f556a9c958ab8e679ade4f
    • Instruction Fuzzy Hash: B25146724187589BD320AF10EC86BAFBBE8FF88314F41885DF1D9811A5DB708529DB67
    APIs
      • Part of subcall function 00C2506B: __fread_nolock.LIBCMT ref: 00C25089
    • _wcscmp.LIBCMT ref: 00C898CD
    • _wcscmp.LIBCMT ref: 00C898E0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: _wcscmp$__fread_nolock
    • String ID: FILE
    • API String ID: 4029003684-3121273764
    • Opcode ID: 73248330e0cc5f1b0314874a129d7622f7232d841bab9b3b6581d37e8779b92b
    • Instruction ID: 6919cd1f78097ad293d7a025f7d26c0e2a5fb75755aafbc3d4165a45e9abdca6
    • Opcode Fuzzy Hash: 73248330e0cc5f1b0314874a129d7622f7232d841bab9b3b6581d37e8779b92b
    • Instruction Fuzzy Hash: 20412671A0061ABADF20AEA0DC85FEFB7BDEF49714F040469F904B71C0DA71AE0497A5
    APIs
    • _memset.LIBCMT ref: 00C926B4
    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00C926EA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CrackInternet_memset
    • String ID: |
    • API String ID: 1413715105-2343686810
    • Opcode ID: 31b380430fcf2ca28b35c7482c9932475c06756c886c134b53ec962a2b74ac18
    • Instruction ID: f0794563331bed015212ea6063670533da9e337c0e1c099ecee0882571932914
    • Opcode Fuzzy Hash: 31b380430fcf2ca28b35c7482c9932475c06756c886c134b53ec962a2b74ac18
    • Instruction Fuzzy Hash: DD311A71800219AFCF01DFA1DC89EEEBFB9FF08310F100169F814B6165EA315A56EB60
    APIs
    • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00CA7B93
    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00CA7BA8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: '
    • API String ID: 3850602802-1997036262
    • Opcode ID: 151c35ad49345c9db8821d07f1926155a8eae536658301f52440fd8b51066b18
    • Instruction ID: a8f584b72343da334524a004b55edfcabf551ab944e53ab8e56392380a03af42
    • Opcode Fuzzy Hash: 151c35ad49345c9db8821d07f1926155a8eae536658301f52440fd8b51066b18
    • Instruction Fuzzy Hash: 99412AB5A0530AAFDB14CF65D880BDEBBB5FB09304F10016AE914AB391D730AA41CFA0
    APIs
    • DestroyWindow.USER32(?,?,?,?), ref: 00CA6B49
    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00CA6B85
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$DestroyMove
    • String ID: static
    • API String ID: 2139405536-2160076837
    • Opcode ID: bc99be5fee895544a7d8c30c4f568a0f6bea2e2d5f449dbdf2f81f40b5801a2f
    • Instruction ID: 4e83b1fe8691c4a842f965aacc31e0350eebf3d202b51438e7f4fcb916e2e7de
    • Opcode Fuzzy Hash: bc99be5fee895544a7d8c30c4f568a0f6bea2e2d5f449dbdf2f81f40b5801a2f
    • Instruction Fuzzy Hash: D6319C71100605AAEB109F68DC81BFB73A9FF49728F148619F8A6D7190DB30AC81EB60
    APIs
    • _memset.LIBCMT ref: 00C82C09
    • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00C82C44
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: InfoItemMenu_memset
    • String ID: 0
    • API String ID: 2223754486-4108050209
    • Opcode ID: 95210af3ca2d080f853016a09722862f97f4cbd134967365e37a92833d2ada2e
    • Instruction ID: b87f1d49ecc05bf246bba11133d386d2bfd4e0dbe8b2e27be29e179f62609947
    • Opcode Fuzzy Hash: 95210af3ca2d080f853016a09722862f97f4cbd134967365e37a92833d2ada2e
    • Instruction Fuzzy Hash: 0B31D7316002099FFB34EF58D989BBEBBB5FF05358F144019ED96961A0D770AB44DB14
    APIs
    • __snwprintf.LIBCMT ref: 00C93B7C
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __snwprintf_memmove
    • String ID: , $$AUTOITCALLVARIABLE%d
    • API String ID: 3506404897-2584243854
    • Opcode ID: 7ae2bf54194575649487f86078ecb32a6c8ac68ae414714de397490bb259ddb4
    • Instruction ID: 94ef94767273ea4f0e4a754e9f5067e390f4f1163bb9ac4695154b5ba0859b3e
    • Opcode Fuzzy Hash: 7ae2bf54194575649487f86078ecb32a6c8ac68ae414714de397490bb259ddb4
    • Instruction Fuzzy Hash: 98217135600229AFCF10EFA4DC86EAE77B4FF44700F4044A9F505AB281DB30EA59DBA1
    APIs
    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00CA6793
    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00CA679E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: MessageSend
    • String ID: Combobox
    • API String ID: 3850602802-2096851135
    • Opcode ID: a8deb11a361afb48509a924e711e5585f0a500bf537b082dc42399ef1776cf6d
    • Instruction ID: 091e7e25dbb62c3abc7d3cba69bd28be74611be409aa820f188293a0e73f4cee
    • Opcode Fuzzy Hash: a8deb11a361afb48509a924e711e5585f0a500bf537b082dc42399ef1776cf6d
    • Instruction Fuzzy Hash: 1811B27561020A6FEF21DF24CC84EBB376AEB9A36CF144129F928D7290D6319D5197A0
    APIs
      • Part of subcall function 00C21D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00C21D73
      • Part of subcall function 00C21D35: GetStockObject.GDI32(00000011), ref: 00C21D87
      • Part of subcall function 00C21D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00C21D91
    • GetWindowRect.USER32(00000000,?), ref: 00CA6CA3
    • GetSysColor.USER32(00000012), ref: 00CA6CBD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Window$ColorCreateMessageObjectRectSendStock
    • String ID: static
    • API String ID: 1983116058-2160076837
    • Opcode ID: 843d62772c8a02788247c01434b0d82be1ce6a4aed51e1546f18b046bb8f2f7b
    • Instruction ID: 9257ae86e952de6446fe8b2e53e1d17c49ae8b49b042ab44e32e5ebe65c8c0bb
    • Opcode Fuzzy Hash: 843d62772c8a02788247c01434b0d82be1ce6a4aed51e1546f18b046bb8f2f7b
    • Instruction Fuzzy Hash: C6212972A1021AAFDB04DFB8DC45AFA7BA8EB09318F044629FD56D3250E635E861DB50
    APIs
    • GetWindowTextLengthW.USER32(00000000), ref: 00CA69D4
    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00CA69E3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: LengthMessageSendTextWindow
    • String ID: edit
    • API String ID: 2978978980-2167791130
    • Opcode ID: 1191ca75a15f57ab702df3136f74e4d62837d6e0e5323abe34a36e286d9b0596
    • Instruction ID: c40476952a0337b089992b322bb259cf62dd5c992368329b73807f3baa188b0e
    • Opcode Fuzzy Hash: 1191ca75a15f57ab702df3136f74e4d62837d6e0e5323abe34a36e286d9b0596
    • Instruction Fuzzy Hash: 5E113D7150010AABEB119F74DC44AEB3769EB1636CF544728F9B5971E0C6319C519B60
    APIs
    • _memset.LIBCMT ref: 00C82D1A
    • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00C82D39
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: InfoItemMenu_memset
    • String ID: 0
    • API String ID: 2223754486-4108050209
    • Opcode ID: bb764113864b6fdb7f5dfb1d676a6c6386f58d82c1f81351bdce02a0eef3a016
    • Instruction ID: b82fbe61b4595349a9220a9309ed83597cb6694bdf55318b69a59fd982fec60e
    • Opcode Fuzzy Hash: bb764113864b6fdb7f5dfb1d676a6c6386f58d82c1f81351bdce02a0eef3a016
    • Instruction Fuzzy Hash: 12110871D01114ABDB20FF98DC88FAE7BB9AB05308F140126EC25AB2A0D770AF05D799
    APIs
    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00C92342
    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00C9236B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Internet$OpenOption
    • String ID: <local>
    • API String ID: 942729171-4266983199
    • Opcode ID: a302dbd3394b59692ae66a1aae49853f5dbec868ffc0ce3371dce4a4d86d9240
    • Instruction ID: 6c20810c5364a3b47199629225a85033cb3e9c42abc7562bb9178f84c2cc2fc6
    • Opcode Fuzzy Hash: a302dbd3394b59692ae66a1aae49853f5dbec868ffc0ce3371dce4a4d86d9240
    • Instruction Fuzzy Hash: BC11A070541625FADF248F528C8DFBBFB6CFF06755F10812AF99596120D2746A81C6F0
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00C7AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00C7AEC7
    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00C79135
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClassMessageNameSend_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 372448540-1403004172
    • Opcode ID: 46f223ae2f12b4788be94a7ca6b81cfe33d1635f58b23169488b450bb7d9e95e
    • Instruction ID: 3f5be143ac3eda8658ff9dd2858a98ed8631d616322bfecd3ef6be054b5579bc
    • Opcode Fuzzy Hash: 46f223ae2f12b4788be94a7ca6b81cfe33d1635f58b23169488b450bb7d9e95e
    • Instruction Fuzzy Hash: BA012431645229ABCF04FBA4CC969FE7369FF0A320B144719F836673D2EA355918A750
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: __fread_nolock_memmove
    • String ID: EA06
    • API String ID: 1988441806-3962188686
    • Opcode ID: b15e1041b755768a8da0dd32006f3275f4cb29a4b6a59a3fe11bbed7bdd45831
    • Instruction ID: 1744249bf7d92e7a23c65dc57c1643ee0cdded5601063a8d7e0c684b159c3d01
    • Opcode Fuzzy Hash: b15e1041b755768a8da0dd32006f3275f4cb29a4b6a59a3fe11bbed7bdd45831
    • Instruction Fuzzy Hash: 3D01F9718042187EDB28D6A8CC16EEE7BF89B01701F0045AAF552D2181E9B4A6089760
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00C7AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00C7AEC7
    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00C7902D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClassMessageNameSend_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 372448540-1403004172
    • Opcode ID: 5f7cb41b0f186ed1d40f0a4d0101f2409c2d50d137d8c00e0cd6c84ec93c5e36
    • Instruction ID: 9f9d27ad983d4d4fdedfeb3487710234aad16b3445346974c1159831f37f105f
    • Opcode Fuzzy Hash: 5f7cb41b0f186ed1d40f0a4d0101f2409c2d50d137d8c00e0cd6c84ec93c5e36
    • Instruction Fuzzy Hash: A801F771A45118ABCF14E7A0CD96EFF73A8DF05300F14412AB916772C1DE355F18A271
    APIs
      • Part of subcall function 00C27F41: _memmove.LIBCMT ref: 00C27F82
      • Part of subcall function 00C7AEA4: GetClassNameW.USER32(?,?,000000FF), ref: 00C7AEC7
    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00C790B0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClassMessageNameSend_memmove
    • String ID: ComboBox$ListBox
    • API String ID: 372448540-1403004172
    • Opcode ID: 537695dbb7599fe48897c0407823e84c72abab0b7bdcdd6c55e2ba5a1fd0d164
    • Instruction ID: 18d5b225f98f1c0267e35f49adf4cdb8fc6917d479d48f7f9c07c219b9db5e7d
    • Opcode Fuzzy Hash: 537695dbb7599fe48897c0407823e84c72abab0b7bdcdd6c55e2ba5a1fd0d164
    • Instruction Fuzzy Hash: BE01A271A45118ABCF00E6A4CD96AFFB7A8DF06300F144126791673282DA365F18A2B2
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: ClassName_wcscmp
    • String ID: #32770
    • API String ID: 2292705959-463685578
    • Opcode ID: 1a6198fd20aba275452b647d6dc80e86ccb583f25b863910d1b75c656515bda2
    • Instruction ID: 3ea61e8b7e3198634b9ba6160b891bf2222791b0ac43e54cda0e0992f3c71794
    • Opcode Fuzzy Hash: 1a6198fd20aba275452b647d6dc80e86ccb583f25b863910d1b75c656515bda2
    • Instruction Fuzzy Hash: 33E068336002292BE720AB99AC09FABF7ACFB41770F00002BFD00D3150EAB09A0587E0
    APIs
      • Part of subcall function 00C5B494: _memset.LIBCMT ref: 00C5B4A1
      • Part of subcall function 00C40AC0: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00C5B470,?,?,?,00C2100A), ref: 00C40AC5
    • IsDebuggerPresent.KERNEL32(?,?,?,00C2100A), ref: 00C5B474
    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00C2100A), ref: 00C5B483
    Strings
    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00C5B47E
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
    • API String ID: 3158253471-631824599
    • Opcode ID: 73be8adbf46cde640ca488a8e1c8ebccc9efd7b53e7346d0f5af53c8c088b7c9
    • Instruction ID: ffbde55d3e0bdfcf581263ac64be1a7c0a8f42af6c94eec54d912ee8ff77c739
    • Opcode Fuzzy Hash: 73be8adbf46cde640ca488a8e1c8ebccc9efd7b53e7346d0f5af53c8c088b7c9
    • Instruction Fuzzy Hash: C8E012B42007518FD730DF64E404B4A7BE4AF0470AF158A6DE896C7752EBF4D889CBA5
    APIs
    • GetSystemDirectoryW.KERNEL32(?), ref: 00C61ACE
      • Part of subcall function 00C9C104: LoadLibraryA.KERNEL32(kernel32.dll,?,00C61CB7,?), ref: 00C9C112
      • Part of subcall function 00C9C104: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00C9C124
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00C61CC6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Library$AddressDirectoryFreeLoadProcSystem
    • String ID: WIN_XPe
    • API String ID: 582185067-3257408948
    • Opcode ID: 928178fdb0cc0cc750bb4600ba4baa133e91a3af5b77ee81331993c96abfc808
    • Instruction ID: 5369060856c28a76bd3f8fa7ed45e432a53fd98ef0e3461819ebc3e7fa934b95
    • Opcode Fuzzy Hash: 928178fdb0cc0cc750bb4600ba4baa133e91a3af5b77ee81331993c96abfc808
    • Instruction Fuzzy Hash: 1AF0C970812119DFCB25DBD2C9C8BECBBF8AB08305F180095E502A64A2C7754F45EF24
    APIs
    • GetTempPathW.KERNEL32(00000104,?), ref: 00C899A1
    • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00C899B8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: Temp$FileNamePath
    • String ID: aut
    • API String ID: 3285503233-3010740371
    • Opcode ID: 2d2fd8a41b0ca48b5c38ed2e989dea544981c2647d2adaa5aa8804555db01561
    • Instruction ID: c9a958ce785d05f38ae918ecbbd72df8f1a446ee83ed5d781cc0501cf0c69b52
    • Opcode Fuzzy Hash: 2d2fd8a41b0ca48b5c38ed2e989dea544981c2647d2adaa5aa8804555db01561
    • Instruction Fuzzy Hash: 47D05E7954030DABDB50ABE0DC0EFDA773CE704705F0003B1BB94921A1EAB095998B91
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CA59D7
    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00CA59EA
      • Part of subcall function 00C852EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C85363
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 19f1a4bb84aa6f8c680d0d3233dae132e73b2b1693c16a6f16b20611442f7234
    • Instruction ID: 05626de9d69df2f369b3f7a447488d7577ef79cde34b35e77fd0b5a7398b5560
    • Opcode Fuzzy Hash: 19f1a4bb84aa6f8c680d0d3233dae132e73b2b1693c16a6f16b20611442f7234
    • Instruction Fuzzy Hash: 3BD0C931784311B6E664BBB0AC4BF9A6A64AB01B54F00083AB355AB1D1D9F0A8018654
    APIs
    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CA5A17
    • PostMessageW.USER32(00000000), ref: 00CA5A1E
      • Part of subcall function 00C852EB: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00C85363
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1763142670.0000000000C21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C20000, based on PE: true
    • Associated: 00000000.00000002.1763117646.0000000000C20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763199710.0000000000CD4000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763239852.0000000000CDE000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1763255894.0000000000CE7000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_c20000_01_extracted.jbxd
    Similarity
    • API ID: FindMessagePostSleepWindow
    • String ID: Shell_TrayWnd
    • API String ID: 529655941-2988720461
    • Opcode ID: 13767a6f2eabef4f8e051e281821f473139acb6049c96615ef339c7333faed57
    • Instruction ID: 535ad6e1ec1a588334cc7e6977dab7611b98d138515483b3ceb8b88a3e7139ed
    • Opcode Fuzzy Hash: 13767a6f2eabef4f8e051e281821f473139acb6049c96615ef339c7333faed57
    • Instruction Fuzzy Hash: 51D0C9317843117AE664BBB0AC4BF9A6664AB05B54F00083AB355AB1D1D9F0A8018658