Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nteste.exe

Overview

General Information

Sample name:nteste.exe
Analysis ID:1546271
MD5:5367157a35583431b54b30426831640a
SHA1:8cb18452a832b235e376274f3f67125ed73da76c
SHA256:a1ea9eb86e26f04236bf7f47a63912af16f70463c47f8fd785f6e0f97d41c769
Tags:exeuser-Porcupine
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Machine Learning detection for dropped file
Machine Learning detection for sample
Contains functionality to dynamically determine API calls
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • nteste.exe (PID: 3556 cmdline: "C:\Users\user\Desktop\nteste.exe" MD5: 5367157A35583431B54B30426831640A)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Users\user\Desktop\CamScanner 23-10-2024 19.12.pdfJoe Sandbox ML: detected
Source: nteste.exeJoe Sandbox ML: detected
Source: nteste.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00403E52 FindFirstFileW,0_2_00403E52
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_004045A6 __EH_prolog,GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLogicalDriveStringsW,0_2_004045A6
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_004162A00_2_004162A0
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0040C5070_2_0040C507
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0041F2300_2_0041F230
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_004223660_2_00422366
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0040537A0_2_0040537A
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_004263B00_2_004263B0
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_004265700_2_00426570
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0041A8620_2_0041A862
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00426A600_2_00426A60
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00422AA00_2_00422AA0
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00427B130_2_00427B13
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0041FC500_2_0041FC50
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00423CF00_2_00423CF0
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00425C800_2_00425C80
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00427CA10_2_00427CA1
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00401D5A0_2_00401D5A
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00427D7B0_2_00427D7B
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00425E900_2_00425E90
Source: C:\Users\user\Desktop\nteste.exeCode function: String function: 004020F6 appears 69 times
Source: C:\Users\user\Desktop\nteste.exeCode function: String function: 00427400 appears 234 times
Source: nteste.exe, 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename7z.sfx.exe, vs nteste.exe
Source: nteste.exeBinary or memory string: OriginalFilename7z.sfx.exe, vs nteste.exe
Source: nteste.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@1/3@0/0
Source: CamScanner 23-10-2024 19.13.pdf.0.drInitial sample: https:\057\057v3.camscanner.com\057user\057download
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_004134A3 __EH_prolog,_CxxThrowException,_CxxThrowException,CoCreateInstance,0_2_004134A3
Source: C:\Users\user\Desktop\nteste.exeFile created: C:\Users\user\Desktop\CamScanner 23-10-2024 19.12.pdfJump to behavior
Source: nteste.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\nteste.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\nteste.exeFile read: C:\Users\user\Desktop\nteste.exeJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\nteste.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
Source: nteste.exeStatic file information: File size 2743085 > 1048576
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0040195E LoadLibraryW,GetProcAddress,memset,FreeLibrary,0_2_0040195E
Source: nteste.exeStatic PE information: section name: .sxdata
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00427400 push eax; ret 0_2_0042741E
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00427790 push eax; ret 0_2_004277BE
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0041FED0 push ecx; mov dword ptr [esp], ecx0_2_0041FED1
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_00403E52 FindFirstFileW,0_2_00403E52
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_004045A6 __EH_prolog,GetLogicalDriveStringsW,GetLogicalDriveStringsW,GetLogicalDriveStringsW,0_2_004045A6
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0040592F GetSystemInfo,0_2_0040592F
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_0040195E LoadLibraryW,GetProcAddress,memset,FreeLibrary,0_2_0040195E
Source: C:\Users\user\Desktop\nteste.exeCode function: 0_2_004200F0 GetVersionExW,0_2_004200F0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Spearphishing Link
1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping2
File and Directory Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory3
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
nteste.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\Desktop\CamScanner 23-10-2024 19.12.pdf100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1546271
    Start date and time:2024-10-31 17:31:09 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 21s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:nteste.exe
    Detection:MAL
    Classification:mal48.winEXE@1/3@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 72
    • Number of non-executed functions: 51
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
    • Excluded IPs from analysis (whitelisted): 88.221.110.91, 2.16.100.168
    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, a767.dspw65.akamai.net, wu-b-net.trafficmanager.net, download.windowsupdate.com.edgesuite.net
    • VT rate limit hit for: nteste.exe
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    s-part-0017.t-0009.t-msedge.nethttps://t.ly/4Nq2xGet hashmaliciousHTMLPhisher, Mamba2FABrowse
    • 13.107.246.45
    INVOICE ATTACHMENT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
    • 13.107.246.45
    Indocount Invoice Amendment.exeGet hashmaliciousFormBookBrowse
    • 13.107.246.45
    FUNDS TRANSFER - 000009442004 - OUTWARD PAYMENT ADVICE pdf.pif.exeGet hashmaliciousFormBook, GuLoaderBrowse
    • 13.107.246.45
    SecuriteInfo.com.BackDoor.AgentTeslaNET.37.15827.22386.exeGet hashmaliciousFormBookBrowse
    • 13.107.246.45
    https://hidrive.ionos.com/lnk/FamigcCEFGet hashmaliciousUnknownBrowse
    • 13.107.246.45
    http://djaahaf.r.af.d.sendibt2.comGet hashmaliciousUnknownBrowse
    • 13.107.246.45
    BGUO31BLG4WQAOX9MA4VF71OJ1M.exeGet hashmaliciousUnknownBrowse
    • 13.107.246.45
    fattura di pagamento.exeGet hashmaliciousFormBookBrowse
    • 13.107.246.45
    http://www.kristinsacademy.com/?wptouch_switch=desktop&redirect=http://lagunaua.comGet hashmaliciousHTMLPhisherBrowse
    • 13.107.246.45
    No context
    No context
    No context
    Process:C:\Users\user\Desktop\nteste.exe
    File Type:PDF document, version 1.7, 1 pages
    Category:dropped
    Size (bytes):454424
    Entropy (8bit):7.957541049518111
    Encrypted:false
    SSDEEP:12288:koogWqQRedoQLhoUuAUTEC+KrG5yamr1jVP78PHUWGtk:koogW5edH+MoE3KrGMamr1GPHpG+
    MD5:70A353DFB55F319A7B0D37F688EE77AC
    SHA1:94B30B4B2488325CAB033D40C84D0F825F641AB8
    SHA-256:846B5CD3D0820027D65F7D54758EB11CD24373D5BBBDA8A56BD56E24BCA2A16D
    SHA-512:CE1326018110D715334C567DD5C95A5CA7C3568139F4B91BA97304236CDD24E2C6CFA8A8A950CEACF3348F9D7ED65FFE4894742EB0C454F96894E158E63CEC41
    Malicious:true
    Antivirus:
    • Antivirus: Joe Sandbox ML, Detection: 100%
    Reputation:low
    Preview:%PDF-1.7.%.....1 0 obj.<<./Type /Catalog./Pages 2 0 R.>>.endobj.2 0 obj.<<./Type /Pages./Kids [ 4 0 R ]./Count 1.>>.endobj.3 0 obj.<<./Producer <FEFF0069006E0074007300690067002E0063006F006D0020007000640066002000700072006F00640075006300650072>./Title <FEFF00430061006D005300630061006E006E00650072002000320033002D00310030002D0032003000320034002000310039002E00310032>./Author <FEFF00430061006D005300630061006E006E00650072>./Subject <FEFF00430061006D005300630061006E006E00650072002000320033002D00310030002D0032003000320034002000310039002E00310032>./ModDate <FEFF>./Keywords <FEFF>.>>.endobj.4 0 obj.<<./Type /Page./MediaBox [ 0 0 595 842 ]./Contents 5 0 R./Resources <<./ProcSet [ /PDF /Text /ImageB /ImageC /ImageI ]./XObject <<./X1 7 0 R./X2 10 0 R.>>.>>./Parent 2 0 R./Annots [ 9 0 R ].>>.endobj.5 0 obj.<<./Length 6 0 R.>>.stream..0 0 0 RG.0 Tr.q.1 0 0 1 434 10 cm.145 0 0 15 0 0 cm./X1 Do.Q.q.1 0 0 1 48.80182 25 cm.497.39636 0 0 817 0 0 cm./X2 Do.Q..endstream.endobj.6 0 obj.120.endobj.7 0 obj.<<./
    Process:C:\Users\user\Desktop\nteste.exe
    File Type:PDF document, version 1.7, 5 pages
    Category:dropped
    Size (bytes):1886540
    Entropy (8bit):7.935131728433788
    Encrypted:false
    SSDEEP:49152:NwFWEOPozZ07PG/Do6DhwiUOZQSsh2cZr21TaJe7:uoZsyu/DoUhSOeSsRYV7
    MD5:F1BF4C319D0FBD65BBBB994EFE51E2AD
    SHA1:668C4B0CCBDF0471287C096BB311AE34CC4B1F23
    SHA-256:446D5AAECF4B33DA4C3861021C2BDC6823D57392B40849629654E90136B65B11
    SHA-512:72955FA7E4DBA3BD8A1FBE313BFFB3BF8CEE00E4FB783669C425846B7B3F189F1C2D9770EA3261200A25F09E68385576F9EDFF9533035FFE9317097FD27D8298
    Malicious:false
    Reputation:low
    Preview:%PDF-1.7.%.....1 0 obj.<<./Type /Catalog./Pages 2 0 R.>>.endobj.2 0 obj.<<./Type /Pages./Kids [ 4 0 R 12 0 R 20 0 R 28 0 R 36 0 R ]./Count 5.>>.endobj.3 0 obj.<<./Producer <FEFF0069006E0074007300690067002E0063006F006D0020007000640066002000700072006F00640075006300650072>./Title <FEFF00430061006D005300630061006E006E00650072002000320033002D00310030002D0032003000320034002000310039002E00310033>./Author <FEFF00430061006D005300630061006E006E00650072>./Subject <FEFF00430061006D005300630061006E006E00650072002000320033002D00310030002D0032003000320034002000310039002E00310033>./ModDate <FEFF>./Keywords <FEFF>.>>.endobj.4 0 obj.<<./Type /Page./MediaBox [ 0 0 842 595 ]./Contents 5 0 R./Resources <<./ProcSet [ /PDF /Text /ImageB /ImageC /ImageI ]./XObject <<./X1 7 0 R./X2 10 0 R.>>.>>./Parent 2 0 R./Annots [ 9 0 R ].>>.endobj.5 0 obj.<<./Length 6 0 R.>>.stream..0 0 0 RG.0 Tr.q.1 0 0 1 681 10 cm.145 0 0 15 0 0 cm./X1 Do.Q.q.1 0 0 1 0 168.73607 cm.842 0 0 282.52786 0 0 cm./X2 Do.Q..endstream.endobj.6 0
    Process:C:\Users\user\Desktop\nteste.exe
    File Type:PDF document, version 1.4, 1 pages
    Category:dropped
    Size (bytes):542579
    Entropy (8bit):7.660578132045769
    Encrypted:false
    SSDEEP:12288:kHVDVys22/lSisq1icXm2knbw1xkEHl8dzppupjR:k5Vys2YW2kbwLDF8dzA
    MD5:EAE04A20AD4F3281FD6696DC4091A0B0
    SHA1:937F595CCC01F0DFE74FD817F040FA97286B09D5
    SHA-256:7D9284A1FD37AC9C132D24938319FED8C5958BD6782F3F630BB1E4A1AE8BFEC8
    SHA-512:BAF05BBA69927CA8300186BC224766E39763720512CE21FEBECAF618B114531A737A0FDC03E7D7F1FAA49B8C04A71B2699DA9971EDEC85D530F6F588461E804E
    Malicious:false
    Reputation:low
    Preview:%PDF-1.4.%......5 0 obj.<<./Type /XObject./Subtype /Image./Name /Im0./Width 2480./Height 3507./BitsPerComponent 8./ColorSpace /DeviceRGB./Filter /DCTDecode./Length 4 0 R.>>.stream.......JFIF.....,.,......................................C...............(B+($$(Q:=0B`Ued_U][jx..jq.s[].........g............................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz............................................................................C....(#(N++N.n]n.......................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz........................................................................................."...................?....(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(...(.
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.971241163291758
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:nteste.exe
    File size:2'743'085 bytes
    MD5:5367157a35583431b54b30426831640a
    SHA1:8cb18452a832b235e376274f3f67125ed73da76c
    SHA256:a1ea9eb86e26f04236bf7f47a63912af16f70463c47f8fd785f6e0f97d41c769
    SHA512:2c7f568bde2db7e4c3bed28b82fe8d0f49ce7a1cf8786e9ed60d61d55e2dfe52fac6c1cede3b3aeb4fb80839ae491656ee5de53d16b16428c00e0a9127dccd8d
    SSDEEP:49152:HCtt1JXrncsqZRoNSWLlwsW4K70HQzrr5PxC1gIlC9lfhhiUzgTe:HUJjiZRM7+sG7gQPdPbIk9l5h8Te
    TLSH:8DC5233177E1C87EC42611318AE8EBF7707AEB8D0F1185932394D72A6E31665D23672B
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........B.i...i...i...v...i..>u...i...v...i...v...i..3a...i...i...i..>a...i...O...i...O...i....i..i....]..i..zo...i..Rich.i.........
    Icon Hash:b8868baba9aba2d8
    Entrypoint:0x4277c6
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    DLL Characteristics:NX_COMPAT
    Time Stamp:0x5C6ECB00 [Thu Feb 21 16:00:00 2019 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:da401ef5e9d5c4599673c26d95fa6029
    Instruction
    push ebp
    mov ebp, esp
    push FFFFFFFFh
    push 0042CCA0h
    push 004277C0h
    mov eax, dword ptr fs:[00000000h]
    push eax
    mov dword ptr fs:[00000000h], esp
    sub esp, 68h
    push ebx
    push esi
    push edi
    mov dword ptr [ebp-18h], esp
    xor ebx, ebx
    mov dword ptr [ebp-04h], ebx
    push 00000002h
    call dword ptr [0042B13Ch]
    pop ecx
    or dword ptr [00436534h], FFFFFFFFh
    or dword ptr [00436538h], FFFFFFFFh
    call dword ptr [0042B138h]
    mov ecx, dword ptr [00434514h]
    mov dword ptr [eax], ecx
    call dword ptr [0042B134h]
    mov ecx, dword ptr [00434510h]
    mov dword ptr [eax], ecx
    mov eax, dword ptr [0042B130h]
    mov eax, dword ptr [eax]
    mov dword ptr [00436530h], eax
    call 00007FB1E48E5FA4h
    cmp dword ptr [00432170h], ebx
    jne 00007FB1E48E5E8Eh
    push 00412BA9h
    call dword ptr [0042B12Ch]
    pop ecx
    call 00007FB1E48E5F79h
    push 0043204Ch
    push 00432048h
    call 00007FB1E48E5F64h
    mov eax, dword ptr [0043450Ch]
    mov dword ptr [ebp-6Ch], eax
    lea eax, dword ptr [ebp-6Ch]
    push eax
    push dword ptr [00434508h]
    lea eax, dword ptr [ebp-64h]
    push eax
    lea eax, dword ptr [ebp-70h]
    push eax
    lea eax, dword ptr [ebp-60h]
    push eax
    call dword ptr [0042B124h]
    push 00432044h
    push 00432000h
    call 00007FB1E48E5F31h
    Programming Language:
    • [C++] VS98 (6.0) SP6 build 8804
    • [ C ] VS98 (6.0) SP6 build 8804
    • [ C ] VS2010 SP1 build 40219
    • [ASM] VS2010 SP1 build 40219
    • [EXP] VC++ 6.0 SP5 build 8804
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x309740x8c.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x380000x2090.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x234.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x293f50x294002a572bd8572511c16cf22aae6fdfb407False0.5841619318181818COM executable for DOS6.676714054170099IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x2b0000x65000x660038373dcd80ae6d5d8044f9e98b4cec4aFalse0.33903952205882354data4.4296711026291495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x320000x453c0x20021ab621bd3546bfa2ab5932413c3cc39False0.39453125data3.3900459809566854IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .sxdata0x370000x40x20035925cfdc1176bd9ffc634a58b40ec17False0.02734375data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_LNK_INFO, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x380000x20900x22001dc164c6087a90028d0a924f2042e607False0.2819393382352941data3.1607948061827598IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x387c00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.16532258064516128
    RT_ICON0x38aa80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.32094594594594594
    RT_DIALOG0x391480x440dataEnglishUnited States0.39981617647058826
    RT_DIALOG0x38bf80x12edataEnglishUnited States0.6225165562913907
    RT_DIALOG0x38d280x2f4dataEnglishUnited States0.48148148148148145
    RT_DIALOG0x390200x126dataEnglishUnited States0.5850340136054422
    RT_STRING0x396080x3eMatlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.6774193548387096
    RT_STRING0x395c00x42dataEnglishUnited States0.7121212121212122
    RT_STRING0x396480x60dataEnglishUnited States0.5625
    RT_STRING0x3a0600x30dataEnglishUnited States0.5833333333333334
    RT_STRING0x396a80x20cMatlab v4 mat-file (little endian) h, numeric, rows 0, columns 0EnglishUnited States0.42748091603053434
    RT_STRING0x398b80xe4Matlab v4 mat-file (little endian) C, numeric, rows 0, columns 0EnglishUnited States0.44298245614035087
    RT_STRING0x399a00x34dataEnglishUnited States0.6538461538461539
    RT_STRING0x399d80x30dataEnglishUnited States0.6041666666666666
    RT_STRING0x39a080x6eMatlab v4 mat-file (little endian) , numeric, rows 0, columns 0EnglishUnited States0.6818181818181818
    RT_STRING0x39a780x11adataEnglishUnited States0.5035460992907801
    RT_STRING0x39b980x6adataEnglishUnited States0.5471698113207547
    RT_STRING0x395880x32dataEnglishUnited States0.58
    RT_STRING0x39c080x1eadataEnglishUnited States0.363265306122449
    RT_STRING0x39df80x156Matlab v4 mat-file (little endian) U, numeric, rows 0, columns 0EnglishUnited States0.5175438596491229
    RT_STRING0x39f500x56dataEnglishUnited States0.6162790697674418
    RT_STRING0x39fa80xb6dataEnglishUnited States0.5164835164835165
    RT_GROUP_ICON0x38bd00x22dataEnglishUnited States1.0
    RT_VERSION0x385100x2b0dataEnglishUnited States0.4956395348837209
    DLLImport
    OLEAUT32.dllSysFreeString, SysAllocStringLen, SysAllocString, VariantClear, SysStringLen
    ole32.dllCoCreateInstance, CoInitialize, CoUninitialize, OleInitialize
    USER32.dllCheckDlgButton, IsDlgButtonChecked, EndDialog, SetDlgItemTextW, GetFocus, SetFocus, GetKeyState, InvalidateRect, SetWindowTextW, EnableWindow, PostMessageW, MessageBoxW, SetTimer, DialogBoxParamW, SetWindowLongW, GetWindowLongW, ShowWindow, MoveWindow, ScreenToClient, GetDlgItem, GetWindowRect, MapDialogRect, SystemParametersInfoW, GetWindowTextLengthW, GetWindowTextW, SendMessageW, LoadStringW, CharUpperW, LoadIconW, GetParent, SetCursor, LoadCursorW, KillTimer
    SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHGetMalloc
    MSVCRT.dllwcsstr, wcscmp, _beginthreadex, _except_handler3, ??1type_info@@UAE@XZ, ?terminate@@YAXXZ, __dllonexit, _onexit, _exit, _XcptFilter, exit, _acmdln, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _controlfp, _CxxThrowException, malloc, memcpy, memmove, memset, _purecall, memcmp, __CxxFrameHandler, free
    KERNEL32.dllGetStartupInfoA, InitializeCriticalSection, ResetEvent, SetEvent, CreateEventW, WaitForSingleObject, lstrlenW, lstrcatW, VirtualFree, VirtualAlloc, SetPriorityClass, DeleteCriticalSection, Sleep, EnterCriticalSection, LeaveCriticalSection, WaitForMultipleObjects, GetFileInformationByHandle, GetStdHandle, GlobalMemoryStatus, GetSystemInfo, GetCurrentProcess, GetProcessAffinityMask, FileTimeToLocalFileTime, FileTimeToSystemTime, CompareFileTime, SetEndOfFile, WriteFile, ReadFile, SetFilePointer, GetFileSize, GetLogicalDriveStringsW, GetFileAttributesW, GetModuleHandleA, FindNextFileW, FindFirstFileW, FindClose, GetTickCount, GetCurrentDirectoryW, SetLastError, DeleteFileW, CreateDirectoryW, GetModuleHandleW, MoveFileW, RemoveDirectoryW, SetFileAttributesW, CreateFileW, SetFileTime, CloseHandle, GetSystemDirectoryW, FormatMessageW, LocalFree, GetModuleFileNameW, MultiByteToWideChar, GetLastError, GetVersionExW, LoadLibraryW, GetProcAddress, FreeLibrary, GetCommandLineW, LoadLibraryExW
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 31, 2024 17:32:17.715715885 CET1.1.1.1192.168.2.50x542eNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
    Oct 31, 2024 17:32:17.715715885 CET1.1.1.1192.168.2.50x542eNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:12:31:58
    Start date:31/10/2024
    Path:C:\Users\user\Desktop\nteste.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\nteste.exe"
    Imagebase:0x400000
    File size:2'743'085 bytes
    MD5 hash:5367157A35583431B54B30426831640A
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:14.3%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:4.5%
      Total number of Nodes:2000
      Total number of Limit Nodes:31
      execution_graph 18259 41d6e0 18260 41d6fb 18259->18260 18261 41d712 18260->18261 18263 41d6a0 18260->18263 18264 41d6aa 18263->18264 18268 41d6c8 18264->18268 18269 41f500 free 18264->18269 18266 41d6b9 18270 41f4e0 18266->18270 18268->18261 18269->18266 18271 41f4e4 18270->18271 18272 41f4e7 malloc 18270->18272 18271->18268 18272->18268 18273 41cfe0 18276 41cffa __aulldiv 18273->18276 18274 41d010 18276->18274 18278 420ae0 18276->18278 18277 41d15b 18279 420afa 18278->18279 18280 420b09 18278->18280 18279->18277 18283 420c18 18280->18283 18285 423ac0 18280->18285 18284 420c42 18283->18284 18295 421280 18283->18295 18284->18277 18286 423b26 18285->18286 18289 423bcd 18286->18289 18299 426280 SetEvent 18286->18299 18288 423ba3 18288->18289 18290 426280 2 API calls 18288->18290 18289->18283 18291 423bb1 18290->18291 18291->18289 18303 423c60 18291->18303 18297 421293 18295->18297 18298 421556 18297->18298 18390 420540 18297->18390 18298->18284 18300 426290 GetLastError 18299->18300 18301 42628d 18299->18301 18302 42629a 18300->18302 18301->18288 18302->18288 18304 423c77 18303->18304 18311 423c90 18304->18311 18307 423c40 18308 423c4d 18307->18308 18310 423c5a 18308->18310 18371 423a80 18308->18371 18310->18289 18320 423cf0 18311->18320 18314 426280 2 API calls 18315 423cc1 18314->18315 18316 426280 2 API calls 18315->18316 18317 423ccc 18316->18317 18332 423780 EnterCriticalSection 18317->18332 18319 423bbd 18319->18289 18319->18307 18335 426230 WaitForSingleObject 18320->18335 18322 423c9d 18322->18314 18322->18319 18326 424720 EnterCriticalSection LeaveCriticalSection 18329 423d21 18326->18329 18328 426280 SetEvent GetLastError 18328->18329 18329->18322 18329->18326 18329->18328 18330 424810 EnterCriticalSection LeaveCriticalSection 18329->18330 18331 426230 WaitForSingleObject 18329->18331 18336 424670 18329->18336 18340 4246c0 EnterCriticalSection 18329->18340 18343 424630 18329->18343 18347 423700 EnterCriticalSection 18329->18347 18330->18329 18331->18329 18333 42379b LeaveCriticalSection 18332->18333 18334 423798 18332->18334 18333->18319 18334->18333 18335->18329 18337 4246b2 18336->18337 18338 424688 18336->18338 18337->18329 18338->18337 18350 406260 18338->18350 18342 4246de LeaveCriticalSection 18340->18342 18342->18329 18345 424638 18343->18345 18344 424646 18344->18329 18345->18344 18367 426240 _beginthreadex 18345->18367 18348 423768 LeaveCriticalSection 18347->18348 18349 423745 18347->18349 18348->18329 18349->18348 18351 406279 18350->18351 18354 40768a 18351->18354 18352 40628d 18352->18338 18355 4076ae 18354->18355 18356 4076cd 18355->18356 18358 406671 18355->18358 18356->18352 18363 404827 18358->18363 18361 40669e GetLastError 18362 40669a 18361->18362 18362->18356 18364 404834 18363->18364 18365 4047fa ReadFile 18364->18365 18366 404845 18365->18366 18366->18361 18366->18362 18368 426264 18367->18368 18369 426269 GetLastError 18367->18369 18368->18344 18370 426273 18369->18370 18370->18344 18372 423a8e 18371->18372 18373 423aac 18371->18373 18375 426280 2 API calls 18372->18375 18374 426200 ctype 2 API calls 18373->18374 18376 423ab4 18374->18376 18377 423a96 18375->18377 18378 426280 2 API calls 18377->18378 18379 423a9e 18378->18379 18383 426230 WaitForSingleObject 18379->18383 18381 423aa5 18384 426200 18381->18384 18383->18381 18385 42622b 18384->18385 18386 426209 CloseHandle 18384->18386 18385->18373 18387 426214 GetLastError 18386->18387 18388 426225 18386->18388 18387->18385 18389 42621e 18387->18389 18388->18385 18389->18373 18391 420574 18390->18391 18392 42073e 18390->18392 18391->18392 18394 420642 memcpy 18391->18394 18395 4230f0 18391->18395 18392->18297 18394->18391 18396 423125 18395->18396 18397 4233d5 memcpy 18396->18397 18398 42320b 18396->18398 18397->18391 18398->18391 18399 416ec3 18400 416ed0 18399->18400 18401 416ee1 18399->18401 18400->18401 18405 416f09 18400->18405 18406 416f13 __EH_prolog 18405->18406 18414 417499 18406->18414 18413 4020f6 free 18413->18401 18415 4174a3 __EH_prolog 18414->18415 18419 4174d3 18415->18419 18435 4174ea 18415->18435 18451 4020f6 free 18415->18451 18417 416f29 18421 417448 18417->18421 18452 4020f6 free 18419->18452 18426 417452 __EH_prolog 18421->18426 18423 416f35 18428 416f56 18423->18428 18425 417482 18504 4020f6 free 18425->18504 18426->18425 18498 409e45 18426->18498 18503 4020f6 free 18426->18503 18505 4020f6 free 18428->18505 18430 416f61 18506 4020f6 free 18430->18506 18432 416f69 18507 416dc2 18432->18507 18436 4174f4 __EH_prolog 18435->18436 18453 407cc3 18436->18453 18444 41752d 18474 4020f6 free 18444->18474 18446 417535 18475 417563 18446->18475 18451->18415 18452->18417 18454 407cd3 18453->18454 18455 407cd8 18453->18455 18457 426280 2 API calls 18454->18457 18456 407cee 18455->18456 18491 426230 WaitForSingleObject 18455->18491 18461 4175fc 18456->18461 18457->18455 18459 407ce7 18460 426200 ctype 2 API calls 18459->18460 18460->18456 18462 417606 __EH_prolog 18461->18462 18465 41763b 18462->18465 18493 4020f6 free 18462->18493 18464 417519 18467 4173f2 18464->18467 18492 4020f6 free 18465->18492 18471 4173fc __EH_prolog 18467->18471 18468 417431 18494 4020f6 free 18468->18494 18470 417439 18473 4020f6 free 18470->18473 18471->18468 18495 4020f6 free 18471->18495 18473->18444 18474->18446 18476 41756d __EH_prolog 18475->18476 18477 407cc3 5 API calls 18476->18477 18478 417586 18477->18478 18479 426200 ctype 2 API calls 18478->18479 18480 41758e 18479->18480 18481 426200 ctype 2 API calls 18480->18481 18482 417596 18481->18482 18483 426200 ctype 2 API calls 18482->18483 18484 417542 18483->18484 18485 4175ab 18484->18485 18486 4175b5 __EH_prolog 18485->18486 18496 4020f6 free 18486->18496 18488 4175c8 18497 4020f6 free 18488->18497 18490 417556 18490->18415 18491->18459 18492->18464 18493->18462 18494->18470 18495->18471 18496->18488 18497->18490 18499 426200 ctype 2 API calls 18498->18499 18500 409e50 18499->18500 18501 426200 ctype 2 API calls 18500->18501 18502 409e58 18501->18502 18503->18426 18504->18423 18505->18430 18506->18432 18518 4020f6 free 18507->18518 18509 416dcd 18519 4020f6 free 18509->18519 18511 416dd5 18520 4020f6 free 18511->18520 18513 416ddd 18521 4020f6 free 18513->18521 18515 416de5 18522 4020f6 free 18515->18522 18517 416dec 18517->18413 18518->18509 18519->18511 18520->18513 18521->18515 18522->18517 18523 41f583 VirtualAlloc 18524 41f5a3 VirtualFree 18525 415c02 18526 415c0f 18525->18526 18529 40c507 18526->18529 18536 40c511 __EH_prolog 18529->18536 18530 40c61d 18531 40c636 18530->18531 18816 4020cf malloc 18530->18816 18532 4020cf 2 API calls 18531->18532 18535 40c663 18532->18535 18586 40c676 18535->18586 18819 40a058 18535->18819 18536->18530 18540 40c67a _CxxThrowException 18536->18540 18542 40c68f _CxxThrowException 18536->18542 18609 4025d5 18536->18609 18612 4040ba 18536->18612 18812 408f37 18536->18812 18815 4020f6 free 18536->18815 18540->18542 18542->18586 18543 40cd29 18848 4020f6 free 18543->18848 18545 4025d5 malloc _CxxThrowException 18545->18586 18546 40cb1b 18546->18543 18608 40c739 18546->18608 18547 40cdb6 18849 4020f6 free 18547->18849 18550 40cd18 18847 4020f6 free 18550->18847 18552 40cd20 18553 4040ba 16 API calls 18553->18586 18554 40ccd6 _CxxThrowException 18554->18546 18555 40cb5b 18835 4020f6 free 18555->18835 18562 40cb7a 18836 4020f6 free 18562->18836 18564 40cb85 18566 401bbe free 18564->18566 18565 40cbc2 18838 4020f6 free 18565->18838 18568 40cb92 18566->18568 18570 40cf13 free 18568->18570 18569 40cbcd 18572 401bbe free 18569->18572 18573 40cba1 18570->18573 18571 4020f6 free ctype 18571->18586 18575 40cbda 18572->18575 18837 4020f6 free 18573->18837 18579 40cf13 free 18575->18579 18580 40cbe9 18579->18580 18839 4020f6 free 18580->18839 18582 40cc4e 18842 4020f6 free 18582->18842 18585 40cc08 18840 4020f6 free 18585->18840 18586->18545 18586->18546 18586->18553 18586->18554 18586->18555 18586->18562 18586->18565 18586->18571 18586->18582 18586->18585 18588 40cc91 18586->18588 18586->18608 18686 40ce67 18586->18686 18692 40d489 18586->18692 18698 40cdd3 18586->18698 18702 402778 18586->18702 18708 40fd36 18586->18708 18711 40cf80 18586->18711 18794 401bbe 18586->18794 18800 40cf13 18586->18800 18831 40c4be 18586->18831 18587 40cc59 18589 401bbe free 18587->18589 18844 4020f6 free 18588->18844 18591 40cc66 18589->18591 18594 40cf13 free 18591->18594 18592 40cc13 18595 401bbe free 18592->18595 18597 40cc75 18594->18597 18598 40cc20 18595->18598 18596 40cc9c 18599 401bbe free 18596->18599 18843 4020f6 free 18597->18843 18601 40cf13 free 18598->18601 18602 40cca9 18599->18602 18603 40cc2f 18601->18603 18604 40cf13 free 18602->18604 18841 4020f6 free 18603->18841 18606 40ccb8 18604->18606 18845 4020f6 free 18606->18845 18846 4020f6 free 18608->18846 18610 4020cf 2 API calls 18609->18610 18611 4025e2 18610->18611 18611->18536 18613 4040c4 __EH_prolog 18612->18613 18617 40428c 18613->18617 18857 402618 18613->18857 18616 402618 2 API calls 18620 404105 18616->18620 18618 40430b 18617->18618 18619 4042c0 18617->18619 18621 404357 18618->18621 18622 404327 18618->18622 18680 40432c 18618->18680 18893 4040ab GetFileAttributesW 18619->18893 18626 404143 18620->18626 18861 402999 18620->18861 18640 402618 2 API calls 18621->18640 18621->18680 18625 4040ab GetFileAttributesW 18622->18625 18625->18680 18629 404188 18626->18629 18639 404163 18626->18639 18632 4040ba 14 API calls 18629->18632 18630 403e32 FindClose 18633 404275 18630->18633 18631 4042db 18895 402714 18631->18895 18634 404190 18632->18634 18633->18536 18636 404186 18634->18636 18637 40427c 18634->18637 18865 4026a8 18636->18865 18891 4020f6 free 18637->18891 18638 4042f2 18638->18630 18639->18636 18642 402778 3 API calls 18639->18642 18643 404387 18640->18643 18642->18636 18901 401ded 18643->18901 18645 404284 18892 4020f6 free 18645->18892 18650 4025d5 2 API calls 18673 4041c5 18650->18673 18651 401ded 4 API calls 18652 40439f 18651->18652 18654 403e52 5 API calls 18652->18654 18655 4043af 18654->18655 18657 4043b3 wcscmp 18655->18657 18658 4043d2 18655->18658 18656 404211 18884 4020f6 free 18656->18884 18657->18658 18677 4043cb 18657->18677 18661 4040ab GetFileAttributesW 18658->18661 18659 404209 SetLastError 18659->18656 18664 4043dd 18661->18664 18663 404253 18885 4020f6 free 18663->18885 18669 4043ef 18664->18669 18664->18677 18666 404215 18881 40295d 18666->18881 18667 402714 3 API calls 18671 404446 18667->18671 18668 40425b 18886 403e32 18668->18886 18905 4020f6 free 18669->18905 18906 4020f6 free 18671->18906 18673->18656 18673->18659 18673->18666 18679 4025d5 2 API calls 18673->18679 18868 404048 18673->18868 18876 402143 18673->18876 18880 4020f6 free 18673->18880 18677->18667 18679->18673 18680->18638 18850 403e52 18680->18850 18681 40444e 18683 403e32 FindClose 18681->18683 18683->18633 18684 40426d 18890 4020f6 free 18684->18890 18687 40ce71 __EH_prolog 18686->18687 18688 4025d5 2 API calls 18687->18688 18689 40cea6 18688->18689 18948 40cec1 18689->18948 18693 40d493 __EH_prolog 18692->18693 18695 4020cf 2 API calls 18693->18695 18697 40d4cc 18693->18697 18694 40d513 18694->18586 18695->18697 18696 4020cf 2 API calls 18696->18697 18697->18694 18697->18696 18699 40cde3 18698->18699 18700 4025d5 2 API calls 18699->18700 18701 40ce00 18700->18701 18701->18586 18703 402788 18702->18703 18704 402784 18702->18704 18703->18704 18705 4020cf 2 API calls 18703->18705 18704->18586 18706 40279c 18705->18706 18954 4020f6 free 18706->18954 18955 40f928 18708->18955 18712 40cf8a __EH_prolog 18711->18712 18713 4026a8 2 API calls 18712->18713 18714 40cfda 18713->18714 18715 4026a8 2 API calls 18714->18715 18719 40cff2 18715->18719 18716 40d034 19756 40d5b8 18716->19756 18719->18716 18721 402778 3 API calls 18719->18721 18721->18716 18722 40d055 19772 402c6d 18722->19772 18726 40d06b 19781 4020f6 free 18726->19781 18728 40d077 18729 4025d5 2 API calls 18728->18729 18730 40d084 18729->18730 18731 4026a8 2 API calls 18730->18731 18732 40d097 18731->18732 18733 4025d5 2 API calls 18732->18733 18735 40d107 18732->18735 18736 40d0ad 18733->18736 18734 40d231 18737 40d243 18734->18737 18739 401a7d 4 API calls 18734->18739 18735->18734 18743 40d12d 18735->18743 18748 4025d5 2 API calls 18735->18748 19847 402f86 18736->19847 18740 40d298 18737->18740 18741 40d248 18737->18741 18739->18737 19797 403b12 18740->19797 19868 402876 18741->19868 19883 4020f6 free 18743->19883 18744 40d0f7 19853 4020f6 free 18744->19853 18792 40d13c 18748->18792 18749 40d255 19782 40a37a 18749->19782 18750 40d2a4 GetLastError 18753 40d2b0 18750->18753 18757 402876 3 API calls 18753->18757 18754 40d372 19884 4020f6 free 18754->19884 18760 40d2c2 18757->18760 18759 402778 3 API calls 18759->18744 18764 40295d 4 API calls 18760->18764 18761 40d37a 19885 4020f6 free 18761->19885 18762 40d1e0 18763 40d219 18762->18763 18775 40d1e5 18762->18775 18767 411a68 ctype free 18763->18767 18764->18743 18766 40d329 19817 417a2e 18766->19817 18771 40d225 18767->18771 18769 40d385 19886 4020f6 free 18769->19886 18770 40fdcd 4 API calls 18770->18792 19867 4020f6 free 18771->19867 18772 40d327 18790 40d343 18772->18790 19878 40bc7a 18772->19878 18780 411a68 ctype free 18775->18780 18776 40d38d 18777 411a68 ctype free 18776->18777 18782 40d39b 18777->18782 18778 40d2e8 18779 40d31b 18778->18779 19874 40d3b7 18778->19874 18784 40531a VariantClear 18779->18784 18785 40d205 18780->18785 19887 4020f6 free 18782->19887 18784->18772 19866 4020f6 free 18785->19866 18788 40d3a3 18788->18586 18790->18743 18791 40bc7a 15 API calls 18790->18791 18791->18743 18792->18762 18792->18770 18792->18775 19854 40e0ee 18792->19854 19863 40a992 18792->19863 18795 401bc5 18794->18795 18796 401bd7 18795->18796 21012 4020f6 free 18795->21012 21011 4020f6 free 18796->21011 18799 401bde 18799->18586 18801 40cf1d __EH_prolog 18800->18801 18802 40f264 free 18801->18802 18803 40cf30 18802->18803 18804 40cf69 free 18803->18804 18805 40cf3c 18804->18805 21013 4020f6 free 18805->21013 18807 40cf44 18808 411a68 ctype free 18807->18808 18809 40cf51 18808->18809 21014 40d438 18809->21014 21023 4159ee 18812->21023 18815->18536 18817 4020e0 _CxxThrowException 18816->18817 18818 4020f4 18816->18818 18817->18818 18818->18531 18820 40a062 __EH_prolog 18819->18820 18821 4025d5 2 API calls 18820->18821 18822 40a0b5 18821->18822 18823 4025d5 2 API calls 18822->18823 18824 40a0c1 18823->18824 21032 40a181 18824->21032 18827 4025d5 2 API calls 18828 40a0dc 18827->18828 18829 4020cf 2 API calls 18828->18829 18830 40a147 18829->18830 18830->18586 18832 40c4fa 18831->18832 18834 40c4d2 18831->18834 18832->18586 18833 402ecb wcscmp 18833->18834 18834->18832 18834->18833 18835->18608 18836->18564 18837->18608 18838->18569 18839->18608 18840->18592 18841->18608 18842->18587 18843->18608 18844->18596 18845->18608 18846->18550 18847->18552 18848->18547 18849->18552 18851 403e32 FindClose 18850->18851 18852 403e63 18851->18852 18853 403e67 FindFirstFileW 18852->18853 18856 403e7e 18852->18856 18854 403e82 18853->18854 18853->18856 18907 403e97 18854->18907 18856->18638 18858 402628 18857->18858 18911 402466 18858->18911 18862 4029ab 18861->18862 18914 40249e 18862->18914 18866 402466 2 API calls 18865->18866 18867 4026b8 18866->18867 18867->18650 18869 404058 18868->18869 18870 40404d 18868->18870 18932 403f7a 18869->18932 18927 404005 18870->18927 18873 404056 18874 404074 GetLastError 18873->18874 18875 40406d 18873->18875 18874->18875 18875->18673 18877 40214b 18876->18877 18878 402180 CharUpperW 18877->18878 18879 402175 18877->18879 18878->18877 18879->18673 18880->18673 18882 40249e 4 API calls 18881->18882 18883 40296e 18882->18883 18883->18656 18884->18663 18885->18668 18887 403e3c FindClose 18886->18887 18888 403e47 18886->18888 18887->18888 18889 4020f6 free 18888->18889 18889->18684 18890->18633 18891->18645 18892->18617 18894 4040b7 18893->18894 18894->18631 18894->18680 18896 402726 18895->18896 18897 4020cf 2 API calls 18896->18897 18900 40274a 18896->18900 18898 402740 18897->18898 18944 4020f6 free 18898->18944 18900->18638 18902 401df8 18901->18902 18903 401dfd 18901->18903 18945 402489 18902->18945 18903->18651 18905->18680 18906->18681 18908 403ed5 18907->18908 18909 402714 3 API calls 18908->18909 18910 403ef5 18909->18910 18910->18856 18912 4020cf 2 API calls 18911->18912 18913 40247b 18912->18913 18913->18616 18915 4024b0 18914->18915 18916 4024c3 18914->18916 18918 4023af 18915->18918 18916->18626 18919 402404 _CxxThrowException 18918->18919 18920 4023be 18918->18920 18920->18919 18921 4023c6 18920->18921 18922 4020cf 2 API calls 18921->18922 18923 4023d1 18922->18923 18926 4020f6 free 18923->18926 18925 4023f7 18925->18916 18926->18925 18928 404021 18927->18928 18929 404017 SetLastError 18927->18929 18930 404030 18928->18930 18941 403fee 18928->18941 18929->18930 18930->18873 18933 403e32 FindClose 18932->18933 18934 403f8b 18933->18934 18935 403fd5 18934->18935 18936 403fa2 SetLastError FindFirstStreamW 18934->18936 18937 403f98 SetLastError 18934->18937 18935->18873 18938 403fd0 18936->18938 18939 403fc5 GetLastError 18936->18939 18937->18935 18938->18935 18940 403fee 3 API calls 18938->18940 18939->18935 18939->18938 18940->18935 18942 402714 3 API calls 18941->18942 18943 404004 18942->18943 18943->18930 18944->18900 18946 4023af 4 API calls 18945->18946 18947 40249d 18946->18947 18947->18903 18949 40cecb __EH_prolog 18948->18949 18950 4025d5 2 API calls 18949->18950 18951 40cef8 18950->18951 18952 4025d5 2 API calls 18951->18952 18953 40ceb2 18952->18953 18953->18586 18954->18704 18956 40f932 __EH_prolog 18955->18956 18957 4020cf 2 API calls 18956->18957 18959 40f94c 18957->18959 18958 40f95e 18961 4025d5 2 API calls 18958->18961 18959->18958 19031 40faa2 18959->19031 18962 40f98d 18961->18962 18963 4025d5 2 API calls 18962->18963 18964 40f999 18963->18964 18965 40f9ca 18964->18965 19039 403d6a 18964->19039 18984 40f28b 18965->18984 18971 40f9f7 19060 4020f6 free 18971->19060 18973 40fa6f 19074 4020f6 free 18973->19074 18974 40f9ff 19061 4020f6 free 18974->19061 18977 40fa77 19075 4020f6 free 18977->19075 18980 40fa07 18980->18586 18983 40fa1b 18983->18973 19062 4025b1 18983->19062 19065 401a7d 18983->19065 19073 4020f6 free 18983->19073 18985 40f295 __EH_prolog 18984->18985 19076 40f264 18985->19076 18987 40f887 malloc _CxxThrowException 19030 40f2a6 18987->19030 18988 402778 malloc _CxxThrowException free 18988->19030 18989 40f6a3 18990 40531a VariantClear 18989->18990 19002 40f2b4 18990->19002 18991 40f87a 18992 40531a VariantClear 18991->18992 18992->19002 18994 40f669 18995 40f68f 18994->18995 19193 40ec0a 18994->19193 19198 40d526 18995->19198 19000 40d526 free 19000->19030 19001 402778 3 API calls 19001->18995 19002->18971 19002->18983 19004 40f6b2 19005 40d526 free 19004->19005 19005->19002 19007 40f6fc 19008 40d526 free 19007->19008 19008->19002 19009 40cdd3 2 API calls 19009->19030 19011 40f746 19013 40ec0a 3 API calls 19011->19013 19012 40f7dd 19212 4020f6 free 19012->19212 19016 40f758 19013->19016 19018 402778 3 API calls 19016->19018 19017 40f7e5 19213 4020f6 free 19017->19213 19020 40f767 19018->19020 19210 4020f6 free 19020->19210 19021 40f7ed 19025 40d526 free 19021->19025 19022 40fd5e memcpy malloc _CxxThrowException free 19022->19030 19024 40f76f 19211 4020f6 free 19024->19211 19025->19002 19027 40f777 19028 40d526 free 19027->19028 19028->19002 19029 4020f6 free ctype 19029->19030 19030->18987 19030->18988 19030->18989 19030->18991 19030->18994 19030->19000 19030->19002 19030->19004 19030->19007 19030->19009 19030->19011 19030->19012 19030->19022 19030->19029 19080 40eedc 19030->19080 19114 40531a 19030->19114 19119 40dec1 19030->19119 19136 40de46 19030->19136 19140 40ec65 19030->19140 19189 40e200 19030->19189 19032 40faac __EH_prolog 19031->19032 19033 4025d5 2 API calls 19032->19033 19034 40fae0 19033->19034 19035 4025d5 2 API calls 19034->19035 19036 40faf6 19035->19036 19037 4025d5 2 API calls 19036->19037 19038 40fb05 19037->19038 19038->18958 19685 403d0d 19039->19685 19042 402714 3 API calls 19043 403d84 19042->19043 19044 402714 3 API calls 19043->19044 19045 403d9d 19044->19045 19046 40fc2f 19045->19046 19047 40fc39 __EH_prolog 19046->19047 19048 402778 3 API calls 19047->19048 19049 40fc4e 19048->19049 19050 4025b1 2 API calls 19049->19050 19051 40fc5b 19050->19051 19052 4040ba 16 API calls 19051->19052 19053 40fc6a 19052->19053 19748 4020f6 free 19053->19748 19055 40fc7e 19056 40fc83 _CxxThrowException 19055->19056 19057 40fc98 19055->19057 19056->19057 19749 401ed7 19057->19749 19060->18974 19061->18980 19753 402555 19062->19753 19066 401a87 __EH_prolog 19065->19066 19067 4020cf 2 API calls 19066->19067 19068 401a92 19067->19068 19069 401aa9 19068->19069 19070 4026a8 2 API calls 19068->19070 19071 40fdcd 4 API calls 19069->19071 19070->19069 19072 401ab5 19071->19072 19072->18983 19073->18983 19074->18977 19075->18980 19077 40f26f 19076->19077 19078 40f289 19077->19078 19214 40fda8 19077->19214 19078->19030 19081 40eee6 __EH_prolog 19080->19081 19082 40ef35 19081->19082 19083 40ef08 19081->19083 19084 40ef0f 19082->19084 19086 4020cf 2 API calls 19082->19086 19085 4020cf 2 API calls 19083->19085 19087 40ec65 63 API calls 19084->19087 19085->19084 19088 40ef45 19086->19088 19092 40efd8 19087->19092 19090 402778 3 API calls 19088->19090 19089 40efa5 19089->19030 19091 40ef81 19090->19091 19221 4047ec 19091->19221 19092->19089 19224 4084ff 19092->19224 19095 40ef92 GetLastError 19095->19089 19097 40f152 19233 4020f6 free 19097->19233 19099 4026a8 2 API calls 19108 40f053 19099->19108 19100 401ded 4 API calls 19100->19108 19102 40295d 4 API calls 19102->19108 19103 4020f6 free ctype 19103->19108 19104 402999 4 API calls 19104->19108 19105 4047ec 2 API calls 19105->19108 19106 402778 malloc _CxxThrowException free 19106->19108 19107 40f212 16 API calls 19107->19108 19108->19097 19108->19099 19108->19100 19108->19102 19108->19103 19108->19104 19108->19105 19108->19106 19108->19107 19109 40ec65 63 API calls 19108->19109 19110 40f182 19108->19110 19227 40f238 19108->19227 19109->19108 19234 4020f6 free 19110->19234 19112 40f18a 19235 4020f6 free 19112->19235 19115 405320 19114->19115 19118 4052c4 19114->19118 19115->19030 19116 4052eb VariantClear 19116->19030 19117 405302 19117->19030 19118->19116 19118->19117 19130 40decb __EH_prolog 19119->19130 19120 40df84 19123 40df9c 19120->19123 19124 40df90 19120->19124 19125 40dfcc 19120->19125 19121 40df77 19122 40531a VariantClear 19121->19122 19127 40df7f 19122->19127 19123->19125 19126 40df9a 19123->19126 19261 402823 SysStringLen 19124->19261 19129 40531a VariantClear 19125->19129 19132 40531a VariantClear 19126->19132 19127->19030 19129->19127 19134 40df1e 19130->19134 19254 402419 19130->19254 19133 40dfb6 19132->19133 19133->19127 19267 40dfea 19133->19267 19134->19120 19134->19121 19134->19127 19137 40de6f 19136->19137 19138 40531a VariantClear 19137->19138 19139 40de9c 19138->19139 19139->19030 19141 40ec6f __EH_prolog 19140->19141 19292 40e74a 19141->19292 19143 40ee6b 19143->19030 19147 40ee80 VariantClear 19148 40ecfb 19147->19148 19148->19143 19149 40ee80 VariantClear 19148->19149 19150 40ed14 19149->19150 19150->19143 19151 40ee80 VariantClear 19150->19151 19152 40ed2d 19151->19152 19152->19143 19153 40ee80 VariantClear 19152->19153 19154 40ed46 19153->19154 19154->19143 19155 40ee80 VariantClear 19154->19155 19156 40ed5f 19155->19156 19156->19143 19340 402fde 19156->19340 19159 4025d5 2 API calls 19161 40ed7d 19159->19161 19160 40ed9f 19163 40ee1a 19160->19163 19165 40ee1f 19160->19165 19166 40edcf 19160->19166 19161->19160 19162 402714 3 API calls 19161->19162 19162->19160 19360 4020f6 free 19163->19360 19355 40d974 19165->19355 19169 4025d5 2 API calls 19166->19169 19167 40ee63 19361 4020f6 free 19167->19361 19172 40edd7 19169->19172 19173 4025d5 2 API calls 19172->19173 19174 40ede5 19173->19174 19344 40c37a 19174->19344 19175 40c37a 4 API calls 19177 40ee46 19175->19177 19179 402778 3 API calls 19177->19179 19181 40ee52 19179->19181 19190 40e20a __EH_prolog 19189->19190 19191 40531a VariantClear 19190->19191 19192 40e28d 19191->19192 19192->19030 19194 402778 3 API calls 19193->19194 19195 40ec52 19194->19195 19196 402778 3 API calls 19195->19196 19197 40ec5e 19196->19197 19197->19001 19199 40d530 __EH_prolog 19198->19199 19675 4020f6 free 19199->19675 19201 40d549 19676 4020f6 free 19201->19676 19203 40d551 19677 4020f6 free 19203->19677 19205 40d559 19678 40cf69 19205->19678 19208 40cf69 free 19209 40d56c 19208->19209 19209->19002 19210->19024 19211->19027 19212->19017 19213->19021 19215 40fdc6 19214->19215 19216 40fdb9 19214->19216 19215->19077 19217 40d526 free 19216->19217 19218 40fdc0 19217->19218 19220 4020f6 free 19218->19220 19220->19215 19236 4047cb 19221->19236 19250 4024c6 19224->19250 19226 408513 19226->19108 19228 40f250 19227->19228 19229 40f246 19227->19229 19231 4026a8 2 API calls 19228->19231 19230 4025d5 2 API calls 19229->19230 19232 40f24e 19230->19232 19231->19232 19232->19108 19233->19089 19234->19112 19235->19089 19239 4047ae 19236->19239 19242 404685 19239->19242 19247 4046be 19242->19247 19245 404694 CreateFileW 19246 4046b9 19245->19246 19246->19084 19246->19095 19248 4046c8 CloseHandle 19247->19248 19249 404690 19247->19249 19248->19249 19249->19245 19249->19246 19251 4024da 19250->19251 19252 402466 2 API calls 19251->19252 19253 4024e4 19252->19253 19253->19226 19253->19253 19255 402440 19254->19255 19256 40242b _CxxThrowException 19254->19256 19257 4020cf 2 API calls 19255->19257 19256->19255 19258 40244b 19257->19258 19283 4020f6 free 19258->19283 19260 402458 19260->19134 19262 402838 19261->19262 19266 40284c 19261->19266 19263 4020cf 2 API calls 19262->19263 19264 402843 19263->19264 19284 4020f6 free 19264->19284 19266->19126 19268 40dff4 __EH_prolog 19267->19268 19285 40dea5 19268->19285 19271 40e077 19271->19127 19272 402778 3 API calls 19273 40e02e 19272->19273 19274 40e051 19273->19274 19275 40e08a 19273->19275 19276 40e05c 19273->19276 19279 40531a VariantClear 19274->19279 19275->19274 19278 40e06f 19275->19278 19277 401ded 4 API calls 19276->19277 19280 40e065 19277->19280 19281 40531a VariantClear 19278->19281 19279->19271 19288 402911 19280->19288 19281->19271 19283->19260 19284->19266 19286 40de46 VariantClear 19285->19286 19287 40deb0 19286->19287 19287->19271 19287->19272 19289 402921 19288->19289 19290 40249e 4 API calls 19289->19290 19291 402934 19290->19291 19291->19278 19293 40e754 __EH_prolog 19292->19293 19294 402fde 2 API calls 19293->19294 19295 40e7b5 19294->19295 19296 4025d5 2 API calls 19295->19296 19298 40e7c0 19296->19298 19297 40e7e2 19300 4020cf 2 API calls 19297->19300 19301 40e80c 19297->19301 19298->19297 19299 402714 3 API calls 19298->19299 19299->19297 19300->19301 19302 40e852 19301->19302 19310 40e871 19301->19310 19385 40fdcd 19302->19385 19304 40e85b 19318 40e966 19304->19318 19330 40e919 19304->19330 19362 40674f 19304->19362 19307 40eb12 19426 4020f6 free 19307->19426 19308 40d974 CharUpperW 19308->19310 19310->19304 19310->19308 19316 40fdcd 4 API calls 19310->19316 19388 4037b0 19310->19388 19311 40eb1a 19427 4020f6 free 19311->19427 19313 40eb22 19428 4020f6 free 19313->19428 19316->19310 19319 40eb5a 19318->19319 19328 40ec0a 3 API calls 19318->19328 19318->19330 19331 40674f 3 API calls 19318->19331 19368 40e6e6 19318->19368 19371 418bd7 19318->19371 19377 4194ad 19318->19377 19391 40e30d 19318->19391 19429 4020f6 free 19319->19429 19322 40eb73 19430 4020f6 free 19322->19430 19324 40eb7b 19431 4020f6 free 19324->19431 19326 40eb83 19432 4020f6 free 19326->19432 19328->19318 19329 40eb2a 19329->19143 19336 40ee80 19329->19336 19425 4020f6 free 19330->19425 19331->19318 19333 40674f 3 API calls 19333->19318 19337 40eea6 19336->19337 19338 40531a VariantClear 19337->19338 19339 40ece0 19338->19339 19339->19143 19339->19147 19341 402ff1 19340->19341 19342 402618 2 API calls 19341->19342 19343 402fff 19342->19343 19343->19159 19345 40c384 __EH_prolog 19344->19345 19356 40d99c 19355->19356 19357 40d97f 19355->19357 19356->19175 19357->19356 19358 402143 CharUpperW 19357->19358 19358->19357 19360->19167 19361->19143 19363 406758 19362->19363 19364 40675f 19362->19364 19363->19330 19363->19333 19433 404729 SetFilePointer 19364->19433 19366 406777 19436 40672b 19366->19436 19440 40e700 19368->19440 19370 40e6f9 19370->19318 19372 418be1 __EH_prolog 19371->19372 19373 4194ad 11 API calls 19372->19373 19374 418c53 19373->19374 19376 418c5a 19374->19376 19456 41b257 19374->19456 19376->19318 19378 4194bf 19377->19378 19383 40674f 3 API calls 19378->19383 19379 4194d3 19382 41950a 19379->19382 19384 40674f 3 API calls 19379->19384 19380 4194e7 19380->19382 19610 4192dc 19380->19610 19382->19318 19383->19379 19384->19380 19625 401cde 19385->19625 19389 401cde 4 API calls 19388->19389 19390 4037b9 memmove 19389->19390 19390->19310 19392 40e317 __EH_prolog 19391->19392 19393 40e397 19392->19393 19394 40e387 19392->19394 19634 40e2a0 19393->19634 19396 40531a VariantClear 19394->19396 19424 40e38f 19396->19424 19398 40531a VariantClear 19399 40e3ad 19398->19399 19400 40e3e5 19399->19400 19401 40e3d5 19399->19401 19403 40e2a0 _CxxThrowException 19400->19403 19402 40531a VariantClear 19401->19402 19402->19424 19404 40e3ef 19403->19404 19405 40531a VariantClear 19404->19405 19406 40e3fa 19405->19406 19407 40e432 19406->19407 19408 40e422 19406->19408 19410 40e450 19407->19410 19412 402714 3 API calls 19407->19412 19409 40531a VariantClear 19408->19409 19409->19424 19411 40531a VariantClear 19410->19411 19413 40e458 19411->19413 19412->19410 19414 40e490 19413->19414 19415 40e480 19413->19415 19416 40e4ae 19414->19416 19419 402714 3 API calls 19414->19419 19417 40531a VariantClear 19415->19417 19418 40531a VariantClear 19416->19418 19417->19424 19420 40e4ba 19418->19420 19419->19416 19420->19424 19638 40e5aa 19420->19638 19424->19318 19425->19307 19426->19311 19427->19313 19428->19329 19429->19322 19430->19324 19431->19326 19432->19329 19434 404752 GetLastError 19433->19434 19435 40475c 19433->19435 19434->19435 19435->19366 19437 406732 GetLastError 19436->19437 19438 40672f 19436->19438 19439 40673c 19437->19439 19438->19363 19439->19363 19441 40e70a __EH_prolog 19440->19441 19444 41b580 19441->19444 19442 40e721 19442->19370 19445 41b58a __EH_prolog 19444->19445 19446 4020cf 2 API calls 19445->19446 19447 41b595 19446->19447 19448 41b5a9 19447->19448 19450 418325 19447->19450 19448->19442 19451 41832f __EH_prolog 19450->19451 19452 4183a5 7 API calls 19451->19452 19453 418354 19452->19453 19454 4025d5 malloc _CxxThrowException 19453->19454 19455 418372 19454->19455 19455->19448 19457 41b261 __EH_prolog 19456->19457 19462 41af85 19457->19462 19460 41b298 _CxxThrowException 19460->19376 19461 41b2cf 19461->19376 19463 41af8f __EH_prolog 19462->19463 19492 418dda 19463->19492 19465 41b04b 19465->19460 19465->19461 19467 41b0e5 19467->19465 19468 4020cf 2 API calls 19467->19468 19469 41b10a 19468->19469 19499 407bca 19469->19499 19471 41b121 19474 41b141 19471->19474 19484 41b125 19471->19484 19537 419091 _CxxThrowException 19471->19537 19502 419171 19474->19502 19477 41b201 19539 41a862 19477->19539 19479 41b193 19506 41a5b5 19479->19506 19480 419091 _CxxThrowException 19480->19479 19609 4020f6 free 19484->19609 19491 40674f 3 API calls 19491->19467 19493 418e5f free 19492->19493 19494 418e10 19493->19494 19495 4020f6 ctype free 19494->19495 19496 418e2c 19495->19496 19497 4020f6 ctype free 19496->19497 19498 418e3f 19497->19498 19498->19465 19498->19491 19500 407b7e ReadFile GetLastError 19499->19500 19501 407bdd 19500->19501 19501->19471 19503 41918d 19502->19503 19504 41919c 19503->19504 19505 419091 _CxxThrowException 19503->19505 19504->19477 19504->19479 19504->19480 19505->19504 19507 41a5bf __EH_prolog 19506->19507 19508 41a355 19 API calls 19507->19508 19519 41a61c 19508->19519 19509 41b4c4 memcpy malloc _CxxThrowException free 19509->19519 19510 4182b8 free 19511 41a7a0 19510->19511 19513 4020f6 ctype free 19511->19513 19512 41a7dd _CxxThrowException 19514 41a7f1 19512->19514 19518 4182b8 free 19514->19518 19516 407b48 malloc _CxxThrowException free 19516->19519 19521 41a80e 19518->19521 19519->19509 19519->19512 19519->19514 19519->19516 19522 4020cf malloc _CxxThrowException 19519->19522 19531 4162a0 30 API calls 19519->19531 19535 41a771 19519->19535 19536 419091 _CxxThrowException 19519->19536 19524 4020f6 ctype free 19521->19524 19522->19519 19531->19519 19535->19510 19536->19519 19538 4190a9 19537->19538 19538->19474 19540 41a86c __EH_prolog 19539->19540 19541 419171 _CxxThrowException 19540->19541 19542 41a87f 19541->19542 19543 41a8a7 19542->19543 19544 41953a _CxxThrowException 19542->19544 19546 41a5b5 45 API calls 19543->19546 19548 41a924 19543->19548 19545 41a89f 19544->19545 19547 419171 _CxxThrowException 19545->19547 19550 41a8f0 19546->19550 19547->19543 19549 41a99c 19548->19549 19553 41a355 19 API calls 19548->19553 19559 419268 _CxxThrowException _CxxThrowException 19549->19559 19598 41ae12 19549->19598 19551 41a8f7 19550->19551 19552 41a90b 19550->19552 19556 419171 _CxxThrowException 19552->19556 19557 41a983 19553->19557 19556->19548 19609->19465 19611 4192e6 __EH_prolog 19610->19611 19612 407bca 2 API calls 19611->19612 19614 4192fd 19612->19614 19613 419310 19613->19382 19614->19613 19615 4020cf 2 API calls 19614->19615 19616 419337 memcpy 19615->19616 19620 419355 19616->19620 19617 419414 19624 4020f6 free 19617->19624 19619 4193f6 memmove 19619->19620 19620->19617 19620->19619 19621 419419 memcpy 19620->19621 19623 406671 2 API calls 19620->19623 19622 40674f 3 API calls 19621->19622 19622->19617 19623->19620 19624->19613 19626 401d28 19625->19626 19627 401ce9 19625->19627 19626->19304 19628 4020cf 2 API calls 19627->19628 19629 401d08 19628->19629 19630 401d21 19629->19630 19631 401d12 memcpy 19629->19631 19633 4020f6 free 19630->19633 19631->19630 19633->19626 19635 40e2a8 19634->19635 19636 40e2d1 19635->19636 19637 40e2bc _CxxThrowException 19635->19637 19636->19398 19637->19636 19640 40e5b4 __EH_prolog 19638->19640 19639 40531a VariantClear 19641 40e4eb 19639->19641 19640->19639 19641->19424 19642 40e648 19641->19642 19643 40e652 __EH_prolog 19642->19643 19644 40531a VariantClear 19643->19644 19645 40e6d3 19644->19645 19645->19424 19675->19201 19676->19203 19677->19205 19683 4020f6 free 19678->19683 19680 40cf74 19684 4020f6 free 19680->19684 19682 40cf7c 19682->19208 19683->19680 19684->19682 19686 4051af 19685->19686 19689 404e26 19686->19689 19690 404e30 __EH_prolog 19689->19690 19691 402714 3 API calls 19690->19691 19692 404e43 19691->19692 19693 404ea1 19692->19693 19696 404e50 19692->19696 19694 4025d5 2 API calls 19693->19694 19695 404ea9 19694->19695 19698 404eb4 19695->19698 19699 404ebf 19695->19699 19697 403d76 19696->19697 19700 402618 2 API calls 19696->19700 19697->19042 19697->19043 19701 402714 3 API calls 19698->19701 19738 404fde GetCurrentDirectoryW 19699->19738 19703 404e69 19700->19703 19704 404ebd 19701->19704 19733 405036 19703->19733 19732 404eed 19704->19732 19741 404989 19704->19741 19709 404e94 19737 4020f6 free 19709->19737 19711 40295d 4 API calls 19711->19709 19712 404ed3 19713 4025d5 2 API calls 19712->19713 19712->19732 19714 404f53 19713->19714 19715 404f80 19714->19715 19716 404f66 19714->19716 19717 402714 3 API calls 19715->19717 19718 402911 4 API calls 19716->19718 19719 404f7e 19717->19719 19720 404f75 19718->19720 19721 405036 memmove 19719->19721 19722 402911 4 API calls 19720->19722 19723 404f94 19721->19723 19722->19719 19724 404fa6 19723->19724 19725 404f98 19723->19725 19727 402778 3 API calls 19724->19727 19746 4020f6 free 19725->19746 19728 404fc2 19727->19728 19729 40295d 4 API calls 19728->19729 19730 404fce 19729->19730 19747 4020f6 free 19730->19747 19745 4020f6 free 19732->19745 19735 405049 19733->19735 19734 404e75 19734->19709 19734->19711 19735->19734 19736 402cf9 memmove 19735->19736 19736->19735 19737->19697 19739 402714 3 API calls 19738->19739 19740 40501f 19739->19740 19740->19704 19742 4049aa 19741->19742 19743 404990 19741->19743 19742->19712 19743->19742 19744 401ded 4 API calls 19743->19744 19744->19742 19745->19697 19746->19732 19747->19732 19748->19055 19750 401f00 19749->19750 19752 401ee2 19749->19752 19750->18965 19751 4020f6 free ctype 19751->19752 19752->19750 19752->19751 19754 402466 2 API calls 19753->19754 19755 402570 19754->19755 19755->18983 19757 40d5c2 __EH_prolog 19756->19757 19758 4026a8 2 API calls 19757->19758 19759 40d5d5 19758->19759 19888 40d61c 19759->19888 19762 40d5f9 19764 4026a8 2 API calls 19762->19764 19765 40d604 19764->19765 19892 4020f6 free 19765->19892 19767 40d042 19768 40265b 19767->19768 19769 402671 19768->19769 19769->19769 19770 402466 2 API calls 19769->19770 19771 402680 19770->19771 19771->18722 19771->19771 19773 402cd1 19772->19773 19774 402c7f 19772->19774 19780 4020f6 free 19773->19780 19904 402cd8 19774->19904 19776 402c8b 19776->19773 19907 402a16 wcsstr 19776->19907 19909 402cf9 19776->19909 19913 402ba9 19776->19913 19780->18726 19781->18728 19920 40bd59 19782->19920 19784 40a38d 19925 40354e 19784->19925 19787 402778 3 API calls 19788 40a482 19787->19788 19789 402778 3 API calls 19788->19789 19790 40a48d 19789->19790 19791 40a4af 19790->19791 19792 404989 4 API calls 19790->19792 19791->18766 19791->18778 19793 40a49f 19792->19793 19794 403d0d 6 API calls 19793->19794 19795 40a4a8 19794->19795 19796 404989 4 API calls 19795->19796 19796->19791 19798 403b1c __EH_prolog 19797->19798 19799 4040ab GetFileAttributesW 19798->19799 19801 403b27 19799->19801 19800 403b30 19800->18749 19800->18750 19801->19800 19802 402618 2 API calls 19801->19802 19804 403b5d 19802->19804 19803 403b84 19805 4026a8 2 API calls 19803->19805 19804->19803 19806 403b7d 19804->19806 19813 403b9a 19805->19813 19967 4020f6 free 19806->19967 19809 403bad GetLastError 19810 403c2c 19809->19810 19809->19813 19966 4020f6 free 19810->19966 19812 403c38 19812->19806 19813->19809 19813->19810 19815 403bf6 19813->19815 19948 403c53 19813->19948 19815->19810 19959 4027d0 19815->19959 19965 403b03 CreateDirectoryW 19815->19965 19819 417a38 __EH_prolog 19817->19819 19818 4020cf 2 API calls 19820 417b3e 19818->19820 19819->19818 19828 417a86 19819->19828 19821 4020cf 2 API calls 19820->19821 19827 417ba3 19821->19827 19822 417c0e 19824 4182b8 free 19822->19824 19823 417c66 19971 4182b8 19823->19971 19824->19828 19827->19822 19827->19823 19827->19828 19829 417daf 19827->19829 19831 4025d5 2 API calls 19827->19831 19833 4179f9 45 API calls 19827->19833 19834 417ec0 19827->19834 19836 418003 19827->19836 19838 417f4c 19827->19838 19977 4176e6 19827->19977 19980 4162a0 19827->19980 20056 4020f6 free 19827->20056 19828->18772 19830 4182b8 free 19829->19830 19830->19828 19831->19827 19833->19827 20053 4020f6 free 19834->20053 20055 4020f6 free 19836->20055 20054 4020f6 free 19838->20054 19841 417ec8 19842 4182b8 free 19841->19842 19842->19828 19843 41800b 19844 4182b8 free 19843->19844 19844->19828 19845 417f51 19846 4182b8 free 19845->19846 19846->19828 19849 402f94 19847->19849 19848 4027d0 3 API calls 19850 402fcf 19848->19850 19849->19848 19851 402714 3 API calls 19850->19851 19852 402fd9 19851->19852 19852->18744 19852->18759 19853->18735 19855 401ed7 free 19854->19855 19856 40e114 19855->19856 19857 40dea5 VariantClear 19856->19857 19858 40e120 19857->19858 19859 40e143 19858->19859 20917 40e0a1 19858->20917 19859->18792 20947 40a964 19863->20947 19866->18743 19867->18734 19869 402889 19868->19869 19870 4020cf 2 API calls 19869->19870 19873 4028a9 19869->19873 19871 40289f 19870->19871 20999 4020f6 free 19871->20999 19873->18749 19875 40d3ea 19874->19875 19876 40d3c6 19874->19876 19875->18779 19876->19875 19877 40d3d5 _CxxThrowException 19876->19877 19877->19875 19879 40b7f7 12 API calls 19878->19879 19880 40bc83 19879->19880 21000 40bbbf 19880->21000 19883->18754 19884->18761 19885->18769 19886->18776 19887->18788 19889 40d624 19888->19889 19890 40d5e9 19889->19890 19899 402b21 19889->19899 19890->19762 19893 4026d6 19890->19893 19892->19767 19894 4026e2 19893->19894 19895 4026f3 19893->19895 19896 4020cf 2 API calls 19894->19896 19895->19762 19897 4026ea 19896->19897 19903 4020f6 free 19897->19903 19900 402b31 memmove 19899->19900 19901 402b2c 19899->19901 19900->19890 19902 402489 4 API calls 19901->19902 19902->19900 19903->19895 19905 402ce0 wcscmp 19904->19905 19906 402cf2 19904->19906 19905->19906 19906->19776 19908 402a33 19907->19908 19908->19776 19910 402d10 19909->19910 19911 402d41 19910->19911 19912 402d18 memmove 19910->19912 19911->19776 19912->19911 19914 402bb9 19913->19914 19916 402bc3 19913->19916 19917 402373 19914->19917 19916->19776 19918 40249e 4 API calls 19917->19918 19919 402381 memmove 19918->19919 19919->19916 19921 40bd81 19920->19921 19923 40bd64 19920->19923 19921->19784 19923->19921 19934 40bddb 19923->19934 19937 4020f6 free 19923->19937 19926 403558 __EH_prolog 19925->19926 19927 401ed7 free 19926->19927 19930 403564 19926->19930 19928 403570 19927->19928 19939 403762 19928->19939 19930->19787 19931 4020cf 2 API calls 19933 40357e 19931->19933 19932 4026a8 2 API calls 19932->19933 19933->19930 19933->19931 19933->19932 19938 4020f6 free 19934->19938 19936 40bde3 19936->19923 19937->19923 19938->19936 19940 40376f 19939->19940 19946 4037a4 19939->19946 19941 4020cf 2 API calls 19940->19941 19942 403784 19941->19942 19943 40379d 19942->19943 19944 40378e memcpy 19942->19944 19947 4020f6 free 19943->19947 19944->19943 19946->19933 19947->19946 19968 427400 19948->19968 19950 403c5d CreateDirectoryW 19951 403c76 GetLastError 19950->19951 19952 403c72 19950->19952 19951->19952 19953 403c87 19951->19953 19952->19813 19954 4025d5 2 API calls 19953->19954 19955 403c97 19954->19955 19956 4040ba 16 API calls 19955->19956 19957 403ca3 19956->19957 19969 4020f6 free 19957->19969 19960 4027de 19959->19960 19962 4027f1 19959->19962 19961 4020cf 2 API calls 19960->19961 19963 4027e8 19961->19963 19962->19815 19970 4020f6 free 19963->19970 19965->19815 19966->19812 19967->19800 19968->19950 19969->19952 19970->19962 19972 4182c2 __EH_prolog 19971->19972 20057 4020f6 free 19972->20057 19974 4182e9 20058 4178bc 19977->20058 19981 4162aa __EH_prolog 19980->19981 20666 4197cd 19981->20666 20053->19841 20054->19845 20055->19843 20056->19827 20057->19974 20061 4178bf 20058->20061 20059 417708 20059->19827 20061->20059 20063 41770b 20061->20063 20069 417890 20061->20069 20064 417715 __EH_prolog 20063->20064 20073 404785 20064->20073 20070 417897 20069->20070 20749 419557 20666->20749 20776 419268 20749->20776 20918 40dec1 7 API calls 20917->20918 20919 40e0b3 20918->20919 20920 40e0e7 20919->20920 20939 40deb3 20919->20939 20920->19859 20924 402ee4 20920->20924 20925 402eee __EH_prolog 20924->20925 20926 401ed7 free 20925->20926 20927 402f00 20926->20927 20928 402f76 20927->20928 20929 4025d5 2 API calls 20927->20929 20928->19859 20935 402f11 20929->20935 20930 402f51 20931 4027d0 3 API calls 20930->20931 20933 402f62 20931->20933 20932 4027d0 3 API calls 20932->20935 20934 401a7d 4 API calls 20933->20934 20936 402f6e 20934->20936 20935->20930 20935->20932 20937 401a7d 4 API calls 20935->20937 20946 4020f6 free 20936->20946 20937->20935 20940 40de46 VariantClear 20939->20940 20941 40debe 20940->20941 20941->20920 20942 402b5a 20941->20942 20943 402b69 20942->20943 20945 402b84 20942->20945 20943->20943 20944 402373 5 API calls 20943->20944 20943->20945 20944->20945 20945->20920 20946->20928 20950 4033fe 20947->20950 20951 403408 __EH_prolog 20950->20951 20969 4033c1 20951->20969 20954 4033c1 2 API calls 20955 40343a 20954->20955 20958 403425 20955->20958 20973 403208 20955->20973 20958->18792 20961 401ac4 2 API calls 20962 40346b 20961->20962 20963 4033fe 6 API calls 20962->20963 20964 403482 20963->20964 20965 403496 20964->20965 20966 403486 20964->20966 20968 411a68 ctype free 20965->20968 20967 411a68 ctype free 20966->20967 20967->20958 20968->20958 20972 4033cd 20969->20972 20970 4033f3 20970->20954 20970->20958 20972->20970 20984 403103 20972->20984 20974 403231 20973->20974 20975 403213 20973->20975 20974->20958 20977 4034b6 20974->20977 20975->20974 20976 402ecb wcscmp 20975->20976 20976->20975 20978 4034c0 __EH_prolog 20977->20978 20980 4020cf 2 API calls 20978->20980 20983 4034f5 20978->20983 20979 40345d 20979->20961 20980->20983 20981 4020cf 2 API calls 20981->20983 20982 4026a8 2 API calls 20982->20983 20983->20979 20983->20981 20983->20982 20986 403112 20984->20986 20985 4031d7 20985->20972 20986->20985 20988 402ecb wcscmp 20986->20988 20989 403005 20986->20989 20988->20986 20992 40300e 20989->20992 20991 40308c 20991->20986 20992->20991 20993 402180 CharUpperW 20992->20993 20994 40300e 20992->20994 20993->20992 20995 40308c 20994->20995 20997 403023 20994->20997 20995->20992 20996 40300e CharUpperW 20996->20997 20997->20995 20997->20996 20998 402180 CharUpperW 20997->20998 20998->20997 20999->19873 21001 40bbc9 __EH_prolog 21000->21001 21002 406117 3 API calls 21001->21002 21009 40bbd7 21001->21009 21003 40bbfa 21002->21003 21004 40bc55 21003->21004 21005 40bb8f 3 API calls 21003->21005 21005->21003 21009->18790 21011->18799 21012->18795 21013->18807 21015 40d442 __EH_prolog 21014->21015 21018 40d526 free 21015->21018 21019 40d472 21015->21019 21021 4020f6 free 21015->21021 21017 40cf5c 21017->18586 21018->21015 21022 4020f6 free 21019->21022 21021->21015 21022->21017 21024 408f3f 21023->21024 21025 4159f9 21023->21025 21024->18536 21026 4020cf 2 API calls 21025->21026 21027 415a18 21026->21027 21028 415a31 21027->21028 21029 415a22 memcpy 21027->21029 21031 4020f6 free 21028->21031 21029->21028 21031->21024 21033 4025d5 2 API calls 21032->21033 21034 40a0cd 21033->21034 21034->18827 21035 4277c6 __set_app_type __p__fmode __p__commode 21036 427835 21035->21036 21037 427849 21036->21037 21038 42783d __setusermatherr 21036->21038 21047 427942 _controlfp 21037->21047 21038->21037 21040 42784e _initterm __getmainargs _initterm 21041 4278a2 GetStartupInfoA 21040->21041 21043 4278d6 GetModuleHandleA 21041->21043 21048 4019ce 21043->21048 21047->21040 21049 4019d8 __EH_prolog 21048->21049 21059 401a47 GetVersionExW 21049->21059 21052 401a10 21061 420210 GetVersionExW 21052->21061 21053 4019f0 21222 4100cf MessageBoxW 21053->21222 21058 4019fc exit _XcptFilter 21060 4019ec 21059->21060 21060->21052 21060->21053 21062 42023e GetModuleHandleW GetProcAddress 21061->21062 21065 42022f 21061->21065 21063 420268 GetSystemDirectoryW 21062->21063 21064 420259 21062->21064 21066 420283 21063->21066 21067 401a19 21063->21067 21064->21063 21064->21067 21065->21062 21065->21063 21066->21067 21068 42028e lstrlenW 21066->21068 21071 401039 21067->21071 21069 4202a9 21068->21069 21069->21067 21070 4202fa lstrcatW LoadLibraryExW 21069->21070 21070->21067 21070->21069 21223 427400 21071->21223 21073 401043 OleInitialize 21224 40195e LoadLibraryW 21073->21224 21076 4025d5 2 API calls 21077 401079 21076->21077 21078 4025d5 2 API calls 21077->21078 21079 40108a 21078->21079 21080 401096 GetCommandLineW 21079->21080 21081 402618 2 API calls 21080->21081 21082 4010a9 21081->21082 21230 401e1b 21082->21230 21086 4010c4 21087 401ac4 2 API calls 21086->21087 21095 4010d3 21086->21095 21087->21095 21088 401153 21089 4025d5 2 API calls 21088->21089 21090 40115f 21089->21090 21251 403926 GetModuleFileNameW 21090->21251 21093 40119d 21374 4100cf MessageBoxW 21093->21374 21094 4025d5 2 API calls 21097 401176 21094->21097 21095->21088 21095->21093 21099 402714 malloc _CxxThrowException free 21095->21099 21102 404989 4 API calls 21095->21102 21100 403d0d 6 API calls 21097->21100 21098 4011a9 21105 411a68 ctype free 21098->21105 21099->21095 21101 401188 21100->21101 21103 4011b1 21101->21103 21104 40118c 21101->21104 21102->21095 21108 4020cf 2 API calls 21103->21108 21373 4100cf MessageBoxW 21104->21373 21107 4015b0 21105->21107 21371 4020f6 free 21107->21371 21114 4011b8 21108->21114 21109 401198 21424 4020f6 free 21109->21424 21111 4015b8 21372 4020f6 free 21111->21372 21113 4015c0 21113->21058 21255 40db3e 21114->21255 21118 401596 21425 4020f6 free 21118->21425 21120 401200 21123 4020cf 2 API calls 21120->21123 21121 4011f4 21375 401000 21121->21375 21124 40120a 21123->21124 21125 40121d 21124->21125 21383 4017c1 21124->21383 21267 411e4d 21125->21267 21222->21058 21223->21073 21225 401975 GetProcAddress 21224->21225 21226 40105e 21224->21226 21227 4019b5 FreeLibrary 21225->21227 21228 401988 memset 21225->21228 21226->21076 21227->21226 21229 4019a4 21228->21229 21229->21227 21231 401e25 __EH_prolog 21230->21231 21232 4026a8 2 API calls 21231->21232 21233 401e34 21232->21233 21428 402a98 21233->21428 21236 401ed7 free 21239 401e4f 21236->21239 21237 4025d5 malloc _CxxThrowException 21237->21239 21239->21237 21240 401a7d 4 API calls 21239->21240 21241 401eaf 21239->21241 21242 402778 3 API calls 21239->21242 21245 4020f6 free ctype 21239->21245 21432 401d64 21239->21432 21240->21239 21438 4020f6 free 21241->21438 21242->21239 21244 401eb7 21439 4020f6 free 21244->21439 21245->21239 21247 401ebf 21440 4020f6 free 21247->21440 21249 4010b8 21250 4020f6 free 21249->21250 21250->21086 21252 403963 21251->21252 21253 40116e 21251->21253 21252->21253 21254 402714 3 API calls 21252->21254 21253->21094 21254->21253 21256 40db48 __EH_prolog 21255->21256 21441 40dd0a 21256->21441 21259 4025d5 malloc _CxxThrowException 21260 40db57 21259->21260 21260->21259 21261 402876 malloc _CxxThrowException free 21260->21261 21263 4020f6 free ctype 21260->21263 21266 4011f0 21260->21266 21446 40dc3e 21260->21446 21449 40d9a8 21260->21449 21466 40dcc3 21260->21466 21474 401c31 21260->21474 21261->21260 21263->21260 21266->21120 21266->21121 21268 411e57 __EH_prolog 21267->21268 21539 4100df 21268->21539 21371->21111 21372->21113 21373->21109 21374->21098 21376 40100a __EH_prolog 21375->21376 21855 4156a6 21376->21855 21384 4017cb __EH_prolog 21383->21384 21385 4025d5 2 API calls 21384->21385 21386 4017fe 21385->21386 21424->21118 21425->21098 21429 402aa0 21428->21429 21430 401e48 21429->21430 21431 402ac1 memmove 21429->21431 21430->21236 21431->21430 21433 401dcb 21432->21433 21436 401d8e 21432->21436 21433->21239 21434 401dd9 21435 402714 3 API calls 21434->21435 21435->21433 21436->21433 21436->21434 21437 401ded 4 API calls 21436->21437 21437->21436 21438->21244 21439->21247 21440->21249 21442 40dd32 21441->21442 21444 40dd15 21441->21444 21442->21260 21444->21442 21480 401bfe 21444->21480 21486 4020f6 free 21444->21486 21447 4025d5 2 API calls 21446->21447 21448 40dc54 21447->21448 21448->21260 21450 40d9b2 __EH_prolog 21449->21450 21488 40daa9 21450->21488 21467 40dccd __EH_prolog 21466->21467 21468 4020cf 2 API calls 21467->21468 21469 40dcd8 21468->21469 21470 40dcef 21469->21470 21512 40dd3a 21469->21512 21472 40fdcd 4 API calls 21470->21472 21473 40dcfb 21472->21473 21473->21260 21476 401c3b __EH_prolog 21474->21476 21475 401c61 21530 4020f6 free 21475->21530 21476->21475 21525 401c77 21476->21525 21479 401c68 21479->21260 21481 401c08 __EH_prolog 21480->21481 21482 401c31 ctype free 21481->21482 21483 401c1b 21482->21483 21487 4020f6 free 21483->21487 21485 401c23 21485->21444 21486->21444 21487->21485 21489 40dab3 __EH_prolog 21488->21489 21490 401ed7 free 21489->21490 21491 40dac5 21490->21491 21492 4025d5 2 API calls 21491->21492 21497 40dacd 21492->21497 21513 40dd44 __EH_prolog 21512->21513 21514 4026a8 2 API calls 21513->21514 21515 40dd6b 21514->21515 21531 401c93 21525->21531 21530->21479 21537 4020f6 free 21531->21537 21533 401c9e 21538 4020f6 free 21533->21538 21535 401c7f 21537->21533 21538->21535 21856 4156c3 21855->21856 21857 4156b7 21855->21857 21859 40397e 6 API calls 21856->21859 21858 4100df 6 API calls 21857->21858 21860 401017 21858->21860 21859->21860 21882 418486 21883 418493 21882->21883 21887 4184a4 21882->21887 21883->21887 21888 4184ab 21883->21888 21889 4184b5 __EH_prolog 21888->21889 21895 4020f6 free 21889->21895 21891 4184ce 21896 4184f5 21891->21896 21894 4020f6 free 21894->21887 21895->21891 21905 4020f6 free 21896->21905 21898 418503 21906 4020f6 free 21898->21906 21900 41850e 21907 4020f6 free 21900->21907 21902 418519 21908 418525 21902->21908 21905->21898 21906->21900 21907->21902 21939 4020f6 free 21908->21939 21910 418534 21940 4020f6 free 21910->21940 21912 41853f 21941 4020f6 free 21912->21941 21914 41854a 21942 4020f6 free 21914->21942 21916 41855b 21943 4020f6 free 21916->21943 21918 418562 21944 4020f6 free 21918->21944 21920 418573 21945 4020f6 free 21920->21945 21922 41857a 21946 4020f6 free 21922->21946 21924 41858b 21947 4020f6 free 21924->21947 21926 418592 21948 4020f6 free 21926->21948 21928 4185a0 21949 4020f6 free 21928->21949 21930 4185a7 21950 4020f6 free 21930->21950 21932 4185af 21951 4020f6 free 21932->21951 21934 4185b7 21952 4020f6 free 21934->21952 21936 4185bf 21953 4185cc 21936->21953 21939->21910 21940->21912 21941->21914 21942->21916 21943->21918 21944->21920 21945->21922 21946->21924 21947->21926 21948->21928 21949->21930 21950->21932 21951->21934 21952->21936 21976 4020f6 free 21953->21976 21955 4185d7 21977 4020f6 free 21955->21977 21957 4185df 21978 4020f6 free 21957->21978 21959 4185e7 21979 4020f6 free 21959->21979 21961 4185ef 21980 4020f6 free 21961->21980 21963 4185f7 21981 4020f6 free 21963->21981 21965 4185ff 21982 4020f6 free 21965->21982 21967 418607 21983 4020f6 free 21967->21983 21969 41860f 21984 4020f6 free 21969->21984 21971 418617 21985 4020f6 free 21971->21985 21973 41861f 21986 4020f6 free 21973->21986 21975 41849e 21975->21894 21976->21955 21977->21957 21978->21959 21979->21961 21980->21963 21981->21965 21982->21967 21983->21969 21984->21971 21985->21973 21986->21975 21987 405dc9 21988 405dd3 __EH_prolog 21987->21988 21989 405df2 GetWindowLongW 21988->21989 21990 405de4 SetWindowLongW 21988->21990 21991 405e1e 21989->21991 21992 405e02 21989->21992 21990->21989 21995 405af4 21992->21995 21999 405a49 21992->21999 21996 405afb 21995->21996 21997 405b1f 21995->21997 21996->21991 22003 415b7e 21997->22003 22000 405a65 21999->22000 22001 405a54 21999->22001 22000->21991 22001->22000 22027 415a42 22001->22027 22018 427400 22003->22018 22005 415b88 IsDlgButtonChecked 22006 4025d5 2 API calls 22005->22006 22007 415bad 22006->22007 22019 4059e5 GetWindowTextLengthW 22007->22019 22009 415bbd 22010 402a98 memmove 22009->22010 22011 415bcd 22010->22011 22012 404989 4 API calls 22011->22012 22013 415bd5 22012->22013 22014 402778 3 API calls 22013->22014 22015 415be1 KiUserCallbackDispatcher 22014->22015 22026 4020f6 free 22015->22026 22017 415bf4 22017->21996 22018->22005 22020 405a34 GetLastError 22019->22020 22022 405a06 22019->22022 22025 405a41 22020->22025 22021 405a13 GetWindowTextW 22024 405a26 22021->22024 22022->22021 22023 402419 4 API calls 22022->22023 22023->22021 22024->22020 22024->22025 22025->22009 22026->22017 22036 427400 22027->22036 22029 415a4c GetDlgItem 22030 4026a8 2 API calls 22029->22030 22031 415a74 SetWindowTextW LoadIconW SendMessageW 22030->22031 22037 405d7d 22031->22037 22035 415ab2 22035->22000 22036->22029 22044 405b29 SystemParametersInfoW 22037->22044 22039 405d8e GetWindowRect 22040 405da3 22039->22040 22041 405dc6 22039->22041 22040->22041 22042 405dab MoveWindow 22040->22042 22043 4020f6 free 22041->22043 22042->22041 22043->22035 22044->22039 22045 4062d1 22046 4062e0 22045->22046 22048 4062e6 22045->22048 22049 407bec 22046->22049 22051 407bf9 22049->22051 22050 407c23 22050->22048 22051->22050 22053 41784d 14 API calls 22051->22053 22054 4178f8 22051->22054 22053->22051 22058 417907 22054->22058 22055 4178bc 45 API calls 22055->22058 22056 4179e1 22056->22051 22057 41770b 44 API calls 22057->22058 22058->22055 22058->22056 22058->22057 22059 417890 14 API calls 22058->22059 22061 406906 22058->22061 22059->22058 22066 4048d4 22061->22066 22064 40672b GetLastError 22065 406939 22064->22065 22065->22058 22069 4048e1 22066->22069 22068 40490d 22068->22064 22069->22068 22070 40489a 22069->22070 22071 4048a8 22070->22071 22072 4048ab WriteFile 22070->22072 22071->22072 22072->22069 22073 41dad0 22074 41dae5 22073->22074 22075 41dadc 22073->22075 22078 41d820 22074->22078 22079 41d834 22078->22079 22082 41da47 22078->22082 22080 4230f0 memcpy 22079->22080 22081 407bec 47 API calls 22079->22081 22079->22082 22083 40768a 2 API calls 22079->22083 22080->22079 22081->22079 22083->22079 22084 41f550 22085 41f554 22084->22085 22086 41f557 malloc 22084->22086 22087 41f570 free 22088 414df0 22089 414e1c 22088->22089 22090 414dfd KillTimer 22088->22090 22092 405a49 10 API calls 22089->22092 22090->22089 22091 414e38 22090->22091 22095 414c08 22091->22095 22093 414e36 22092->22093 22096 414c12 __EH_prolog 22095->22096 22126 41417f 22096->22126 22099 4100df 6 API calls 22100 414c37 SetDlgItemTextW 22099->22100 22205 4020f6 free 22100->22205 22102 414c4f 6 API calls 22103 414c98 22102->22103 22206 414d9e 22103->22206 22106 414d9e 2 API calls 22107 414cab EnterCriticalSection 22106->22107 22212 414dcf 22107->22212 22110 414dcf 3 API calls 22111 414ceb LeaveCriticalSection 22110->22111 22112 414cff 22111->22112 22119 414d22 22111->22119 22114 414d18 MessageBoxW 22112->22114 22115 402876 3 API calls 22112->22115 22113 414d63 22117 414d7c KiUserCallbackDispatcher 22113->22117 22118 414d6c 22113->22118 22114->22113 22114->22117 22115->22114 22121 414d85 22117->22121 22217 41516c 22118->22217 22119->22113 22119->22114 22119->22117 22122 402876 3 API calls 22119->22122 22124 4136e1 ctype free 22121->22124 22122->22114 22125 414d8d 22124->22125 22125->22093 22235 427400 22126->22235 22128 414189 EnterCriticalSection 22236 41498b 22128->22236 22131 41498b 4 API calls 22132 41423e 22131->22132 22133 41498b 4 API calls 22132->22133 22134 414250 LeaveCriticalSection GetTickCount 22133->22134 22136 414282 22134->22136 22137 414308 22136->22137 22241 413e4b 22136->22241 22250 4140a2 22137->22250 22142 41431e __aulldiv 22143 414395 22142->22143 22144 414383 SetDlgItemTextW 22142->22144 22145 4143b4 22143->22145 22158 4143fd __aulldiv 22143->22158 22195 41475b 22143->22195 22144->22143 22146 41516c 11 API calls 22145->22146 22148 4143bb 22146->22148 22147 414856 22150 414896 22147->22150 22151 4026a8 2 API calls 22147->22151 22155 4143c9 SetDlgItemTextW 22148->22155 22154 4025d5 2 API calls 22150->22154 22202 414950 22150->22202 22152 414868 22151->22152 22294 414963 22152->22294 22153 4144aa SetDlgItemTextW 22187 4144b5 __aulldiv 22153->22187 22157 4148a9 22154->22157 22155->22158 22159 4143ea 22155->22159 22161 4025d5 2 API calls 22157->22161 22158->22153 22176 4145cf __aulldiv 22158->22176 22158->22187 22289 41384a 6 API calls 22159->22289 22172 4148b8 22161->22172 22164 4146aa wcscmp 22167 4146ca 22164->22167 22175 4146ea 22164->22175 22165 4143f6 22290 4137e6 22165->22290 22169 402714 3 API calls 22167->22169 22168 4148c2 22171 402778 3 API calls 22168->22171 22170 4146d8 SetDlgItemTextW 22169->22170 22170->22175 22174 4148f5 22171->22174 22172->22168 22173 4148d9 22172->22173 22177 4027d0 3 API calls 22173->22177 22178 414963 6 API calls 22174->22178 22181 414760 22175->22181 22185 414731 22175->22185 22176->22164 22179 4148e7 22177->22179 22180 414914 22178->22180 22182 402714 3 API calls 22179->22182 22184 414963 6 API calls 22180->22184 22183 4140a2 SetDlgItemTextW 22181->22183 22182->22174 22188 414772 22183->22188 22189 41491e 22184->22189 22186 4140a2 SetDlgItemTextW 22185->22186 22190 414747 22186->22190 22187->22176 22196 414595 SetDlgItemTextW 22187->22196 22191 4140a2 SetDlgItemTextW 22188->22191 22301 4028ea 22189->22301 22193 4140a2 SetDlgItemTextW 22190->22193 22204 414788 __aulldiv 22191->22204 22193->22195 22195->22147 22254 414e43 22195->22254 22196->22176 22197 40295d 4 API calls 22198 414932 SetDlgItemTextW 22197->22198 22305 4020f6 free 22198->22305 22200 414948 22306 4020f6 free 22200->22306 22202->22099 22203 414831 SetDlgItemTextW 22203->22195 22204->22195 22204->22203 22205->22102 22207 414da8 __EH_prolog 22206->22207 22208 4025d5 2 API calls 22207->22208 22209 414db4 22208->22209 22210 4025d5 2 API calls 22209->22210 22211 414ca0 22210->22211 22211->22106 22213 402778 3 API calls 22212->22213 22214 414ddd 22213->22214 22215 402778 3 API calls 22214->22215 22216 414cdf 22215->22216 22216->22110 22314 427400 22217->22314 22219 415176 EnterCriticalSection 22220 4151b0 22219->22220 22221 4151eb LeaveCriticalSection 22219->22221 22223 401ed7 free 22220->22223 22222 415273 22221->22222 22231 4151fd 22221->22231 22225 411a68 ctype free 22222->22225 22224 4151bc 22223->22224 22226 4176a7 3 API calls 22224->22226 22227 414d7a 22225->22227 22230 4151c5 22226->22230 22227->22121 22229 41523d SendMessageW SendMessageW 22229->22222 22232 4151e3 22230->22232 22315 4058be 22230->22315 22233 415219 22231->22233 22321 4150c9 22231->22321 22232->22221 22233->22222 22233->22229 22235->22128 22237 402cd8 wcscmp 22236->22237 22238 41499a 22237->22238 22239 41422c 22238->22239 22240 402778 3 API calls 22238->22240 22239->22131 22240->22239 22243 413e60 22241->22243 22242 413efb 22246 413f01 22242->22246 22243->22242 22244 413ee7 SendMessageW 22243->22244 22245 413ee6 22243->22245 22244->22242 22245->22244 22248 413f1c 22246->22248 22247 413f82 SendMessageW 22249 413fa0 22247->22249 22248->22247 22248->22249 22249->22137 22251 4140b9 22250->22251 22252 4140eb 22251->22252 22253 4140db SetDlgItemTextW 22251->22253 22252->22142 22253->22252 22255 414e4d __EH_prolog 22254->22255 22256 4025d5 2 API calls 22255->22256 22257 414e5b 22256->22257 22307 4132b5 EnterCriticalSection LeaveCriticalSection 22257->22307 22259 414e6a 22260 40295d 4 API calls 22259->22260 22264 414e82 22259->22264 22263 414e7a 22260->22263 22261 414eb7 22262 414ed4 22261->22262 22265 4028e2 4 API calls 22261->22265 22308 4028e2 22262->22308 22267 4028e2 4 API calls 22263->22267 22264->22261 22270 402999 4 API calls 22264->22270 22268 414ec8 22265->22268 22267->22264 22271 40295d 4 API calls 22268->22271 22273 414ead 22270->22273 22271->22262 22272 40295d 4 API calls 22274 414eeb 22272->22274 22275 401ded 4 API calls 22273->22275 22276 414f29 SetWindowTextW 22274->22276 22278 4026a8 2 API calls 22274->22278 22275->22261 22311 4020f6 free 22276->22311 22280 414efd 22278->22280 22279 414f3d 22279->22147 22281 414963 6 API calls 22280->22281 22282 414f0c 22281->22282 22283 4028e2 4 API calls 22282->22283 22284 414f14 22283->22284 22285 40295d 4 API calls 22284->22285 22286 414f20 22285->22286 22312 4020f6 free 22286->22312 22288 414f28 22288->22276 22289->22165 22291 4137f2 22290->22291 22293 413806 22290->22293 22291->22293 22313 4132b5 EnterCriticalSection LeaveCriticalSection 22291->22313 22293->22158 22295 41487d SetDlgItemTextW 22294->22295 22296 41496d 22294->22296 22300 4020f6 free 22295->22300 22297 402cf9 memmove 22296->22297 22298 41497b 22297->22298 22299 402b5a 5 API calls 22298->22299 22299->22295 22300->22150 22302 4028f5 22301->22302 22303 4028fa 22301->22303 22304 402489 4 API calls 22302->22304 22303->22197 22304->22303 22305->22200 22306->22202 22307->22259 22309 401ded 4 API calls 22308->22309 22310 4028e9 22309->22310 22310->22272 22311->22279 22312->22288 22313->22293 22314->22219 22316 4058c8 __EH_prolog 22315->22316 22317 4020cf 2 API calls 22316->22317 22318 4058d3 22317->22318 22319 4058ea 22318->22319 22320 4026a8 2 API calls 22318->22320 22319->22230 22320->22319 22322 4150d3 __EH_prolog 22321->22322 22323 402618 2 API calls 22322->22323 22324 4150e6 22323->22324 22325 41513f 22324->22325 22329 4084ff 2 API calls 22324->22329 22334 415064 SendMessageW 22324->22334 22340 4020f6 free 22324->22340 22341 402d47 22324->22341 22326 415064 3 API calls 22325->22326 22327 41514c 22326->22327 22344 4020f6 free 22327->22344 22329->22324 22330 41515a 22330->22231 22335 415097 22334->22335 22345 405ed0 SendMessageW 22335->22345 22337 4150b4 22346 405f07 SendMessageW 22337->22346 22339 4150c3 22339->22324 22340->22324 22342 402d53 memmove 22341->22342 22343 402d76 22341->22343 22342->22343 22343->22324 22344->22330 22345->22337 22346->22339 22347 415474 22348 41547e __EH_prolog 22347->22348 22351 4154c0 22348->22351 22352 4154ca __EH_prolog 22351->22352 22353 4025d5 2 API calls 22352->22353 22354 4154e8 22353->22354 22357 4156a6 9 API calls 22354->22357 22374 4155b9 22354->22374 22356 4155f1 EnterCriticalSection 22358 415634 22356->22358 22363 41560a 22356->22363 22359 4155a0 22357->22359 22361 402778 3 API calls 22358->22361 22360 402778 3 API calls 22359->22360 22365 4155ad 22360->22365 22366 415632 22361->22366 22362 415684 4 API calls 22368 4155c8 22362->22368 22364 415655 LeaveCriticalSection 22363->22364 22369 402778 3 API calls 22363->22369 22383 4020f6 free 22364->22383 22392 4020f6 free 22365->22392 22366->22364 22368->22356 22368->22362 22372 415626 22369->22372 22371 415666 22384 4153cf 22371->22384 22373 402778 3 API calls 22372->22373 22373->22366 22377 415684 22374->22377 22376 415493 22378 415690 22377->22378 22379 4156a3 22377->22379 22380 41569b 22378->22380 22381 4028ea 4 API calls 22378->22381 22379->22368 22382 40295d 4 API calls 22380->22382 22381->22380 22382->22379 22383->22371 22385 4153f1 22384->22385 22386 4153db 22384->22386 22387 4153fa PostMessageW 22385->22387 22388 41540e 22385->22388 22389 426280 2 API calls 22386->22389 22387->22376 22388->22376 22390 4153e6 22389->22390 22393 426230 WaitForSingleObject 22390->22393 22392->22374 22393->22385 22394 413894 22395 4138ab GetParent 22394->22395 22396 4138ba GetTickCount GetDlgItem GetDlgItem SendMessageW 22394->22396 22395->22396 22398 426280 2 API calls 22396->22398 22399 4139cb GetDlgItem 22398->22399 22400 4059e5 7 API calls 22399->22400 22401 4139e6 22400->22401 22402 402778 3 API calls 22401->22402 22403 4139f2 22402->22403 22404 4139fc GetDlgItem 22403->22404 22405 4059e5 7 API calls 22404->22405 22406 413a17 22405->22406 22435 4056d9 22406->22435 22409 4056d9 6 API calls 22410 413a31 22409->22410 22411 4056d9 6 API calls 22410->22411 22412 413a3e SetWindowTextW 22411->22412 22438 414f4b 22412->22438 22418 413a6b 22450 405e9b SendMessageW 22418->22450 22420 413a7e SendMessageW SendMessageW 22451 41384a 6 API calls 22420->22451 22422 413aa9 22452 405bcb GetDlgItem GetWindowRect 22422->22452 22427 413b12 22429 413b40 SetTimer 22427->22429 22430 413b23 LoadIconW SendMessageW 22427->22430 22428 413ad6 8 API calls 22428->22427 22461 4153a8 22429->22461 22430->22429 22433 4137e6 2 API calls 22434 413b66 22433->22434 22464 405676 LoadStringW 22435->22464 22470 4132b5 EnterCriticalSection LeaveCriticalSection 22438->22470 22440 414f59 SetDlgItemTextW 22442 414e43 9 API calls 22440->22442 22443 413a54 22442->22443 22444 415004 22443->22444 22445 415013 22444->22445 22446 415016 SetDlgItemTextW 22444->22446 22445->22446 22447 414e43 9 API calls 22446->22447 22448 413a5b 22447->22448 22449 405e9b SendMessageW 22448->22449 22449->22418 22450->22420 22451->22422 22453 405bec 22452->22453 22454 405cc4 22453->22454 22471 405b29 SystemParametersInfoW 22454->22471 22456 405cd7 GetWindowRect 22458 405d00 22456->22458 22457 405d76 22457->22427 22457->22428 22458->22457 22459 405d63 MoveWindow 22458->22459 22460 405d56 ShowWindow 22458->22460 22459->22457 22460->22457 22462 4153b8 PostMessageW 22461->22462 22463 413b5f 22461->22463 22462->22463 22463->22433 22465 4056c7 22464->22465 22466 4056b7 22464->22466 22468 405611 5 API calls 22465->22468 22467 402714 3 API calls 22466->22467 22469 4056c5 22467->22469 22468->22469 22469->22409 22470->22440 22471->22456 22472 4065f9 22477 406615 22472->22477 22475 40660e 22478 40661f __EH_prolog 22477->22478 22479 4046be ctype CloseHandle 22478->22479 22480 406601 22479->22480 22480->22475 22481 4020f6 free 22480->22481 22481->22475 22482 414a7d 22489 4132b5 EnterCriticalSection LeaveCriticalSection 22482->22489 22484 414a8b 22485 414a9f 22484->22485 22486 4153a8 PostMessageW 22484->22486 22487 414a96 22486->22487 22488 41417f 39 API calls 22487->22488 22488->22485 22489->22484

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 534 40195e-401973 LoadLibraryW 535 401975-401986 GetProcAddress 534->535 536 4019bf-4019c3 534->536 537 4019b5-4019be FreeLibrary 535->537 538 401988-4019a6 memset 535->538 537->536 538->537 540 4019a8-4019b3 538->540 540->537
      APIs
      • LoadLibraryW.KERNELBASE(comctl32.dll,00000000,?,?,?,0040105E,?,00000000), ref: 00401968
      • GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 0040197C
      • memset.MSVCRT ref: 0040198F
      • FreeLibrary.KERNELBASE(00000000,?,?,?,?,0040105E,?,00000000), ref: 004019B8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Library$AddressFreeLoadProcmemset
      • String ID: DllGetVersion$comctl32.dll
      • API String ID: 2465613599-3857068685
      • Opcode ID: fd83fbd22df73e10962855b5466e86aaa248dea5b8ea4acd0913300f47c76d1f
      • Instruction ID: 1a686f6cead35edd8612a654887fc31c35c298b4e4ae9392d507691200d7e33f
      • Opcode Fuzzy Hash: fd83fbd22df73e10962855b5466e86aaa248dea5b8ea4acd0913300f47c76d1f
      • Instruction Fuzzy Hash: E2F062B1A0021DABDB106FB99DC9DAF7BBCEB04744F900536EA01E2190E774C945C6B8
      APIs
      • __EH_prolog.LIBCMT ref: 004162A5
        • Part of subcall function 004197CD: _CxxThrowException.MSVCRT(?,0042D080), ref: 00419816
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ExceptionH_prologThrow
      • String ID:
      • API String ID: 461045715-3916222277
      • Opcode ID: d3f941f06014f468c7be19ecc61cc2ce4602c318d95294c99e7b3a886af2c8b0
      • Instruction ID: d4c56de07559275c506104d135318a02aaade4dbbede869f4df0758d21b74ecc
      • Opcode Fuzzy Hash: d3f941f06014f468c7be19ecc61cc2ce4602c318d95294c99e7b3a886af2c8b0
      • Instruction Fuzzy Hash: 24828E31900259DFDB14DFA8C884AEEBBB5BF05304F15809EE815AB392DB79ED81CB54

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1132 40c507-40c56a call 427400 1135 40c575-40c57b 1132->1135 1136 40c56c-40c573 1132->1136 1137 40c57e-40c583 1135->1137 1136->1137 1138 40c589-40c5b3 call 404088 call 4025d5 1137->1138 1139 40c61d-40c623 1137->1139 1154 40c5e0-40c617 call 408f37 call 4020f6 1138->1154 1155 40c5b5-40c5c5 call 4040ba 1138->1155 1140 40c625-40c62b 1139->1140 1141 40c63a-40c641 1139->1141 1145 40c630-40c637 call 4020cf 1140->1145 1146 40c62d 1140->1146 1143 40c643-40c657 1141->1143 1144 40c659-40c66d call 4020cf 1141->1144 1143->1144 1156 40c6a4 1144->1156 1157 40c66f-40c678 call 40a058 1144->1157 1145->1141 1146->1145 1154->1138 1154->1139 1162 40c5ca-40c5cc 1155->1162 1161 40c6a6-40c6b4 1156->1161 1157->1161 1165 40c6b6-40c6b8 1161->1165 1166 40c6bc-40c721 1161->1166 1167 40c5d2-40c5da 1162->1167 1168 40c67a-40c68a _CxxThrowException 1162->1168 1165->1166 1170 40c723-40c737 1166->1170 1171 40c74f-40c761 1166->1171 1167->1154 1172 40c68f-40c69f _CxxThrowException 1167->1172 1168->1172 1170->1171 1181 40c739-40c73f 1170->1181 1173 40c767-40c76e 1171->1173 1174 40cb1b-40cb1f 1171->1174 1172->1156 1177 40c774-40c7a0 call 404088 call 4025d5 1173->1177 1178 40cb0b-40cb15 1173->1178 1179 40cb21-40cb25 1174->1179 1180 40cb2b-40cb3f 1174->1180 1202 40c7a2-40c7b1 1177->1202 1203 40c7b3-40c7be call 4040ba 1177->1203 1178->1173 1178->1174 1179->1180 1183 40cd29-40cda6 1179->1183 1193 40cb45-40cb4b 1180->1193 1194 40cceb-40ccfd 1180->1194 1184 40c741-40c743 1181->1184 1185 40c747-40c74a 1181->1185 1186 40cda8-40cdaa 1183->1186 1187 40cdae-40cdc1 call 4020f6 * 2 1183->1187 1184->1185 1190 40cd10-40cd24 call 4020f6 * 2 1185->1190 1186->1187 1211 40cdc2-40cdd0 1187->1211 1190->1211 1195 40cb53-40cb56 1193->1195 1196 40cb4d-40cb4f 1193->1196 1194->1183 1207 40ccff-40cd05 1194->1207 1195->1190 1196->1195 1208 40c7d9-40c7f6 1202->1208 1214 40c7c3-40c7c5 1203->1214 1212 40cd07-40cd09 1207->1212 1213 40cd0d 1207->1213 1218 40cb5b-40cb6a call 4020f6 1208->1218 1219 40c7fc-40c881 call 40ce67 call 40d489 call 40cdd3 call 402778 call 40fd36 1208->1219 1212->1213 1213->1190 1215 40ccd6-40cce6 _CxxThrowException 1214->1215 1216 40c7cb-40c7d3 1214->1216 1215->1194 1216->1208 1216->1215 1224 40cb72-40cb75 1218->1224 1225 40cb6c-40cb6e 1218->1225 1234 40c892-40c899 1219->1234 1235 40c883-40c889 1219->1235 1224->1190 1225->1224 1237 40c89f-40c8bf 1234->1237 1238 40cb7a-40cbb0 call 4020f6 call 401bbe call 40cf13 call 4020f6 1234->1238 1236 40c88b 1235->1236 1235->1237 1236->1234 1242 40cbc2-40cbf8 call 4020f6 call 401bbe call 40cf13 call 4020f6 1237->1242 1243 40c8c5-40c8c8 1237->1243 1277 40cbb2-40cbb4 1238->1277 1278 40cbb8-40cbbd 1238->1278 1307 40cc00-40cc03 1242->1307 1308 40cbfa-40cbfc 1242->1308 1246 40c939-40c940 1243->1246 1247 40c8ca-40c8d5 1243->1247 1249 40c946-40c94c 1246->1249 1250 40c9ec-40ca03 1246->1250 1252 40cad7-40caf9 call 4020f6 call 401bbe call 40cf13 1247->1252 1253 40c8db-40c907 call 404088 call 4025d5 call 4040ba 1247->1253 1249->1250 1256 40c952-40c967 1249->1256 1257 40ca10 1250->1257 1258 40ca05-40ca09 1250->1258 1296 40cafe-40cb0a call 4020f6 1252->1296 1309 40c928-40c934 call 4020f6 1253->1309 1310 40c909-40c914 1253->1310 1264 40c9b4-40c9b8 1256->1264 1265 40c969-40c97f call 40c4be 1256->1265 1267 40ca12-40ca62 call 40cf80 1257->1267 1258->1257 1266 40ca0b-40ca0e 1258->1266 1264->1250 1276 40c9ba-40c9c2 1264->1276 1289 40c9a0-40c9ac 1265->1289 1290 40c981-40c984 1265->1290 1266->1267 1281 40ca67-40ca6c 1267->1281 1284 40c9c4 1276->1284 1285 40c9ce-40c9e6 1276->1285 1277->1278 1278->1190 1291 40ca72-40ca79 1281->1291 1292 40cc4e-40cc84 call 4020f6 call 401bbe call 40cf13 call 4020f6 1281->1292 1286 40c9c6-40c9c8 1284->1286 1287 40c9ca-40c9cc 1284->1287 1285->1250 1304 40cc08-40cc3e call 4020f6 call 401bbe call 40cf13 call 4020f6 1285->1304 1286->1285 1286->1287 1287->1285 1289->1265 1298 40c9ae-40c9b1 1289->1298 1290->1289 1297 40c986-40c99d 1290->1297 1299 40ca9b-40ca9e 1291->1299 1300 40ca7b-40ca99 1291->1300 1334 40cc86-40cc88 1292->1334 1335 40cc8c-40cc8f 1292->1335 1296->1178 1297->1289 1298->1264 1306 40caa1-40cad1 1299->1306 1300->1306 1341 40cc40-40cc42 1304->1341 1342 40cc46-40cc49 1304->1342 1306->1252 1312 40cc91-40ccc7 call 4020f6 call 401bbe call 40cf13 call 4020f6 1306->1312 1307->1190 1308->1307 1309->1252 1310->1309 1317 40c916-40c925 1310->1317 1343 40ccc9-40cccb 1312->1343 1344 40cccf-40ccd4 1312->1344 1317->1309 1334->1335 1335->1190 1341->1342 1342->1190 1343->1344 1344->1190
      APIs
      • __EH_prolog.LIBCMT ref: 0040C50C
      • _CxxThrowException.MSVCRT(?,0042D1D0), ref: 0040C68A
      • _CxxThrowException.MSVCRT(?,0042D1D0), ref: 0040CCE6
      • _CxxThrowException.MSVCRT(0042BD78,0042D1D0), ref: 0040C69F
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
        • Part of subcall function 0040CF13: __EH_prolog.LIBCMT ref: 0040CF18
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ExceptionThrow$H_prolog$free
      • String ID:
      • API String ID: 1223536468-0
      • Opcode ID: 6401713db915f8d1beca05a7285fad2d6e1d1ee05f989dc5c2414d0c7a8c35e2
      • Instruction ID: 1564e9ce279f6b2538ea1401fb6712d4b8d0e76fcc500ddc0f133ab972702d80
      • Opcode Fuzzy Hash: 6401713db915f8d1beca05a7285fad2d6e1d1ee05f989dc5c2414d0c7a8c35e2
      • Instruction Fuzzy Hash: 2F523970900218DFCB25DF68C985ADDBBF1BF58304F1441AAE949B7292CB74AE84CF59

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1829 4134a3-413611 call 427400 call 4025d5 * 11 call 4131cb call 4262c0 1858 413613-413623 _CxxThrowException 1829->1858 1859 413628-413637 call 4262c0 1829->1859 1858->1859 1862 413639-413649 _CxxThrowException 1859->1862 1863 41364e-413666 CoCreateInstance 1859->1863 1862->1863 1864 413668-41366a 1863->1864 1865 41366e-41367e 1863->1865 1864->1865
      APIs
      • __EH_prolog.LIBCMT ref: 004134A8
        • Part of subcall function 004131CB: __EH_prolog.LIBCMT ref: 004131D0
        • Part of subcall function 004262C0: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,0041360F,?,?,00000000,?,?,00416003,?,00000000,?,00415FAE), ref: 004262D1
      • _CxxThrowException.MSVCRT(?,0042D080), ref: 00413623
      • _CxxThrowException.MSVCRT(?,0042D080), ref: 00413649
      • CoCreateInstance.OLE32(0042CC54,00000000,00000001,0042B268,?,?,?,00000000,?,?,00416003,?,00000000,?,00415FAE), ref: 0041365C
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CreateExceptionH_prologThrow$EventInstance
      • String ID:
      • API String ID: 2828082681-0
      • Opcode ID: e1f804f55efacb170058b9f77ec301868956dc49b421a127250cdaffb2d5f11f
      • Instruction ID: e78bd52aa9b0b7512fbbbe428075605cc85d0c9fc8f7a0b82057842a1bd0957d
      • Opcode Fuzzy Hash: e1f804f55efacb170058b9f77ec301868956dc49b421a127250cdaffb2d5f11f
      • Instruction Fuzzy Hash: 7851A130505784DEC321DF79C594BDAFBE0BF29314F94885ED4DA63282DBB86648CB29
      APIs
        • Part of subcall function 00403E32: FindClose.KERNEL32(?,?,00403E63), ref: 00403E3D
      • FindFirstFileW.KERNELBASE(?,?), ref: 00403E71
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Find$CloseFileFirst
      • String ID:
      • API String ID: 2295610775-0
      • Opcode ID: ee63bfe366631b6283930c23277e265c57fd103b123b342b22fbda5376c8f6c2
      • Instruction ID: 0ea4c11ad74a6852d9b502feb0288d2902ec6dd8686e0a7d0f206977ca46a185
      • Opcode Fuzzy Hash: ee63bfe366631b6283930c23277e265c57fd103b123b342b22fbda5376c8f6c2
      • Instruction Fuzzy Hash: 63E0923000010867CF20AF24CC498AA3B6CAF5131AF004B7AA995A72C0D638AF4ACBD8

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 41417f-414259 call 427400 EnterCriticalSection call 41498b * 3 9 414262-414280 LeaveCriticalSection GetTickCount 0->9 10 41425b-41425f 0->10 11 414282-41428b 9->11 12 41428d-414293 9->12 10->9 13 414296-41429b 11->13 12->13 14 4142a8-4142ae 13->14 15 41429d-4142a6 13->15 16 4142b1-4142bd 14->16 15->16 17 414308-41435c call 4140a2 call 4275d0 16->17 18 4142bf-4142ce 16->18 30 414366-41438f call 413fd2 SetDlgItemTextW 17->30 31 41435e-414364 17->31 19 4142f0-414303 call 413e4b call 413f01 18->19 20 4142d0-4142d5 18->20 19->17 20->19 22 4142d7-4142e6 20->22 22->17 25 4142e8-4142ee 22->25 25->17 25->19 32 414395-41439d 30->32 31->30 31->32 35 4143a9-4143b2 32->35 36 41439f-4143a3 32->36 38 4143b4-4143e8 call 41516c call 40204f SetDlgItemTextW 35->38 39 4143fd-414403 35->39 36->35 37 414849-41484d 36->37 43 414856-41485a 37->43 44 41484f-414851 call 414e43 37->44 38->39 82 4143ea-4143f8 call 41384a call 4137e6 38->82 40 414409-414414 39->40 41 4145cf-4145de 39->41 45 414416-414428 40->45 46 41443c-414443 40->46 48 4145e0-4145f4 call 4276f0 41->48 49 414603-41460f 41->49 51 414897-41489b 43->51 52 41485c-414896 call 4026a8 call 414963 SetDlgItemTextW call 4020f6 43->52 44->43 56 4144b5-4144c5 45->56 57 41442e-41443a 45->57 58 414445 46->58 59 414474-41448a call 4275d0 46->59 48->49 75 4145f6-4145fe call 4275d0 48->75 54 414611-414614 49->54 55 414616-41461b 49->55 60 4148a1-4148c0 call 4025d5 * 2 51->60 61 414952-414960 51->61 52->51 54->55 67 41461f-414639 call 40204f 54->67 55->67 65 4144d0 56->65 66 4144c7-4144ce 56->66 68 4144aa-4144af SetDlgItemTextW 57->68 69 414447-41444d 58->69 70 41444f-41446f call 4149b5 58->70 88 414491-4144a9 call 413fd2 59->88 89 41448c-41448f 59->89 106 4148c2-4148c9 60->106 107 4148cb-4148d7 call 402a6b 60->107 77 4144d3-4144f4 call 4276f0 call 4275d0 65->77 66->77 93 41463b-414644 67->93 94 4146aa-4146c8 wcscmp 67->94 68->56 69->59 69->70 70->59 75->49 119 4144f6-4144fb 77->119 120 4144fd-414504 77->120 82->39 88->68 89->56 89->88 104 414654-41466c 93->104 105 414646 93->105 100 4146ea-4146f2 94->100 101 4146ca-4146e4 call 402714 SetDlgItemTextW 94->101 109 4146f4-4146fd 100->109 110 4146ff-414705 100->110 101->100 113 41466e-414671 104->113 112 41464c-414652 105->112 114 4148fb call 402778 106->114 124 4148f7-4148f8 107->124 125 4148d9-4148f5 call 4027d0 call 402714 107->125 118 414708-41470d 109->118 110->118 112->104 112->112 121 414673-41467d 113->121 122 41467f-414688 113->122 126 414900-414951 call 414963 * 2 call 4028ea call 40295d SetDlgItemTextW call 4020f6 * 2 114->126 127 414717-41471a 118->127 128 41470f-414715 118->128 119->120 129 414506-414508 119->129 130 414518-414525 call 4276c0 120->130 121->113 131 414698-4146a5 call 40204f 122->131 132 41468a 122->132 124->114 125->126 126->61 138 41471d-414724 127->138 128->138 139 414511-414517 129->139 140 41450a-41450f 129->140 146 414527-414533 130->146 147 41453e-414568 call 40204f 130->147 131->94 134 414690-414696 132->134 134->131 134->134 144 414760-414791 call 4140a2 * 2 138->144 145 414726-41472f 138->145 139->130 140->130 140->139 169 414843-414847 144->169 170 414797-41479e 144->170 145->144 151 414731-41475b call 4140a2 * 2 145->151 146->147 153 414535-414538 146->153 163 414578-414585 147->163 164 41456a 147->164 151->169 153->41 153->147 171 414595-4145c9 SetDlgItemTextW 163->171 172 414587-414594 163->172 168 414570-414576 164->168 168->163 168->168 169->37 169->44 170->169 175 4147a4-4147a8 170->175 171->41 172->171 175->169 177 4147ae-4147d4 call 4276f0 call 4275d0 175->177 185 4147d6-4147db 177->185 186 4147dd-4147f8 call 40204f 177->186 185->169 185->186 189 414809-41481f 186->189 190 4147fa 186->190 192 414820-414823 189->192 191 414800-414807 190->191 191->189 191->191 193 414831-41483d SetDlgItemTextW 192->193 194 414825-41482f 192->194 193->169 194->192
      APIs
      • __EH_prolog.LIBCMT ref: 00414184
      • EnterCriticalSection.KERNEL32(?,00000000), ref: 0041419E
      • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 00414270
      • GetTickCount.KERNEL32 ref: 00414276
      • __aulldiv.LIBCMT ref: 0041434B
      • SetDlgItemTextW.USER32(000000FF,00000078,?), ref: 0041438F
      • SetDlgItemTextW.USER32(000000FF,0000007E,?), ref: 004143D5
      • __aulldiv.LIBCMT ref: 00414479
      • SetDlgItemTextW.USER32(000000FF,00000079,?), ref: 004144AF
      • __aulldiv.LIBCMT ref: 004144E7
      • SetDlgItemTextW.USER32(000000FF,0000007B,00000073), ref: 004145C9
        • Part of subcall function 0041384A: GetDlgItem.USER32(000000FF,00000F42), ref: 0041385E
        • Part of subcall function 0041384A: ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 00413875
        • Part of subcall function 0041384A: GetDlgItem.USER32(000000FF,0000007E), ref: 0041387C
        • Part of subcall function 0041384A: ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 00413880
        • Part of subcall function 0041384A: GetDlgItem.USER32(000000FF,00000065), ref: 00413887
        • Part of subcall function 0041384A: ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 0041388B
      • __aulldiv.LIBCMT ref: 004145FE
      • wcscmp.MSVCRT ref: 004146BE
      • SetDlgItemTextW.USER32(000000FF,0000006F,?), ref: 004146E4
      • __aulldiv.LIBCMT ref: 004147C1
      • SetDlgItemTextW.USER32(000000FF,0000007D,?), ref: 0041483D
      • SetDlgItemTextW.USER32(00000001,00000067,?), ref: 00414884
      • SetDlgItemTextW.USER32(00000003,00000066,?), ref: 0041493A
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Item$Text$__aulldiv$ShowWindow$CriticalSection$CountEnterH_prologLeaveTickfreewcscmp
      • String ID: / $K$s
      • API String ID: 4873191-244442477
      • Opcode ID: d6acf40f35c2d5a755702209c69fff3aac4f6ff7832523f0ae864a732ec0e9c0
      • Instruction ID: 4d0d9544b472a643e945a1fcf1f6986b8192c7052894643872ec3c246660b371
      • Opcode Fuzzy Hash: d6acf40f35c2d5a755702209c69fff3aac4f6ff7832523f0ae864a732ec0e9c0
      • Instruction Fuzzy Hash: 6142E230A003099FCB25DFA4C985BEFBBB5FF85314F14442EE16AA7291D7786985CB18

      Control-flow Graph

      APIs
      • GetParent.USER32(?), ref: 004138AE
        • Part of subcall function 00405E9B: SendMessageW.USER32(?,00001061,?,?), ref: 00405EC6
      • GetTickCount.KERNEL32 ref: 00413928
      • GetDlgItem.USER32 ref: 00413990
      • GetDlgItem.USER32(?,00000065), ref: 0041399D
      • SendMessageW.USER32(00000000,00002005,00000001,00000000), ref: 004139B7
      • GetDlgItem.USER32(?,000001BC), ref: 004139D3
      • GetDlgItem.USER32(?,000001BE), ref: 00413A04
      • SetWindowTextW.USER32(?,?), ref: 00413A47
      • SendMessageW.USER32(?,0000101E,00000000,0000FFFF), ref: 00413A8D
      • SendMessageW.USER32(?,0000101E,00000001,0000FFFF), ref: 00413A9E
        • Part of subcall function 0041384A: GetDlgItem.USER32(000000FF,00000F42), ref: 0041385E
        • Part of subcall function 0041384A: ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 00413875
        • Part of subcall function 0041384A: GetDlgItem.USER32(000000FF,0000007E), ref: 0041387C
        • Part of subcall function 0041384A: ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 00413880
        • Part of subcall function 0041384A: GetDlgItem.USER32(000000FF,00000065), ref: 00413887
        • Part of subcall function 0041384A: ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 0041388B
        • Part of subcall function 00405BCB: GetDlgItem.USER32(?,?), ref: 00405BD7
        • Part of subcall function 00405BCB: GetWindowRect.USER32(00000000,?), ref: 00405BE2
        • Part of subcall function 00405CC4: GetWindowRect.USER32(?,?), ref: 00405CEA
        • Part of subcall function 00405CC4: ShowWindow.USER32(?,00000003), ref: 00405D5B
      • GetDlgItem.USER32(?,000003F0), ref: 00413ADE
      • ShowWindow.USER32(00000000,00000000), ref: 00413AE9
      • GetDlgItem.USER32(?,0000006E), ref: 00413AF0
      • ShowWindow.USER32(00000000,00000000), ref: 00413AF5
      • GetDlgItem.USER32(?,00000F41), ref: 00413AFF
      • ShowWindow.USER32(00000000,00000000), ref: 00413B04
      • GetDlgItem.USER32(?,0000007D), ref: 00413B0B
      • ShowWindow.USER32(00000000,00000000), ref: 00413B10
      • LoadIconW.USER32(?), ref: 00413B2D
      • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 00413B3E
      • SetTimer.USER32(?,00000003,000000C8,00000000), ref: 00413B4C
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Item$Window$Show$MessageSend$Rect$CountIconLoadParentTextTickTimer
      • String ID:
      • API String ID: 671334427-0
      • Opcode ID: f4c4fab4a4901d3d4b709469ee9434c75282bdc979d0b6fcb9063382afa5b27f
      • Instruction ID: 120c89e6fc8fa70aada40a3fb636a2cf61a5284c802e999402c76418925045d8
      • Opcode Fuzzy Hash: f4c4fab4a4901d3d4b709469ee9434c75282bdc979d0b6fcb9063382afa5b27f
      • Instruction Fuzzy Hash: 5E815D70640B04ABE720AF25CD46FDBFBE9FF54704F00492EE2AA962E1CBB564448B54

      Control-flow Graph

      APIs
      • __EH_prolog.LIBCMT ref: 00414C0D
        • Part of subcall function 0041417F: __EH_prolog.LIBCMT ref: 00414184
        • Part of subcall function 0041417F: EnterCriticalSection.KERNEL32(?,00000000), ref: 0041419E
        • Part of subcall function 0041417F: LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 00414270
        • Part of subcall function 0041417F: GetTickCount.KERNEL32 ref: 00414276
      • SetDlgItemTextW.USER32(?,00000002,?), ref: 00414C41
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      • GetDlgItem.USER32(?,00000002), ref: 00414C5A
      • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00414C66
      • GetDlgItem.USER32(?,000001BC), ref: 00414C73
      • ShowWindow.USER32(00000000,00000000), ref: 00414C78
      • GetDlgItem.USER32(?,000001BE), ref: 00414C85
      • ShowWindow.USER32(00000000,00000000), ref: 00414C8B
        • Part of subcall function 00414D9E: __EH_prolog.LIBCMT ref: 00414DA3
      • EnterCriticalSection.KERNEL32(?), ref: 00414CBC
      • LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 00414CF2
      • MessageBoxW.USER32(?,?,?,00000000), ref: 00414D57
      • KiUserCallbackDispatcher.NTDLL(?,00000000), ref: 00414D7F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CriticalItemSection$H_prolog$EnterLeaveMessageShowWindow$CallbackCountDispatcherSendTextTickUserfree
      • String ID: 7-Zip
      • API String ID: 4254867592-40562396
      • Opcode ID: 7c2931e8ef52673d4f24b2872611336fcb22a27e94cb8ed322faabd4cb4ceac7
      • Instruction ID: 27f5438033cab32098d42ebace47759c35a326d0a85ef1f8026c0615151919b8
      • Opcode Fuzzy Hash: 7c2931e8ef52673d4f24b2872611336fcb22a27e94cb8ed322faabd4cb4ceac7
      • Instruction Fuzzy Hash: 8F418131A00218EFDF21AFA4DC99BEEBB75EF44708F44402EF101661A2CBB95995CB54

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 277 4277c6-42783b __set_app_type __p__fmode __p__commode call 427954 280 427849-4278a0 call 427942 _initterm __getmainargs _initterm 277->280 281 42783d-427848 __setusermatherr 277->281 284 4278a2-4278aa 280->284 285 4278dc-4278df 280->285 281->280 286 4278b0-4278b3 284->286 287 4278ac-4278ae 284->287 288 4278e1-4278e5 285->288 289 4278b9-4278bd 285->289 286->289 290 4278b5-4278b6 286->290 287->284 287->286 288->285 291 4278c3-4278d4 GetStartupInfoA 289->291 292 4278bf-4278c1 289->292 290->289 293 4278d6-4278da 291->293 294 4278e7-4278e9 291->294 292->290 292->291 295 4278ea-427917 GetModuleHandleA call 4019ce exit _XcptFilter 293->295 294->295
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
      • String ID: L C
      • API String ID: 801014965-4237334846
      • Opcode ID: 9b92f90470f3aaef7e20cf3256f4efe07d2ab1cf0cffcf5c1e4ead4adf0851b9
      • Instruction ID: a00cb6c05502d333b3867e83413997388873d9c69d702601a4e13f1702f0f6aa
      • Opcode Fuzzy Hash: 9b92f90470f3aaef7e20cf3256f4efe07d2ab1cf0cffcf5c1e4ead4adf0851b9
      • Instruction Fuzzy Hash: 294188B1E04314AFDB249FA4EC49AAABBB8FB09710FA0112FF551973A1D7785841CB58

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 298 401039-4010c8 call 427400 OleInitialize call 40195e call 4025d5 * 2 call 418f71 GetCommandLineW call 402618 call 401e1b call 4020f6 315 4010d3-4010d8 298->315 316 4010ca-4010ce call 401ac4 298->316 318 401153-40118a call 4025d5 call 403926 call 4025d5 call 403d0d 315->318 319 4010da-4010e6 315->319 316->315 348 4011b1-4011c2 call 4020cf 318->348 349 40118c-401198 call 4100cf 318->349 320 4010e8-4010ee 319->320 321 40114d-401151 319->321 320->321 323 4010f0-4010f8 320->323 321->318 321->319 325 401103-401107 323->325 326 4010fa-4010fe 323->326 329 401118-40111c 325->329 330 401109-401110 325->330 326->325 328 401100 326->328 328->325 335 40113b-40113f 329->335 336 40111e-401139 call 402714 call 404989 329->336 332 401116 330->332 333 40119d-4011ac call 4100cf 330->333 332->321 347 4015a4-4015d1 call 411a68 call 4020f6 * 2 333->347 335->321 339 401141-401148 call 402714 335->339 336->321 339->321 360 4011c4-4011cd call 4016bf 348->360 361 4011cf 348->361 358 4012c1-4012c3 349->358 363 40158d 358->363 365 4011d1-4011dd 360->365 361->365 368 40158e-4015a3 call 4020f6 * 2 363->368 369 4011e5-4011f2 call 40db3e 365->369 370 4011df-4011e1 365->370 368->347 376 401200-401214 call 4020cf 369->376 377 4011f4-4011fb call 401000 369->377 370->369 384 401221 376->384 385 401216-40121f call 4017c1 376->385 383 4012b3-4012b9 377->383 383->358 386 4012bb-4012bd 383->386 388 401223-40122c 384->388 385->388 386->358 390 401234-40127f call 411e4d call 402778 call 40172d call 4025d5 call 403db4 388->390 391 40122e-401230 388->391 402 401281-4012ab call 4100cf call 4020f6 * 2 390->402 403 4012c8-4012ce 390->403 391->390 402->383 418 4012ad-4012af 402->418 404 4012d0 403->404 405 4012d3-4013bf call 402778 call 418f71 * 2 call 401a7d * 2 call 401641 call 402618 call 403350 call 4020f6 call 418f71 call 415c5f 403->405 404->405 434 4013c4-4013e8 call 401bbe call 4020f6 405->434 418->383 439 4014b2-4014b8 434->439 440 4013ee-4013f1 434->440 443 401517-40151a 439->443 444 4014ba-401508 call 401671 call 411a68 * 2 call 4020f6 * 2 call 409e38 439->444 441 4013f3-4013f6 440->441 442 4013f8-40143d call 401671 call 411a68 * 2 call 4020f6 * 2 440->442 441->442 445 40144e-401493 call 401671 call 411a68 * 2 call 4020f6 * 2 441->445 500 401443-401449 442->500 501 40157d-401583 442->501 447 401520-401523 443->447 448 4015d7-4015de 443->448 514 401510-401515 444->514 515 40150a-40150c 444->515 505 401495-401497 445->505 506 40149b-4014a1 445->506 452 4015d2 call 401000 447->452 453 401529-401530 call 4100cf 447->453 455 4015e4-401632 call 401671 call 411a68 * 2 call 4020f6 * 2 call 409e38 448->455 456 401535-401578 call 401671 call 411a68 * 2 call 4020f6 * 2 call 409e38 448->456 452->448 453->456 520 401634-401636 455->520 521 40163a-40163c 455->521 456->501 500->501 510 401585-401587 501->510 511 40158b 501->511 505->506 506->368 512 4014a7-4014ad 506->512 510->511 511->363 512->368 514->368 515->514 520->521 521->363
      APIs
      • __EH_prolog.LIBCMT ref: 0040103E
      • OleInitialize.OLE32(00000000), ref: 0040104E
        • Part of subcall function 0040195E: LoadLibraryW.KERNELBASE(comctl32.dll,00000000,?,?,?,0040105E,?,00000000), ref: 00401968
        • Part of subcall function 0040195E: GetProcAddress.KERNEL32(00000000,DllGetVersion), ref: 0040197C
        • Part of subcall function 0040195E: memset.MSVCRT ref: 0040198F
        • Part of subcall function 0040195E: FreeLibrary.KERNELBASE(00000000,?,?,?,?,0040105E,?,00000000), ref: 004019B8
      • GetCommandLineW.KERNEL32(?,00000000), ref: 0040109A
        • Part of subcall function 00401E1B: __EH_prolog.LIBCMT ref: 00401E20
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
        • Part of subcall function 004020CF: malloc.MSVCRT ref: 004020D5
        • Part of subcall function 004020CF: _CxxThrowException.MSVCRT(?,0042D048), ref: 004020EF
        • Part of subcall function 004017C1: __EH_prolog.LIBCMT ref: 004017C6
        • Part of subcall function 00401671: __EH_prolog.LIBCMT ref: 00401676
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$Library$AddressCommandExceptionFreeInitializeLineLoadProcThrowfreemallocmemset
      • String ID: Bad command$Error 1329484$Error 1329485$Error in archive$comctl32.dll
      • API String ID: 950025763-3158529442
      • Opcode ID: b8650a010a255341a7c267875faeb47369e013a1205322b5ecb63717ebc0fa85
      • Instruction ID: 472c7fcaedc80eb8356a9ef49e46fd933df5a3c87e186d9ab304c9f5584081a3
      • Opcode Fuzzy Hash: b8650a010a255341a7c267875faeb47369e013a1205322b5ecb63717ebc0fa85
      • Instruction Fuzzy Hash: A702A130D05248EACF25EBA4C945BEDBBB4AF14304F1440AFE145772E2DB781B88DB1A

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 522 40595e-405991 GetModuleHandleW GetProcAddress 523 405993-40599b GlobalMemoryStatusEx 522->523 524 4059be-4059d5 GlobalMemoryStatus 522->524 523->524 527 40599d-4059a6 523->527 525 4059d7 524->525 526 4059da-4059dc 524->526 525->526 528 4059e0-4059e4 526->528 529 4059b4 527->529 530 4059a8 527->530 531 4059b7-4059bc 529->531 532 4059aa-4059ad 530->532 533 4059af-4059b2 530->533 531->528 532->529 532->533 533->531
      APIs
      • GetModuleHandleW.KERNEL32(kernel32.dll,GlobalMemoryStatusEx), ref: 00405982
      • GetProcAddress.KERNEL32(00000000), ref: 00405989
      • GlobalMemoryStatusEx.KERNELBASE(00000040), ref: 00405997
      • GlobalMemoryStatus.KERNEL32(?), ref: 004059C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: GlobalMemoryStatus$AddressHandleModuleProc
      • String ID: $@$GlobalMemoryStatusEx$kernel32.dll
      • API String ID: 180289352-802862622
      • Opcode ID: 5284d998541766e7541bad290797f0052b35c532fb70d4a4ac19be2f4d4da570
      • Instruction ID: 6c8c30df25bb6d4e4a178cec537dc139bebcca375eea442511eecf700d0b2231
      • Opcode Fuzzy Hash: 5284d998541766e7541bad290797f0052b35c532fb70d4a4ac19be2f4d4da570
      • Instruction Fuzzy Hash: 76112AB0A01709DBEF20DF94D949BAFBBF9EB14311F50442AD446BB280D778A844CF98

      Control-flow Graph

      APIs
      • GetDlgItem.USER32(000000FF,00000F42), ref: 0041385E
      • ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 00413875
      • GetDlgItem.USER32(000000FF,0000007E), ref: 0041387C
      • ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 00413880
      • GetDlgItem.USER32(000000FF,00000065), ref: 00413887
      • ShowWindow.USER32(00000000,00000000,?,?,000003E8,004143F6,00000001,?,?,00000000,000003E8), ref: 0041388B
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ItemShowWindow
      • String ID:
      • API String ID: 3351165006-0
      • Opcode ID: 64832d24a414e6d06aaa9f7b69a18a0c4dc5769e0a771ea220e0ad29ba3e24bd
      • Instruction ID: e34129ecb20a930ca08e7f8573c067670e1cf7eb67d0aa8b2d1b4524c1aa6d7f
      • Opcode Fuzzy Hash: 64832d24a414e6d06aaa9f7b69a18a0c4dc5769e0a771ea220e0ad29ba3e24bd
      • Instruction Fuzzy Hash: 70E0927160420C3BE6206B62DD5AD7BBF9DDF82B99B42443AF64492160CAA6BC108674

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 867 40eedc-40ef06 call 427400 870 40ef35-40ef38 867->870 871 40ef08-40ef12 call 4020cf 867->871 872 40efd0-40efd3 call 40ec65 870->872 873 40ef3e-40ef4f call 4020cf 870->873 880 40ef14-40ef1d 871->880 881 40ef1f 871->881 879 40efd8-40efe4 872->879 883 40ef51-40ef5b call 4064dc 873->883 884 40ef5d 873->884 885 40f1ba-40f1c3 879->885 886 40efea-40efee 879->886 882 40ef21-40ef30 call 4182fe 880->882 881->882 882->872 891 40ef60-40ef90 call 4182fe call 402778 call 4047ec 883->891 884->891 888 40f1c5-40f1c7 885->888 889 40f1cb-40f1d4 885->889 886->885 892 40eff4-40eff8 886->892 888->889 895 40f1d6-40f1d8 889->895 896 40f1dc 889->896 916 40ef92-40efa3 GetLastError 891->916 917 40efc3-40efc9 891->917 892->885 893 40effe-40f002 892->893 899 40f004-40f007 893->899 900 40f00d-40f016 893->900 895->896 901 40f1de-40f1ec 896->901 899->885 899->900 903 40f15b-40f164 900->903 904 40f01c-40f038 call 402201 900->904 907 40f166-40f168 903->907 908 40f16c-40f175 903->908 904->903 915 40f03e-40f061 call 4084ff 904->915 907->908 911 40f177-40f179 908->911 912 40f17d-40f180 908->912 911->912 912->901 924 40f152-40f15a call 4020f6 915->924 925 40f067-40f07f call 402201 915->925 919 40efa5-40efa7 916->919 920 40efab-40efb4 916->920 917->872 919->920 922 40efb6-40efb8 920->922 923 40efbc-40efbe 920->923 922->923 923->901 924->903 930 40f141-40f14c 925->930 931 40f085-40f0ea call 4026a8 call 401ded call 40f238 call 40295d call 4020f6 call 402778 call 402999 call 40f212 925->931 930->924 930->925 948 40f105-40f114 call 4047ec 931->948 949 40f0ec-40f103 call 402778 call 40f212 931->949 955 40f134-40f140 call 4020f6 948->955 956 40f116-40f132 call 40e2e1 call 40ec65 948->956 949->948 949->955 955->930 956->955 964 40f182-40f19d call 4020f6 * 2 956->964 969 40f1a5-40f1ae 964->969 970 40f19f-40f1a1 964->970 971 40f1b0-40f1b2 969->971 972 40f1b6-40f1b8 969->972 970->969 971->972 972->901
      APIs
      • __EH_prolog.LIBCMT ref: 0040EEE1
      • GetLastError.KERNEL32(?,?,00000000,00000013,?), ref: 0040EF92
        • Part of subcall function 004020CF: malloc.MSVCRT ref: 004020D5
        • Part of subcall function 004020CF: _CxxThrowException.MSVCRT(?,0042D048), ref: 004020EF
        • Part of subcall function 0040EC65: __EH_prolog.LIBCMT ref: 0040EC6A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$ErrorExceptionLastThrowmalloc
      • String ID: .001$.exe$Split
      • API String ID: 1950902910-1819480430
      • Opcode ID: cf6b42870e815e998b135a4961ea797e2778ccc149ac8e02011dee41db5538fb
      • Instruction ID: 2e497f5e6d7084d82a5dc8001912b5ba61214fcfb2f12fe8ae294b3655d21f49
      • Opcode Fuzzy Hash: cf6b42870e815e998b135a4961ea797e2778ccc149ac8e02011dee41db5538fb
      • Instruction Fuzzy Hash: 91A19230A00209EFCB24DFA5C985AAEB7B5BF04304F14447EE956BB6D2CB799D05CB58

      Control-flow Graph

      APIs
      • __EH_prolog.LIBCMT ref: 00415A47
      • GetDlgItem.USER32 ref: 00415A5F
      • SetWindowTextW.USER32(?,?), ref: 00415A7E
      • LoadIconW.USER32(00000001), ref: 00415A8C
      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00415A9D
        • Part of subcall function 00405D7D: GetWindowRect.USER32(?,?), ref: 00405D95
        • Part of subcall function 00405D7D: MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00405DC0
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Window$H_prologIconItemLoadMessageMoveRectSendTextfree
      • String ID:
      • API String ID: 4226961521-0
      • Opcode ID: a69c0555744779e3416228a0f2a8f2ff5693be6edbf01dafdac416e534d3530f
      • Instruction ID: 3f9dc10f33571ac88d483359bf54bc70d4fe30b983a4990dfccf35a9d7e4fe33
      • Opcode Fuzzy Hash: a69c0555744779e3416228a0f2a8f2ff5693be6edbf01dafdac416e534d3530f
      • Instruction Fuzzy Hash: 06014F31600700AFDB216B60DD0ABAEBBB5FF04705F00852EF652655E0CBB56455DF48

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 982 4040ba-4040da call 427400 call 404cab 987 4040e0-4040e6 982->987 988 40428e-4042a4 call 404bdf 982->988 987->988 990 4040ec-40410c call 402618 * 2 987->990 993 4042a6-4042a8 988->993 994 4042a9-4042b6 call 4049ab 988->994 1000 404119-40411f 990->1000 1001 40410e-404114 990->1001 993->994 1002 4042b8-4042be 994->1002 1003 40430b-404312 994->1003 1004 404121-404134 call 402201 1000->1004 1005 404136-40413e call 402999 1000->1005 1001->1000 1002->1003 1008 4042c0-4042cc call 4040ab 1002->1008 1006 404314-404318 1003->1006 1007 40431e-404325 1003->1007 1004->1005 1017 404143-404150 call 404bb6 1004->1017 1005->1017 1006->1007 1010 4043fc-404401 call 403e52 1006->1010 1011 404357-40435e call 404b59 1007->1011 1012 404327-404331 call 4040ab 1007->1012 1008->1010 1024 4042d2-4042d5 1008->1024 1023 404406 1010->1023 1011->1010 1030 404364-40436f 1011->1030 1012->1010 1026 404337-40433a 1012->1026 1033 404152-404155 1017->1033 1034 404188-404192 call 4040ba 1017->1034 1028 404408-40440b call 403e32 1023->1028 1024->1010 1029 4042db-4042f8 call 404088 call 402714 1024->1029 1026->1010 1032 404340-404355 call 404088 1026->1032 1042 404410 1028->1042 1054 404304-404306 1029->1054 1059 4042fa-4042ff 1029->1059 1030->1010 1031 404375-40437c call 404963 1030->1031 1031->1010 1051 40437e-4043b1 call 402618 call 401ded * 2 call 403e52 1031->1051 1032->1054 1040 404163-40417b call 404088 1033->1040 1041 404157-40415a 1033->1041 1052 404198 1034->1052 1053 40427c-40428d call 4020f6 * 2 1034->1053 1057 40419a-4041c0 call 4026a8 call 4025d5 1040->1057 1058 40417d-404186 call 402778 1040->1058 1041->1034 1047 40415c-404161 1041->1047 1048 404412-404420 1042->1048 1047->1034 1047->1040 1083 4043b3-4043c9 wcscmp 1051->1083 1084 4043d6-4043e3 call 4040ab 1051->1084 1052->1057 1053->988 1054->1028 1074 4041c5-4041db call 404048 1057->1074 1058->1057 1059->1054 1080 404211-404213 1074->1080 1081 4041dd-4041e1 1074->1081 1082 40424b-404277 call 4020f6 * 2 call 403e32 call 4020f6 * 2 1080->1082 1085 4041e3-4041f0 call 402143 1081->1085 1086 404209-40420b SetLastError 1081->1086 1082->1042 1090 4043d2 1083->1090 1091 4043cb-4043d0 1083->1091 1097 404423-40442d call 404088 1084->1097 1098 4043e5-4043e8 1084->1098 1099 4041f2-404207 call 4020f6 call 4025d5 1085->1099 1100 404215-40421b 1085->1100 1086->1080 1090->1084 1095 404441-404459 call 402714 call 4020f6 call 403e32 1091->1095 1095->1048 1117 404434 1097->1117 1118 40442f-404432 1097->1118 1103 4043ea-4043ed 1098->1103 1104 4043ef-4043fb call 4020f6 1098->1104 1099->1074 1107 40421d-404222 1100->1107 1108 40422e-404249 call 40295d 1100->1108 1103->1097 1103->1104 1104->1010 1107->1108 1115 404224-40422a 1107->1115 1108->1082 1115->1108 1124 40443b-40443e 1117->1124 1118->1124 1124->1095
      APIs
      • __EH_prolog.LIBCMT ref: 004040BF
      • SetLastError.KERNEL32(00000002,?,?,0000FBEF,:$DATA,?,00000000,00000000,?,00000000), ref: 0040420B
      • wcscmp.MSVCRT ref: 004043BF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ErrorH_prologLastwcscmp
      • String ID: :$DATA
      • API String ID: 161073058-2587938151
      • Opcode ID: bf2a63ef74e6ef63e5b9c411d4c09445fdec89beda3e525e482d59bc0708e90a
      • Instruction ID: 0aa9a7b59709699b29067b3e5cb2f95f9efe95872249ea4963ba63781caa8802
      • Opcode Fuzzy Hash: bf2a63ef74e6ef63e5b9c411d4c09445fdec89beda3e525e482d59bc0708e90a
      • Instruction Fuzzy Hash: DBB115B0A002049ACF24EFA5C9856EEB7B0BF94318F10813FEA52772E1DB7D5945D718
      APIs
      • __EH_prolog.LIBCMT ref: 0040A9AD
        • Part of subcall function 0040A757: __EH_prolog.LIBCMT ref: 0040A75C
        • Part of subcall function 0040D761: __EH_prolog.LIBCMT ref: 0040D766
        • Part of subcall function 0040D761: wcscmp.MSVCRT ref: 0040D7BB
        • Part of subcall function 0040D8EA: __EH_prolog.LIBCMT ref: 0040D8EF
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
        • Part of subcall function 004063C5: __EH_prolog.LIBCMT ref: 004063CA
        • Part of subcall function 0040A809: __EH_prolog.LIBCMT ref: 0040A80E
      Strings
      • Can not seek to begin of file, xrefs: 0040B4C6
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$freewcscmp
      • String ID: Can not seek to begin of file
      • API String ID: 197229272-1513257940
      • Opcode ID: da73c5db32e52142c0d81f7291ea57daabc7abe5cd410e8813748350c8cb6c92
      • Instruction ID: e932c431c2be89ccba5d268edbb3cf4babdeff98aa2f261b59e4fc1550dd80f2
      • Opcode Fuzzy Hash: da73c5db32e52142c0d81f7291ea57daabc7abe5cd410e8813748350c8cb6c92
      • Instruction Fuzzy Hash: 6182BD30900349AFCB20DFA4C894AAEBBB5FF04304F14847EE556B72D1DB39A945DB5A

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1782 4192dc-4192ff call 427400 call 407bca 1787 419305-41930e call 41946e 1782->1787 1788 41945d-41946b 1782->1788 1791 419310-419312 1787->1791 1792 419317-41931c 1787->1792 1791->1788 1793 41932d-419351 call 4020cf memcpy 1792->1793 1794 41931e-419323 1792->1794 1798 419355-41935c 1793->1798 1794->1793 1796 419325-419328 1794->1796 1796->1788 1799 41937c-419398 call 406671 1798->1799 1800 41935e-41936c 1798->1800 1805 419450 1799->1805 1806 41939e-4193a3 1799->1806 1800->1799 1801 41936e-419370 1800->1801 1801->1799 1802 419372-419376 1801->1802 1802->1799 1804 419414-419417 1802->1804 1808 419452-41945b call 4020f6 1804->1808 1805->1808 1806->1804 1807 4193a5-4193b1 1806->1807 1810 4193b3-4193b6 1807->1810 1811 4193f6-41940f memmove 1807->1811 1808->1788 1813 4193b8-4193bc 1810->1813 1814 4193dd-4193df 1810->1814 1811->1798 1816 4193d3-4193d4 1813->1816 1817 4193be-4193c2 1813->1817 1814->1811 1815 4193e1-4193ef call 41946e 1814->1815 1825 4193f1-4193f4 1815->1825 1826 419419-41944d memcpy call 40674f 1815->1826 1816->1814 1819 4193c4-4193c8 1817->1819 1820 4193d6-4193d8 1817->1820 1821 4193da 1819->1821 1822 4193ca-4193cf 1819->1822 1820->1814 1821->1814 1822->1810 1824 4193d1 1822->1824 1824->1814 1825->1807 1826->1805
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 3e23db53cf71e5ce8f26aa50b9a583861208264ff56e9d16f13e52517fdba1e7
      • Instruction ID: cd3e7004e383a716012a185e435a627af6ed05eafb2dd68e955295a10b6cfdbc
      • Opcode Fuzzy Hash: 3e23db53cf71e5ce8f26aa50b9a583861208264ff56e9d16f13e52517fdba1e7
      • Instruction Fuzzy Hash: 6D510871A042099BEB24DF54C8A4BFFB3B5FF48308F14452BE82597381E778AC858755

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1866 40cf80-40cffa call 427400 call 418f71 call 4026a8 * 2 1875 40d034-40d09d call 40d5b8 call 40265b call 402c6d call 4020f6 * 2 call 4025d5 call 4026a8 1866->1875 1876 40cffc-40d020 call 402201 1866->1876 1895 40d108-40d119 call 4031e4 1875->1895 1896 40d09f-40d0a3 1875->1896 1876->1875 1881 40d022-40d02f call 402778 1876->1881 1881->1875 1901 40d232-40d235 1895->1901 1902 40d11f-40d12b 1895->1902 1896->1895 1898 40d0a5-40d0c5 call 4025d5 call 402f86 1896->1898 1915 40d0c7-40d0d3 1898->1915 1916 40d0fb-40d107 call 4020f6 1898->1916 1904 40d243-40d246 1901->1904 1905 40d237-40d23e call 401a7d 1901->1905 1913 40d134-40d152 call 4025d5 call 418f71 1902->1913 1914 40d12d-40d12f 1902->1914 1910 40d298-40d29b call 403b12 1904->1910 1911 40d248-40d250 call 402876 1904->1911 1905->1904 1919 40d2a0-40d2a2 1910->1919 1924 40d255-40d28c call 40a37a 1911->1924 1947 40d1e0-40d1e3 1913->1947 1948 40d158-40d15b 1913->1948 1920 40d367-40d3b4 call 4020f6 * 4 call 411a68 call 4020f6 1914->1920 1921 40d0d5-40d0d9 1915->1921 1922 40d0db-40d0df 1915->1922 1916->1895 1919->1924 1926 40d2a4-40d2ae GetLastError 1919->1926 1921->1922 1928 40d0e3-40d0e6 1921->1928 1922->1928 1941 40d2d3 1924->1941 1942 40d28e-40d291 1924->1942 1931 40d2b0 1926->1931 1932 40d2b5-40d2ce call 402876 call 40295d 1926->1932 1928->1916 1934 40d0e8-40d0f7 call 402778 1928->1934 1931->1932 1932->1920 1934->1916 1945 40d2d5-40d2e6 1941->1945 1942->1941 1949 40d293-40d296 1942->1949 1954 40d2e8-40d30e 1945->1954 1955 40d329-40d330 call 417a2e 1945->1955 1950 40d1e5-40d1f7 1947->1950 1951 40d219-40d231 call 411a68 call 4020f6 1947->1951 1956 40d162-40d173 call 40e0ee 1948->1956 1957 40d15d-40d160 1948->1957 1949->1945 1976 40d1fb-40d20e call 411a68 call 4020f6 1950->1976 1951->1901 1985 40d310-40d316 call 40d3b7 1954->1985 1986 40d31b-40d327 call 40531a 1954->1986 1967 40d333 1955->1967 1972 40d213-40d217 1956->1972 1973 40d179-40d17c 1956->1973 1957->1956 1958 40d1c6-40d1cc call 40fdcd 1957->1958 1970 40d1d1-40d1da 1958->1970 1974 40d335-40d33c 1967->1974 1970->1947 1970->1948 1972->1976 1979 40d1b2-40d1b5 1973->1979 1980 40d17e-40d18b call 402eb8 1973->1980 1982 40d346-40d348 1974->1982 1983 40d33e-40d343 call 40bc7a 1974->1983 1976->1920 1979->1958 1990 40d1b7-40d1c4 call 40a992 1979->1990 2005 40d18d-40d19a 1980->2005 2006 40d1af 1980->2006 1991 40d34a 1982->1991 1992 40d34c-40d360 1982->1992 1983->1982 1985->1986 1986->1974 1990->1958 1990->1970 1991->1992 1992->1920 2008 40d362 call 40bc7a 1992->2008 2009 40d1a3-40d1a7 2005->2009 2010 40d19c-40d19f 2005->2010 2006->1979 2008->1920 2009->1979 2014 40d1a9-40d1ad 2009->2014 2010->1979 2013 40d1a1 2010->2013 2013->2006 2014->1979 2014->2006
      APIs
      • __EH_prolog.LIBCMT ref: 0040CF85
      • GetLastError.KERNEL32(?,?,0000000D,00000000,00000000,?), ref: 0040D2A4
      Strings
      • Can not create output directory: , xrefs: 0040D2B8
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ErrorH_prologLast
      • String ID: Can not create output directory:
      • API String ID: 1057991267-3123869724
      • Opcode ID: 5c2cccee5354194b0c48e011cbe96bfa24a820c496bc76d26af480ac08f2ff10
      • Instruction ID: 14afd462d1bef7c194ecaca9d63f6d86c47c4da6b56855b854b8cc7b9de55903
      • Opcode Fuzzy Hash: 5c2cccee5354194b0c48e011cbe96bfa24a820c496bc76d26af480ac08f2ff10
      • Instruction Fuzzy Hash: F2E17C30D00249EBCF20EFE4C944AEEBBB5BF19308F14406EE94577291DA789E49DB59
      APIs
      • __EH_prolog.LIBCMT ref: 00405DCE
      • SetWindowLongW.USER32(?,000000EB,?), ref: 00405DEC
      • GetWindowLongW.USER32(?,000000EB), ref: 00405DF8
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: LongWindow$H_prolog
      • String ID:
      • API String ID: 3290177264-0
      • Opcode ID: e08a05fd0fc8a194509ba1aaca244b45a6299a21f9aa697965bb52aac5d282f2
      • Instruction ID: b1d1d039f94e185a531ba274deec0ef3b8810f38033f643ea8b605c337fad42c
      • Opcode Fuzzy Hash: e08a05fd0fc8a194509ba1aaca244b45a6299a21f9aa697965bb52aac5d282f2
      • Instruction Fuzzy Hash: D8018B31600119EFCF168F44DC18AAF3B65FF44360F50C13AF856AA2A0C7399921DF94
      APIs
      • __EH_prolog.LIBCMT ref: 00415B83
      • IsDlgButtonChecked.USER32(?,00000D66), ref: 00415B96
        • Part of subcall function 004059E5: GetWindowTextLengthW.USER32 ref: 004059FA
        • Part of subcall function 004059E5: GetWindowTextW.USER32(?,00000000,?), ref: 00405A1C
        • Part of subcall function 004059E5: GetLastError.KERNEL32 ref: 00405A34
        • Part of subcall function 00402A98: memmove.MSVCRT(?,?,?,?,?,00401E48), ref: 00402AD4
      • KiUserCallbackDispatcher.NTDLL(00000000,00000001), ref: 00415BE6
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: TextWindow$ButtonCallbackCheckedDispatcherErrorH_prologLastLengthUserfreememmove
      • String ID:
      • API String ID: 1501428628-0
      • Opcode ID: fca6567c6ee1c15010b138bda7b603a86b6899ebc7cf039e794fc152276f8df1
      • Instruction ID: 2236174cac86860b17a222109bbd00086e11993f7b49e706391860cfe10a43eb
      • Opcode Fuzzy Hash: fca6567c6ee1c15010b138bda7b603a86b6899ebc7cf039e794fc152276f8df1
      • Instruction Fuzzy Hash: 870121719006059ECB24EBA5C9579FFBBB4EF14314F40443EE202624D1DF78A549CB84
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID: Split
      • API String ID: 3519838083-1882502421
      • Opcode ID: 4a13cf1b4db60b7befba25564973d73154796047a7552b3d5bdec91a74f86755
      • Instruction ID: 616a78c830e29c2dc57caffe9be07347e63c6fd7d35e9ef6245cc82ab62af23f
      • Opcode Fuzzy Hash: 4a13cf1b4db60b7befba25564973d73154796047a7552b3d5bdec91a74f86755
      • Instruction Fuzzy Hash: 3C023A70A00249EFCF14DFA5C9849AEBBB5BF48304F14886EE506AB391C739AD55CB54
      APIs
      • __EH_prolog.LIBCMT ref: 004019D3
        • Part of subcall function 00401A47: GetVersionExW.KERNEL32(?), ref: 00401A61
        • Part of subcall function 004100CF: MessageBoxW.USER32(00000000,0042C214,7-Zip,00000010), ref: 004100D8
      Strings
      • Unsupported Windows version, xrefs: 004019F0
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prologMessageVersion
      • String ID: Unsupported Windows version
      • API String ID: 3493591556-2397968907
      • Opcode ID: ed8828ada12aaa90c5deb74c7c2207a6019be7e81250d0cce5a2ae34c0db44e4
      • Instruction ID: bc7fe7522f176ca9a2377c0d91c19e7eb3c4aaa93377a5d0eed236c7fd359826
      • Opcode Fuzzy Hash: ed8828ada12aaa90c5deb74c7c2207a6019be7e81250d0cce5a2ae34c0db44e4
      • Instruction Fuzzy Hash: 22E09B727052189BCB14AFA9B542B9E77A8DB85758F10883FF001B3593C7FC54418A6D
      APIs
      • __EH_prolog.LIBCMT ref: 0041A5BA
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 0041A7EC
        • Part of subcall function 004020CF: malloc.MSVCRT ref: 004020D5
        • Part of subcall function 004020CF: _CxxThrowException.MSVCRT(?,0042D048), ref: 004020EF
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ExceptionThrow$H_prologmalloc
      • String ID:
      • API String ID: 3044594480-0
      • Opcode ID: e859eaa1a6cd1bdd81a33e1a104e16a8b21adbf55dece5dd425d8406769b1d52
      • Instruction ID: 3c4600278733f0fd76907272d5c7152b0a01dbeeca939584879cb54402bd9a2f
      • Opcode Fuzzy Hash: e859eaa1a6cd1bdd81a33e1a104e16a8b21adbf55dece5dd425d8406769b1d52
      • Instruction Fuzzy Hash: BA818D70D01209DFCB21DFA9C880AEEBBB5BF05304F14419EE555A3292CB389E95DF65
      APIs
      • __EH_prolog.LIBCMT ref: 00414E48
        • Part of subcall function 004132B5: EnterCriticalSection.KERNEL32(?,?,?,?,00414F92), ref: 004132C1
        • Part of subcall function 004132B5: LeaveCriticalSection.KERNEL32(?,?,?,00414F92), ref: 004132CB
      • SetWindowTextW.USER32(00000000,?), ref: 00414F2F
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CriticalSection$EnterH_prologLeaveTextWindow
      • String ID:
      • API String ID: 374128308-0
      • Opcode ID: 49611383234625862a234187188164019676c5c04722436ee820891858c73de2
      • Instruction ID: 3a62dccf950b22f6d4dc55b14e374e89802837ad55d0645f6bc97149168701be
      • Opcode Fuzzy Hash: 49611383234625862a234187188164019676c5c04722436ee820891858c73de2
      • Instruction Fuzzy Hash: B731877190020A9ACF14FBE1C956AEEB7B8BF14308F10442FE256731D1DF786A8ACB54
      APIs
      • __EH_prolog.LIBCMT ref: 0041B25C
        • Part of subcall function 0041AF85: __EH_prolog.LIBCMT ref: 0041AF8A
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 0041B2A7
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$ExceptionThrow
      • String ID:
      • API String ID: 2366012087-0
      • Opcode ID: a958b5337674e05bf956635333f46def9c7f0676146241ab79f327ef10fc837d
      • Instruction ID: f2df3114f1da51f2426b745af0dbb6047acfd708cf9f8735b5f93dd5867aab36
      • Opcode Fuzzy Hash: a958b5337674e05bf956635333f46def9c7f0676146241ab79f327ef10fc837d
      • Instruction Fuzzy Hash: 1A01F232504248BFDF029F94C809BEE7FB4EF05314F04404BF8046B211C3B9A998C7A5
      APIs
      • SetFilePointer.KERNELBASE(?,?,?,?), ref: 00404745
      • GetLastError.KERNEL32(?,?,?,?), ref: 00404752
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ErrorFileLastPointer
      • String ID:
      • API String ID: 2976181284-0
      • Opcode ID: 438f7263e7d15e04be64078ac3070df8d93fa652b3568f5664d05ecef30f1d1b
      • Instruction ID: f8195280055ccb744b5f4933d4478b7b27988e1595bb0384b5a033c88192e03c
      • Opcode Fuzzy Hash: 438f7263e7d15e04be64078ac3070df8d93fa652b3568f5664d05ecef30f1d1b
      • Instruction Fuzzy Hash: 9CF0AF71600208ABCB11DF28ED01BCA3BE9AB45320F108165F915E72E0E7719901AA64
      APIs
      • _beginthreadex.MSVCRT ref: 00426254
      • GetLastError.KERNEL32(?,?,00000000,00000000,00000000), ref: 00426269
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ErrorLast_beginthreadex
      • String ID:
      • API String ID: 4034172046-0
      • Opcode ID: 5d6ebca4f48b41029d32f40167fce92df6aeec327d475f20c86aa1587e792771
      • Instruction ID: 31c2dbd69e1885a24532e4269a1eb50c54c6565d93c2a908d681394ab9fb7b0c
      • Opcode Fuzzy Hash: 5d6ebca4f48b41029d32f40167fce92df6aeec327d475f20c86aa1587e792771
      • Instruction Fuzzy Hash: EFE0E6713042129BE3249B54AC05F67769CDB90B41F84847DB645D6194EB649810C7B9
      APIs
      • GetCurrentProcess.KERNEL32(?,?,0040593D), ref: 00405921
      • GetProcessAffinityMask.KERNEL32(00000000), ref: 00405928
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Process$AffinityCurrentMask
      • String ID:
      • API String ID: 1231390398-0
      • Opcode ID: 9e0810395d80602b49144d642d60a3fbc7d5546b35032bc074dd17f94df92988
      • Instruction ID: 07ee87926fc5390885ae6a9ef4862940daf2e417708100acc4bc86754a5c0598
      • Opcode Fuzzy Hash: 9e0810395d80602b49144d642d60a3fbc7d5546b35032bc074dd17f94df92988
      • Instruction Fuzzy Hash: 6CB092B1600104ABCE219BA09E0CD2B3B2CFA063413488468B215C1410D73AD0028BA4
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ExceptionThrowmalloc
      • String ID:
      • API String ID: 2436765578-0
      • Opcode ID: 09cfdf487e9e4269f2fdf1dace1d4180c2df62fdca8d78840ba6b5cd8df3f6ae
      • Instruction ID: 7fb36d490106e20b2164e3848833c77b579d17c231f5b056c4223b52cbc47585
      • Opcode Fuzzy Hash: 09cfdf487e9e4269f2fdf1dace1d4180c2df62fdca8d78840ba6b5cd8df3f6ae
      • Instruction Fuzzy Hash: 5ED0A7312082CC7BCF016FA5A805C9E3F2C99016A4B409027FE188E152D635D791D75C
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: e0859860234d1a16a7c44ca61de55d9d3f7c919ded42ba10d07c0479defd8cc6
      • Instruction ID: 340f7582cbbd9a3adfd79e7b7252e6d1e9fe7669e9aa6b8baa0bc10dee8afb25
      • Opcode Fuzzy Hash: e0859860234d1a16a7c44ca61de55d9d3f7c919ded42ba10d07c0479defd8cc6
      • Instruction Fuzzy Hash: 38428270904249DFDF11CFA8C584BEEBBB5AF49304F24409EE805AB391DB799E85CB25
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: e0e7b93d0640cad387665ff99c4d6fde96781850c5c42a8f57e7544b44410689
      • Instruction ID: 0f07cf4e18590a0158061efb07cd9f14cc5d1c547ddaf9a6d5cd82f448a6fca8
      • Opcode Fuzzy Hash: e0e7b93d0640cad387665ff99c4d6fde96781850c5c42a8f57e7544b44410689
      • Instruction Fuzzy Hash: 23127F31900209DFCF20DFA4C984AEEB7B5AF45314F2481BAE445FB291DB39AE49CB55
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 81201897ae7dd6e2ad135f8e655b94a4276dd898dfb569a95b909b69ed5fe49c
      • Instruction ID: 37085afd514dfc8b0f11459bf5528e69d7fd873d7eb4aaf3a52d7daf68779b0c
      • Opcode Fuzzy Hash: 81201897ae7dd6e2ad135f8e655b94a4276dd898dfb569a95b909b69ed5fe49c
      • Instruction Fuzzy Hash: 5D917D30A0064AEFCB25DFA9C490AEEFBB1FF09304F10456EE559A3311D739A994CB95
      APIs
      • __EH_prolog.LIBCMT ref: 00415C64
        • Part of subcall function 00415F97: __EH_prolog.LIBCMT ref: 00415F9C
        • Part of subcall function 00403D12: GetCurrentDirectoryW.KERNEL32(00000105,00000000,?,00000000), ref: 00403D3D
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$CurrentDirectoryfree
      • String ID:
      • API String ID: 1231661175-0
      • Opcode ID: be0f0b4e1bd94d20ae94145a96cd94cbc77c7a7969c84c0b75b9d381ab5219d1
      • Instruction ID: 09c4014094affc46a77da51cbfe550b9ceff7a30d4da3af5e026942b496d4ded
      • Opcode Fuzzy Hash: be0f0b4e1bd94d20ae94145a96cd94cbc77c7a7969c84c0b75b9d381ab5219d1
      • Instruction Fuzzy Hash: 39819C31800249DFCF25DFA4C841ADDBBB4BF18308F0080AEE549A7292DB389E85CF55
      APIs
      • __EH_prolog.LIBCMT ref: 0040EC6A
        • Part of subcall function 0040E74A: __EH_prolog.LIBCMT ref: 0040E74F
        • Part of subcall function 0040C37A: __EH_prolog.LIBCMT ref: 0040C37F
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$free
      • String ID:
      • API String ID: 2654054672-0
      • Opcode ID: ff3dccf710e2fed04cc13cf77327336f995d208d98c7800cd030a6e41afb1b0e
      • Instruction ID: 5c1dc32a309cc29cc9a930ca77f75e64d73e40bcb36dbefd7ed33ab82a3d2cc1
      • Opcode Fuzzy Hash: ff3dccf710e2fed04cc13cf77327336f995d208d98c7800cd030a6e41afb1b0e
      • Instruction Fuzzy Hash: CF61C270600209DFDB20EFA2C985EAEB7B9AF04308F10483FE546B72D1DB79A945CB54
      APIs
      • __EH_prolog.LIBCMT ref: 00418BDC
        • Part of subcall function 0041B257: __EH_prolog.LIBCMT ref: 0041B25C
        • Part of subcall function 0041B257: _CxxThrowException.MSVCRT(?,004303B8), ref: 0041B2A7
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$ExceptionThrow
      • String ID:
      • API String ID: 2366012087-0
      • Opcode ID: 0f51b4e1465cb587c46163fff8b5871f7aa0289ee5ef11b2c6b7415d69d63f8b
      • Instruction ID: aab3a4f930dec5388b4800193ed2a8635661b44e127019220ecbb7f2bca0c157
      • Opcode Fuzzy Hash: 0f51b4e1465cb587c46163fff8b5871f7aa0289ee5ef11b2c6b7415d69d63f8b
      • Instruction Fuzzy Hash: 7D517970600249DFCB11CFA8C988ADEBBB4BF49304F1444AEE44AD7352DB399E85CB61
      APIs
      • __EH_prolog.LIBCMT ref: 0040F92D
        • Part of subcall function 004020CF: malloc.MSVCRT ref: 004020D5
        • Part of subcall function 004020CF: _CxxThrowException.MSVCRT(?,0042D048), ref: 004020EF
        • Part of subcall function 0040FAA2: __EH_prolog.LIBCMT ref: 0040FAA7
        • Part of subcall function 00401A7D: __EH_prolog.LIBCMT ref: 00401A82
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$ExceptionThrowfreemalloc
      • String ID:
      • API String ID: 2423332413-0
      • Opcode ID: 9be19f6b846c03c81b4fc44d8a41c4572a90b766f3554761c4030b277644f9da
      • Instruction ID: 14fb5bc4644c8be8bbbd85468426697c20ae80b86053c8fdc83c98d4d2e019d2
      • Opcode Fuzzy Hash: 9be19f6b846c03c81b4fc44d8a41c4572a90b766f3554761c4030b277644f9da
      • Instruction Fuzzy Hash: 1E51C171A0060AEFCB21DFA5C484A9EBBB4BF08314F10817FE555B76E2CB789A45CB54
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 4d0e1bcaa22eed2ebc0e05ee49bdbc367b0a37000601ac4497db0d2a6758db35
      • Instruction ID: 20b8af3ec1be57dcb73f1ad09a802ec4c95816be6c57237e58952c87f2746826
      • Opcode Fuzzy Hash: 4d0e1bcaa22eed2ebc0e05ee49bdbc367b0a37000601ac4497db0d2a6758db35
      • Instruction Fuzzy Hash: 5141AD70A046469FDB21CF64C488BAABBB0BF04354F148A6ED46697791D374FDC1CB94
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 6c249aee99056093a111b26770c2c76e3830b52cfb7801991afb191706880683
      • Instruction ID: aee0a3abb712aa14678732b216a728155357ffbf8a2d3bda02b1285abcb88c69
      • Opcode Fuzzy Hash: 6c249aee99056093a111b26770c2c76e3830b52cfb7801991afb191706880683
      • Instruction Fuzzy Hash: 28316131C012199BCB14EFE5D945ADEBBB8FF14314F14852EE412B32D1DB78AA49DB18
      APIs
      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00413F90
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: 329ed73377c4fe396c0ef21212cd01c86fa39b463e426f5280b305e6ec5d41cf
      • Instruction ID: 0dacdcfece33f48d4adb4ceeedf6e302bf861e498a27e992ad954936af03ac54
      • Opcode Fuzzy Hash: 329ed73377c4fe396c0ef21212cd01c86fa39b463e426f5280b305e6ec5d41cf
      • Instruction Fuzzy Hash: 42214C35700705AFDB24DE24C480B9BB7B6EF86352F10851EE99A87340C774BE86CA69
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: faf64749df2646f11e7877185ccf87ca485dc7c266260ca03f01c58aa6668eb3
      • Instruction ID: c8d04accb6ab48836b320e843486b404e492812a6cbc38840d705cf7fcc4152b
      • Opcode Fuzzy Hash: faf64749df2646f11e7877185ccf87ca485dc7c266260ca03f01c58aa6668eb3
      • Instruction Fuzzy Hash: 3B218EB1A057809FD765DF34C880BABBBA5FF44314F04886FD19A67242C734B944CB58
      APIs
      • __EH_prolog.LIBCMT ref: 004174EF
        • Part of subcall function 004175FC: __EH_prolog.LIBCMT ref: 00417601
        • Part of subcall function 004173F2: __EH_prolog.LIBCMT ref: 004173F7
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
        • Part of subcall function 00417563: __EH_prolog.LIBCMT ref: 00417568
        • Part of subcall function 004175AB: __EH_prolog.LIBCMT ref: 004175B0
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$free
      • String ID:
      • API String ID: 2654054672-0
      • Opcode ID: fee138fc70115c786cb7e28129668b3601e991b439443d2d6ba3a207c132b50f
      • Instruction ID: efc97fdb2cd501e263356821e8bbbc0493516a7fb5b1082b523d0c7857f09569
      • Opcode Fuzzy Hash: fee138fc70115c786cb7e28129668b3601e991b439443d2d6ba3a207c132b50f
      • Instruction Fuzzy Hash: F4F0F931918B60DACB19FB68D81539DBBF1AF04308F10855FE152636D2CFBC6A00974D
      APIs
      • __EH_prolog.LIBCMT ref: 0041749E
        • Part of subcall function 004174EA: __EH_prolog.LIBCMT ref: 004174EF
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$free
      • String ID:
      • API String ID: 2654054672-0
      • Opcode ID: 6ee6d8b74b3aa55adc54459261b118c78aaaa05815ffb244da1ec2e80cc4e2b4
      • Instruction ID: 0d2538145b2f53762c335bf756670600069896b2a133757d526aa6263dcbfd11
      • Opcode Fuzzy Hash: 6ee6d8b74b3aa55adc54459261b118c78aaaa05815ffb244da1ec2e80cc4e2b4
      • Instruction Fuzzy Hash: 8AF0E232A046209BD725AB4DD881BEAFBB8FF50324F10802FE91167742CFBC9C008658
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: fcf6c9437ee82e96642ca29cd9d38f643f0dc697364c92bfbac083e3f7b32662
      • Instruction ID: 9a5e07ec0e47d64c26588371121f8ffa3219084a79d0dc189f2b82a60e8117f4
      • Opcode Fuzzy Hash: fcf6c9437ee82e96642ca29cd9d38f643f0dc697364c92bfbac083e3f7b32662
      • Instruction Fuzzy Hash: 040128B1601B54DBC325DFA495802CAFBE4AF14304F90C85FD49A53741DBB86608CB58
      APIs
      • __EH_prolog.LIBCMT ref: 0041541C
        • Part of subcall function 00426240: _beginthreadex.MSVCRT ref: 00426254
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog_beginthreadex
      • String ID:
      • API String ID: 273140464-0
      • Opcode ID: ec6a2a04366d7cd57758bda68cb4f363685c3bb3d15507ecac7c3b4d00f13e12
      • Instruction ID: 76e682a7ea0aabb95fce7a0902c1170d0023b604bf98ee2b1dd9ae3271808536
      • Opcode Fuzzy Hash: ec6a2a04366d7cd57758bda68cb4f363685c3bb3d15507ecac7c3b4d00f13e12
      • Instruction Fuzzy Hash: 46F08232A10039EBDB14AB50DC01BEFB768EF40359F11816BA811A6280D77C9E84C7AC
      APIs
      • __EH_prolog.LIBCMT ref: 00415FF1
        • Part of subcall function 004134A3: __EH_prolog.LIBCMT ref: 004134A8
        • Part of subcall function 004134A3: _CxxThrowException.MSVCRT(?,0042D080), ref: 00413623
        • Part of subcall function 004134A3: _CxxThrowException.MSVCRT(?,0042D080), ref: 00413649
        • Part of subcall function 00413261: __EH_prolog.LIBCMT ref: 00413266
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$ExceptionThrow
      • String ID:
      • API String ID: 2366012087-0
      • Opcode ID: 6708e0341f6018fe9b873d488056be1469f5172c695251e8db54eadfe182fa34
      • Instruction ID: 607f97d41993f9ee4f9aa1de6ff351c0bd8c0e3f80b48a06ceb8507f62edee5e
      • Opcode Fuzzy Hash: 6708e0341f6018fe9b873d488056be1469f5172c695251e8db54eadfe182fa34
      • Instruction Fuzzy Hash: 35F082B1A01654DFC311DFA9D8846CAFBE0FF18304F9184AFD45A97301C7B86A00CB58
      APIs
      • __EH_prolog.LIBCMT ref: 00415F9C
        • Part of subcall function 00415FEC: __EH_prolog.LIBCMT ref: 00415FF1
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: ed89fa709e25b81b5d8e3a69996be17590871d0bee4b56f8ef7a10b79e90fdc1
      • Instruction ID: f73321e82dc03a21e434aafab76963d66f8b8827e683e2e3f1d56e2a489d7348
      • Opcode Fuzzy Hash: ed89fa709e25b81b5d8e3a69996be17590871d0bee4b56f8ef7a10b79e90fdc1
      • Instruction Fuzzy Hash: EAF08CB1A00614DEC7109FAAD4086CDFBF8EF90304F1082AFA055D3321DBF46945CB64
      APIs
      • __EH_prolog.LIBCMT ref: 0040DCC8
        • Part of subcall function 004020CF: malloc.MSVCRT ref: 004020D5
        • Part of subcall function 004020CF: _CxxThrowException.MSVCRT(?,0042D048), ref: 004020EF
        • Part of subcall function 0040DD3A: __EH_prolog.LIBCMT ref: 0040DD3F
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$ExceptionThrowmalloc
      • String ID:
      • API String ID: 3744649731-0
      • Opcode ID: 5d48e162d1faf98e253d13c591023dfcf50975d86c2c3ab67d2bb775dc8dbcde
      • Instruction ID: 8787ccbb7256473083212f4ff884c9d7143cb1cd305eeeed8f47dfe13ee31d75
      • Opcode Fuzzy Hash: 5d48e162d1faf98e253d13c591023dfcf50975d86c2c3ab67d2bb775dc8dbcde
      • Instruction Fuzzy Hash: 48E09271F10116AFDB18EB68D80669D76A5AF04314F10863FA022F36C6DFB84A008658
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 57f476f9e83fa3e42b27ed10c0dedfd59894f846a8cddb888c3c565faacacd9b
      • Instruction ID: 24c95e28fcf060a65b72f5e970eeabed95ea355385133c076e0d391a57a80cfb
      • Opcode Fuzzy Hash: 57f476f9e83fa3e42b27ed10c0dedfd59894f846a8cddb888c3c565faacacd9b
      • Instruction Fuzzy Hash: 44E06D35600114EFC705EF99D845F9EBBA8FF48318F10846EB40ADB241CB78A901CA68
      APIs
      • KillTimer.USER32(00008001,?), ref: 00414E09
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: KillTimer
      • String ID:
      • API String ID: 729406807-0
      • Opcode ID: 1c0f08aefd08420088e86f9fe6cad966aa150a0d9f5500e682c1a166dc49c7ae
      • Instruction ID: f0695324b343396b54ec2f2796eb2e772adf312a6a052f2307a7ea4d3645fc5f
      • Opcode Fuzzy Hash: 1c0f08aefd08420088e86f9fe6cad966aa150a0d9f5500e682c1a166dc49c7ae
      • Instruction Fuzzy Hash: FCF0A032118741DBCB325B20C844BDFBBE2BFC4300F10481EF09616150CB7918A5DF55
      APIs
      • __EH_prolog.LIBCMT ref: 00416F0E
        • Part of subcall function 00417499: __EH_prolog.LIBCMT ref: 0041749E
        • Part of subcall function 00417448: __EH_prolog.LIBCMT ref: 0041744D
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID:
      • API String ID: 3519838083-0
      • Opcode ID: 440eb707d267d6ed2b4d48beec5fbb1f1bc8f4bdf6ec121d93ec76858d26ff00
      • Instruction ID: 383f8f2811993b49c410e9bafb6d37c57ab428893a244b838021762b379e2fb1
      • Opcode Fuzzy Hash: 440eb707d267d6ed2b4d48beec5fbb1f1bc8f4bdf6ec121d93ec76858d26ff00
      • Instruction Fuzzy Hash: 0EE0E571900A20CAEB1CEB58D4127DCBBB4AF04328F00425EA427532D2CB786A04C658
      APIs
        • Part of subcall function 004046BE: CloseHandle.KERNELBASE(?,?,00404690), ref: 004046C9
      • CreateFileW.KERNELBASE(?,?,?,00000000,?,?,00000000), ref: 004046A7
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CloseCreateFileHandle
      • String ID:
      • API String ID: 3498533004-0
      • Opcode ID: f308e96676010879eaf098f804ca93bd275243095bcecf339b7b316c46e70dcd
      • Instruction ID: d6e1da346eebb5349affc62c63fb53b40b2f73570a5de9cd5c672068ff8cdd1a
      • Opcode Fuzzy Hash: f308e96676010879eaf098f804ca93bd275243095bcecf339b7b316c46e70dcd
      • Instruction Fuzzy Hash: 84E086761002197BCF215F64DC01BCE3B95AF19760F140526FB20A61E0D777C8B1ABD5
      APIs
      • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 004048BD
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: FileWrite
      • String ID:
      • API String ID: 3934441357-0
      • Opcode ID: b66284758cf875ea0eb3d52af25ea993fc5d38dbbc9fac0c9351a47cf47e9f00
      • Instruction ID: 47c02cd602e8811402d77a375cebeaba5eccd3a0030b36b25c1369484e3eb127
      • Opcode Fuzzy Hash: b66284758cf875ea0eb3d52af25ea993fc5d38dbbc9fac0c9351a47cf47e9f00
      • Instruction Fuzzy Hash: E2E0ED75600208FFCB11CF55D841B8E7BF9EB45354F10C069F919AA260D379AA54DF54
      APIs
      • PostMessageW.USER32(?,00008001,00000000,00000000), ref: 00415406
        • Part of subcall function 00426280: SetEvent.KERNEL32(?,00407AAF), ref: 00426283
        • Part of subcall function 00426230: WaitForSingleObject.KERNEL32(?,000000FF,00414B7B,00000061,00000000,?,?,?,00000000,?,?,?,?,00000000,00000000,00000000), ref: 00426233
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: EventMessageObjectPostSingleWait
      • String ID:
      • API String ID: 3033668351-0
      • Opcode ID: 385471b70e4ab07d8a46c976a7c2347c658f69b8b3faf526f1e3173eeb6697ae
      • Instruction ID: e41a08748df710f84823e84766246ae2f5dde630ef0742ad732470b1a371cff2
      • Opcode Fuzzy Hash: 385471b70e4ab07d8a46c976a7c2347c658f69b8b3faf526f1e3173eeb6697ae
      • Instruction Fuzzy Hash: 00E0DF30214B909EE731A334FC097C27B819F01300F04048EF0EA221D18BA428E1C398
      APIs
      • __EH_prolog.LIBCMT ref: 00415479
        • Part of subcall function 004154C0: __EH_prolog.LIBCMT ref: 004154C5
        • Part of subcall function 004154C0: EnterCriticalSection.KERNEL32(?,?,?), ref: 004155FB
        • Part of subcall function 004154C0: LeaveCriticalSection.KERNEL32(?,?,?,?), ref: 00415658
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CriticalH_prologSection$EnterLeave
      • String ID:
      • API String ID: 317552408-0
      • Opcode ID: e60df4fbdc2895a6d6e2531f28aeae4733311a65d100025a0a6deadf173157c8
      • Instruction ID: 024d663840d7811bdf33d7098ac025f6201eb583077b037c263a31ff1b2e0f64
      • Opcode Fuzzy Hash: e60df4fbdc2895a6d6e2531f28aeae4733311a65d100025a0a6deadf173157c8
      • Instruction Fuzzy Hash: 67E08C72A10664EBD704DB5998427DEB7A8EB8531DF00852FA005E3241C3BC694087A8
      APIs
      • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00404810
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: FileRead
      • String ID:
      • API String ID: 2738559852-0
      • Opcode ID: 5df1515875bedd3c83e58b8461d968d386211719c35e5b0019e1da2bdd808035
      • Instruction ID: 4003fc020f9de39c5eb42a26df6463e231032b8024d01712fd11260babaa06a2
      • Opcode Fuzzy Hash: 5df1515875bedd3c83e58b8461d968d386211719c35e5b0019e1da2bdd808035
      • Instruction Fuzzy Hash: CAE0EC75200208FBCB11CF90CC01F8E7BB9EB49754F208059E915A6160C375AA14EB54
      APIs
      • SendMessageW.USER32(?,00001061,?,?), ref: 00405EC6
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: MessageSend
      • String ID:
      • API String ID: 3850602802-0
      • Opcode ID: 164ae8f425abc56fbc857c6c366a6cd0eb2d2d679ece0eda857c8e78f80bdc8a
      • Instruction ID: cdc53ab37f91f56d0dbb0838b48238b413029ddd79ee80067a6402257e70dd9f
      • Opcode Fuzzy Hash: 164ae8f425abc56fbc857c6c366a6cd0eb2d2d679ece0eda857c8e78f80bdc8a
      • Instruction Fuzzy Hash: 4EE092B490020EAFDF00DFA5D845DAEBBB9FB88708F108519E914AB250D3B49A558BA0
      APIs
      • __EH_prolog.LIBCMT ref: 0041B585
        • Part of subcall function 004020CF: malloc.MSVCRT ref: 004020D5
        • Part of subcall function 004020CF: _CxxThrowException.MSVCRT(?,0042D048), ref: 004020EF
        • Part of subcall function 00418325: __EH_prolog.LIBCMT ref: 0041832A
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$ExceptionThrowmalloc
      • String ID:
      • API String ID: 3744649731-0
      • Opcode ID: 3611bad8bc305f9afebf70df4c86a3ba817e45835301676c5d1ea26fa01f0f72
      • Instruction ID: f5876fddc976ad4f8e0900b1f669633691ac615741aaf313824f3d6d5b5970fd
      • Opcode Fuzzy Hash: 3611bad8bc305f9afebf70df4c86a3ba817e45835301676c5d1ea26fa01f0f72
      • Instruction Fuzzy Hash: DBD05EB1B041259BCB5CEFB4A4163AD76B2EB44708F20843FB417E37C2DF7899408629
      APIs
        • Part of subcall function 004132B5: EnterCriticalSection.KERNEL32(?,?,?,?,00414F92), ref: 004132C1
        • Part of subcall function 004132B5: LeaveCriticalSection.KERNEL32(?,?,?,00414F92), ref: 004132CB
      • SetDlgItemTextW.USER32(?,000001BE,?), ref: 00414F6D
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CriticalSection$EnterItemLeaveText
      • String ID:
      • API String ID: 3811111623-0
      • Opcode ID: f082560edcc5121aa8624134d61551f1986023105dc6a65dfdb121e04a48e551
      • Instruction ID: 73fa5fe5624e36446d85b1d75fa1e4fb82caf0c45f5c66cd579ca59815aa7b54
      • Opcode Fuzzy Hash: f082560edcc5121aa8624134d61551f1986023105dc6a65dfdb121e04a48e551
      • Instruction Fuzzy Hash: B8D05E311007148BCA62AB20D941ADA73E5AF84744B0004AFE8928B665DB646A9A8A88
      APIs
      • SetDlgItemTextW.USER32(?,000001BC,?), ref: 00415020
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ItemText
      • String ID:
      • API String ID: 3367045223-0
      • Opcode ID: bdab0797297c75f1c21d8b741e2a4a45fdd30b50d794ac87e04b62f8df79d3d8
      • Instruction ID: 002b25c598a0ce2437379d27bdb06f616906fede3377d933caf3d8d9dfbfdc72
      • Opcode Fuzzy Hash: bdab0797297c75f1c21d8b741e2a4a45fdd30b50d794ac87e04b62f8df79d3d8
      • Instruction Fuzzy Hash: CFD0A730110B209FD722AB20DC01BC77BE5BF49700F44056EE48286561D764B990C7C5
      APIs
      • SetFileTime.KERNELBASE(?,?,?,?,0040B88D,00000000,00000000,00000000), ref: 0040488B
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: FileTime
      • String ID:
      • API String ID: 1425588814-0
      • Opcode ID: 1747e296422807fe7e08a4852a4b49f21b7a2dc1fb5098c2f50bc72f35b5ef15
      • Instruction ID: 097119e42d876942feea11de77e02c88dc52f1d0728cd243263ddf67d0b43124
      • Opcode Fuzzy Hash: 1747e296422807fe7e08a4852a4b49f21b7a2dc1fb5098c2f50bc72f35b5ef15
      • Instruction Fuzzy Hash: C9C04C36158205FF8F120F70CC04D1ABBA2EB95311F10C918B169C4070C7328024EB06
      APIs
      • DialogBoxParamW.USER32(?,?,00405DC9,?,00414B4C), ref: 00405E57
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: DialogParam
      • String ID:
      • API String ID: 665744214-0
      • Opcode ID: 258b3f1e7912d4069fa8dddc4f7b2ae2e734b2864e693f1637925099db8f7780
      • Instruction ID: d99d672b3947a8f7820696ab6f9b1f793f30db75bc89ee9dfad2b3a394f79c79
      • Opcode Fuzzy Hash: 258b3f1e7912d4069fa8dddc4f7b2ae2e734b2864e693f1637925099db8f7780
      • Instruction Fuzzy Hash: 22C04C35114342ABCB02DF50DD19C267A61FF95300B54882AB1501007483625424DB55
      APIs
      • GetFileAttributesW.KERNELBASE(?,00403B27), ref: 004040AC
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 3fa9057e520350eb0908adb99f81bb4c9546e7580eefc3b396430a8ff70d2e8f
      • Instruction ID: 243b1f0a9a099f5e4fd37fbeee605c112d8cbe8a18bd5c6b85c1ff2d1a928ae1
      • Opcode Fuzzy Hash: 3fa9057e520350eb0908adb99f81bb4c9546e7580eefc3b396430a8ff70d2e8f
      • Instruction Fuzzy Hash: 6CA022F0A20000C2CB3203303C0800B3B808A80332BB00FB2F330E00E0CB38C80038AC
      APIs
      • SetEndOfFile.KERNELBASE(?,0040495E,?,?,?), ref: 0040491B
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: File
      • String ID:
      • API String ID: 749574446-0
      • Opcode ID: 4877def579187a439d091a120b9cce330d01ec03bb2ce6299276197d0a8db838
      • Instruction ID: b8ddff0f0ce236edcb9b80f72c6c1c5c59f5cede9ce630d845cafbcf44f1e6be
      • Opcode Fuzzy Hash: 4877def579187a439d091a120b9cce330d01ec03bb2ce6299276197d0a8db838
      • Instruction Fuzzy Hash: A0A002703E511B8B8F221F34DD098293BA2EB52B0776417B4B117D94F8DF224419AA45
      APIs
      • SetFileAttributesW.KERNELBASE ref: 00403AC9
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: AttributesFile
      • String ID:
      • API String ID: 3188754299-0
      • Opcode ID: 7b92a3730b5fef3cc42d1066d5a852b8a4492f94cdb29db13c9b1ca3bd427707
      • Instruction ID: 60e4c2d02b9765280195f1672c84df48c3864d808d09589d9af1a8e40566ec74
      • Opcode Fuzzy Hash: 7b92a3730b5fef3cc42d1066d5a852b8a4492f94cdb29db13c9b1ca3bd427707
      • Instruction Fuzzy Hash: 78A002A03112459BA6251B315E09F2F266EFEC1BD1745C56C7411C5060EB29C8515666
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ErrorLast
      • String ID:
      • API String ID: 1452528299-0
      • Opcode ID: b1d23bd8cc2f6b5c6acc5c1a7072e2f56e2b83c1e28e12267b0acb3134d4719e
      • Instruction ID: 9031adda98efe2f63c70a2b8663eb4d7f69ea420b7051a7302f7c9b69e056c10
      • Opcode Fuzzy Hash: b1d23bd8cc2f6b5c6acc5c1a7072e2f56e2b83c1e28e12267b0acb3134d4719e
      • Instruction Fuzzy Hash: 96F0A4712106079BCB24DE10D9009B73768FF04310B114C3AAD07E76A0D73BE8259B98
      APIs
      • CloseHandle.KERNELBASE(?,?,00404690), ref: 004046C9
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CloseHandle
      • String ID:
      • API String ID: 2962429428-0
      • Opcode ID: 8f14f25d0a08195d688ffe9e41955209db87d83e11149b69f25caf95e26f77a6
      • Instruction ID: 19c5b7b149ef6b78bdf230e37c466ebcbdeb2f2bbca282333fd789e7feab8b70
      • Opcode Fuzzy Hash: 8f14f25d0a08195d688ffe9e41955209db87d83e11149b69f25caf95e26f77a6
      • Instruction Fuzzy Hash: 50D0127150416147CA741E7C78445C333D96B533713610BAAF1B1D32E0E37A8C934698
      APIs
      • VirtualAlloc.KERNELBASE(00000000), ref: 0041F591
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: AllocVirtual
      • String ID:
      • API String ID: 4275171209-0
      • Opcode ID: 1701518ff9cff853d37f100dd6ed6d11e62168be09bf45a01b00f09eaecaa913
      • Instruction ID: 9d7e77d1fce5533231b394661bdbc009fd232efc5d702a0478458ff6f5489ef5
      • Opcode Fuzzy Hash: 1701518ff9cff853d37f100dd6ed6d11e62168be09bf45a01b00f09eaecaa913
      • Instruction Fuzzy Hash: A5C08CE1A4D2809FDF0213108C407303B208B87300F4A00C1E9045B092C6000809C722
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: malloc
      • String ID:
      • API String ID: 2803490479-0
      • Opcode ID: 7eb0c7e85277742d8eb2c84607b0eda41cd5309b40220591e7394a307975209c
      • Instruction ID: edb7dee5a5fe1e8978fb62284b1ea4fdb52eb131d262c574b5685380d86b94c4
      • Opcode Fuzzy Hash: 7eb0c7e85277742d8eb2c84607b0eda41cd5309b40220591e7394a307975209c
      • Instruction Fuzzy Hash: D8B012B031104002DF3C07342C140673110665020F7C00478B803C0111E71DD06A504D
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: malloc
      • String ID:
      • API String ID: 2803490479-0
      • Opcode ID: c0cb48ea1e1d75581b2851136fad6e8f8381a5f2131f1520d37978d210b70763
      • Instruction ID: d6751d571afff6d337c92a84d6b7927b579f73ef18650cdb9c2d1653eab13d70
      • Opcode Fuzzy Hash: c0cb48ea1e1d75581b2851136fad6e8f8381a5f2131f1520d37978d210b70763
      • Instruction Fuzzy Hash: 17B012A8A0004012DA140B383C040673133B6D060E7C4C474A40580125FB28F069604D
      APIs
      • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 0041F5AC
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: FreeVirtual
      • String ID:
      • API String ID: 1263568516-0
      • Opcode ID: 0c83439fa4c725d00e38eb752a8bc10cde513a0133cb09a307a7de3e93c184f1
      • Instruction ID: 0b764dc8d57671a1fc91aa54129727df4719345381b419d6290591ecd97602b2
      • Opcode Fuzzy Hash: 0c83439fa4c725d00e38eb752a8bc10cde513a0133cb09a307a7de3e93c184f1
      • Instruction Fuzzy Hash: 87A00278B8070476ED7167306D4FF763624B788F01F7085547251690D4AEE460499A5C
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: free
      • String ID:
      • API String ID: 1294909896-0
      • Opcode ID: e5b61bb752fd1406cda7aa26b58092988b7d5cf5ae00073aa8044059efcb3113
      • Instruction ID: 2d31d677e3fc248ebea702578755217e4fc8eccf8b0b543ebada156eaa7c33d5
      • Opcode Fuzzy Hash: e5b61bb752fd1406cda7aa26b58092988b7d5cf5ae00073aa8044059efcb3113
      • Instruction Fuzzy Hash:
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: free
      • String ID:
      • API String ID: 1294909896-0
      • Opcode ID: db7dec8f591615152b75f9208ac597a2ae6b288c9c2a6b0c6a0495a1f5e63a54
      • Instruction ID: 13fe2ed5b53cab0bee48690aafe0246fe445695eda3f1e742bd4df4346e8d53c
      • Opcode Fuzzy Hash: db7dec8f591615152b75f9208ac597a2ae6b288c9c2a6b0c6a0495a1f5e63a54
      • Instruction Fuzzy Hash:
      APIs
      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0040538B
      • FileTimeToSystemTime.KERNEL32(?,?,?,?), ref: 0040539D
      • __aullrem.LIBCMT ref: 004054FB
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Time$File$LocalSystem__aullrem
      • String ID:
      • API String ID: 2417234408-0
      • Opcode ID: 4af20367b5cdc8f32a2167142c7b984cf69ea129b74ea6c3fd0543a715718702
      • Instruction ID: 9b2a24d50627d2caf7484fe88683b0e843c59621b6a34b61515ffe6e66d34e8b
      • Opcode Fuzzy Hash: 4af20367b5cdc8f32a2167142c7b984cf69ea129b74ea6c3fd0543a715718702
      • Instruction Fuzzy Hash: AA51CB72A05355DBD710CF5E94C06EEFBF6EF79210F24805AE884D3282D27A4D5AC720
      APIs
      • __EH_prolog.LIBCMT ref: 004045AB
      • GetLogicalDriveStringsW.KERNEL32(00000000,00000000), ref: 004045C8
      • GetLogicalDriveStringsW.KERNEL32(00000000,00000000), ref: 004045F6
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: DriveLogicalStrings$H_prologfree
      • String ID:
      • API String ID: 396970233-0
      • Opcode ID: 870fc058b23bd43a99f2027af3a7be07be430d919b31566bd93727412383ecfb
      • Instruction ID: 40f0e937e4fca1712a0c0889b8bc5cd9056fd665d0ed9ad76a354fd1a5406f83
      • Opcode Fuzzy Hash: 870fc058b23bd43a99f2027af3a7be07be430d919b31566bd93727412383ecfb
      • Instruction Fuzzy Hash: 392171B2E002059BDB14EFA59D85AAFB7B8EF45314F20453FE211B32C1DA7D5A04C669
      APIs
      • memcpy.MSVCRT(?,00000000,?,?,00000000,?), ref: 00425ECC
      • memcpy.MSVCRT(?,00000000,00000040,00000000,?,00000000,?), ref: 00425EEE
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: memcpy
      • String ID:
      • API String ID: 3510742995-0
      • Opcode ID: bdcef5cc755c2b65765fdd23cbf8f8552a0b388de8dbcad399ea5c20001b9d4a
      • Instruction ID: be7640e2d17d0da69cec5fca855ce1339e5bd66a57267f8e940a65d8363f696e
      • Opcode Fuzzy Hash: bdcef5cc755c2b65765fdd23cbf8f8552a0b388de8dbcad399ea5c20001b9d4a
      • Instruction Fuzzy Hash: 1C918CB2A043108FC318DF59E88454BB7E1FFC8314F568A6EE9488B315E335E915CB86
      APIs
      • __EH_prolog.LIBCMT ref: 0041A867
        • Part of subcall function 00419091: _CxxThrowException.MSVCRT(?,00430378), ref: 004190A4
        • Part of subcall function 004190FD: memcpy.MSVCRT(00000000,?,00000000,?,?,00419681,?,?,00000000,00000000), ref: 00419123
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 0041ACD2
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ExceptionThrow$H_prologmemcpy
      • String ID:
      • API String ID: 3273695820-0
      • Opcode ID: f156e4844460ed86659a8bdae370be893c80e34bd91267f952c917e1a65a486b
      • Instruction ID: 1dcaab9b92b70811f76bcfe7dcfc1ed719c2dfc12bd0dd2abfc21641a6e5128f
      • Opcode Fuzzy Hash: f156e4844460ed86659a8bdae370be893c80e34bd91267f952c917e1a65a486b
      • Instruction Fuzzy Hash: 2B227F7090124ADFCF14DFA5C590BEEBBB1BF04304F14806EE419A7252DB78AA95CF96
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Version
      • String ID:
      • API String ID: 1889659487-0
      • Opcode ID: 4744eb24ad6710932659651afa36c41b6db1c79646798b9a43281fea1ba5683c
      • Instruction ID: 03e42b4b276c969c2af72c0c005ffba7ff52d78708b68ec57d6ccc05fef6e3fb
      • Opcode Fuzzy Hash: 4744eb24ad6710932659651afa36c41b6db1c79646798b9a43281fea1ba5683c
      • Instruction Fuzzy Hash: 33E0D8716002458BD7149B15D8026BB73E4BB50708FC8097ED498C1252F73EDB1DC65A
      APIs
        • Part of subcall function 0040591C: GetCurrentProcess.KERNEL32(?,?,0040593D), ref: 00405921
        • Part of subcall function 0040591C: GetProcessAffinityMask.KERNEL32(00000000), ref: 00405928
      • GetSystemInfo.KERNEL32(?), ref: 00405953
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Process$AffinityCurrentInfoMaskSystem
      • String ID:
      • API String ID: 3251479945-0
      • Opcode ID: c0a34ffe727ac158d3eb02d5992bddd5be8d0188b74203df62cf93fa4022d544
      • Instruction ID: 25077934b5aff40aa6b101f249a075879fb5a09f09fe59fde39d86d8e9b856bd
      • Opcode Fuzzy Hash: c0a34ffe727ac158d3eb02d5992bddd5be8d0188b74203df62cf93fa4022d544
      • Instruction Fuzzy Hash: 80D012B0A0050AD7CF14F7A5D446DAF7778DE44328F040079D912F22D1DB74D9458EA8
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID: $EC
      • API String ID: 0-2732497988
      • Opcode ID: 931a59e9bb2cac4f019ed8fad2302ed74e96653f9fffdeac9066dbc5b5a57e1f
      • Instruction ID: 5ef4e63655a0c897131c4051aca8dfb0919acb341c46533e92abf2e0a1bb7f03
      • Opcode Fuzzy Hash: 931a59e9bb2cac4f019ed8fad2302ed74e96653f9fffdeac9066dbc5b5a57e1f
      • Instruction Fuzzy Hash: 7E317337A609164BD74CCB28EC33BB96280E744305B89617EEA4BCB7D1EF6C9801C64C
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CriticalSection$EnterEventLeaveObjectSingleWait
      • String ID:
      • API String ID: 4060455350-0
      • Opcode ID: d33fa0af719fe4d40595c29ef95889c7e6692fa52d39ef1143959a1663b408f5
      • Instruction ID: e7255074088508b2f197b19ba624a4e9a24bd90bce1e94700411c88bb2990fa2
      • Opcode Fuzzy Hash: d33fa0af719fe4d40595c29ef95889c7e6692fa52d39ef1143959a1663b408f5
      • Instruction Fuzzy Hash: 4A6213B1A083508FCB24DF19E48062BBBE1FFD8744F948A2EE99987315D774D845CB46
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5e2a2f0d0f42b76f4f6b833c13a8ac4c9f948a915a86b73f9f3c18f8ea78656a
      • Instruction ID: 4e8b9c2ed86aeef9b70658028d6a45ccffe5cc12ed8d27813b1da846071be810
      • Opcode Fuzzy Hash: 5e2a2f0d0f42b76f4f6b833c13a8ac4c9f948a915a86b73f9f3c18f8ea78656a
      • Instruction Fuzzy Hash: F3023C73B0837047D714CE19DD90229B7E3FBD1380FAA462FE89647394DAB89946C789
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b5ab2d6071ba4f626031de446fa0850a734d69f202f19f46ab4dd51ed20a1283
      • Instruction ID: 61a39267599ff41eb138a7052bc945cb3060b844d00b39cdfd7622f9a929051f
      • Opcode Fuzzy Hash: b5ab2d6071ba4f626031de446fa0850a734d69f202f19f46ab4dd51ed20a1283
      • Instruction Fuzzy Hash: A5024B32B042218BC718CE28D6C027DBBE2FBC5345F510A2FE89697654D7B8D985CB99
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a7a96c1aaf24c8af0ea9d144db609074e883124d20b64139257fbd2e78c5b0ae
      • Instruction ID: 773246a4f21ee00a3c77d86e8aad08c44626cb74183739e538c6de4e29020b8b
      • Opcode Fuzzy Hash: a7a96c1aaf24c8af0ea9d144db609074e883124d20b64139257fbd2e78c5b0ae
      • Instruction Fuzzy Hash: 98D103758043AA4FEB54EF4DFC81239B762EF84301F498639CA500B3A7D678B611D798
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 95bbf68041f6a309ea1876750805daac2d155b5047d4a53fea4dd49e8b7b885a
      • Instruction ID: 407bc6de505d00b8198d8542c4792a91f8620c13cfe084bcc47b4b388399c9ff
      • Opcode Fuzzy Hash: 95bbf68041f6a309ea1876750805daac2d155b5047d4a53fea4dd49e8b7b885a
      • Instruction Fuzzy Hash: 0FD1CD339546A64FE714DF5CDC80221BBA2ABD8302F4B5679CA541B263C634FA12DBA4
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4099da4a2216205fc64cc4b82022cee0677a3829cdfe913caed688f86145e9d0
      • Instruction ID: b2e9d7da493935494be0ca6660e2f87f0fd1bfe1a5d562eb0c5d8d4fc1df4eb3
      • Opcode Fuzzy Hash: 4099da4a2216205fc64cc4b82022cee0677a3829cdfe913caed688f86145e9d0
      • Instruction Fuzzy Hash: 52717AB2A083158FC348DF49E48855AF3E1FFC8318F598A6DE9888B311D771E955CB86
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b31d452cf4fc038398579975b7917bb1ff375609163340ad82824380036c8528
      • Instruction ID: ff6aeb81e0743867d1bcab476ce981ec43b0d6947151c9a8023e4a2455680639
      • Opcode Fuzzy Hash: b31d452cf4fc038398579975b7917bb1ff375609163340ad82824380036c8528
      • Instruction Fuzzy Hash: 1D414833A0422A4BC714CE2C99942BAF7D1ABD5311B19477FC99797381E2249D8FC3D9
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 143c61723e4ffab3130a29a76379c9d02878b4e1cb0fdfb73aa060e8a62a191a
      • Instruction ID: f909df35a120c3ddb9733c5edf484032f59a546f51651308d5cd89b4bdf9ca83
      • Opcode Fuzzy Hash: 143c61723e4ffab3130a29a76379c9d02878b4e1cb0fdfb73aa060e8a62a191a
      • Instruction Fuzzy Hash: 7841D031B10A301AB30CCF26AC841666FC3D7C9346785D23DD1A5CA6DDDABDC04BC6A8
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3d24efc165e0a183422bdd108a3fa052590590d9631de2c04fbe31b73398f314
      • Instruction ID: 43a9c8aa4b605b42ae35a1edcd2fd1f4ca09d74e1ae4b18a31a5ee82433c72b9
      • Opcode Fuzzy Hash: 3d24efc165e0a183422bdd108a3fa052590590d9631de2c04fbe31b73398f314
      • Instruction Fuzzy Hash: B3312BB1B046B607E310DE1EAC80126FB93AFC1211F99827BD4948B74AD939A5528695
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
      • Instruction ID: a33af8adbce6e3ccfdd1f44a046a749ba678f075715d8e2b01d76f42186ee2a5
      • Opcode Fuzzy Hash: e781e73348b070714efe4b9f1f387dbcbf5b044bf6c7f23a7a0004d2e0ca769a
      • Instruction Fuzzy Hash: 0B41C261818B9652EB234F7CD882262B320BFAB204F00D76AFDD179922FB326544A655
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
      • Instruction ID: b2161842f3fa5d77dde35637ee4baa6b5dfc08799e1d32f1df75879d22ffac34
      • Opcode Fuzzy Hash: a91e830b051fd3563903b3b4c558af91fd9d6843125d3e1887e1db665648e344
      • Instruction Fuzzy Hash: 6321C5329146354BCB02CE6EF4C45A7F3A1FFC536AF534727ED8467291C628A85496A0
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
      • Instruction ID: 6604c4551b8a131c6e7360c6b7a526fdff4bf7066038cfe21cd6221b7ba2f4a5
      • Opcode Fuzzy Hash: d88b4545622fc2f48369f3988b55fed1d0241348448e0d26e09a3dd7181b3030
      • Instruction Fuzzy Hash: 202107726184358BC701DF1EF48867BB3E1FFD4319FA38A2BD9858B281C628D845D6A4
      APIs
      • __EH_prolog.LIBCMT ref: 004100F7
      • SetWindowTextW.USER32(?,?), ref: 0041010E
      • GetDlgItem.USER32(?,00000064), ref: 00410121
      • GetDlgItem.USER32(?,00000067), ref: 0041012D
      • GetDlgItem.USER32(?,00000066), ref: 00410137
      • GetDlgItem.USER32(?,00000067), ref: 00410147
      • ShowWindow.USER32(00000000,00000000), ref: 0041014C
      • GetDlgItem.USER32(?,00000067), ref: 00410154
      • EnableWindow.USER32(00000000,00000000), ref: 00410159
      • SendMessageW.USER32(?,00002005,00000001,00000000), ref: 00410170
      • SendMessageW.USER32(?,00000143,00000000,?), ref: 004101F5
      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00410203
      • SendMessageW.USER32(?,00001003,00000001,00000000), ref: 00410223
      • SendMessageW.USER32(?,00001003,00000000,00000000), ref: 00410236
      • SendMessageW.USER32(?,00001061,00000002,0000000F), ref: 004102D2
      • SendMessageW.USER32(?,0000101E,00000000,0000FFFF), ref: 0041031F
      • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00410335
      • SetWindowTextW.USER32(?,?), ref: 00410491
      • PostMessageW.USER32(00000003,00000128,00010002,00000000), ref: 004104A6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Message$Send$Item$Window$Text$EnableH_prologPostShow
      • String ID: *.*$2009-09-09 09:09$9999 MB$d
      • API String ID: 2205015233-1989021564
      • Opcode ID: fb04c1ddce067206cc86e38e5f1509bec1aec748710c8a99fde4674b662ae389
      • Instruction ID: fc7961d7d49fade69871298604dee21b5c4306267315d07f1921bc5b025592c0
      • Opcode Fuzzy Hash: fb04c1ddce067206cc86e38e5f1509bec1aec748710c8a99fde4674b662ae389
      • Instruction Fuzzy Hash: 08C17D70900309ABDB21EBA1CD46BEEBBB5FF04708F10442EE651762D1DBB96985DB18
      APIs
      • __EH_prolog.LIBCMT ref: 00419A3E
        • Part of subcall function 00419268: _CxxThrowException.MSVCRT(?,004303B8), ref: 0041928B
      • memcpy.MSVCRT(?,?,?,?,?,?,?,?,0000000B,00000000,?,?), ref: 00419E30
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419ECC
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419EE0
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419EF4
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419F08
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419F1C
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419F30
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419F44
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419F58
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419F6C
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419F80
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419F94
        • Part of subcall function 00419091: _CxxThrowException.MSVCRT(?,00430378), ref: 004190A4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ExceptionThrow$H_prologmemcpy
      • String ID: $!$@
      • API String ID: 3273695820-2517134481
      • Opcode ID: 3aea2d08f0f494636122d2b97f7f51403b962ff08f9202ea197148bc8bd987e1
      • Instruction ID: b92d931366b96e333b6f1969fbbd18cc88424578900dfebd92014336e182bb0c
      • Opcode Fuzzy Hash: 3aea2d08f0f494636122d2b97f7f51403b962ff08f9202ea197148bc8bd987e1
      • Instruction Fuzzy Hash: 49126B74A05249EFCF14DFA5C5A09EEBBB1BF49304F10845EE845AB352CB38AD81CB58
      APIs
      • GetVersionExW.KERNEL32 ref: 00420225
      • GetModuleHandleW.KERNEL32(kernel32.dll,SetDefaultDllDirectories), ref: 00420248
      • GetProcAddress.KERNEL32(00000000), ref: 0042024F
      • GetSystemDirectoryW.KERNEL32(?,00000106), ref: 00420275
      • lstrlenW.KERNEL32(?), ref: 00420296
      • lstrcatW.KERNEL32(?,.dll,?,00000000), ref: 00420307
      • LoadLibraryExW.KERNEL32(?,00000000,00000008,?,00000000), ref: 00420315
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemVersionlstrcatlstrlen
      • String ID: .dll$SetDefaultDllDirectories$\$\$kernel32.dll
      • API String ID: 532070074-471922092
      • Opcode ID: 1a2d77fbe7f47e51ccaacfd2b6649412b1bf1bc9b9c1e0cd82fe61bcb81d996e
      • Instruction ID: 83ad1d9d9813f1b0190c04410eec3c4702913240e255888e7c5d758e739ca2e2
      • Opcode Fuzzy Hash: 1a2d77fbe7f47e51ccaacfd2b6649412b1bf1bc9b9c1e0cd82fe61bcb81d996e
      • Instruction Fuzzy Hash: 8C21B4313443549BD735DF60AC48BDBB7E8EF58300F84486EE9C193291E7799845CBA9
      APIs
      • __EH_prolog.LIBCMT ref: 0041096E
      • SetDlgItemTextW.USER32(00000000,00000065,?), ref: 00410BA5
      • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 00410BBA
      • SendMessageW.USER32(?,00001009,00000000,00000000), ref: 00410BC7
      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00410D03
      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00410D9C
      • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00410DC8
      • SendMessageW.USER32(?,00001030,?,00410E7D), ref: 00410DD7
      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00410DE4
      • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00410E0E
      • SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00410E26
      • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00410E2F
      • InvalidateRect.USER32(?,00000000,00000001,?,00410E7D,?,?), ref: 00410E36
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: MessageSend$H_prologInvalidateItemRectText
      • String ID:
      • API String ID: 3901109532-0
      • Opcode ID: ca12edea3dcbd3f57b2269390453b5c97a71e7ec0a6a79f69310fff45bfe7647
      • Instruction ID: 7a44c218316055f2a1973e9ef08e733a7dc84dfd715ca893daec9c62fa403412
      • Opcode Fuzzy Hash: ca12edea3dcbd3f57b2269390453b5c97a71e7ec0a6a79f69310fff45bfe7647
      • Instruction Fuzzy Hash: 31E18C31900218EEDF21EFA1C946BEDBBB0BF14308F1040AEE545B71D2DBB95A85CB58
      APIs
      • memcmp.MSVCRT(?,0042CC44,00000010), ref: 00406C44
      • memcmp.MSVCRT(?,0042B438,00000010), ref: 00406C61
      • memcmp.MSVCRT(?,0042B388,00000010), ref: 00406C74
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: memcmp
      • String ID:
      • API String ID: 1475443563-0
      • Opcode ID: 716c8fe353742ed8b29bccd4319d3965a741789b70bebf6bbdc8c7a2ee2e3527
      • Instruction ID: e15056697588e1c9fdfe99527641ddaeb8e699943d0c3e6f7475544813102a75
      • Opcode Fuzzy Hash: 716c8fe353742ed8b29bccd4319d3965a741789b70bebf6bbdc8c7a2ee2e3527
      • Instruction Fuzzy Hash: F251B176700724ABE710AE21EC41AB737ACDE20748B51442AFD47A7685E738FE60C7D9
      APIs
      • __EH_prolog.LIBCMT ref: 00414AAA
      • MessageBoxW.USER32(00000000,Progress Error,7-Zip,00000010), ref: 00414B92
        • Part of subcall function 00414BD5: LoadCursorW.USER32(00000000,00007F02), ref: 00414BDF
        • Part of subcall function 00414BD5: SetCursor.USER32(00000000,?,00414AD5,?,?,00000000,?,?,?,?,00000000,00000000,00000000), ref: 00414BEC
      • WaitForMultipleObjects.KERNEL32(00000002,?,00000000,000001F4,?,?,00000000,?,?,?,?,00000000,00000000,00000000), ref: 00414AF6
      • SetCursor.USER32(?,?,00000000,?,?,?,?,00000000,00000000,00000000), ref: 00414B17
      • SetCursor.USER32(?,?,00000000,?,?,?,?,00000000,00000000,00000000), ref: 00414B2C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Cursor$H_prologLoadMessageMultipleObjectsWait
      • String ID: 7-Zip$Progress Error
      • API String ID: 2069487291-3559664798
      • Opcode ID: 4ea81027deff449ef729935167bea0273ce01014c86d3dfa2f6b34cee31c389c
      • Instruction ID: 1b308af0c6fab5660296bc0e0794598d38ce5ee38fefb6f8936b33ae37a45f3c
      • Opcode Fuzzy Hash: 4ea81027deff449ef729935167bea0273ce01014c86d3dfa2f6b34cee31c389c
      • Instruction Fuzzy Hash: 5E217171A44209DFCB10DFA4D885BEEBBB0FF18304F50446FE511A3251C7756981CB69
      APIs
      • GetModuleHandleA.KERNEL32(kernel32.dll,FindFirstStreamW), ref: 00403F53
      • GetProcAddress.KERNEL32(00000000), ref: 00403F5C
      • GetModuleHandleA.KERNEL32(kernel32.dll,FindNextStreamW), ref: 00403F69
      • GetProcAddress.KERNEL32(00000000), ref: 00403F6C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: AddressHandleModuleProc
      • String ID: FindFirstStreamW$FindNextStreamW$kernel32.dll
      • API String ID: 1646373207-4044117955
      • Opcode ID: e26824a2c43990c3e38738af90ba79f433061884f98840ad074de67418fbe398
      • Instruction ID: f6135786c924eca19af7679878007c950061591a856372b756e2a94578c5a963
      • Opcode Fuzzy Hash: e26824a2c43990c3e38738af90ba79f433061884f98840ad074de67418fbe398
      • Instruction Fuzzy Hash: 34E0DFB2B0022D378A002BAABD45C27BB9CEA85351351003BB201E3210DBF858018BED
      APIs
        • Part of subcall function 00419268: _CxxThrowException.MSVCRT(?,004303B8), ref: 0041928B
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419584
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 004196E0
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 004196F4
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 00419735
      • _CxxThrowException.MSVCRT(?,004303B8), ref: 0041979D
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ExceptionThrow$free
      • String ID:
      • API String ID: 3129652135-3916222277
      • Opcode ID: 9627f9222169792647d1afc75a05c2ae5cd1cafc9e6b7e0d8e965309ed989dbd
      • Instruction ID: d714118d11ce753f4a371c2145e1c50208b8bdaa92f5a1dc909a0b31cf7f65f1
      • Opcode Fuzzy Hash: 9627f9222169792647d1afc75a05c2ae5cd1cafc9e6b7e0d8e965309ed989dbd
      • Instruction Fuzzy Hash: 6F918075E003199BCF00DFA9C0A15EEBBB5AF49314F14845FE865A7341C7789E81CBA8
      APIs
      • __EH_prolog.LIBCMT ref: 00412EC5
      • GetDlgItem.USER32(00000005,?), ref: 00413015
      • SetWindowTextW.USER32(00000000,?), ref: 0041301B
      • SHGetFileInfoW.SHELL32(?,00000080,?,000002B4,00000110), ref: 0041303A
      • GetDlgItem.USER32(00000005,?), ref: 0041304A
      • SendMessageW.USER32(00000000,00000170,?,00000000), ref: 0041305A
        • Part of subcall function 00412E1C: __EH_prolog.LIBCMT ref: 00412E21
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prologItem$FileInfoMessageSendTextWindowfree
      • String ID:
      • API String ID: 1023756698-0
      • Opcode ID: ec5709dea8b7c785b1c49cacfd7581ac81a92977520d2e9a6046ce4c7e6a148e
      • Instruction ID: 8c0f7fe54a87b8195d95f33ab6938a6b0c4f3fb7e0b758d1b3e023786fea783a
      • Opcode Fuzzy Hash: ec5709dea8b7c785b1c49cacfd7581ac81a92977520d2e9a6046ce4c7e6a148e
      • Instruction Fuzzy Hash: 25515F71D00209AADF15EBE1C94ABEEBF79AF04318F00442EE201731D2DB796A59DB64
      APIs
      • GetDlgItem.USER32(?,00000065), ref: 00411C68
      • SetWindowTextW.USER32(?,?), ref: 00411C79
      • GetDlgItem.USER32(?,00000064), ref: 00411C80
      • SetWindowTextW.USER32(00000000,?), ref: 00411C86
      • SetWindowTextW.USER32(?,?), ref: 00411C8E
      • SendMessageW.USER32(?,00000143,00000000,?), ref: 00411CAA
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: TextWindow$Item$MessageSend
      • String ID:
      • API String ID: 166695626-0
      • Opcode ID: 95787a42e308a8ca0530aa152f334255a1bf7f60af4ab6a1d089ca84c7d14cde
      • Instruction ID: 4a49a7d553261a9342894c5700810c205f5fcfa36908dbd4268bb506834cd112
      • Opcode Fuzzy Hash: 95787a42e308a8ca0530aa152f334255a1bf7f60af4ab6a1d089ca84c7d14cde
      • Instruction Fuzzy Hash: 06016231200B00AFDB315F56CD85D57BBA6FF847507014429F15646A70C771BC62DF94
      APIs
        • Part of subcall function 00405C0C: GetDlgItem.USER32(?,?), ref: 00405C16
        • Part of subcall function 00405C0C: GetWindowRect.USER32(00000000,?), ref: 00405C21
      • InvalidateRect.USER32(?,00000000,00000001,00000F3D,?,00000F3C,?), ref: 00413BBB
        • Part of subcall function 00405B8D: MapDialogRect.USER32(?,00000000), ref: 00405BAC
      • GetDlgItem.USER32(?,00000067), ref: 00413C08
      • GetDlgItem.USER32(?,00000066), ref: 00413C1D
      • GetDlgItem.USER32(?,00000064), ref: 00413C32
      • MoveWindow.USER32(?,?,?,?,?,00000001,00000065,?,00000000,?), ref: 00413CCE
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Item$Rect$Window$DialogInvalidateMove
      • String ID:
      • API String ID: 3766569201-0
      • Opcode ID: afc61609b97a343706b2c714c700e57a27c1ad6d506f5d545f3e6b76e13ca0be
      • Instruction ID: 4dccb021c4230f8c2b6db1240133684513ae9db4c8d3742d670880b25f4ef9be
      • Opcode Fuzzy Hash: afc61609b97a343706b2c714c700e57a27c1ad6d506f5d545f3e6b76e13ca0be
      • Instruction Fuzzy Hash: 45A17071A00209AFDF14DFA9CC85AEE7BB6EB88314F10412EF911E7290D775AA50CB44
      APIs
      • __EH_prolog.LIBCMT ref: 00415171
      • EnterCriticalSection.KERNEL32(?,?,?,000003E8,000003E8,00000000), ref: 00415196
      • LeaveCriticalSection.KERNEL32(?,?,000003E8,000003E8,00000000), ref: 004151F2
      • SendMessageW.USER32(?,0000101E,00000000,0000FFFF), ref: 00415255
      • SendMessageW.USER32(?,0000101E,00000001,0000FFFF), ref: 00415265
        • Part of subcall function 004058BE: __EH_prolog.LIBCMT ref: 004058C3
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CriticalH_prologMessageSectionSend$EnterLeave
      • String ID:
      • API String ID: 2092801393-0
      • Opcode ID: 8f251b1b9b41ec4111d3eba9c44cd304488512e05738d32df97850f9c1568f50
      • Instruction ID: 6277e753baa9494ca469ad6eb80d01a8052bb57f49affb331d4937fb25378b26
      • Opcode Fuzzy Hash: 8f251b1b9b41ec4111d3eba9c44cd304488512e05738d32df97850f9c1568f50
      • Instruction Fuzzy Hash: 69316F71E00605DFDB21EFA5C881AEEB7B6FF85344F10446EE56693251C7782981CB84
      APIs
      • memcmp.MSVCRT(?,0042CC44,00000010), ref: 00408995
      • memcmp.MSVCRT(?,0042B438,00000010), ref: 004089B2
      • memcmp.MSVCRT(?,0042B3A8,00000010), ref: 004089C5
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: memcmp
      • String ID:
      • API String ID: 1475443563-0
      • Opcode ID: d73cc205fe1b12d27a478ef05c58c44aa49a8432c3d74892311d41773868cbe2
      • Instruction ID: 2a065281a61c98fa4d20f31188ddfdb55ac3ff03f4ecd62be5633b792b553b51
      • Opcode Fuzzy Hash: d73cc205fe1b12d27a478ef05c58c44aa49a8432c3d74892311d41773868cbe2
      • Instruction Fuzzy Hash: 6121C5717402147BD704AA11ED81F7B37A99B60798B50403FFC85AA286EF78ED414699
      APIs
      • __EH_prolog.LIBCMT ref: 004124D4
        • Part of subcall function 0040557B: __EH_prolog.LIBCMT ref: 00405580
        • Part of subcall function 0040557B: LoadStringW.USER32(?,00000000,00000100,00000000), ref: 004055B2
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$LoadStringfree
      • String ID: : $0$x
      • API String ID: 787671065-2465998972
      • Opcode ID: 6fc7907ba5f0438e1d497ed487d16a5a1fd9af1e2d0608c8d4557636d590d254
      • Instruction ID: c7482ba53cd2981b02c956e0771768e0d8630431dae98449b70287df6dad2ad3
      • Opcode Fuzzy Hash: 6fc7907ba5f0438e1d497ed487d16a5a1fd9af1e2d0608c8d4557636d590d254
      • Instruction Fuzzy Hash: 13319231D00129AADF05EBE9D9957EEB775AF08308F14802FE411732D1DBBC5A44CB68
      APIs
      • SendMessageW.USER32(?,0000100C,000000FF,00000002), ref: 00411053
      • SetWindowTextW.USER32(?,..\), ref: 004110CD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: MessageSendTextWindow
      • String ID: ..\
      • API String ID: 893732450-2756224523
      • Opcode ID: e03ae7195331f317b6899e92dc72dbae49ae85c978df62e52457d33b5528642f
      • Instruction ID: acbeec5433cf17cb0c9fe11cba2582e2c264cf2c6daf076dffcd53e3ea00e435
      • Opcode Fuzzy Hash: e03ae7195331f317b6899e92dc72dbae49ae85c978df62e52457d33b5528642f
      • Instruction Fuzzy Hash: C5113430900380AFDB319B25DC08FF73FA2EB08314F00065AE29266AF1D7B9A9C5DB44
      APIs
      • memcmp.MSVCRT(?,0042CC44,00000010), ref: 00406537
      • memcmp.MSVCRT(?,0042B4A8,00000010), ref: 00406552
      • memcmp.MSVCRT(?,0042B488,00000010), ref: 00406566
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: memcmp
      • String ID:
      • API String ID: 1475443563-0
      • Opcode ID: 92905cf85172c85e6551585a0a063fdc95da14ed58f3acb174cd8dca02bb6a7b
      • Instruction ID: 5373975dee7a807eae5f42c9136b3b97fcc5a790c92c41c433da0545eb44b987
      • Opcode Fuzzy Hash: 92905cf85172c85e6551585a0a063fdc95da14ed58f3acb174cd8dca02bb6a7b
      • Instruction Fuzzy Hash: A91103313402147BC710AE11FC42FBA33E88B54758F11843AFD46AA29BF6B8F5608698
      APIs
      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000), ref: 00402DA7
      • GetLastError.KERNEL32(?,?,00000000,00000000), ref: 00402DB0
      • _CxxThrowException.MSVCRT(?,0042D080), ref: 00402DCA
      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,?,?,?,?,00000000,00000000), ref: 00402DEF
      • _CxxThrowException.MSVCRT(?,0042D080), ref: 00402E05
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ByteCharExceptionMultiThrowWide$ErrorLast
      • String ID:
      • API String ID: 2296236218-0
      • Opcode ID: b7fc7a5da364c63be2478e767ad97cef0df8fc846a3a351e5724eeb242f35dc9
      • Instruction ID: a4aa18cd7b7e419e251ab3f0bf2d226299e0d5711fc6350c08e410aa15a413bb
      • Opcode Fuzzy Hash: b7fc7a5da364c63be2478e767ad97cef0df8fc846a3a351e5724eeb242f35dc9
      • Instruction Fuzzy Hash: 11114CB1200206BFD724DF55C985E6BB7ADEF84394720813AE918D7390E774AD51CBA8
      APIs
        • Part of subcall function 00405C0C: GetDlgItem.USER32(?,?), ref: 00405C16
        • Part of subcall function 00405C0C: GetWindowRect.USER32(00000000,?), ref: 00405C21
      • InvalidateRect.USER32(?,00000000,00000001,0000006E,?), ref: 0041051B
        • Part of subcall function 00405C8F: GetDlgItem.USER32(?,?), ref: 00405C98
        • Part of subcall function 00405C8F: MoveWindow.USER32(00000000,?,?,?,?,00000000), ref: 00405CB4
        • Part of subcall function 00405BCB: GetDlgItem.USER32(?,?), ref: 00405BD7
        • Part of subcall function 00405BCB: GetWindowRect.USER32(00000000,?), ref: 00405BE2
      • MoveWindow.USER32(?,?,?,?,?,00000001,00000066,?,00000065,?), ref: 004105E2
      • MoveWindow.USER32(?,?,?,?,?,00000001,00000067,?), ref: 00410613
      • MoveWindow.USER32(?,?,?,?,?,00000001,00000064,?), ref: 00410649
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: Window$Move$ItemRect$Invalidate
      • String ID:
      • API String ID: 378132125-0
      • Opcode ID: 497ef5ca769b21f2c1cd12e3658a8f3fc7060fceb4e742f7abc1d01a13e96267
      • Instruction ID: 0cba97a10396c266d585c808ecf9234a07d9ade0f28ce1b8979da8b821ac6780
      • Opcode Fuzzy Hash: 497ef5ca769b21f2c1cd12e3658a8f3fc7060fceb4e742f7abc1d01a13e96267
      • Instruction Fuzzy Hash: 5A41DE76A00209BFEF10DFE9CD86EEEBBB9EF48714F008119F615F6191C671A9508B64
      APIs
      • EnterCriticalSection.KERNEL32(004323F0,?,?,?,?,0042A278,000000FF,0041EE2F,?,?,?,?,?,0042A388,000000FF), ref: 0041E6F7
      • LeaveCriticalSection.KERNEL32(004323F0,?,?,?,?,?,?,0042A278,000000FF,0041EE2F,?,?,?,?,?,0042A388), ref: 0041E74A
        • Part of subcall function 0041E460: memmove.MSVCRT(?,?,FFFFFFE0,?,?,?,?,00000000,0041E710,?,?,?,?,?,0042A278,000000FF), ref: 0041E4C7
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CriticalSection$EnterLeavememmove
      • String ID: #C$#C
      • API String ID: 572680541-4107556936
      • Opcode ID: 00a9cf9867428ef29c153c5ad89e2b6456ef84ac1a1527bba193c3276c626024
      • Instruction ID: 6a956b2a0aaa4a7bba4165c43aa79d0ec1b832aca7821ab1c235c8850d13b05c
      • Opcode Fuzzy Hash: 00a9cf9867428ef29c153c5ad89e2b6456ef84ac1a1527bba193c3276c626024
      • Instruction Fuzzy Hash: 1B012639341210FBD6206B2B9D06BEB77A9EF89768F00451FFD2153381DBBC188947A9
      APIs
      • __EH_prolog.LIBCMT ref: 0040578F
      • CoInitialize.OLE32(00000000), ref: 004057A0
      • SHBrowseForFolderW.SHELL32 ref: 004057AA
      • CoUninitialize.OLE32 ref: 004057E2
        • Part of subcall function 004056EA: __EH_prolog.LIBCMT ref: 004056EF
        • Part of subcall function 004056EA: SHGetMalloc.SHELL32(00000000), ref: 0040570A
        • Part of subcall function 004056EA: _CxxThrowException.MSVCRT(?,0042D080), ref: 00405724
        • Part of subcall function 00405755: SHGetPathFromIDListW.SHELL32 ref: 00405771
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$BrowseExceptionFolderFromInitializeListMallocPathThrowUninitialize
      • String ID:
      • API String ID: 2234105922-0
      • Opcode ID: 5486295b442ce2d74fcf763b2590a6b2fc931f95c9f38f54c665f7f218145bb7
      • Instruction ID: efd3bca53dad38535348f61485822574344f4a1531d32ac46a4fb8411c20d85d
      • Opcode Fuzzy Hash: 5486295b442ce2d74fcf763b2590a6b2fc931f95c9f38f54c665f7f218145bb7
      • Instruction Fuzzy Hash: 7B01A271A01254EFC714EBA898585EEBBB8EF44304F1440BFE401B3351DA745E05CB75
      APIs
        • Part of subcall function 00403E32: FindClose.KERNEL32(?,?,00403E63), ref: 00403E3D
      • SetLastError.KERNEL32(00000078), ref: 00403F9A
      • SetLastError.KERNEL32(00000000), ref: 00403FA4
      • FindFirstStreamW.KERNELBASE(?,00000000,?,00000000), ref: 00403FB8
      • GetLastError.KERNEL32 ref: 00403FC5
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: ErrorLast$Find$CloseFirstStream
      • String ID:
      • API String ID: 4071060300-0
      • Opcode ID: 2968890746f7810fdcd9cd4d73bf507cf8724a70549a584c2cf7f7940bb943a6
      • Instruction ID: f4f22adc8bd8525b5b0143cd18e6cacc112ebf8a93910cebcc9a6da8f05eabb3
      • Opcode Fuzzy Hash: 2968890746f7810fdcd9cd4d73bf507cf8724a70549a584c2cf7f7940bb943a6
      • Instruction Fuzzy Hash: A9F0A930A0020697CB305F64DC0DB9A3B7D9B11327F100236F669B51D0DBB86A86CB5D
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID: ''$Warning
      • API String ID: 3519838083-3383353200
      • Opcode ID: 3b392bbd84ff73e3c79dcacaba275077c192d9d5ed01008f3bc97dbea7e19a09
      • Instruction ID: 5182bb13069c1475451c857675dbbf687b08e2cccbaa545a54830e7a88241665
      • Opcode Fuzzy Hash: 3b392bbd84ff73e3c79dcacaba275077c192d9d5ed01008f3bc97dbea7e19a09
      • Instruction Fuzzy Hash: 01B1E330A00208DBCF14EBA5C645AEEB7B1BF44318F14806FE415B72D2CBB85E96DB59
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID: Unknown error$Unknown warning
      • API String ID: 3519838083-4291957651
      • Opcode ID: 75fb67ca24e09b75ad36949949bfea7628467a8c00dde5fd4ad116d27cc668d1
      • Instruction ID: acad7666b25d64218f40ab4b89a0dea462db87e38a77e492c6199787b60f783f
      • Opcode Fuzzy Hash: 75fb67ca24e09b75ad36949949bfea7628467a8c00dde5fd4ad116d27cc668d1
      • Instruction Fuzzy Hash: DB915E71900609DBCB14DFA5C990AEEBBF5FF48304F50896EE41AA7280D774AE19CB58
      APIs
      • __EH_prolog.LIBCMT ref: 004157A8
        • Part of subcall function 00415994: __EH_prolog.LIBCMT ref: 00415999
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$free
      • String ID: __DIR__$__FILE__.001
      • API String ID: 2654054672-545012136
      • Opcode ID: 7fa886799a6688661a802810579431e1c69997b7b3765121f2fd9e790a1f5201
      • Instruction ID: 9bd3aea674f2f1d0a29268e1043e136db8f39a1e8cec5fe702c1aa3c329a8c15
      • Opcode Fuzzy Hash: 7fa886799a6688661a802810579431e1c69997b7b3765121f2fd9e790a1f5201
      • Instruction Fuzzy Hash: 6A419334A0050ADBDB14EF59C441AFEB3B9FF88358F10801EE955A7291DB38AD96CB58
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID: : $Error #
      • API String ID: 3519838083-3172960709
      • Opcode ID: 36396dabeb85ff067e73ff58afb7a7fb3499e5896fc00c6c8230ea54b1e985c6
      • Instruction ID: 7e16575449e5e5afd87125bda2bbe4c1ffa7a421fe17dc60127094f732e619c5
      • Opcode Fuzzy Hash: 36396dabeb85ff067e73ff58afb7a7fb3499e5896fc00c6c8230ea54b1e985c6
      • Instruction Fuzzy Hash: 18410231E00118DADB14AAA5CA147EEB765EF44314F14847BE814B32D1CBFC0E92D7AA
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog
      • String ID: Warning$Warnings
      • API String ID: 3519838083-1940404325
      • Opcode ID: bc2af719133f59bda48cc424bd7a945d79c2168c7dad806e28f7960fd583e0fc
      • Instruction ID: 6528afc71aed1263ac31944f2d0965ed360a2944fe157d92987d6118e04ac729
      • Opcode Fuzzy Hash: bc2af719133f59bda48cc424bd7a945d79c2168c7dad806e28f7960fd583e0fc
      • Instruction Fuzzy Hash: A831D671B002159BCB15BB9AD6557EEB6B6AF80314F14822FD025A22E1CFFC0A46D718
      APIs
      • __EH_prolog.LIBCMT ref: 0040A87B
      • GetLastError.KERNEL32(?), ref: 0040A887
        • Part of subcall function 0040397E: __EH_prolog.LIBCMT ref: 00403983
        • Part of subcall function 004020F6: free.MSVCRT ref: 004020FA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: H_prolog$ErrorLastfree
      • String ID: :
      • API String ID: 683690243-3653984579
      • Opcode ID: 07d0d72f9fd4bbe0229933527eadf047e911c3690d7b561f07fbe69d22b98bf7
      • Instruction ID: 35ebbcb7a019875166bfd37de68e441eed840bfa0d0441ae627b438c0f9232ff
      • Opcode Fuzzy Hash: 07d0d72f9fd4bbe0229933527eadf047e911c3690d7b561f07fbe69d22b98bf7
      • Instruction Fuzzy Hash: F401A572E00215DBCB15FBA5D50AADEBB75AF54318F10806EE501B32D1CF798A05D794
      APIs
        • Part of subcall function 00426230: WaitForSingleObject.KERNEL32(?,000000FF,00414B7B,00000061,00000000,?,?,?,00000000,?,?,?,?,00000000,00000000,00000000), ref: 00426233
      • MessageBoxW.USER32(00000000,Progress Error,7-Zip,00000010), ref: 00414B92
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: MessageObjectSingleWait
      • String ID: 7-Zip$Progress Error
      • API String ID: 102643358-3559664798
      • Opcode ID: 38930b4bdfafac6aaf9d2c626ea4f83c9ad4c42e43d9037f993755df5fe4efc3
      • Instruction ID: 9f618321a064bca9d79c8c4edc47689a83b4718d4eaf77f73b72a10906046790
      • Opcode Fuzzy Hash: 38930b4bdfafac6aaf9d2c626ea4f83c9ad4c42e43d9037f993755df5fe4efc3
      • Instruction Fuzzy Hash: 27E0DF32B40344DFDB10DF58E892BEEB7B0EF58310F40406BE81163282C3756810CA14
      APIs
      • memcmp.MSVCRT(?,0042CC44,00000010), ref: 0040A1AE
      • memcmp.MSVCRT(?,0042B308,00000010), ref: 0040A1C2
      • memcmp.MSVCRT(?,0042B318,00000010), ref: 0040A1E0
      • memcmp.MSVCRT(?,0042B448,00000010), ref: 0040A1FE
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: memcmp
      • String ID:
      • API String ID: 1475443563-0
      • Opcode ID: 59a8aefdbc1b769384d4a04c8d3f5e938b2fea18fadd38afcefccbfc237923b5
      • Instruction ID: 2c087003b267337e09e524d6be62c0259019d433c18c3e9d8c795e18c40217a0
      • Opcode Fuzzy Hash: 59a8aefdbc1b769384d4a04c8d3f5e938b2fea18fadd38afcefccbfc237923b5
      • Instruction Fuzzy Hash: 5811E13238030467C7149A15AC02FBA33E99B94718F54843EFD05AB3C7F6B9F960929A
      APIs
      • memcmp.MSVCRT(?,0042CC44,00000010), ref: 0040FB73
      • memcmp.MSVCRT(?,0042B2F8,00000010), ref: 0040FB87
      • memcmp.MSVCRT(?,0042B2D8,00000010), ref: 0040FBA5
      • memcmp.MSVCRT(?,0042B318,00000010), ref: 0040FBC3
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: memcmp
      • String ID:
      • API String ID: 1475443563-0
      • Opcode ID: c961b534b2c62400157584b1bfbba692ebe8e0b7334d49cecf28d4b2356afdc1
      • Instruction ID: 7037899fdcd77d3a0f501dc929058300569b2a973e803621f66b46ac4a23f5ab
      • Opcode Fuzzy Hash: c961b534b2c62400157584b1bfbba692ebe8e0b7334d49cecf28d4b2356afdc1
      • Instruction Fuzzy Hash: E211253134430067C7249A11EC42FBA33F88B94708F14843AFD45AF6C2FBB8F9548A99
      APIs
      • memcmp.MSVCRT(?,0042CC44,00000010), ref: 004018BE
      • memcmp.MSVCRT(?,0042B288,00000010), ref: 004018D9
      • memcmp.MSVCRT(?,0042B278,00000010), ref: 004018ED
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: memcmp
      • String ID:
      • API String ID: 1475443563-0
      • Opcode ID: 26aab78c485a6f09fb4d025bc73d79a2e8cd174819d2a5a5eed03a278b9ee622
      • Instruction ID: 2fd627cda4e7d669abc1864bd1733abe8044ade2867e8e41ffb13ea191a1f5ab
      • Opcode Fuzzy Hash: 26aab78c485a6f09fb4d025bc73d79a2e8cd174819d2a5a5eed03a278b9ee622
      • Instruction Fuzzy Hash: E5010472740304BBC7145A15AC02F7A33E89B64719F10443EFD85AB2A6E6B8A550D29C
      APIs
      • EnterCriticalSection.KERNEL32(?,?,?,?,00413433,?,?,?,?,?,?,?,?,?,?,00412227), ref: 004132E9
      • LeaveCriticalSection.KERNEL32(?,?,?,00413433,?,?,?,?,?,?,?,?,?,?,00412227,?), ref: 004132F7
      • Sleep.KERNEL32(00000064,?,?,00413433,?,?,?,?,?,?,?,?,?,?,00412227,?), ref: 004132FF
      • LeaveCriticalSection.KERNEL32(?,?,?,00413433,?,?,?,?,?,?,?,?,?,?,00412227,?), ref: 00413312
      Memory Dump Source
      • Source File: 00000000.00000002.2082017354.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2082005755.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082037340.000000000042B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082051201.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2082063651.0000000000438000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_nteste.jbxd
      Similarity
      • API ID: CriticalSection$Leave$EnterSleep
      • String ID:
      • API String ID: 4275215032-0
      • Opcode ID: 2e947b979be4488679223019f4bb05689ab22b974430e6dcf8f0d0a95324fdd9
      • Instruction ID: 26e0ca0b752039b406c11194da8d39c8ff686cbcf791325fce2bae1386f61067
      • Opcode Fuzzy Hash: 2e947b979be4488679223019f4bb05689ab22b974430e6dcf8f0d0a95324fdd9
      • Instruction Fuzzy Hash: D7E09B73B00310ABD3326BA49C4CBEBBB74D745752F04006FE7569611087681887D3AD