Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ArchivePlayer.exe

Overview

General Information

Sample name:ArchivePlayer.exe
Analysis ID:1428280
MD5:9fc7930a0e24916b1f136c2ec0832ca8
SHA1:ad64c6eb86d06729f5657e9e97d12bac096b0f1e
SHA256:527b331af189dd4fb9d2e9049ec002dbb5ad4a3b6da9bd06b38d80f1fc911f6c
Infos:

Detection

Score:29
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Potentially malicious time measurement code found
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w10x64
  • ArchivePlayer.exe (PID: 2408 cmdline: "C:\Users\user\Desktop\ArchivePlayer.exe" MD5: 9FC7930A0E24916B1F136C2EC0832CA8)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_005E9C00 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,__read,__close,__read,__close,_clock,_clock,_clock,_abort,0_2_005E9C00
Source: ArchivePlayer.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: E:\VSS\ArchivePlayer\Release\ArchivePlayer.pdb source: ArchivePlayer.exe
Source: Binary string: E:\VSS\ArchivePlayer\Release\ArchivePlayer.pdb* source: ArchivePlayer.exe
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_008163F1 __EH_prolog3,_strlen,__cftof,FtpFindFirstFileA,FtpSetCurrentDirectoryA,FtpSetCurrentDirectoryA,FtpSetCurrentDirectoryA,0_2_008163F1
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0081D90B __EH_prolog3_GS,GetFullPathNameA,__cftof,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,_strlen,0_2_0081D90B
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007BF980 _memset,_memmove,FindFirstFileA,FindClose,DeleteFileA,CreateDirectoryA,0_2_007BF980
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A42A0 __WSAFDIsSet,_memset,recvfrom,WSAGetLastError,htonl,htons,select,htons,htons,htons,htons,0_2_007A42A0
Source: ArchivePlayer.exeString found in binary or memory: http://%s:%d/cgi-bin/%smpeg4?USER=%s&PWD=%s&DIO_OUTPUT=0x%.2x%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&DIO_O
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007CA6F0 GdipGetImageEncodersSize,_malloc,GdipGetImageEncoders,PathFindExtensionA,GdipSaveImageToFile,GdipDisposeImage,GdipCreateBitmapFromHBITMAP,GdipSaveImageToFile,GdipDisposeImage,GdipDisposeImage,_free,_memmove,_memset,_memset,_memset,_strtok,_strtok,__snprintf,GetDC,SendMessageA,GetDC,CreateDIBitmap,ReleaseDC,CreateCompatibleDC,GetClientRect,CreateCompatibleBitmap,SelectObject,GetDC,BitBlt,CreateFontA,SetBkColor,SelectObject,SetTextColor,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,TextOutA,DeleteObject,GetDC,GetDC,CreateDIBitmap,ReleaseDC,CreateCompatibleDC,GetClientRect,CreateCompatibleBitmap,SelectObject,GetDC,BitBlt,CreateFontA,SetBkColor,SelectObject,SetTextColor,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,GetDC,TextOutA,DeleteObject,0_2_007CA6F0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007960300_2_00796030
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007AA0100_2_007AA010
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F60100_2_007F6010
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007EC0F00_2_007EC0F0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007FA0B00_2_007FA0B0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F80800_2_007F8080
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007B61600_2_007B6160
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007DE1000_2_007DE100
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007982300_2_00798230
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0077E2F00_2_0077E2F0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F02900_2_007F0290
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0096C3140_2_0096C314
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A03D00_2_007A03D0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_008144D50_2_008144D5
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007C84B00_2_007C84B0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007EA4900_2_007EA490
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_004185500_2_00418550
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0093855B0_2_0093855B
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F65A00_2_007F65A0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007CA6F00_2_007CA6F0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_009746720_2_00974672
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0078C6900_2_0078C690
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007B86800_2_007B8680
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0074E7500_2_0074E750
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0092A7000_2_0092A700
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007C87A00_2_007C87A0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007DA7A00_2_007DA7A0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0079E8400_2_0079E840
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_009548E00_2_009548E0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A28D00_2_007A28D0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A88B00_2_007A88B0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0077A9C00_2_0077A9C0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0093A9700_2_0093A970
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_00418B700_2_00418B70
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007FAB300_2_007FAB30
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_00780BE00_2_00780BE0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_006CCBD00_2_006CCBD0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007E4CF00_2_007E4CF0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007E6CF00_2_007E6CF0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007B8F100_2_007B8F10
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A30600_2_007A3060
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_004250200_2_00425020
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007E70000_2_007E7000
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0094506D0_2_0094506D
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F72E00_2_007F72E0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_004192E00_2_004192E0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0093F40D0_2_0093F40D
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A35200_2_007A3520
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0094B6800_2_0094B680
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007857300_2_00785730
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007E17000_2_007E1700
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A97C00_2_007A97C0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F78600_2_007F7860
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_008578460_2_00857846
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007B59300_2_007B5930
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0084B9D20_2_0084B9D2
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0070DA400_2_0070DA40
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A1A000_2_007A1A00
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_00977B040_2_00977B04
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_00945B510_2_00945B51
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0093BCA50_2_0093BCA5
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_005E9C000_2_005E9C00
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_00955CE00_2_00955CE0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_00973C050_2_00973C05
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007ABC900_2_007ABC90
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0092FC6E0_2_0092FC6E
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_00949DF00_2_00949DF0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 0092F7E0 appears 49 times
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 0092A9B0 appears 95 times
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 00815A52 appears 178 times
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 00929E20 appears 62 times
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 0092F701 appears 75 times
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 0092AFF6 appears 73 times
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 00948D41 appears 31 times
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 0092C730 appears 49 times
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: String function: 0092AF72 appears 149 times
Source: ArchivePlayer.exeBinary or memory string: OriginalFilename vs ArchivePlayer.exe
Source: ArchivePlayer.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus29.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_008140DB __EH_prolog3_GS,_memset,GetVersionExA,_malloc,_memset,__cftof,CoInitializeEx,CoCreateInstance,0_2_008140DB
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0080ADE2 __EH_prolog3_catch,FindResourceA,LoadResource,LockResource,GetDesktopWindow,IsWindowEnabled,EnableWindow,EnableWindow,GetActiveWindow,SetActiveWindow,FreeResource,0_2_0080ADE2
Source: C:\Users\user\Desktop\ArchivePlayer.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: avifil32.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeWindow detected: Number of UI elements: 36
Source: ArchivePlayer.exeStatic PE information: More than 390 > 100 exports found
Source: ArchivePlayer.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: ArchivePlayer.exeStatic file information: File size 7742976 > 1048576
Source: ArchivePlayer.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x56b000
Source: ArchivePlayer.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x180a00
Source: ArchivePlayer.exeStatic PE information: More than 200 imports for USER32.dll
Source: ArchivePlayer.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\VSS\ArchivePlayer\Release\ArchivePlayer.pdb source: ArchivePlayer.exe
Source: Binary string: E:\VSS\ArchivePlayer\Release\ArchivePlayer.pdb* source: ArchivePlayer.exe
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F4460 FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007F4460
Source: ArchivePlayer.exeStatic PE information: section name: .text.un
Source: ArchivePlayer.exeStatic PE information: section name: .drectve
Source: ArchivePlayer.exeStatic PE information: section name: .rodata
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0092F6CF push ecx; ret 0_2_0092F6E2
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0092F825 push ecx; ret 0_2_0092F838
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0070BD00 push dword ptr [eax+04h]; ret 0_2_0070BD2F
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007C99C0 GetFileAttributesExA,_memset,_sprintf,IsIconic,SendMessageA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,GetClientRect,DrawIcon,0_2_007C99C0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F4460 FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007F4460
Source: C:\Users\user\Desktop\ArchivePlayer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007ED160 rdtsc 0_2_007ED160
Source: C:\Users\user\Desktop\ArchivePlayer.exeAPI coverage: 6.6 %
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_008163F1 __EH_prolog3,_strlen,__cftof,FtpFindFirstFileA,FtpSetCurrentDirectoryA,FtpSetCurrentDirectoryA,FtpSetCurrentDirectoryA,0_2_008163F1
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0081D90B __EH_prolog3_GS,GetFullPathNameA,__cftof,PathIsUNCA,GetVolumeInformationA,CharUpperA,FindFirstFileA,FindClose,_strlen,0_2_0081D90B
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007BF980 _memset,_memmove,FindFirstFileA,FindClose,DeleteFileA,CreateDirectoryA,0_2_007BF980
Source: ArchivePlayer.exe, 00000000.00000002.3282904864.0000000000FDD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll/>
Source: ArchivePlayer.exeBinary or memory string: xvmcidct
Source: ArchivePlayer.exeBinary or memory string: d->log2_chroma_h <= 3d->nb_components <= 4d->name && d->name[0](d->nb_components==4 || d->nb_components==2) == !!(d->flags & (1 << 7))!c->plane && !c->step_minus1 && !c->offset_plus1 && !c->shift && !c->depth_minus1c->step_minus1 >= c->depth_minus18*(c->step_minus1+1) >= c->depth_minus1+1bayer_tmp[0] == 0 && tmp[1] == 0beyuv420pyuyv422rgb24bgr24yuv422pyuv444pyuv410pyuv411pgraygray8,y8monowmonobpal8yuvj420pyuvj422pyuvj444pxvmcmcxvmcidctuyvy422uyyvyy411bgr8bgr4bgr4_bytergb8rgb4rgb4_bytenv12nv21argbabgrgray16bey16begray16ley16leyuv440pyuvj440pyuva420pvdpau_h264vdpau_mpeg1vdpau_mpeg2vdpau_wmv3vdpau_vc1rgb48bergb48lergb565bergb565lergb555bergb555lebgr565bebgr565lebgr555bebgr555levaapi_mocovaapi_idctvaapi_vldyuv420p16leyuv420p16beyuv422p16leyuv422p16beyuv444p16leyuv444p16bevdpau_mpeg4dxva2_vldrgb444lergb444bebgr444lebgr444beya8gray8abgr48bebgr48leyuv420p9beyuv420p9leyuv420p10beyuv420p10leyuv422p10beyuv422p10leyuv444p9beyuv444p9leyuv444p10beyuv444p10leyuv422p9beyuv422p9levda_vldgbrpgbrp9begbrp9legbrp10begbrp10legbrp16begbrp16leyuva420p9beyuva420p9leyuva422p9beyuva422p9leyuva444p9beyuva444p9leyuva420p10beyuva420p10leyuva422p10beyuva422p10leyuva444p10beyuva444p10leyuva420p16beyuva420p16leyuva422p16beyuva422p16leyuva444p16beyuva444p16levdpauxyz12lexyz12benv16nv20lenv20beyvyu422vdaya16beya16leqsvmmald3d11va_vldrgba64bergba64lebgra64bebgra64le0rgbrgb00bgrbgr0yuva444pyuva422pyuv420p12beyuv420p12leyuv420p14beyuv420p14leyuv422p12beyuv422p12leyuv422p14beyuv422p14leyuv444p12beyuv444p12leyuv444p14beyuv444p14legbrp12begbrp12legbrp14begbrp14legbrapgbrap16begbrap16leyuvj411pbayer_bggr8bayer_rggb8bayer_gbrg8bayer_grbg8bayer_bggr16lebayer_bggr16bebayer_rggb16lebayer_rggb16bebayer_gbrg16lebayer_gbrg16bebayer_grbg16lebayer_grbg16beyuv440p10leyuv440p10beyuv440p12leyuv440p12be
Source: ArchivePlayer.exeBinary or memory string: VMware Screen Codec / VMware Video
Source: C:\Users\user\Desktop\ArchivePlayer.exeAPI call chain: ExitProcess graph end nodegraph_0-76219

Anti Debugging

barindex
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_005E9C00 Start: 005E9D3A End: 005E9D460_2_005E9C00
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007ED160 rdtsc 0_2_007ED160
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0092A4DF IsDebuggerPresent,0_2_0092A4DF
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0080999F OutputDebugStringA,GetLastError,0_2_0080999F
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007F4460 FreeLibrary,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007F4460
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_00948514 __lseeki64_nolock,__lseeki64_nolock,GetProcessHeap,HeapAlloc,__setmode_nolock,__write_nolock,__setmode_nolock,GetProcessHeap,HeapFree,__lseeki64_nolock,SetEndOfFile,GetLastError,__lseeki64_nolock,0_2_00948514
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_009352BB SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_009352BB
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_005E9900 cpuid 0_2_005E9900
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0092CB13 GetSystemTimeAsFileTime,__aulldiv,0_2_0092CB13
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_0092CDB1 GetSystemTimeAsFileTime,__aulldiv,GetTimeZoneInformation,__aulldiv,__aullrem,__aulldiv,__invoke_watson,0_2_0092CDB1
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_008140DB __EH_prolog3_GS,_memset,GetVersionExA,_malloc,_memset,__cftof,CoInitializeEx,CoCreateInstance,0_2_008140DB
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007A03D0 swprintf,getaddrinfo,_wprintf,_wprintf,_wprintf,_wprintf,_wprintf,_wprintf,_wprintf,_wprintf,socket,freeaddrinfo,bind,freeaddrinfo,shutdown,closesocket,freeaddrinfo,setsockopt,0_2_007A03D0
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007B4540 socket,setsockopt,setsockopt,htons,htonl,bind,inet_addr,setsockopt,setsockopt,recvfrom,_memmove,0_2_007B4540
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007B4860 socket,setsockopt,setsockopt,htons,htonl,bind,inet_addr,setsockopt,setsockopt,0_2_007B4860
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007BAA00 socket,htonl,htons,bind,setsockopt,setsockopt,setsockopt,inet_addr,htonl,setsockopt,setsockopt,0_2_007BAA00
Source: C:\Users\user\Desktop\ArchivePlayer.exeCode function: 0_2_007BAB50 socket,freeaddrinfo,bind,freeaddrinfo,freeaddrinfo,setsockopt,0_2_007BAB50
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
OS Credential Dumping2
System Time Discovery
Remote Services1
Screen Capture
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
Obfuscated Files or Information
LSASS Memory41
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets13
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ArchivePlayer.exe2%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://%s:%d/cgi-bin/%smpeg4?USER=%s&PWD=%s&DIO_OUTPUT=0x%.2x%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&DIO_OArchivePlayer.exefalse
    low
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1428280
    Start date and time:2024-04-18 18:58:59 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 35s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:ArchivePlayer.exe
    Detection:SUS
    Classification:sus29.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 76%
    • Number of executed functions: 47
    • Number of non-executed functions: 237
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Report size exceeded maximum capacity and may have missing disassembly code.
    • VT rate limit hit for: ArchivePlayer.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.748383314638453
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.55%
    • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:ArchivePlayer.exe
    File size:7'742'976 bytes
    MD5:9fc7930a0e24916b1f136c2ec0832ca8
    SHA1:ad64c6eb86d06729f5657e9e97d12bac096b0f1e
    SHA256:527b331af189dd4fb9d2e9049ec002dbb5ad4a3b6da9bd06b38d80f1fc911f6c
    SHA512:bd16e10424366008f97e54e6b819d82465e0bf640c55239c65359120d5dcc90586a5f1267d64d0d2384872286296cab0b077ede68b895a71d4f28a84bb89bf8d
    SSDEEP:196608:VQeJEEccgNWMh66h6t/1meZTbPI5qv+SG5/OofY:zjxU0ofY
    TLSH:F876AE80F6C381F5CC030930542FF76F67395A198634CAE7EB942B1EFDB2692553A25A
    File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......................&V......&V......&V......e.........#...............".&.....#...............'.........v...&V........#............
    Icon Hash:496d4b5906554327
    Entrypoint:0x92c347
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x58DB5C7B [Wed Mar 29 07:04:27 2017 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:83224c19972cbd9bfe9d13c53ab5af9a
    Instruction
    call 00007FD2786DF5E2h
    jmp 00007FD2786D1A15h
    push 00000014h
    push 00B067A0h
    call 00007FD2786D4E98h
    call 00007FD2786DA606h
    movzx esi, ax
    push 00000002h
    call 00007FD2786DF575h
    pop ecx
    mov eax, 00005A4Dh
    cmp word ptr [00400000h], ax
    je 00007FD2786D1A16h
    xor ebx, ebx
    jmp 00007FD2786D1A45h
    mov eax, dword ptr [0040003Ch]
    cmp dword ptr [eax+00400000h], 00004550h
    jne 00007FD2786D19FDh
    mov ecx, 0000010Bh
    cmp word ptr [eax+00400018h], cx
    jne 00007FD2786D19EFh
    xor ebx, ebx
    cmp dword ptr [eax+00400074h], 0Eh
    jbe 00007FD2786D1A1Bh
    cmp dword ptr [eax+004000E8h], ebx
    setne bl
    mov dword ptr [ebp-1Ch], ebx
    call 00007FD2786DD285h
    test eax, eax
    jne 00007FD2786D1A1Ah
    push 0000001Ch
    call 00007FD2786D1AF1h
    pop ecx
    call 00007FD2786D94C8h
    test eax, eax
    jne 00007FD2786D1A1Ah
    push 00000010h
    call 00007FD2786D1AE0h
    pop ecx
    call 00007FD2786DF5EEh
    and dword ptr [ebp-04h], 00000000h
    call 00007FD2786DEF38h
    test eax, eax
    jns 00007FD2786D1A1Ah
    push 0000001Bh
    call 00007FD2786D1AC6h
    pop ecx
    call dword ptr [0098D498h]
    mov dword ptr [00C0DA3Ch], eax
    call 00007FD2786DF609h
    mov dword ptr [00B40B24h], eax
    call 00007FD2786DF1C6h
    test eax, eax
    jns 00007FD2786D1A1Ah
    Programming Language:
    • [C++] VS2013 build 21005
    • [ASM] VS2013 build 21005
    • [ C ] VS2013 build 21005
    • [C++] VS2013 UPD4 build 31101
    • [EXP] VS2013 UPD4 build 31101
    • [RES] VS2013 build 21005
    • [LNK] VS2013 UPD4 build 31101
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x7071500x2a8c.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x709bdc0x1a4.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x8100000x274b8.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x58dea00x38.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6e80700x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x58d0000xb8c.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x56affc0x56b0006b21ee9c40c44ef27cb50cbaadaf9a6bunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .text.un0x56c0000x2094c0x20a002b425bdc812bd24c2ee8fa4b02e33eb7False0.45438966714559387data6.134719709842019IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x58d0000x1809c60x180a00e8581d6701e04ef54c976828620c35b3False0.5601349224081899data6.869654698291933IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x70e0000xffa400x2d2002f265fed23ce24c68522cc081f8ff400False0.07713491170360111data3.5209762676968777IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .drectve0x80e0000x5d40x60022bad3bf562c2a05101e4c427848d34dFalse0.24283854166666666data4.8868926459910575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rodata0x80f0000xf400x1000d5849f7c4b3b0b410741d8ec6d5524c2False0.341064453125data5.163558006475463IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x8100000x274b80x276009c50bd2918990215311069673e86fa2eFalse0.3013268849206349data4.693155961819127IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_CURSOR0x833e100x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseTaiwan0.4805194805194805
    RT_CURSOR0x833f480xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseTaiwan0.7
    RT_CURSOR0x8340280x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseTaiwan0.36363636363636365
    RT_CURSOR0x8341780x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"ChineseTaiwan0.35714285714285715
    RT_CURSOR0x8342c80x134dataChineseTaiwan0.37337662337662336
    RT_CURSOR0x8344180x134dataChineseTaiwan0.37662337662337664
    RT_CURSOR0x8345680x134Targa image data 64 x 65536 x 1 +32 "\001"ChineseTaiwan0.36688311688311687
    RT_CURSOR0x8346b80x134Targa image data 64 x 65536 x 1 +32 "\001"ChineseTaiwan0.37662337662337664
    RT_CURSOR0x8348080x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"ChineseTaiwan0.36688311688311687
    RT_CURSOR0x8349580x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"ChineseTaiwan0.38636363636363635
    RT_CURSOR0x834aa80x134dataChineseTaiwan0.44155844155844154
    RT_CURSOR0x834bf80x134dataChineseTaiwan0.4155844155844156
    RT_CURSOR0x834d480x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseTaiwan0.5422077922077922
    RT_CURSOR0x834e980x134dataChineseTaiwan0.2662337662337662
    RT_CURSOR0x834fe80x134dataChineseTaiwan0.2824675324675325
    RT_CURSOR0x8351380x134dataChineseTaiwan0.3246753246753247
    RT_BITMAP0x8353a80xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseTaiwan0.44565217391304346
    RT_BITMAP0x8354600x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseTaiwan0.37962962962962965
    RT_ICON0x810c600x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024ChineseTaiwan0.6303191489361702
    RT_ICON0x8110c80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304ChineseTaiwan0.5409836065573771
    RT_ICON0x811a500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096ChineseTaiwan0.49882739212007504
    RT_ICON0x812af80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216ChineseTaiwan0.4299792531120332
    RT_ICON0x8150a00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384ChineseTaiwan0.38704534718941896
    RT_ICON0x8192c80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864ChineseTaiwan0.3360573891107841
    RT_ICON0x8227700x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536ChineseTaiwan0.2294451673961907
    RT_DIALOG0x8330000x140dataChineseTaiwan0.58125
    RT_DIALOG0x8331400xab8dataChineseTaiwan0.37900874635568516
    RT_DIALOG0x8352880xe8dataChineseTaiwan0.6336206896551724
    RT_DIALOG0x8353700x34dataChineseTaiwan0.9038461538461539
    RT_STRING0x8355a80x68dataChineseTaiwan0.8173076923076923
    RT_STRING0x8356100x82StarOffice Gallery theme p, 536899072 objects, 1st nChineseTaiwan0.7153846153846154
    RT_STRING0x8356980x2adataChineseTaiwan0.5476190476190477
    RT_STRING0x8356c80x184dataChineseTaiwan0.48711340206185566
    RT_STRING0x8358500x4e6dataChineseTaiwan0.37719298245614036
    RT_STRING0x8360c80x264dataChineseTaiwan0.3333333333333333
    RT_STRING0x835de80x2dadataChineseTaiwan0.3698630136986301
    RT_STRING0x836b100x8adataChineseTaiwan0.6594202898550725
    RT_STRING0x835d380xacdataChineseTaiwan0.45348837209302323
    RT_STRING0x836a000xdedataChineseTaiwan0.536036036036036
    RT_STRING0x8363300x4a8dataChineseTaiwan0.3221476510067114
    RT_STRING0x8367d80x228dataChineseTaiwan0.4003623188405797
    RT_STRING0x836ae00x2cdataChineseTaiwan0.5227272727272727
    RT_STRING0x836ba00x53cdataChineseTaiwan0.2947761194029851
    RT_GROUP_CURSOR0x8340000x22Lotus unknown worksheet or configuration, revision 0x2ChineseTaiwan1.0294117647058822
    RT_GROUP_CURSOR0x8347f00x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x8341600x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x8346a00x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x8345500x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x834e800x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x8344000x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x834a900x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x8342b00x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x8349400x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x834be00x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x834d300x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x834fd00x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x8351200x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_CURSOR0x8352700x14Lotus unknown worksheet or configuration, revision 0x1ChineseTaiwan1.3
    RT_GROUP_ICON0x832f980x68dataChineseTaiwan0.7403846153846154
    RT_VERSION0x833bf80x214dataChineseTaiwan0.4755639097744361
    RT_MANIFEST0x8370e00x3d6XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (906), with CRLF line terminatorsEnglishUnited States0.4989816700610998
    DLLImport
    KERNEL32.dllOutputDebugStringW, WriteConsoleW, GetCurrentDirectoryW, CreateFileW, SetEnvironmentVariableA, GetLastError, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, LoadResource, LockResource, FindResourceW, MultiByteToWideChar, WideCharToMultiByte, GetTickCount, DecodePointer, RaiseException, HeapAlloc, HeapReAlloc, HeapFree, HeapSize, InterlockedExchange, GetProcessAffinityMask, GetConsoleScreenBufferInfo, SetConsoleTextAttribute, CreateDirectoryA, LCMapStringW, GetTimeFormatW, SizeofResource, GetDateFormatW, GetProcessHeap, InitializeCriticalSectionAndSpinCount, OutputDebugStringA, CloseHandle, InitializeCriticalSection, SetEvent, ResetEvent, WaitForSingleObject, CreateEventA, Sleep, CreateThread, GetLocalTime, VirtualFree, GetTimeZoneInformation, ReleaseSemaphore, CreateSemaphoreA, QueryPerformanceCounter, QueryPerformanceFrequency, SetWaitableTimer, CancelWaitableTimer, GetCurrentProcess, GetCurrentThread, SetThreadPriority, GetThreadPriority, SetPriorityClass, GetPriorityClass, GetVersionExA, CreateWaitableTimerA, FreeLibrary, GetProcAddress, LoadLibraryA, FindResourceA, EncodePointer, SetLastError, GetCurrentThreadId, GetSystemDirectoryW, FreeResource, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, LoadLibraryExW, GlobalDeleteAtom, lstrcmpW, LoadLibraryW, GlobalAddAtomA, GlobalFindAtomA, GlobalGetAtomNameA, CompareStringA, GlobalLock, GlobalUnlock, GlobalFree, ResumeThread, GetModuleFileNameA, GlobalAlloc, lstrcmpA, GetPrivateProfileIntA, GetPrivateProfileStringA, WritePrivateProfileStringA, GetCurrentProcessId, GlobalSize, LocalFree, MulDiv, FormatMessageA, CopyFileA, FileTimeToLocalFileTime, LocalAlloc, FileTimeToSystemTime, GlobalFlags, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GlobalReAlloc, GlobalHandle, LocalReAlloc, CompareStringW, GetLocaleInfoW, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetOEMCP, GetCPInfo, GetACP, GetCurrentDirectoryA, DeleteFileA, CreateFileA, FindClose, FindFirstFileA, FlushFileBuffers, GetFileSize, GetFullPathNameA, LockFile, ReadFile, SetEndOfFile, SetFilePointer, UnlockFile, WriteFile, DuplicateHandle, lstrcmpiA, GetVolumeInformationA, GetThreadLocale, GetFileAttributesA, GetFileSizeEx, GetFileTime, SetErrorMode, FindNextFileA, GetWindowsDirectoryA, lstrcpyA, VerSetConditionMask, VerifyVersionInfoA, GetTempPathA, GetTempFileNameA, GetProfileIntA, SearchPathA, VirtualProtect, FindResourceExW, RtlUnwind, IsDebuggerPresent, IsProcessorFeaturePresent, GetSystemInfo, VirtualAlloc, VirtualQuery, GetCommandLineA, GetSystemTimeAsFileTime, ExitThread, ExitProcess, GetModuleHandleExW, AreFileApisANSI, HeapQueryInformation, SetStdHandle, GetFileType, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, IsValidCodePage, GetStdHandle, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStringTypeW, GetConsoleCP, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetDriveTypeW, GetFileAttributesExA
    USER32.dllCreatePopupMenu, MessageBeep, GetNextDlgGroupItem, IsRectEmpty, IntersectRect, SetRect, InvalidateRgn, CopyAcceleratorTableA, OffsetRect, CharNextA, LoadCursorW, ReleaseCapture, SetCapture, CharUpperA, DestroyIcon, InvalidateRect, DeleteMenu, CopyImage, LoadCursorA, GetSysColorBrush, RealChildWindowFromPoint, SystemParametersInfoA, InflateRect, GetMenuItemInfoA, DestroyMenu, ClientToScreen, EndPaint, BeginPaint, GetWindowDC, TabbedTextOutA, GrayStringA, DrawTextExA, DrawTextA, RemoveMenu, InsertMenuA, GetMenuState, GetMenuStringA, KillTimer, SetTimer, WaitMessage, WindowFromPoint, MapVirtualKeyA, GetKeyNameTextA, MapDialogRect, SetWindowContextHelpId, GetWindowThreadProcessId, SetCursor, ShowOwnedPopups, PostQuitMessage, GetMessageA, GetDesktopWindow, GetActiveWindow, GetNextDlgTabItem, EndDialog, CreateDialogIndirectParamA, IsDialogMessageA, SetWindowTextA, IsWindowEnabled, SendDlgItemMessageA, CheckRadioButton, CheckDlgButton, MoveWindow, ShowWindow, GetMonitorInfoA, MonitorFromWindow, WinHelpA, GetScrollInfo, SetScrollInfo, GetMenuDefaultItem, CallNextHookEx, UnhookWindowsHookEx, SetWindowsHookExA, GetWindow, GetLastActivePopup, GetTopWindow, GetClassNameA, GetClassLongA, SetWindowLongA, DestroyCursor, EqualRect, GetSysColor, MapWindowPoints, ScreenToClient, MessageBoxA, AdjustWindowRectEx, GetWindowRect, GetWindowTextLengthA, GetWindowTextA, RemovePropA, GetPropA, SetPropA, ShowScrollBar, GetScrollRange, SetScrollRange, GetScrollPos, SetScrollPos, ScrollWindow, RedrawWindow, ValidateRect, SetForegroundWindow, GetForegroundWindow, SetActiveWindow, UpdateWindow, TrackPopupMenu, GetMenuItemCount, GetMenuItemID, GetSubMenu, SetMenu, GetMenu, GetCapture, GetKeyState, SetFocus, GetDlgCtrlID, GetDlgItem, IsWindowVisible, EndDeferWindowPos, DeferWindowPos, CreateMenu, EnableWindow, SendMessageA, IsIconic, GetSystemMetrics, GetSystemMenu, BeginDeferWindowPos, SetWindowPlacement, GetWindowPlacement, SetWindowPos, DestroyWindow, IsChild, IsWindow, CreateWindowExA, GetClassInfoExA, GetClassInfoA, RegisterClassA, CallWindowProcA, PostMessageA, GetMessageTime, GetMessagePos, RegisterWindowMessageA, BringWindowToTop, LoadAcceleratorsA, TranslateAcceleratorA, LoadMenuA, InsertMenuItemA, SetRectEmpty, LoadImageA, UnpackDDElParam, ReuseDDElParam, RegisterClipboardFormatA, DrawFocusRect, DrawIconEx, GetIconInfo, GetAsyncKeyState, LoadBitmapW, GetParent, EnableScrollBar, HideCaret, InvertRect, NotifyWinEvent, LoadIconA, GetWindowRgn, AppendMenuA, DrawIcon, GetDC, ReleaseDC, GetClientRect, GetCursorPos, FillRect, PtInRect, LoadIconW, UnregisterClassA, DefWindowProcA, ShowCursor, wvsprintfA, TranslateMessage, DispatchMessageA, PeekMessageA, CopyRect, GetFocus, CheckMenuItem, UnionRect, EnableMenuItem, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, SetMenuItemInfoA, SubtractRect, GetUpdateRect, IsClipboardFormatAvailable, TranslateMDISysAccel, DefMDIChildProcA, DefFrameProcA, DrawMenuBar, FrameRect, CharUpperBuffA, ModifyMenuA, SetMenuDefaultItem, CopyIcon, GetDoubleClickTime, SetClassLongA, SetCursorPos, DestroyAcceleratorTable, CreateAcceleratorTableA, LoadAcceleratorsW, ToAsciiEx, GetKeyboardState, LockWindowUpdate, MapVirtualKeyExA, IsCharLowerA, GetKeyboardLayout, IsZoomed, GetComboBoxInfo, LoadMenuW, TrackMouseEvent, MonitorFromPoint, UpdateLayeredWindow, IsMenu, SetWindowRgn, DrawFrameControl, DrawEdge, LoadImageW, DrawStateA, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, EnumDisplayMonitors, SetLayeredWindowAttributes, PostThreadMessageA, SetParent, GetWindowLongA
    GDI32.dllGetTextFaceA, GetViewportOrgEx, LPtoDP, GetWindowOrgEx, GetBoundsRect, FillRgn, SetPaletteEntries, ExtFloodFill, SetPixelV, PtInRegion, FrameRgn, RoundRect, CreateRoundRectRgn, OffsetRgn, EnumFontFamiliesExA, Polyline, Polygon, CreatePolygonRgn, Ellipse, CreateEllipticRgn, SetDIBColorTable, CreateDIBSection, StretchBlt, SetPixel, GetTextCharsetInfo, EnumFontFamiliesA, StretchDIBits, RealizePalette, GetSystemPaletteEntries, GetPaletteEntries, GetNearestPaletteIndex, CreatePalette, DPtoLP, SetRectRgn, GetMapMode, CombineRgn, GetRgnBox, GetTextColor, GetBkColor, GetTextMetricsA, GetTextExtentPoint32A, ScaleWindowExtEx, ScaleViewportExtEx, OffsetWindowOrgEx, OffsetViewportOrgEx, SetWindowOrgEx, SetWindowExtEx, SetViewportOrgEx, SetViewportExtEx, ExtTextOutA, MoveToEx, SetTextAlign, SetStretchBltMode, SetROP2, SetPolyFillMode, GetLayout, SetLayout, SetMapMode, SelectPalette, ExtSelectClipRgn, SelectClipRgn, SaveDC, RestoreDC, RectVisible, PtVisible, LineTo, IntersectClipRect, GetWindowExtEx, GetViewportExtEx, GetStockObject, GetPixel, GetObjectType, GetClipBox, ExcludeClipRect, Escape, CreateRectRgn, CreatePatternBrush, CreateHatchBrush, CreateDCA, CopyMetaFileA, PatBlt, CreateRectRgnIndirect, CreateBitmap, TextOutW, SetBkMode, CreateFontW, CreateFontIndirectA, TextOutA, GetObjectA, SetTextColor, SetBkColor, SelectObject, Rectangle, GetDeviceCaps, DeleteObject, DeleteDC, CreateSolidBrush, CreatePen, CreateFontA, CreateDIBitmap, CreateCompatibleDC, CreateCompatibleBitmap, BitBlt
    MSIMG32.dllTransparentBlt, AlphaBlend
    WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter
    ADVAPI32.dllCryptAcquireContextA, RegOpenKeyExA, RegQueryValueExA, RegCreateKeyExA, RegDeleteKeyA, RegDeleteValueA, RegSetValueExA, RegEnumKeyA, RegQueryValueA, RegEnumValueA, RegEnumKeyExA, RegCloseKey, CryptReleaseContext, CryptGenRandom
    SHELL32.dllSHBrowseForFolderA, DragAcceptFiles, SHGetFileInfoA, SHGetPathFromIDListA, SHGetSpecialFolderLocation, SHGetDesktopFolder, DragFinish, SHAppBarMessage, DragQueryFileA, ShellExecuteA
    COMCTL32.dll
    SHLWAPI.dllPathFindExtensionA, PathFindExtensionW, PathFindFileNameA, PathRemoveFileSpecW, PathIsUNCA, PathStripToRootA, StrFormatKBSizeA
    UxTheme.dllGetThemeColor, GetWindowTheme, GetThemeSysColor, DrawThemeText, DrawThemeBackground, IsThemeBackgroundPartiallyTransparent, DrawThemeParentBackground, OpenThemeData, CloseThemeData, GetCurrentThemeName, GetThemePartSize, IsAppThemed
    ole32.dllCoTaskMemFree, OleDuplicateData, ReleaseStgMedium, CoInitializeEx, CoDisconnectObject, CoGetClassObject, StgCreateDocfileOnILockBytes, StgOpenStorageOnILockBytes, CreateILockBytesOnHGlobal, CoFreeUnusedLibraries, OleInitialize, OleUninitialize, CoRevokeClassObject, OleFlushClipboard, OleIsCurrentClipboard, CoRegisterMessageFilter, CreateStreamOnHGlobal, DoDragDrop, OleLockRunning, OleCreateMenuDescriptor, OleDestroyMenuDescriptor, OleTranslateAccelerator, IsAccelerator, OleGetClipboard, CoLockObjectExternal, RegisterDragDrop, RevokeDragDrop, CLSIDFromProgID, CLSIDFromString, CoInitialize, CoCreateInstance, CoCreateGuid, CoUninitialize, CoTaskMemAlloc
    OLEAUT32.dllSysAllocString, SysStringLen, SystemTimeToVariantTime, VariantTimeToSystemTime, SafeArrayDestroy, LoadTypeLib, OleCreateFontIndirect, VariantCopy, VarBstrFromDate, SysAllocStringByteLen, VariantChangeType, SysFreeString, VariantClear, VariantInit, SysAllocStringLen
    oledlg.dll
    WS2_32.dllgetsockname, htonl, htons, inet_addr, ntohs, recvfrom, sendto, WSAStartup, WSACleanup, WSASetLastError, __WSAFDIsSet, shutdown, ntohl, closesocket, connect, ioctlsocket, getsockopt, select, send, setsockopt, socket, WSAGetLastError, getaddrinfo, freeaddrinfo, recv, bind
    gdiplus.dllGdipCreateBitmapFromStream, GdipBitmapLockBits, GdipBitmapUnlockBits, GdipDeleteGraphics, GdipDrawImageI, GdipCreateFromHDC, GdipSetInterpolationMode, GdipDrawImageRectI, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipGetImageGraphicsContext, GdipGetImageEncoders, GdipGetImageEncodersSize, GdipCreateBitmapFromHBITMAP, GdipCreateBitmapFromScan0, GdipSaveImageToFile, GdipDisposeImage, GdipCloneImage, GdiplusShutdown, GdiplusStartup, GdipFree, GdipAlloc, GdipGetImagePalette, GdipGetImagePaletteSize
    OLEACC.dllAccessibleObjectFromWindow, LresultFromObject, CreateStdAccessibleObject
    IMM32.dllImmGetContext, ImmGetOpenStatus, ImmReleaseContext
    WINMM.dllwaveInReset, waveInGetPosition, waveOutWrite, waveOutReset, waveInStart, waveOutGetNumDevs, PlaySoundA, timeEndPeriod, timeBeginPeriod, waveOutUnprepareHeader, waveOutPrepareHeader, waveInAddBuffer, waveInPrepareHeader, waveInClose, waveInOpen, waveOutClose, waveOutGetVolume, waveOutSetVolume, waveOutOpen, waveInGetNumDevs
    WININET.dllInternetCloseHandle, InternetConnectA, InternetOpenA, HttpQueryInfoA, HttpSendRequestA, HttpOpenRequestA, FtpGetCurrentDirectoryA, FtpSetCurrentDirectoryA, FtpOpenFileA, InternetReadFile, FtpFindFirstFileA, InternetSetStatusCallback, InternetGetLastResponseInfoA, InternetSetOptionExA, InternetFindNextFileA, InternetQueryDataAvailable, InternetWriteFile, InternetSetFilePointer
    AVIFIL32.dllAVIFileInit, AVIStreamWrite, AVIStreamEndStreaming, AVIFileExit, AVIFileOpenA, AVIFileRelease, AVIFileGetStream, AVIStreamRelease, AVIStreamInfoA, AVIStreamStart, AVIStreamLength, AVIStreamReadFormat, AVIStreamRead, AVIFileOpenW, AVIFileCreateStreamA, AVIStreamSetFormat
    NameOrdinalAddress
    CDECAudioDecodeExtra10x7c3ef0
    CDECAudioStart20x7c4720
    CDECCreate30x7c1d30
    CDECDecStreamParameter40x7c3e10
    CDECDecode50x7c3de0
    CDECDecodeEX60x7c3d80
    CDECDecodeExtra70x7c37b0
    CDECDigitalReScaleExtra80x7c2610
    CDECDigitalReScaleYUVExtra90x7c2fa0
    CDECEncode100x7c4650
    CDECEncodeExtra110x7c4250
    CDECGetFrameRate120x7c4850
    CDECGetResolution130x7c4820
    CDECReScaleExtra140x7c2200
    CDECReScaleYUVExtra150x7c2b60
    CDECRelease160x7c2140
    CDECRotateExtra170x7c3540
    CDECSetAudioCodecUseage180x7c1fb0
    CDECSetCodecUseage190x7c1dc0
    CDECSetDeblock200x7c4780
    CDECSetFormat210x7c4760
    CDECSetQuality220x7c47b0
    CDECSetReScaleType230x7c48a0
    CDECSetReductionRatio240x7c48e0
    CDECSetResolution250x7c47d0
    CDECSetRotateType260x7c48c0
    CDECStart270x7c46d0
    DCreate280x7bc060
    DEPTZRender290x7bc2a0
    DEPTZRender3300x7bc2e0
    DEnableFullScreen310x7bc0b0
    DExit320x774c30
    DGetVersion330x7753a0
    DInit340x7747c0
    DNotifyFullScreenWindow350x7bc110
    DRegisterAfterBitbltCB360x7bc270
    DRender370x7bc160
    DRender2380x7bc1a0
    DRender3390x7bc2e0
    DRender4400x7bc320
    DRender5410x7bc370
    DRenderFillRect420x7bc1e0
    DRenderFillRect2430x7bc220
    DSetImageLeftToRight440x7bc410
    DSetImageUpToDown450x7bc3e0
    DSetRenderInfo460x775370
    DSetStretchMode470x7bc0e0
    FCreate480x7bf660
    FExit490x774c30
    FGetTotalFrameSize500x7bf810
    FGetVersion510x7753a0
    FInit520x7747c0
    FResetFrameTime530x7bf6f0
    FStartRecord540x7bf720
    FStartRecord2550x7bf770
    FStopRecord560x774ec0
    FWriteData570x7bf7c0
    FishEye_CloseInterface580x9530c0
    FishEye_GetCircle590x9530e0
    FishEye_GetCoordinate600x953130
    FishEye_Initial610x9532a0
    FishEye_OpenInterface620x953b40
    FishEye_Release630x953b60
    FishEye_Transform640x953bc0
    FishEye_UserSetCircle650x953d30
    KCODECCreate660x7d0bb0
    KCODECDecode1670x7d0c60
    KCODECDecode2680x7d0cb0
    KCODECRelease690x7d0d00
    KCODECReset700x7d0c00
    KCloseInterface710x7cd510
    KConnect720x7cd190
    KDecodeFrame730x7cfd80
    KDecodeFrame2740x7cfda0
    KDecodeFrame3750x7cfdf0
    KDigitalPTZEnable760x7cfe70
    KDigitalPTZTo770x7cfea0
    KDisconnect780x7cd350
    KDisplayChildScreen790x7d0320
    KDropNextPFrameTillIFrame800x7d00b0
    KEnableDITrigger810x7d0500
    KEnableDaylightTime820x7d0230
    KEnableDecoder830x7cd840
    KEnableDeleteFileAfterClose840x7d0590
    KEnableDisplayTime850x7d0390
    KEnableFishEye860x7d0680
    KEnableFishEyeSubWindow870x7d06c0
    KEnableFixJitter880x7d0650
    KEnableFullScreen890x7cd760
    KEnableJitterLessMode900x7cffa0
    KEnableLocalTime910x7d0200
    KEnablePTZProtocol920x7cf630
    KEnablePrivacyMask930x7cffc0
    KEnableRender940x7cd810
    KEnableStretchMode950x7cd7e0
    KEnableSubWindow960x7d0b50
    KFishEyeGetCircle970x7d0a00
    KFishEyeGetDefaultCircle980x7d0a60
    KFishEyeMoveTo990x7d0920
    KFishEyeRelativeMove1000x7d08e0
    KFishEyeSetCircle1010x7d09a0
    KFishEyeWindowRelativeMove1020x7d0960
    KFlipImage1030x7cff70
    KFreeAudioToken1040x7cd680
    KGetAudioToken1050x7cd630
    KGetBeginTime1060x7ce710
    KGetBeginTimeUTC1070x7ce770
    KGetCameraName1080x7ce910
    KGetCurrentFilePos1090x7d04b0
    KGetCurrentTime1100x7cdf60
    KGetCurrentTimeUTC1110x7cdfb0
    KGetDIDefaultValueByHTTP1120x7ce7d0
    KGetDIOStatusByHTTP1130x7ceb70
    KGetDIOStatusByHTTPEx1140x7ceb10
    KGetDeviceTypeByHTTP1150x7cdca0
    KGetEndTime1160x7ce740
    KGetEndTimeUTC1170x7ce7a0
    KGetFishEyeCurrentCoordinate1180x7d08a0
    KGetFishEyePTZMoveTo1190x7d0740
    KGetFishEyeRotationAngle1200x7d0860
    KGetFishEyeRotationAngleEx1210x7d0b10
    KGetFrameRateMode1220x7cf330
    KGetLastError1230x7ce990
    KGetLastFrame1240x7d0130
    KGetLastFrame21250x7d0180
    KGetLastFrame31260x7d01b0
    KGetMotionInfo1270x7cd3e0
    KGetMotionInfoEx1280x7cd440
    KGetNextIFrame1290x7cf290
    KGetNumberOfChannelByHTTP1300x7cdcf0
    KGetPIRConfig1310x7cd4c0
    KGetPortInfoByHTTP1320x7cdd40
    KGetPrevIFrame1330x7cf2e0
    KGetRawFileInfo21340x7d0410
    KGetRawFileInfo31350x7d0460
    KGetSubWindowInfo1360x7d0b80
    KGetTCPTypeByHTTP1370x7cdc50
    KGetTotalReceiveAudioFrameCount1380x7ce8c0
    KGetTotalReceiveSize1390x7ce820
    KGetTotalReceiveVideoFrameCount1400x7ce870
    KGetVersion1410x7ccce0
    KGetVideoConfig1420x7cd000
    KGetVideoConfig21430x7cd050
    KGetVideoConfig31440x7cd0a0
    KGetVideoFrameCount1450x7d02d0
    KGetVolume1460x7cd570
    KMirrorImage1470x7cff40
    KNotifyFullScreenWindow1480x7cd790
    KOpenInterface1490x7ccd40
    KPCI4100Get4100ChannelCount1500x7cf460
    KPCI4100GetCardCount1510x7cf410
    KPCI4100GetChannelHSync1520x7cf550
    KPCI4100SearchCapCard1530x7cf4b0
    KPCI4100SearchCapChannel1540x7cf500
    KPCI4100SetDICallback1550x7cf3e0
    KPTZBLC1560x7cf8b0
    KPTZDayNight1570x7cf900
    KPTZDegreeToUnit1580x7cfc60
    KPTZEnumerateFunctions1590x7cfa90
    KPTZEnumerateProtocol1600x7cf9f0
    KPTZEnumerateVender1610x7cfa40
    KPTZFocus1620x7cf950
    KPTZGetAbsPTZCommand1630x7cfb40
    KPTZGetAbsPTZCommandByUnit1640x7cfbc0
    KPTZGetCommand1650x7cfae0
    KPTZGetRequestAbsPTZCommand1660x7cfd10
    KPTZGetUnitFromBuffer1670x7cfcc0
    KPTZIris1680x7cf9a0
    KPTZLoadProtocol1690x7cf680
    KPTZMove1700x7cf720
    KPTZOSD1710x7cf860
    KPTZPreset1720x7cf810
    KPTZSetZoomSpeed1730x7cf7c0
    KPTZUnitToDegree1740x7cfc20
    KPTZUnloadProtocol1750x7cf6d0
    KPTZZoom1760x7cf770
    KPause1770x7cd2c0
    KPlay1780x7cd260
    KQuadGetBrightness1790x7cef70
    KQuadGetContrast1800x7cf010
    KQuadGetDisplayMode1810x7cebf0
    KQuadGetHue1820x7cf150
    KQuadGetMotionDetectionEnable1830x7ced90
    KQuadGetMotionSensitive1840x7cee30
    KQuadGetOSDEnable1850x7cecf0
    KQuadGetSaturation1860x7cf0b0
    KQuadGetTitleName1870x7ceed0
    KQuadSetBrightness1880x7cefc0
    KQuadSetContrast1890x7cf060
    KQuadSetDisplayMode1900x7ceca0
    KQuadSetHue1910x7cf1a0
    KQuadSetMotionDetectionEnable1920x7cede0
    KQuadSetMotionSensitive1930x7cee80
    KQuadSetOSDEnable1940x7ced40
    KQuadSetSaturation1950x7cf100
    KQuadSetTitleName1960x7cef20
    KReplaceTimeCodeByLocalTime1970x7d0260
    KReverseImageLeftToRight1980x7cfee0
    KReverseImageUpToDown1990x7cff10
    KSEStartStreaming2000x7cd290
    KSaveReboot2010x7ce180
    KSendAudio2020x7cf1f0
    KSendAudioToSE2030x7cf240
    KSendCommand2040x7ceae0
    KSendCommandToSE2050x7cd9b0
    KSendCommandToStreamingEngine2060x7cd960
    KSendControlCommand2070x7ce1b0
    KSendDO2080x7cddd0
    KSendPTZCommand2090x7cdea0
    KSendRS232Command2100x7cde70
    KSendRS232Setting2110x7cde30
    KSendURLCommand2120x7ce1f0
    KSendURLCommandToDevice2130x7cf380
    KSetAfterRenderCallback2140x7cd8a0
    KSetAfterRenderCallbackEx2150x7cd8d0
    KSetAutoDropFrameByCPUPerformance2160x7d0080
    KSetBitRate2170x7ce0c0
    KSetBrightness2180x7ce000
    KSetCODECType2190x7cda00
    KSetContrast2200x7ce030
    KSetControlDataCallback2210x7ce590
    KSetCurrentPosition2220x7cded0
    KSetCurrentTime2230x7cdf00
    KSetCurrentTimeUTC2240x7cdf30
    KSetDICallback2250x7ce4d0
    KSetDICallback22260x7ce500
    KSetDICallback32270x7ce530
    KSetDIConfig2280x7ce4a0
    KSetDIDefaultValue2290x7ce440
    KSetDIDefaultValue22300x7ce470
    KSetDO2310x7cde00
    KSetDeblock2320x7d05f0
    KSetDebugMessageLevel2330x7cd5d0
    KSetDecodeIFrameOnly2340x7cd600
    KSetDownloadLocalFileName2350x7d0560
    KSetDownloadProgressCallback2360x7d0530
    KSetDrawerType2370x7ce960
    KSetEvent_AfterRender2380x7ce6e0
    KSetEvent_ImageRefresh2390x7ce6b0
    KSetEvent_MotionDetection2400x7ce680
    KSetFPS2410x7ce120
    KSetFilePlayCompleteCallback2420x7cebc0
    KSetFileWriterType2430x7cda30
    KSetFirstB2Callback2440x7d0050
    KSetFishEyeMode2450x7d0780
    KSetFishEyeModule2460x7d07c0
    KSetFishEyePTZMoveTo2470x7d0700
    KSetFishEyeRotationAngle2480x7d0810
    KSetFishEyeRotationAngleEx2490x7d0ac0
    KSetFormat2500x7d05c0
    KSetHue2510x7ce090
    KSetImageCallback32520x7cd870
    KSetMediaConfig2530x7cce00
    KSetMediaConfig22540x7cce90
    KSetMediaConfig32550x7ccf20
    KSetMediaConfig42560x7ccfb0
    KSetMotionDetectionCallback2570x7ce350
    KSetMotionDetectionCallback22580x7ce380
    KSetMotionDetectionCallback32590x7ce3b0
    KSetMotionInfo2600x7cd3b0
    KSetMotionInfoEx2610x7cd410
    KSetMotionVectorCallback2620x7ce410
    KSetMute2630x7cd5a0
    KSetNetworkLossCallback2640x7ce320
    KSetOSDText2650x7d03c0
    KSetPIRConfig2660x7cd470
    KSetPauseAfterCompleted2670x7cd2f0
    KSetPlayDirection2680x7ce5f0
    KSetPlayRate2690x7ce5c0
    KSetPrerecordTime2700x7cdc20
    KSetQuadMotionDetectionCallback2710x7ce3e0
    KSetQuadVideoLossCallback2720x7cf5a0
    KSetQuadVideoRecoveryCallback2730x7cf5d0
    KSetQuality2740x7d0620
    KSetRS232DataCallback2750x7ce560
    KSetRawDataCallback2760x7cd730
    KSetRecordConfig2770x7cdae0
    KSetRecordingStatusCallback2780x7cdbb0
    KSetRenderInfo2790x7cd380
    KSetResolution2800x7ce0f0
    KSetResolutionChangeCallback2810x7cd900
    KSetResolutionChangeCallback22820x7cd930
    KSetSaturation2830x7ce060
    KSetSequenceHeaderChecker2840x7ce9e0
    KSetSmoothFastPlayback2850x7d02a0
    KSetStreamingEngineMediaConfig2860x7cea10
    KSetStreamingEngineMediaConfig22870x7cea60
    KSetTCPType2880x7cdda0
    KSetTargetDeviceType2890x7cf600
    KSetTextOut2900x7cec40
    KSetTimeCodeCallback2910x7ce230
    KSetTimeCodeCallbackEx2920x7d0020
    KSetVariableFPS2930x7ce150
    KSetVideoConfig2940x7cd0f0
    KSetVideoConfig22950x7cd140
    KSetVideoLossCallback2960x7ce260
    KSetVideoLossCallback22970x7ce2c0
    KSetVideoRecoveryCallback2980x7ce290
    KSetVideoRecoveryCallback22990x7ce2f0
    KSetVideoStreamControlCallback3000x7d0360
    KSetVideoTransformConfig3010x7ceab0
    KSetVolume3020x7cd540
    KShowLastFrame3030x7d00e0
    KStartAudioTransfer3040x7cd6b0
    KStartDecodeMode3050x7cfd60
    KStartRecord3060x7cda60
    KStartRecord23070x7cdb20
    KStartStreaming3080x7cd1e0
    KStepNextFrame3090x7ce650
    KStepPrevFrame3100x7ce620
    KStop3110x7cd320
    KStopAudioTransfer3120x7cd700
    KStopDecodeMode3130x7cfe50
    KStopRecord3140x7cdab0
    KStopRecord23150x7cdb80
    KStopStreaming3160x7cd230
    PTZCloseInterface3170x7f9390
    PTZDegreeToUnit3180x7f93d0
    PTZEnumerateFunction3190x7f9430
    PTZEnumerateProtocol3200x7f9480
    PTZEnumerateVender3210x7f94d0
    PTZGetAbsPTZCommand3220x7f9520
    PTZGetAbsPTZCommandByUnit3230x7f95a0
    PTZGetCommand3240x7f9600
    PTZGetCommandExt3250x7f9660
    PTZGetCommandStr3260x7f96c0
    PTZGetProtocolStr3270x7f9710
    PTZGetRequestAbsPTZCommand3280x7f9760
    PTZGetUnitFromBuffer3290x7f97b0
    PTZGetVenderProtocolStr3300x7f9800
    PTZGetVenderStr3310x7f9850
    PTZLoadProtocolFile3320x7f98a0
    PTZLoadProtocolRS3330x7f98f0
    PTZOpenInterface3340x7f9940
    PTZUnitToDegree3350x7f9990
    PTZUnloadProtocol3360x7f99d0
    XConnect3370x774c60
    XCreate3380x7747e0
    XDisconnect3390x774cb0
    XEnableDeleteFileAfterClose3400x7759c0
    XExit3410x774c30
    XGetBeginTime3420x775520
    XGetBeginTimeUTC3430x775570
    XGetCurrentPos3440x775840
    XGetCurrentTime3450x775700
    XGetCurrentTimeUTC3460x775750
    XGetEndTime3470x7755c0
    XGetEndTimeUTC3480x775610
    XGetErrMsg3490x775010
    XGetMotionInfo3500x775420
    XGetNextFrame3510x7750c0
    XGetNextFrame23520x775110
    XGetNextIFrame3530x775200
    XGetNextIFrame23540x775250
    XGetPrevFrame3550x775160
    XGetPrevFrame23560x7751b0
    XGetPrevIFrame3570x7752a0
    XGetPrevIFrame23580x7752f0
    XGetRawFileInfo23590x7757a0
    XGetRawFileInfo33600x7757f0
    XGetSendDataType3610x775a20
    XGetSessionID3620x7754d0
    XGetStatusCode3630x774fc0
    XGetSupportEvents3640x7759f0
    XGetVideoConfig3650x775370
    XGetVideoConfig23660x7753a0
    XGetVideoConfig33670x7753c0
    XGetXSession3680x774f70
    XInit3690x7747c0
    XLiveCheck3700x7758d0
    XSendAudioData3710x775a70
    XSendCommand3720x775450
    XSendData3730x775900
    XSetControlDataCallBack3740x7754a0
    XSetCurrentTime3750x775660
    XSetCurrentTimeUTC3760x7756b0
    XSetDownloadLocalFileName3770x775990
    XSetDownloadProgressCallback3780x775950
    XSetEngineConfig3790x774ce0
    XSetEngineConfig23800x774d10
    XSetMediaConfig3810x774d40
    XSetMediaConfig23820x774dc0
    XSetMediaConfig33830x774e40
    XSetMediaConfig43840x774ec0
    XSetMotionInfo3850x7753f0
    XSetVideoConfig3860x775340
    XSetVideoTransformConfig3870x7758a0
    XStartStreaming3880x774ef0
    XStartTransferStreamingEngineData3890x775090
    XStop3900x775060
    XStopStreaming3910x774f40
    Language of compilation systemCountry where language is spokenMap
    ChineseTaiwan
    EnglishUnited States
    No network behavior found

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:18:59:48
    Start date:18/04/2024
    Path:C:\Users\user\Desktop\ArchivePlayer.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\ArchivePlayer.exe"
    Imagebase:0x400000
    File size:7'742'976 bytes
    MD5 hash:9FC7930A0E24916B1F136C2EC0832CA8
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:6.2%
      Total number of Nodes:1674
      Total number of Limit Nodes:87
      execution_graph 75491 831c91 75492 831ca7 75491->75492 75493 831ca0 75491->75493 75495 8461d5 75493->75495 75496 8461f6 _memset 75495->75496 75505 84627b 75495->75505 75499 846226 VerSetConditionMask VerSetConditionMask VerifyVersionInfoA GetSystemMetrics 75496->75499 75498 84628e 75498->75492 75506 8469a7 75499->75506 75501 84626d 75577 846494 75501->75577 75665 9299b4 75505->75665 75672 92f701 75506->75672 75508 8469b3 GetSysColor 75509 8469d3 GetSysColor 75508->75509 75510 8469cb GetSysColor 75508->75510 75512 8469e6 GetSysColor 75509->75512 75513 8469ee 75509->75513 75510->75509 75512->75513 75673 811d73 75513->75673 75515 846a05 22 API calls 75516 846add 75515->75516 75517 846ae8 GetSysColor 75515->75517 75518 846afa GetSysColorBrush 75516->75518 75517->75518 75519 846b1a GetSysColorBrush 75518->75519 75522 846b15 75518->75522 75521 846b2c GetSysColorBrush 75519->75521 75519->75522 75521->75522 75562 846c86 CreateSolidBrush 75522->75562 75563 81270b 112 API calls 75522->75563 75567 846d11 75522->75567 75680 81270b 75522->75680 75709 81092f 75522->75709 75712 845cb6 8 API calls 2 library calls 75522->75712 75524 846b4b CreateSolidBrush 75685 812594 75524->75685 75527 81270b 112 API calls 75528 846b6b CreateSolidBrush 75527->75528 75529 812594 111 API calls 75528->75529 75530 846b78 75529->75530 75531 81270b 112 API calls 75530->75531 75532 846b85 CreateSolidBrush 75531->75532 75533 812594 111 API calls 75532->75533 75534 846b92 75533->75534 75535 81270b 112 API calls 75534->75535 75536 846b9f CreateSolidBrush 75535->75536 75537 812594 111 API calls 75536->75537 75538 846baf 75537->75538 75539 81270b 112 API calls 75538->75539 75540 846bbc CreateSolidBrush 75539->75540 75541 812594 111 API calls 75540->75541 75542 846bc9 75541->75542 75543 81270b 112 API calls 75542->75543 75544 846bd6 CreateSolidBrush 75543->75544 75545 812594 111 API calls 75544->75545 75546 846be3 75545->75546 75547 81270b 112 API calls 75546->75547 75548 846bf0 CreateSolidBrush 75547->75548 75549 812594 111 API calls 75548->75549 75550 846bfd 75549->75550 75551 81270b 112 API calls 75550->75551 75552 846c0a CreatePen 75551->75552 75553 812594 111 API calls 75552->75553 75554 846c24 75553->75554 75555 81270b 112 API calls 75554->75555 75556 846c31 CreatePen 75555->75556 75557 812594 111 API calls 75556->75557 75558 846c45 75557->75558 75559 81270b 112 API calls 75558->75559 75560 846c52 CreatePen 75559->75560 75561 812594 111 API calls 75560->75561 75561->75522 75564 812594 111 API calls 75562->75564 75563->75522 75566 846cf6 75564->75566 75691 84caa8 75566->75691 75569 812594 111 API calls 75567->75569 75570 846d2a CreatePatternBrush 75569->75570 75572 812594 111 API calls 75570->75572 75574 846d3b 75572->75574 75713 80eef3 75574->75713 75575 846d65 ~_Task_impl 75575->75501 75578 8464a3 __EH_prolog3_GS 75577->75578 75579 811d73 112 API calls 75578->75579 75580 8464b3 GetDeviceCaps 75579->75580 75581 8464f3 75580->75581 75582 846530 75581->75582 75585 812763 111 API calls 75581->75585 75584 84654a 75582->75584 75588 812763 111 API calls 75582->75588 75583 846564 75586 84657e 75583->75586 75594 812763 111 API calls 75583->75594 75584->75583 75589 812763 111 API calls 75584->75589 75587 84652d DeleteObject 75585->75587 75590 846598 75586->75590 75597 812763 111 API calls 75586->75597 75587->75582 75591 846547 DeleteObject 75588->75591 75593 846561 DeleteObject 75589->75593 75592 8465b2 75590->75592 75598 812763 111 API calls 75590->75598 75591->75584 75595 8465cc 75592->75595 75602 812763 111 API calls 75592->75602 75593->75583 75596 84657b DeleteObject 75594->75596 75599 8465e6 75595->75599 75606 812763 111 API calls 75595->75606 75596->75586 75600 846595 DeleteObject 75597->75600 75601 8465af DeleteObject 75598->75601 75603 846600 75599->75603 75607 812763 111 API calls 75599->75607 75600->75590 75601->75592 75605 8465c9 DeleteObject 75602->75605 75604 84661a 75603->75604 75611 812763 111 API calls 75603->75611 75752 84612a 75604->75752 75605->75595 75609 8465e3 DeleteObject 75606->75609 75610 8465fd DeleteObject 75607->75610 75609->75599 75610->75603 75613 846617 DeleteObject 75611->75613 75612 846632 _memset 75614 84663e GetTextCharsetInfo 75612->75614 75613->75604 75615 846674 lstrcpyA 75614->75615 75617 8466a5 75615->75617 75618 846706 CreateFontIndirectA 75615->75618 75617->75618 75619 8466ae EnumFontFamiliesA 75617->75619 75620 812594 111 API calls 75618->75620 75621 8466dc EnumFontFamiliesA 75619->75621 75622 8466cb lstrcpyA 75619->75622 75625 84671e 75620->75625 75623 8466f7 lstrcpyA 75621->75623 75622->75618 75623->75618 75626 846768 CreateFontIndirectA 75625->75626 75627 812594 111 API calls 75626->75627 75628 84677a 75627->75628 75629 84612a SystemParametersInfoA 75628->75629 75630 84679b CreateFontIndirectA 75629->75630 75631 812594 111 API calls 75630->75631 75632 8467bf CreateFontIndirectA 75631->75632 75633 812594 111 API calls 75632->75633 75634 8467e7 CreateFontIndirectA 75633->75634 75635 812594 111 API calls 75634->75635 75636 846804 GetSystemMetrics lstrcpyA CreateFontIndirectA 75635->75636 75637 812594 111 API calls 75636->75637 75638 84683c GetStockObject 75637->75638 75639 8468e0 GetStockObject 75638->75639 75640 84686c GetObjectA 75638->75640 75755 81287f 75639->75755 75640->75639 75641 846879 lstrcpyA CreateFontIndirectA 75640->75641 75643 812594 111 API calls 75641->75643 75645 8468c3 CreateFontIndirectA 75643->75645 75644 8468ee GetObjectA CreateFontIndirectA 75646 812594 111 API calls 75644->75646 75647 812594 111 API calls 75645->75647 75648 846913 CreateFontIndirectA 75646->75648 75647->75639 75649 812594 111 API calls 75648->75649 75650 846934 75649->75650 75651 846d6b 118 API calls 75650->75651 75655 84693b 75651->75655 75652 846973 75653 80eef3 112 API calls 75652->75653 75656 84698c 75653->75656 75654 8469a1 75657 81092f ~_Task_impl RaiseException 75654->75657 75655->75652 75655->75654 75658 805352 111 API calls 75655->75658 75659 811e71 113 API calls 75656->75659 75660 8469a6 75657->75660 75658->75655 75661 84699b 75659->75661 75662 92f6e3 6 API calls 75661->75662 75663 846274 75662->75663 75664 8462ba 8 API calls 75663->75664 75664->75505 75666 9299be IsProcessorFeaturePresent 75665->75666 75667 9299bc 75665->75667 75669 92a530 75666->75669 75667->75498 75759 92a4df 5 API calls ___raise_securityfailure 75669->75759 75671 92a613 75671->75498 75672->75508 75674 811d7f __EH_prolog3 75673->75674 75675 811da2 GetWindowDC 75674->75675 75719 81255e 75675->75719 75678 811dbd ~_Task_impl 75678->75515 75681 812711 75680->75681 75682 812714 75680->75682 75681->75524 75728 812763 75682->75728 75684 812719 DeleteObject 75684->75524 75686 8125a1 75685->75686 75687 8125b6 75685->75687 75733 813197 111 API calls 2 library calls 75686->75733 75687->75527 75689 8125ab 75734 8185d1 59 API calls 75689->75734 75692 84cab1 75691->75692 75702 846d4f 75691->75702 75692->75702 75735 848076 DeleteObject RaiseException 75692->75735 75694 84cac4 75736 848076 DeleteObject RaiseException 75694->75736 75696 84cace 75737 848076 DeleteObject RaiseException 75696->75737 75698 84cad8 75738 848076 DeleteObject RaiseException 75698->75738 75700 84cae2 75739 848076 DeleteObject RaiseException 75700->75739 75703 811e71 75702->75703 75704 811e7d __EH_prolog3 75703->75704 75740 812732 75704->75740 75706 811e91 ReleaseDC 75744 811e0d 75706->75744 75708 811ea6 ~_Task_impl 75708->75575 75750 9299c3 RaiseException 75709->75750 75711 810948 75712->75522 75714 80ef02 __EH_prolog3_catch_GS 75713->75714 75715 81270b 112 API calls 75714->75715 75716 80ef11 75715->75716 75751 92f6f2 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 75716->75751 75720 81256b 75719->75720 75721 811db4 75719->75721 75726 813126 111 API calls 2 library calls 75720->75726 75721->75678 75725 81252a RaiseException __CxxThrowException@8 75721->75725 75723 812575 75727 8185d1 59 API calls 75723->75727 75726->75723 75727->75721 75729 812775 75728->75729 75730 81276e 75728->75730 75729->75684 75732 813197 111 API calls 2 library calls 75730->75732 75732->75729 75733->75689 75734->75687 75735->75694 75736->75696 75737->75698 75738->75700 75739->75702 75741 812744 75740->75741 75742 81273d 75740->75742 75741->75706 75749 813126 111 API calls 2 library calls 75742->75749 75745 811e25 75744->75745 75746 811e19 75744->75746 75745->75708 75747 812732 111 API calls 75746->75747 75748 811e1e DeleteDC 75747->75748 75748->75745 75749->75741 75750->75711 75753 84613f SystemParametersInfoA 75752->75753 75754 846139 75752->75754 75753->75612 75754->75753 75758 813197 111 API calls 2 library calls 75755->75758 75757 812889 75758->75757 75759->75671 75760 92c347 ___security_init_cookie 75761 92c351 _fputc 75760->75761 75798 934f53 GetStartupInfoW 75761->75798 75763 92c362 75800 937c2a GetProcessHeap 75763->75800 75765 92c3ba 75766 92c3c5 75765->75766 75891 92c4a1 58 API calls 3 library calls 75765->75891 75801 933e7e 75766->75801 75769 92c3cb 75770 92c3d7 __RTC_Initialize 75769->75770 75892 92c4a1 58 API calls 3 library calls 75769->75892 75822 939908 75770->75822 75773 92c3d6 75773->75770 75774 92c3e5 75775 92c3f1 GetCommandLineA ___crtGetEnvironmentStringsA 75774->75775 75893 92c4a1 58 API calls 3 library calls 75774->75893 75841 939bbc 75775->75841 75779 92c3f0 75779->75775 75780 92c416 75852 939deb 75780->75852 75784 92c427 75867 92fbd6 75784->75867 75787 92c42f 75788 92c43a 75787->75788 75896 92fb9c 58 API calls 4 library calls 75787->75896 75873 93a082 75788->75873 75794 92c45d 75898 92fbc7 58 API calls _doexit 75794->75898 75797 92c462 _fputc 75799 934f69 75798->75799 75799->75763 75800->75765 75899 92fc6e 35 API calls 2 library calls 75801->75899 75803 933e83 75900 93ed11 InitializeCriticalSectionAndSpinCount __mtinitlocks 75803->75900 75805 933e88 75806 933e8c 75805->75806 75902 934ed5 TlsAlloc 75805->75902 75901 933ef4 61 API calls 2 library calls 75806->75901 75809 933e91 75809->75769 75810 933e9e 75810->75806 75811 933ea9 75810->75811 75903 933933 75811->75903 75814 933eeb 75911 933ef4 61 API calls 2 library calls 75814->75911 75817 933eca 75817->75814 75819 933ed0 75817->75819 75818 933ef0 75818->75769 75910 933dcb 58 API calls 4 library calls 75819->75910 75821 933ed8 GetCurrentThreadId 75821->75769 75823 939914 _fputc 75822->75823 75923 93ebe0 75823->75923 75825 93991b 75826 933933 __calloc_crt 58 API calls 75825->75826 75828 93992c 75826->75828 75827 939997 GetStartupInfoW 75835 9399ac 75827->75835 75838 939adb 75827->75838 75828->75827 75829 939937 _fputc @_EH4_CallFilterFunc@8 75828->75829 75829->75774 75830 939ba3 75932 939bb3 LeaveCriticalSection _doexit 75830->75932 75832 933933 __calloc_crt 58 API calls 75832->75835 75833 939b28 GetStdHandle 75833->75838 75834 939b3b GetFileType 75834->75838 75835->75832 75837 9399fa 75835->75837 75835->75838 75836 939a2e GetFileType 75836->75837 75837->75836 75837->75838 75930 934f76 InitializeCriticalSectionAndSpinCount 75837->75930 75838->75830 75838->75833 75838->75834 75931 934f76 InitializeCriticalSectionAndSpinCount 75838->75931 75842 939bca 75841->75842 75843 939bcf GetModuleFileNameA 75841->75843 75941 9357c3 70 API calls __setmbcp 75842->75941 75845 939bfc 75843->75845 75935 939c6f 75845->75935 75847 92c40b 75847->75780 75894 92fb9c 58 API calls 4 library calls 75847->75894 75850 939c35 75850->75847 75851 939c6f _parse_cmdline 58 API calls 75850->75851 75851->75847 75853 939df4 75852->75853 75854 939df9 _strlen 75852->75854 75945 9357c3 70 API calls __setmbcp 75853->75945 75856 92c41c 75854->75856 75857 933933 __calloc_crt 58 API calls 75854->75857 75856->75784 75895 92fb9c 58 API calls 4 library calls 75856->75895 75863 939e2f _strlen 75857->75863 75858 939e81 75946 92b41d 75858->75946 75860 933933 __calloc_crt 58 API calls 75860->75863 75861 939ea8 75862 92b41d _free 58 API calls 75861->75862 75862->75856 75863->75856 75863->75858 75863->75860 75863->75861 75864 939ebf 75863->75864 75952 93543e 8 API calls 2 library calls 75864->75952 75866 939ecb 75869 92fbe2 __IsNonwritableInCurrentImage 75867->75869 75954 93973f 75869->75954 75870 92fc00 __initterm_e 75872 92fc1f _doexit __IsNonwritableInCurrentImage 75870->75872 75957 92934c 75870->75957 75872->75787 75874 93a093 75873->75874 75875 93a08e 75873->75875 75877 92c440 75874->75877 75993 930935 58 API calls x_ismbbtype_l 75874->75993 75992 9357c3 70 API calls __setmbcp 75875->75992 75879 953ec7 75877->75879 75880 953ed0 75879->75880 75994 80b914 75880->75994 75888 92c44e 75888->75794 75897 92fe3f 58 API calls _doexit 75888->75897 75889 953f16 76035 8281fe 133 API calls ~_Task_impl 75889->76035 75891->75766 75892->75773 75893->75779 75894->75780 75895->75784 75896->75788 75897->75794 75898->75797 75899->75803 75900->75805 75901->75809 75902->75810 75905 93393a 75903->75905 75906 933975 75905->75906 75908 933958 75905->75908 75912 937bb0 75905->75912 75906->75814 75909 934f31 TlsSetValue 75906->75909 75908->75905 75908->75906 75920 935298 Sleep 75908->75920 75909->75817 75910->75821 75911->75818 75913 937bbb 75912->75913 75917 937bd6 75912->75917 75914 937bc7 75913->75914 75913->75917 75921 92f66f 58 API calls __getptd_noexit 75914->75921 75915 937be6 HeapAlloc 75915->75917 75918 937bcc 75915->75918 75917->75915 75917->75918 75922 937c3f DecodePointer 75917->75922 75918->75905 75920->75908 75921->75918 75922->75917 75924 93ebf1 75923->75924 75925 93ec04 EnterCriticalSection 75923->75925 75933 93ec68 58 API calls 10 library calls 75924->75933 75925->75825 75927 93ebf7 75927->75925 75934 92fb9c 58 API calls 4 library calls 75927->75934 75929 93ec03 75929->75925 75930->75837 75931->75838 75932->75829 75933->75927 75934->75929 75937 939c91 75935->75937 75940 939cf5 75937->75940 75943 930935 58 API calls x_ismbbtype_l 75937->75943 75938 939c12 75938->75847 75942 93397b 58 API calls 2 library calls 75938->75942 75940->75938 75944 930935 58 API calls x_ismbbtype_l 75940->75944 75941->75843 75942->75850 75943->75937 75944->75940 75945->75854 75947 92b426 HeapFree 75946->75947 75951 92b44f __dosmaperr 75946->75951 75948 92b43b 75947->75948 75947->75951 75953 92f66f 58 API calls __getptd_noexit 75948->75953 75950 92b441 GetLastError 75950->75951 75951->75856 75952->75866 75953->75950 75955 939742 EncodePointer 75954->75955 75955->75955 75956 93975c 75955->75956 75956->75870 75960 929250 75957->75960 75959 929357 75959->75872 75961 92925c _fputc 75960->75961 75968 92fcfe 75961->75968 75967 929283 _fputc 75967->75959 75969 93ebe0 __lock 58 API calls 75968->75969 75970 929265 75969->75970 75971 929294 DecodePointer DecodePointer 75970->75971 75972 929271 75971->75972 75973 9292c1 75971->75973 75982 92928e 75972->75982 75973->75972 75985 9307fb 59 API calls __mbsrchr_l 75973->75985 75975 929324 EncodePointer EncodePointer 75975->75972 75976 9292d3 75976->75975 75977 9292f8 75976->75977 75986 9339c2 61 API calls 2 library calls 75976->75986 75977->75972 75980 929312 EncodePointer 75977->75980 75987 9339c2 61 API calls 2 library calls 75977->75987 75980->75975 75981 92930c 75981->75972 75981->75980 75988 92fd07 75982->75988 75985->75976 75986->75977 75987->75981 75991 93ed4a LeaveCriticalSection 75988->75991 75990 929293 75990->75967 75991->75990 75992->75874 75993->75874 76036 811b46 75994->76036 75997 811b13 75998 818cf3 ~_Task_impl 30 API calls 75997->75998 75999 811b22 75998->75999 76000 811b45 75999->76000 76089 818ca5 75999->76089 76002 828c48 SetErrorMode SetErrorMode 76000->76002 76003 811b13 ~_Task_impl 53 API calls 76002->76003 76004 828c63 76003->76004 76005 811b13 ~_Task_impl 53 API calls 76004->76005 76006 828c71 76005->76006 76007 828c8c 76006->76007 76107 828ca4 76006->76107 76009 811b13 ~_Task_impl 53 API calls 76007->76009 76010 828c91 76009->76010 76011 828c9d 76010->76011 76142 80b91d 76010->76142 76011->75889 76013 7c4ec0 76011->76013 76232 929e20 76013->76232 76017 7c4eff 76240 810770 76017->76240 76020 7c4f0a 76420 80ddc4 117 API calls 2 library calls 76020->76420 76021 7c4f16 76260 80e283 76021->76260 76024 7c4f14 76028 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 76024->76028 76025 7c4f1d 76275 80d5fb 76025->76275 76030 7c4f8d 76028->76030 76030->75889 76033 7c4f63 76421 7c4a40 112 API calls ~_Task_impl 76033->76421 76035->75888 76037 811b13 ~_Task_impl 53 API calls 76036->76037 76038 811b4b 76037->76038 76044 818cf3 76038->76044 76040 81092f 76041 80b919 76040->76041 76055 9299c3 RaiseException 76040->76055 76041->75997 76043 810948 76045 818cff __EH_prolog3 76044->76045 76046 81092f ~_Task_impl RaiseException 76045->76046 76047 818d4a 76045->76047 76056 818a31 EnterCriticalSection 76045->76056 76084 8188c3 TlsAlloc InitializeCriticalSection RaiseException ~_Task_impl 76045->76084 76046->76045 76077 818dad EnterCriticalSection 76047->76077 76052 818d70 ~_Task_impl 76052->76040 76053 818d5d 76085 818e64 10 API calls 3 library calls 76053->76085 76055->76043 76062 818a4e 76056->76062 76057 818af7 _memset 76058 818b11 LeaveCriticalSection 76057->76058 76058->76045 76059 818a89 ~_Task_impl 76063 818a91 GlobalAlloc 76059->76063 76060 818a9e GlobalHandle GlobalUnlock 76086 8115c4 76060->76086 76062->76057 76062->76059 76062->76060 76065 818acc 76063->76065 76064 818abf GlobalReAlloc 76064->76065 76066 818ad0 76065->76066 76067 818ad7 GlobalLock 76065->76067 76068 818b3e LeaveCriticalSection 76066->76068 76070 818b2e GlobalHandle GlobalLock 76066->76070 76067->76057 76088 810949 RaiseException __CxxThrowException@8 76068->76088 76070->76068 76078 818dc6 76077->76078 76079 818ded LeaveCriticalSection 76077->76079 76078->76079 76080 818dcb TlsGetValue 76078->76080 76081 818d57 76079->76081 76080->76079 76082 818dd7 76080->76082 76081->76052 76081->76053 76082->76079 76083 818ddc LeaveCriticalSection 76082->76083 76083->76081 76084->76045 76085->76052 76087 8115d7 ~_Task_impl 76086->76087 76087->76064 76090 818cb1 __EH_prolog3_catch 76089->76090 76091 818cd8 ~_Task_impl 76090->76091 76095 81779d 6 API calls ~_Task_impl 76090->76095 76091->75999 76093 818cbf 76096 817812 76093->76096 76095->76093 76097 817830 76096->76097 76098 81781d LeaveCriticalSection 76096->76098 76099 81092f ~_Task_impl RaiseException 76097->76099 76098->76091 76100 817835 76099->76100 76105 81798a 8 API calls 76100->76105 76102 81783f 76106 817946 7 API calls 76102->76106 76104 81784b LoadCursorA LoadCursorA 76104->76091 76105->76102 76106->76104 76108 811b13 ~_Task_impl 53 API calls 76107->76108 76109 828cc1 GetModuleFileNameA 76108->76109 76110 828ce9 76109->76110 76111 828cf2 PathFindExtensionA 76110->76111 76179 812544 RaiseException __CxxThrowException@8 76110->76179 76113 828d05 76111->76113 76114 828d0a 76111->76114 76180 812544 RaiseException __CxxThrowException@8 76113->76180 76148 828c03 76114->76148 76117 828d25 76118 828d2e 76117->76118 76181 812544 RaiseException __CxxThrowException@8 76117->76181 76120 828d40 76118->76120 76182 92f915 76118->76182 76124 828e5e 76120->76124 76138 828d7d 76120->76138 76167 8113e9 76120->76167 76123 8113e9 58 API calls 76130 828da5 76123->76130 76191 810949 RaiseException __CxxThrowException@8 76124->76191 76126 828e0c 76126->76124 76127 828e4d 76126->76127 76190 92f8b2 58 API calls __mbsrchr_l 76126->76190 76132 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 76127->76132 76133 92f915 _copy_environ 58 API calls 76130->76133 76137 828db5 76130->76137 76136 828e5a 76132->76136 76133->76137 76134 828e31 76139 92f915 _copy_environ 58 API calls 76134->76139 76135 92f915 _copy_environ 58 API calls 76135->76138 76136->76007 76137->76124 76137->76126 76140 92f915 _copy_environ 58 API calls 76137->76140 76138->76123 76138->76124 76138->76137 76141 828e43 76139->76141 76140->76126 76141->76124 76141->76127 76143 811b13 ~_Task_impl 53 API calls 76142->76143 76144 80b922 76143->76144 76145 80b94a 76144->76145 76225 811b67 76144->76225 76145->76011 76149 828c42 76148->76149 76150 828c0c PathFindFileNameA 76148->76150 76152 81092f ~_Task_impl RaiseException 76149->76152 76151 828c25 76150->76151 76157 828c1b _strlen 76150->76157 76192 92f897 58 API calls __cftof 76151->76192 76153 828c47 SetErrorMode SetErrorMode 76152->76153 76156 811b13 ~_Task_impl 53 API calls 76153->76156 76158 828c63 76156->76158 76157->76117 76159 811b13 ~_Task_impl 53 API calls 76158->76159 76160 828c71 76159->76160 76161 828c8c 76160->76161 76162 828ca4 120 API calls 76160->76162 76163 811b13 ~_Task_impl 53 API calls 76161->76163 76162->76161 76164 828c91 76163->76164 76165 828c9d 76164->76165 76166 80b91d 55 API calls 76164->76166 76165->76117 76166->76165 76168 8113f5 76167->76168 76169 81143d 76167->76169 76168->76169 76170 8113fc 76168->76170 76171 81092f ~_Task_impl RaiseException 76169->76171 76173 811b13 ~_Task_impl 53 API calls 76170->76173 76172 811442 76171->76172 76174 811401 76173->76174 76193 7c6080 FindResourceW 76174->76193 76176 81140d 76177 811415 76176->76177 76178 81141d WideCharToMultiByte 76176->76178 76177->76135 76178->76177 76183 92f91e 76182->76183 76184 92f922 _strlen 76182->76184 76183->76120 76199 92b455 76184->76199 76186 92f94e 76186->76120 76187 92f935 76187->76186 76216 93543e 8 API calls 2 library calls 76187->76216 76189 92f964 76190->76134 76192->76157 76194 7c609d 76193->76194 76195 7c609f 76193->76195 76194->76176 76198 7cbe30 LoadResource LockResource SizeofResource 76195->76198 76197 7c60ab 76197->76176 76198->76197 76200 92b4d0 76199->76200 76212 92b461 76199->76212 76223 937c3f DecodePointer 76200->76223 76202 92b4d6 76224 92f66f 58 API calls __getptd_noexit 76202->76224 76205 92b494 RtlAllocateHeap 76206 92b4c8 76205->76206 76205->76212 76206->76187 76208 92b4bc 76221 92f66f 58 API calls __getptd_noexit 76208->76221 76212->76205 76212->76208 76213 92b4ba 76212->76213 76214 92b46c 76212->76214 76220 937c3f DecodePointer 76212->76220 76222 92f66f 58 API calls __getptd_noexit 76213->76222 76214->76212 76217 937c72 58 API calls 2 library calls 76214->76217 76218 937ccf 58 API calls 6 library calls 76214->76218 76219 92fb86 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 76214->76219 76216->76189 76217->76214 76218->76214 76220->76212 76221->76213 76222->76206 76223->76202 76224->76206 76226 818cf3 ~_Task_impl 30 API calls 76225->76226 76227 81092f 76226->76227 76228 80b92e GetCurrentThreadId SetWindowsHookExA 76227->76228 76231 9299c3 RaiseException 76227->76231 76228->76145 76230 810948 76231->76230 76233 7c4edb #17 76232->76233 76234 80c85a 76233->76234 76235 80c866 __EH_prolog3 76234->76235 76236 80c88b 76235->76236 76237 811b13 ~_Task_impl 53 API calls 76235->76237 76239 80c8b6 ~_Task_impl 76236->76239 76422 7c52a0 76236->76422 76237->76236 76239->76017 76241 81077f __EH_prolog3_GS 76240->76241 76242 818ca5 ~_Task_impl 24 API calls 76241->76242 76243 810791 76242->76243 76244 8107a3 76243->76244 76245 81092f ~_Task_impl RaiseException 76243->76245 76246 8107b4 WSAStartup 76244->76246 76252 8107d6 76244->76252 76245->76244 76248 8107cb 76246->76248 76259 8107c4 76246->76259 76247 811b46 ~_Task_impl 53 API calls 76249 8107e2 76247->76249 76250 810809 WSACleanup WSASetLastError 76248->76250 76248->76252 76256 8107f0 76249->76256 76470 802d2d 76249->76470 76250->76259 76252->76247 76254 802d2d ~_Task_impl 58 API calls 76258 810834 76254->76258 76255 7c4f06 76255->76020 76255->76021 76256->76254 76256->76258 76257 802d2d ~_Task_impl 58 API calls 76257->76259 76258->76257 76258->76259 76467 92f6e3 76259->76467 76261 80e2a3 76260->76261 76262 80e28e 76260->76262 76264 811b13 ~_Task_impl 53 API calls 76261->76264 76263 818ca5 ~_Task_impl 24 API calls 76262->76263 76265 80e29d 76263->76265 76266 80e2a8 76264->76266 76265->76261 76267 80e2ae 76265->76267 76266->76025 76268 81092f ~_Task_impl RaiseException 76267->76268 76273 80e2b3 76268->76273 76269 80e3b1 76269->76025 76272 80e375 76272->76269 76476 80557d 113 API calls ~_Task_impl 76272->76476 76273->76269 76273->76272 76474 80557d 113 API calls ~_Task_impl 76273->76474 76475 824561 RaiseException 76273->76475 76276 92b41d _free 58 API calls 76275->76276 76277 80d609 76276->76277 76278 92f915 _copy_environ 58 API calls 76277->76278 76279 80d611 76278->76279 76280 92b41d _free 58 API calls 76279->76280 76281 80d61c 76280->76281 76282 92f915 _copy_environ 58 API calls 76281->76282 76283 7c4f2c 76282->76283 76284 7c5540 76283->76284 76477 80a893 76284->76477 76286 7c5584 76480 7cc880 76286->76480 76291 803567 53 API calls 76292 7c55c4 76291->76292 76293 803567 53 API calls 76292->76293 76294 7c55dd 76293->76294 76295 803567 53 API calls 76294->76295 76296 7c55f6 76295->76296 76297 803567 53 API calls 76296->76297 76298 7c560f 76297->76298 76299 803567 53 API calls 76298->76299 76300 7c5628 76299->76300 76301 7c52a0 118 API calls 76300->76301 76302 7c5646 76301->76302 76303 7c52a0 118 API calls 76302->76303 76304 7c5688 76303->76304 76305 7c52a0 118 API calls 76304->76305 76306 7c569c 76305->76306 76307 7c52a0 118 API calls 76306->76307 76308 7c56de 76307->76308 76309 7c52a0 118 API calls 76308->76309 76310 7c56f2 76309->76310 76311 803567 53 API calls 76310->76311 76312 7c5701 76311->76312 76313 803567 53 API calls 76312->76313 76314 7c571a 76313->76314 76315 803567 53 API calls 76314->76315 76316 7c5761 76315->76316 76317 803567 53 API calls 76316->76317 76318 7c577a 76317->76318 76319 803567 53 API calls 76318->76319 76320 7c5793 76319->76320 76321 803567 53 API calls 76320->76321 76322 7c57ac 76321->76322 76323 803567 53 API calls 76322->76323 76324 7c57c5 76323->76324 76325 803567 53 API calls 76324->76325 76326 7c57de 76325->76326 76327 803567 53 API calls 76326->76327 76328 7c57f7 76327->76328 76329 803567 53 API calls 76328->76329 76330 7c5810 76329->76330 76331 803567 53 API calls 76330->76331 76332 7c5829 76331->76332 76333 803567 53 API calls 76332->76333 76334 7c5842 76333->76334 76335 803567 53 API calls 76334->76335 76336 7c585b 76335->76336 76337 803567 53 API calls 76336->76337 76338 7c5874 76337->76338 76339 803567 53 API calls 76338->76339 76340 7c588d 76339->76340 76341 803567 53 API calls 76340->76341 76342 7c58a6 76341->76342 76343 803567 53 API calls 76342->76343 76344 7c58bf 76343->76344 76345 803567 53 API calls 76344->76345 76346 7c58d8 76345->76346 76347 803567 53 API calls 76346->76347 76348 7c58f1 76347->76348 76349 803567 53 API calls 76348->76349 76350 7c590a 76349->76350 76351 803567 53 API calls 76350->76351 76352 7c5923 76351->76352 76353 803567 53 API calls 76352->76353 76354 7c593c 76353->76354 76355 803567 53 API calls 76354->76355 76356 7c5955 76355->76356 76357 803567 53 API calls 76356->76357 76358 7c596e 76357->76358 76359 803567 53 API calls 76358->76359 76360 7c59b5 76359->76360 76486 80fbd2 76360->76486 76362 7c59ce _memset 76490 92aff6 76362->76490 76367 7c5a3f 76368 811b13 ~_Task_impl 53 API calls 76367->76368 76370 7c5a47 76368->76370 76369 92aff6 swprintf 59 API calls 76369->76367 76371 811b13 ~_Task_impl 53 API calls 76370->76371 76372 7c5a4c LoadIconW 76371->76372 76373 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 76372->76373 76374 7c4f3c 76373->76374 76375 80ade2 76374->76375 76376 80adee __EH_prolog3_catch 76375->76376 76377 811b13 ~_Task_impl 53 API calls 76376->76377 76378 80ae07 76377->76378 76379 80ae38 76378->76379 76380 811b13 ~_Task_impl 53 API calls 76378->76380 76381 80ae3c LockResource 76379->76381 76383 80ae48 76379->76383 76382 80ae19 FindResourceA LoadResource 76380->76382 76381->76383 76382->76379 76386 80ae4f ~_Task_impl 76383->76386 76553 80b2c7 76383->76553 76386->76033 76388 80ae68 76389 80ae75 GetDesktopWindow 76388->76389 76390 80aec8 76388->76390 76389->76390 76392 80ae7f IsWindowEnabled 76389->76392 76579 803d7c 76390->76579 76392->76390 76394 80ae8a EnableWindow 76392->76394 76623 803d22 53 API calls 76394->76623 76400 80af17 76402 80af58 76400->76402 76626 809e07 EnableWindow 76400->76626 76401 80ae9e 76401->76390 76624 80a445 IsWindowEnabled 76401->76624 76407 80af67 76402->76407 76408 80af5e EnableWindow 76402->76408 76403 811b13 ~_Task_impl 53 API calls 76409 80aefd 76403->76409 76405 80aebb 76405->76390 76625 809e07 EnableWindow 76405->76625 76410 80af6b GetActiveWindow 76407->76410 76411 80af7d 76407->76411 76408->76407 76412 805328 112 API calls 76409->76412 76410->76411 76415 80af76 SetActiveWindow 76410->76415 76627 80b27e 139 API calls ~_Task_impl 76411->76627 76413 80af09 76412->76413 76416 80ad83 203 API calls 76413->76416 76415->76411 76416->76400 76418 80af8b 76418->76386 76419 80af90 FreeResource 76418->76419 76419->76386 76420->76024 76421->76024 76423 7c52cf 76422->76423 76427 7c531e 76423->76427 76430 8113de 76423->76430 76443 7cb9c0 76427->76443 76428 7c5339 76428->76239 76431 811b13 ~_Task_impl 53 API calls 76430->76431 76432 7c530f 76431->76432 76432->76428 76433 7c7500 FindResourceW 76432->76433 76434 7c7529 76433->76434 76435 7c75aa 76433->76435 76460 7cbe30 LoadResource LockResource SizeofResource 76434->76460 76435->76427 76437 7c7531 76437->76435 76438 7c753a WideCharToMultiByte 76437->76438 76439 7c755a 76438->76439 76442 7c7595 76438->76442 76440 7c7575 WideCharToMultiByte 76439->76440 76461 7ca190 58 API calls 76439->76461 76440->76442 76442->76427 76444 7cb9ce 76443->76444 76445 7cb9d9 76443->76445 76444->76428 76446 7cba0d 76445->76446 76455 7cba25 76445->76455 76462 7ca190 58 API calls 76445->76462 76448 7cba18 76446->76448 76449 7cba27 76446->76449 76463 92a82c 58 API calls 2 library calls 76448->76463 76464 92a7ad 58 API calls 3 library calls 76449->76464 76450 7cba6d 76465 7cbaa0 59 API calls 2 library calls 76450->76465 76451 7cba7b 76466 7cbaa0 59 API calls 2 library calls 76451->76466 76455->76450 76455->76451 76456 7cba3c 76455->76456 76456->76428 76457 7cba76 76457->76428 76459 7cba9a 76459->76428 76460->76437 76461->76440 76462->76446 76463->76455 76464->76455 76465->76457 76466->76459 76468 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 76467->76468 76469 92f6ed 76468->76469 76469->76469 76472 802d33 76470->76472 76471 92b455 _malloc 58 API calls 76471->76472 76472->76471 76473 802d55 76472->76473 76473->76256 76474->76273 76475->76273 76476->76272 76478 803567 53 API calls 76477->76478 76479 80a89e 76478->76479 76479->76286 76481 803567 53 API calls 76480->76481 76482 7c559c 76481->76482 76483 803567 76482->76483 76502 802d7d 76483->76502 76487 80fbde __EH_prolog3 76486->76487 76488 803567 53 API calls 76487->76488 76489 80fbe8 ~_Task_impl 76488->76489 76489->76362 76505 92b2a6 76490->76505 76492 7c5a16 76493 92ac07 76492->76493 76527 933d44 76493->76527 76496 92acc8 76532 92a617 6 API calls ___report_securityfailure 76496->76532 76498 92accd 76499 92ac3d 76500 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 76499->76500 76501 7c5a27 76500->76501 76501->76367 76501->76369 76503 811b13 ~_Task_impl 53 API calls 76502->76503 76504 7c55ab 76503->76504 76504->76291 76506 92b2c4 76505->76506 76507 92b2af 76505->76507 76508 92b305 76506->76508 76510 92b2d2 76506->76510 76521 92f66f 58 API calls __getptd_noexit 76507->76521 76525 92f66f 58 API calls __getptd_noexit 76508->76525 76523 92b0be 59 API calls __mbsrchr_l 76510->76523 76512 92b2b4 76522 93542e 9 API calls __mbsrchr_l 76512->76522 76515 92b2bf 76515->76492 76517 92b315 76517->76492 76518 92b2e9 76518->76517 76524 92f66f 58 API calls __getptd_noexit 76518->76524 76520 92b2fd 76526 93542e 9 API calls __mbsrchr_l 76520->76526 76521->76512 76522->76515 76523->76518 76524->76520 76525->76520 76526->76517 76533 933d5c GetLastError 76527->76533 76529 933d4a 76530 92ac24 76529->76530 76547 92fb9c 58 API calls 4 library calls 76529->76547 76530->76496 76530->76499 76532->76498 76548 934f12 76533->76548 76535 933d71 76536 933dbf SetLastError 76535->76536 76537 933933 __calloc_crt 55 API calls 76535->76537 76536->76529 76538 933d84 76537->76538 76538->76536 76551 934f31 TlsSetValue 76538->76551 76540 933d98 76541 933db6 76540->76541 76542 933d9e 76540->76542 76544 92b41d _free 55 API calls 76541->76544 76552 933dcb 58 API calls 4 library calls 76542->76552 76546 933dbc 76544->76546 76545 933da6 GetCurrentThreadId 76545->76536 76546->76536 76547->76530 76549 934f29 TlsGetValue 76548->76549 76550 934f25 76548->76550 76549->76535 76550->76535 76551->76540 76552->76545 76554 811b13 ~_Task_impl 53 API calls 76553->76554 76555 80b2d0 76554->76555 76557 80b2df 76555->76557 76645 80dea0 53 API calls 76555->76645 76628 80debc 76557->76628 76560 803d7c 132 API calls 76561 80ae5e 76560->76561 76562 8040b3 76561->76562 76563 818cf3 ~_Task_impl 30 API calls 76562->76563 76564 8040c3 76563->76564 76565 8040c9 76564->76565 76566 8040fa 76564->76566 76568 811b13 ~_Task_impl 53 API calls 76565->76568 76567 81092f ~_Task_impl RaiseException 76566->76567 76569 8040ff 76567->76569 76570 8040ce 76568->76570 76578 80410c 76569->76578 76648 805352 76569->76648 76571 8040e7 76570->76571 76573 8040da UnhookWindowsHookEx 76570->76573 76571->76388 76573->76571 76575 804136 DefWindowProcA 76575->76578 76576 804124 76653 8038ed 76576->76653 76578->76388 76580 818cf3 ~_Task_impl 30 API calls 76579->76580 76581 803d90 76580->76581 76582 803d96 76581->76582 76583 803dca 76581->76583 76586 803dc1 76582->76586 76587 803da4 GetCurrentThreadId SetWindowsHookExA 76582->76587 76584 81092f ~_Task_impl RaiseException 76583->76584 76585 803dcf 76584->76585 76722 810949 RaiseException __CxxThrowException@8 76585->76722 76607 805328 76586->76607 76587->76585 76587->76586 76608 808b37 ~_Task_impl 111 API calls 76607->76608 76609 805334 76608->76609 76723 81a1cc 76609->76723 76611 805340 76735 809d55 76611->76735 76614 80ad83 76746 80ab30 76614->76746 76616 80adda 76616->76400 76616->76403 76617 80ad98 76617->76616 76618 80adc1 76617->76618 76619 80a305 GetWindowLongA 76617->76619 76618->76616 76620 80a7ae SetWindowPos 76618->76620 76621 80adaf 76619->76621 76620->76616 76778 8078cd 76621->76778 76623->76401 76624->76405 76625->76390 76626->76402 76627->76418 76629 80dee2 GetWindowLongA 76628->76629 76630 80decb 76628->76630 76631 80def2 GetParent 76629->76631 76632 80deff 76629->76632 76646 80deb0 30 API calls 76630->76646 76641 80ded9 76631->76641 76634 80df14 76632->76634 76635 80df07 GetParent 76632->76635 76638 80df1c GetLastActivePopup 76634->76638 76639 80df25 76634->76639 76635->76634 76635->76635 76636 80ded0 76636->76641 76647 803d22 53 API calls 76636->76647 76638->76639 76640 80b2f9 76639->76640 76642 80df30 IsWindowEnabled 76639->76642 76640->76560 76641->76629 76641->76632 76642->76640 76643 80df3b 76642->76643 76643->76640 76644 80df3f EnableWindow 76643->76644 76644->76640 76645->76557 76646->76636 76647->76641 76665 808b37 76648->76665 76650 80535e 76651 80411b 76650->76651 76671 818730 RaiseException ~_Task_impl 76650->76671 76651->76575 76651->76576 76654 8038f9 __EH_prolog3_catch_GS 76653->76654 76655 818cf3 ~_Task_impl 30 API calls 76654->76655 76656 80390e 76655->76656 76657 803923 76656->76657 76658 81092f ~_Task_impl RaiseException 76656->76658 76659 803987 76657->76659 76687 80875c GetWindowRect GetWindowLongA 76657->76687 76658->76657 76663 8039b4 76659->76663 76672 8086bb 76659->76672 76688 92f6f2 6 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 76663->76688 76666 808b43 __EH_prolog3 76665->76666 76667 811b46 ~_Task_impl 53 API calls 76666->76667 76668 808b48 ~_Task_impl 76667->76668 76669 802d2d ~_Task_impl 58 API calls 76668->76669 76670 808b69 ~_Task_impl 76668->76670 76669->76670 76670->76650 76671->76651 76673 8086d8 76672->76673 76674 80874a 76672->76674 76689 80a305 76673->76689 76675 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 76674->76675 76678 808756 76675->76678 76677 8086df 76677->76674 76679 8086e6 GetWindowRect 76677->76679 76678->76663 76679->76674 76680 80870c 76679->76680 76680->76674 76681 808714 GetWindow 76680->76681 76682 805328 112 API calls 76681->76682 76683 808725 76682->76683 76684 808730 76683->76684 76716 80a445 IsWindowEnabled 76683->76716 76684->76674 76692 804b8f 76684->76692 76687->76659 76690 80a31a 76689->76690 76691 80a30e GetWindowLongA 76689->76691 76691->76677 76693 80a305 GetWindowLongA 76692->76693 76694 804baf 76693->76694 76695 804bb5 76694->76695 76697 804bc2 GetParent 76694->76697 76698 804bcd GetWindow 76694->76698 76696 804bf4 GetWindowRect 76695->76696 76699 804c37 76696->76699 76700 804cca GetParent GetClientRect GetClientRect MapWindowPoints 76696->76700 76701 804bd8 76697->76701 76698->76701 76702 804c4b 76699->76702 76703 804c3b GetWindowLongA 76699->76703 76704 804cf7 76700->76704 76701->76696 76705 804bde SendMessageA 76701->76705 76706 804c9b GetWindowRect MonitorFromWindow GetMonitorInfoA CopyRect 76702->76706 76707 804c5f 76702->76707 76703->76702 76717 80a7ae 76704->76717 76705->76696 76708 804bf2 76705->76708 76706->76704 76721 803d22 53 API calls 76707->76721 76708->76696 76710 804c64 MonitorFromWindow GetMonitorInfoA CopyRect CopyRect 76710->76704 76713 804d79 76714 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 76713->76714 76715 804d86 76714->76715 76715->76674 76716->76684 76718 80a7e1 76717->76718 76719 80a7ba SetWindowPos 76717->76719 76719->76713 76721->76710 76724 81a1d8 __EH_prolog3_catch 76723->76724 76727 81a1e1 ~_Task_impl 76724->76727 76740 818730 RaiseException ~_Task_impl 76724->76740 76726 81a1f4 76726->76727 76741 818730 RaiseException ~_Task_impl 76726->76741 76727->76611 76729 81a201 ~_Task_impl 76729->76727 76742 829d9e 59 API calls 76729->76742 76731 81a230 76732 81a23b 76731->76732 76743 810949 RaiseException __CxxThrowException@8 76731->76743 76744 8185d1 59 API calls 76732->76744 76736 80534a 76735->76736 76737 809d5f 76735->76737 76736->76614 76737->76736 76738 809d65 GetParent 76737->76738 76745 818730 RaiseException ~_Task_impl 76738->76745 76740->76726 76741->76729 76742->76731 76744->76727 76745->76736 76747 80ab3c __EH_prolog3_catch 76746->76747 76748 80ab4c 76747->76748 76749 811b13 ~_Task_impl 53 API calls 76747->76749 76750 811b13 ~_Task_impl 53 API calls 76748->76750 76749->76748 76751 80ab57 76750->76751 76799 8039f3 76751->76799 76754 8039f3 128 API calls 76755 80ab78 76754->76755 76844 81a3be 76755->76844 76757 80ab7d 76758 80ab94 ~_Task_impl 76757->76758 76867 81a68f 76757->76867 76758->76617 76760 80abdb 76761 80ac2c 76760->76761 76880 81a640 62 API calls ~_Task_impl 76760->76880 76762 803d7c 132 API calls 76761->76762 76764 80ac3a 76762->76764 76873 80b3bf 76764->76873 76765 80abf6 76881 81a9c5 68 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 76765->76881 76767 80ac05 76882 81a67b GlobalFree 76767->76882 76770 80ac1e 76770->76761 76772 80ac22 GlobalLock 76770->76772 76771 80ac5a 76773 8040b3 137 API calls 76771->76773 76772->76761 76774 80acbe 76773->76774 76775 80ace2 76774->76775 76776 80acd9 DestroyWindow 76774->76776 76775->76758 76777 80ace9 GlobalUnlock GlobalFree 76775->76777 76776->76775 76777->76758 76779 8078eb GetParent 76778->76779 76780 8078e6 76778->76780 76971 80b90b 76779->76971 76781 80a305 GetWindowLongA 76780->76781 76781->76779 76784 807909 76785 807912 PeekMessageA 76784->76785 76787 807929 76784->76787 76788 807a0b 76784->76788 76790 807964 SendMessageA 76784->76790 76793 80794e SendMessageA 76784->76793 76794 807a02 76784->76794 76798 8079e5 PeekMessageA 76784->76798 76974 80baef 76784->76974 76986 80ba96 53 API calls ~_Task_impl 76784->76986 76785->76784 76787->76784 76984 80a82e ShowWindow 76787->76984 76985 80a82e ShowWindow 76787->76985 76987 80c57e 54 API calls 76788->76987 76790->76784 76790->76787 76792 807932 UpdateWindow 76792->76784 76793->76784 76794->76618 76796 8079b6 UpdateWindow 76796->76784 76798->76784 76800 811b13 ~_Task_impl 53 API calls 76799->76800 76802 803a00 _memset 76800->76802 76801 803a0e 76801->76754 76802->76801 76803 811b13 ~_Task_impl 53 API calls 76802->76803 76804 803a35 76803->76804 76805 803a66 76804->76805 76886 803e70 76804->76886 76807 803a87 76805->76807 76809 803e70 122 API calls 76805->76809 76808 803aae 76807->76808 76810 803e70 122 API calls 76807->76810 76811 803ad8 76808->76811 76904 808780 124 API calls ~_Task_impl 76808->76904 76809->76807 76810->76808 76813 803b05 76811->76813 76905 808780 124 API calls ~_Task_impl 76811->76905 76814 803b26 76813->76814 76883 80864f 76813->76883 76817 80864f 17 API calls 76814->76817 76818 803b45 76814->76818 76817->76818 76819 80864f 17 API calls 76818->76819 76820 803b60 76818->76820 76819->76820 76821 803b7c 76820->76821 76823 80864f 17 API calls 76820->76823 76822 803b98 76821->76822 76824 80864f 17 API calls 76821->76824 76825 803bb4 76822->76825 76826 80864f 17 API calls 76822->76826 76823->76821 76824->76822 76827 803bd0 76825->76827 76828 80864f 17 API calls 76825->76828 76826->76825 76829 803bec 76827->76829 76831 80864f 17 API calls 76827->76831 76828->76827 76830 803c08 76829->76830 76832 80864f 17 API calls 76829->76832 76833 803c24 76830->76833 76834 80864f 17 API calls 76830->76834 76831->76829 76832->76830 76835 803c40 76833->76835 76836 80864f 17 API calls 76833->76836 76834->76833 76837 803c5c 76835->76837 76839 80864f 17 API calls 76835->76839 76836->76835 76838 803c78 76837->76838 76840 80864f 17 API calls 76837->76840 76841 803c94 76838->76841 76842 80864f 17 API calls 76838->76842 76839->76837 76840->76838 76841->76801 76843 80864f 17 API calls 76841->76843 76842->76841 76843->76801 76955 8284db 76844->76955 76847 8284db 123 API calls 76848 81a3db 76847->76848 76849 8284db 123 API calls 76848->76849 76850 81a3eb 76849->76850 76851 8284db 123 API calls 76850->76851 76852 81a3fa 76851->76852 76853 8284db 123 API calls 76852->76853 76854 81a405 76853->76854 76855 8284db 123 API calls 76854->76855 76856 81a410 76855->76856 76857 8284db 123 API calls 76856->76857 76858 81a41b 76857->76858 76859 8284db 123 API calls 76858->76859 76860 81a42b 76859->76860 76861 8284db 123 API calls 76860->76861 76862 81a43d 76861->76862 76863 8284db 123 API calls 76862->76863 76864 81a44c 76863->76864 76865 8284db 123 API calls 76864->76865 76866 81a457 76865->76866 76866->76757 76869 81a69c 76867->76869 76868 81a6fc 76868->76760 76869->76868 76961 7ca270 58 API calls 76869->76961 76871 81a6d4 76872 81a6e0 WideCharToMultiByte 76871->76872 76872->76868 76874 80b3cb _fputc 76873->76874 76875 80b3e9 CreateDialogIndirectParamA 76874->76875 76876 80999f 13 API calls 76874->76876 76962 80b420 76875->76962 76878 80b3e5 76876->76878 76878->76875 76879 80b413 _fputc 76878->76879 76879->76771 76880->76765 76881->76767 76882->76770 76906 80986f 76883->76906 76885 80865d 76885->76814 76950 92f76a 76886->76950 76888 803e7c GetClassInfoA 76889 803e93 76888->76889 76890 803e9e ~_Task_impl 76888->76890 76951 809a69 16 API calls _fputc 76889->76951 76890->76805 76892 803e99 76892->76890 76893 811b13 ~_Task_impl 53 API calls 76892->76893 76894 803ea7 76893->76894 76894->76890 76952 81779d 6 API calls ~_Task_impl 76894->76952 76896 803eb4 76897 811b13 ~_Task_impl 53 API calls 76896->76897 76898 803ebd 76897->76898 76953 8041a1 58 API calls _strlen 76898->76953 76900 803eca 76954 804255 58 API calls 76900->76954 76902 803ed3 76903 817812 ~_Task_impl 19 API calls 76902->76903 76903->76890 76904->76811 76905->76813 76907 80987b _fputc 76906->76907 76908 80989a 76907->76908 76914 80999f 76907->76914 76910 8098af 76908->76910 76912 8098d1 _fputc 76908->76912 76923 8095a3 15 API calls _fputc 76908->76923 76924 8098de GetLastError SetLastError GetProcAddress 76910->76924 76912->76885 76915 8099be 76914->76915 76916 8099ae OutputDebugStringA 76914->76916 76917 8099cf 76915->76917 76922 8099e5 76915->76922 76925 809af7 76915->76925 76916->76915 76921 8099ea GetLastError 76917->76921 76949 80966f GetProcAddress 76917->76949 76920 8099e1 76920->76921 76920->76922 76921->76922 76922->76908 76923->76910 76924->76912 76927 809b06 76925->76927 76926 809cbc 76928 92f888 6 API calls 76926->76928 76927->76926 76930 809a0f GetProcAddress 76927->76930 76931 809b44 76927->76931 76929 809cc6 76928->76929 76929->76917 76930->76931 76931->76926 76932 809c3c 76931->76932 76933 809a0f GetProcAddress 76931->76933 76932->76926 76934 80966f GetProcAddress 76932->76934 76935 809b95 76933->76935 76936 809c7e 76934->76936 76935->76926 76939 809bb1 GetModuleFileNameW 76935->76939 76936->76926 76937 8097ae GetProcAddress 76936->76937 76938 809ca5 76937->76938 76940 809cb0 76938->76940 76941 809ca9 LoadLibraryW 76938->76941 76939->76926 76942 809bd2 76939->76942 76943 809cc9 GetProcAddress 76940->76943 76941->76940 76944 809be3 76942->76944 76945 809bd6 SetLastError 76942->76945 76943->76926 76946 80969f GetProcAddress 76944->76946 76945->76926 76947 809c24 76946->76947 76947->76932 76948 809c2f GetLastError 76947->76948 76948->76932 76949->76920 76950->76888 76951->76892 76952->76896 76953->76900 76954->76902 76956 811b13 ~_Task_impl 53 API calls 76955->76956 76957 8284f6 GetClassInfoA 76956->76957 76958 82850b 76957->76958 76959 803e70 122 API calls 76958->76959 76960 81a3d0 76959->76960 76960->76847 76961->76871 76963 80b455 76962->76963 76964 80b429 76962->76964 76963->76879 76965 80b434 GetLastError 76964->76965 76966 80b43e 76964->76966 76965->76966 76970 80977e GetProcAddress 76966->76970 76968 80b44a 76968->76963 76969 80b44e SetLastError 76968->76969 76969->76963 76970->76968 76972 811b67 30 API calls 76971->76972 76973 80b910 76972->76973 76973->76784 76975 811b46 ~_Task_impl 53 API calls 76974->76975 76976 80ba52 76975->76976 76977 811b67 30 API calls 76976->76977 76978 80ba59 KiUserCallbackDispatcher 76977->76978 76979 80ba90 76978->76979 76980 80ba6e 76978->76980 76979->76784 76980->76979 76988 80bab5 76980->76988 76983 80ba82 TranslateMessage DispatchMessageA 76983->76979 76984->76792 76985->76796 76986->76784 76989 811b46 ~_Task_impl 53 API calls 76988->76989 76990 80ba7d 76989->76990 76990->76979 76990->76983 76991 7c9460 77027 80b16f 76991->77027 76993 7c949a GetSystemMenu 77042 8138db 76993->77042 76995 7c9564 SendMessageA SendMessageA 76996 7c95b2 _memset 76995->76996 76998 80f921 SendMessageA SendMessageA 76996->76998 76997 7c94ab 76997->76995 76999 8113de 53 API calls 76997->76999 77001 7c95c6 76998->77001 77000 7c94f5 76999->77000 77002 7c9507 77000->77002 77003 7c7500 64 API calls 77000->77003 77001->77001 77004 7cb9c0 59 API calls 77001->77004 77005 7c9543 77002->77005 77006 7c9513 AppendMenuA AppendMenuA 77002->77006 77003->77002 77007 7c9610 SendMessageA 77004->77007 77005->76995 77006->77005 77008 7c9634 _memset 77007->77008 77009 809dba CheckDlgButton 77008->77009 77010 7c969b CreateSolidBrush CreatePen 77009->77010 77011 7c9713 _memset 77010->77011 77012 7c9726 SendMessageA 77011->77012 77013 80a7ea IsWindow SetWindowTextA RaiseException 77012->77013 77014 7c97d5 77013->77014 77015 7cb9c0 59 API calls 77014->77015 77016 7c980a 77015->77016 77017 807e41 143 API calls 77016->77017 77018 7c9813 SendMessageA 77017->77018 77019 7c9830 77018->77019 77019->77019 77020 7c983b 77019->77020 77021 7c9842 DragAcceptFiles 77019->77021 77022 7c7d50 204 API calls 77020->77022 77023 80a7ea IsWindow SetWindowTextA RaiseException 77021->77023 77022->77021 77024 7c9859 77023->77024 77025 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77024->77025 77026 7c9875 77025->77026 77028 80b184 77027->77028 77030 80b17c 77027->77030 77051 8052be 57 API calls ~_Task_impl 77028->77051 77031 80b192 77030->77031 77045 807e41 77030->77045 77052 80afa2 EndDialog 77031->77052 77034 80b1a4 77034->77031 77036 80b1aa 77034->77036 77035 80b199 77035->76993 77037 80b1ba 77036->77037 77038 80b1ce 77036->77038 77053 80a982 53 API calls ~_Task_impl 77037->77053 77038->76993 77040 80b1bf 77054 80a82e ShowWindow 77040->77054 77218 813af3 111 API calls 2 library calls 77042->77218 77044 8138e5 77046 807e4d __EH_prolog3_catch 77045->77046 77047 811b67 30 API calls 77046->77047 77048 807e61 77047->77048 77055 7c67b0 77048->77055 77049 807e8e ~_Task_impl 77049->77034 77051->77030 77052->77035 77053->77040 77054->77038 77130 813eec 77055->77130 77057 7c67cc 77058 813eec 141 API calls 77057->77058 77059 7c67de 77058->77059 77060 813eec 141 API calls 77059->77060 77061 7c67f0 77060->77061 77062 813eec 141 API calls 77061->77062 77063 7c6802 77062->77063 77064 813eec 141 API calls 77063->77064 77065 7c6814 77064->77065 77066 813eec 141 API calls 77065->77066 77067 7c6826 77066->77067 77068 813eec 141 API calls 77067->77068 77069 7c6838 77068->77069 77148 813d2d 77069->77148 77071 7c684a 77072 813d2d 129 API calls 77071->77072 77073 7c685c 77072->77073 77074 813d2d 129 API calls 77073->77074 77075 7c686e 77074->77075 77076 813d2d 129 API calls 77075->77076 77077 7c6880 77076->77077 77078 813eec 141 API calls 77077->77078 77079 7c6892 77078->77079 77080 813eec 141 API calls 77079->77080 77081 7c68a4 77080->77081 77082 813eec 141 API calls 77081->77082 77083 7c68b6 77082->77083 77084 813eec 141 API calls 77083->77084 77085 7c68c8 77084->77085 77086 813eec 141 API calls 77085->77086 77087 7c68da 77086->77087 77088 813eec 141 API calls 77087->77088 77089 7c68ec 77088->77089 77090 813eec 141 API calls 77089->77090 77091 7c68fe 77090->77091 77092 813eec 141 API calls 77091->77092 77093 7c6910 77092->77093 77094 813eec 141 API calls 77093->77094 77095 7c6922 77094->77095 77096 813eec 141 API calls 77095->77096 77097 7c6934 77096->77097 77098 813eec 141 API calls 77097->77098 77099 7c6946 77098->77099 77100 813eec 141 API calls 77099->77100 77101 7c6958 77100->77101 77102 813eec 141 API calls 77101->77102 77103 7c696a 77102->77103 77104 813eec 141 API calls 77103->77104 77105 7c697c 77104->77105 77106 813eec 141 API calls 77105->77106 77107 7c698e 77106->77107 77108 813eec 141 API calls 77107->77108 77109 7c69a0 77108->77109 77110 813eec 141 API calls 77109->77110 77111 7c69b2 77110->77111 77112 813d2d 129 API calls 77111->77112 77113 7c69c4 77112->77113 77114 813eec 141 API calls 77113->77114 77115 7c69d6 77114->77115 77116 813eec 141 API calls 77115->77116 77117 7c69e8 77116->77117 77118 813eec 141 API calls 77117->77118 77119 7c69fa 77118->77119 77120 813eec 141 API calls 77119->77120 77121 7c6a0c 77120->77121 77122 813eec 141 API calls 77121->77122 77123 7c6a1e 77122->77123 77124 813eec 141 API calls 77123->77124 77125 7c6a30 77124->77125 77126 813eec 141 API calls 77125->77126 77127 7c6a42 77126->77127 77128 813eec 141 API calls 77127->77128 77129 7c6a54 77128->77129 77129->77049 77131 813efd 77130->77131 77143 813f7e 77130->77143 77131->77143 77157 813dd8 77131->77157 77133 813f1c 77134 813f53 77133->77134 77190 82888e RaiseException 77133->77190 77134->77143 77192 807d67 113 API calls 77134->77192 77137 813f40 77137->77134 77138 813f44 77137->77138 77191 8288d2 124 API calls 77138->77191 77139 813f63 77141 813fa2 77139->77141 77142 813f67 77139->77142 77193 810963 RaiseException __CxxThrowException@8 77141->77193 77142->77143 77146 813f6d GetParent 77142->77146 77143->77057 77145 813f51 77145->77143 77146->77143 77147 813fa7 77149 813dd8 127 API calls 77148->77149 77150 813d3f 77149->77150 77151 813d75 77150->77151 77152 813d4d GetWindowTextLengthA 77150->77152 77154 8173d9 11 API calls 77151->77154 77217 805376 58 API calls 77152->77217 77156 813d73 77154->77156 77155 813d61 GetWindowTextA 77155->77156 77156->77071 77159 813df0 77157->77159 77158 813e04 77158->77133 77159->77158 77194 810963 RaiseException __CxxThrowException@8 77159->77194 77161 813e1b 77162 813dd8 125 API calls 77161->77162 77163 813e43 77162->77163 77164 813e51 GetWindowTextA __snwscanf 77163->77164 77165 813e8d 77163->77165 77166 813e78 77164->77166 77167 813edb 77164->77167 77197 92f66f 58 API calls __getptd_noexit 77165->77197 77195 80ddc4 117 API calls 2 library calls 77166->77195 77169 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77167->77169 77172 813ee8 77169->77172 77171 813e92 77198 92f66f 58 API calls __getptd_noexit 77171->77198 77172->77133 77173 813e84 77196 813d86 SetFocus SendMessageA RaiseException 77173->77196 77175 813e99 77199 92b188 59 API calls __vsnprintf_s_l 77175->77199 77178 813e8b 77178->77167 77179 813eae 77200 92f66f 58 API calls __getptd_noexit 77179->77200 77181 813eb6 77182 813ebb 77181->77182 77183 813eca 77181->77183 77201 92f66f 58 API calls __getptd_noexit 77182->77201 77203 92f66f 58 API calls __getptd_noexit 77183->77203 77186 813ec0 77202 804280 lstrcmpW 77186->77202 77187 813ec7 77204 8173d9 77187->77204 77190->77137 77191->77145 77192->77139 77193->77147 77194->77161 77195->77173 77196->77178 77197->77171 77198->77175 77199->77179 77200->77181 77201->77186 77202->77187 77203->77187 77205 8173f9 77204->77205 77206 81746b 77204->77206 77205->77206 77210 8173fd _memset _strlen 77205->77210 77207 81092f ~_Task_impl RaiseException 77206->77207 77208 817470 GetLastError 77207->77208 77209 81747b 77208->77209 77209->77167 77211 817450 SetWindowTextA 77210->77211 77212 81742b GetWindowTextA 77210->77212 77214 817458 77211->77214 77212->77211 77213 81743e lstrcmpA 77212->77213 77213->77211 77213->77214 77215 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77214->77215 77216 817465 77215->77216 77216->77167 77217->77155 77218->77044 77219 7c4fa0 77220 7c4fb1 77219->77220 77235 8072cd 77220->77235 77223 80b31a 77225 80b39e 77245 80729a 77225->77245 77227 80b329 77227->77223 77227->77225 77228 80b34f GetWindowLongA 77227->77228 77228->77225 77229 80b35d 77228->77229 77249 8175c1 8 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 77229->77249 77231 80b369 77231->77225 77232 80b36d GetDlgItem 77231->77232 77233 80b387 SendMessageA 77232->77233 77234 80b37c IsWindowEnabled 77232->77234 77233->77223 77234->77225 77234->77233 77236 811b13 ~_Task_impl 53 API calls 77235->77236 77237 8072d8 77236->77237 77237->77223 77238 805759 77237->77238 77239 805794 77238->77239 77240 805760 77238->77240 77239->77227 77240->77239 77244 805779 77240->77244 77250 8055b5 113 API calls 77240->77250 77242 805790 77242->77227 77244->77242 77251 8055b5 113 API calls 77244->77251 77246 8072aa 77245->77246 77248 8072c5 77246->77248 77252 80a3cc 77246->77252 77248->77223 77249->77231 77250->77244 77251->77244 77253 80a3db 77252->77253 77254 80a3ee IsDialogMessageA 77252->77254 77255 811b13 ~_Task_impl 53 API calls 77253->77255 77256 80a3e0 77254->77256 77255->77256 77256->77248 77257 7c80a0 77340 8140db 115 API calls 6 library calls 77257->77340 77259 7c80f0 77312 814a5e 77259->77312 77262 7c8365 77264 807e41 143 API calls 77262->77264 77266 7c8399 77264->77266 77265 7c8124 77342 7c5c10 77265->77342 77268 7c8222 77266->77268 77367 7c7d50 204 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 77266->77367 77370 814398 113 API calls 3 library calls 77268->77370 77269 7c8134 77350 814d07 126 API calls 2 library calls 77269->77350 77272 7c83d5 77274 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77272->77274 77273 7c83a9 77368 809e07 EnableWindow 77273->77368 77277 7c83ec 77274->77277 77278 7c816a 77280 7c5c10 59 API calls 77278->77280 77279 7c83b6 77369 809e07 EnableWindow 77279->77369 77282 7c817a GetFileAttributesExA 77280->77282 77284 7c81d9 _memset 77282->77284 77285 7c8227 77282->77285 77351 92af72 65 API calls 2 library calls 77284->77351 77286 7c52a0 118 API calls 77285->77286 77287 7c8238 77286->77287 77353 92b93e 77287->77353 77290 7c820a 77352 805c0c 54 API calls ~_Task_impl 77290->77352 77294 7c8269 77295 7cb9c0 59 API calls 77294->77295 77296 7c829e 77295->77296 77297 7c82b0 77296->77297 77357 7c6fb0 58 API calls _memcpy_s 77296->77357 77358 80a7ea 77297->77358 77300 7c82bd 77301 7c82cf 77300->77301 77365 7c6fb0 58 API calls _memcpy_s 77300->77365 77303 80a7ea 3 API calls 77301->77303 77304 7c82dc 77303->77304 77305 7c52a0 118 API calls 77304->77305 77306 7c8311 77305->77306 77307 7cb9c0 59 API calls 77306->77307 77308 7c8346 77307->77308 77309 7c8358 77308->77309 77366 7c6fb0 58 API calls _memcpy_s 77308->77366 77310 80a7ea 3 API calls 77309->77310 77310->77262 77313 814a76 _memset _strlen 77312->77313 77314 814a90 GetFocus 77313->77314 77315 80b2c7 138 API calls 77314->77315 77316 814aad 77315->77316 77317 8040b3 137 API calls 77316->77317 77318 814ab5 77317->77318 77319 814ae5 77318->77319 77320 814ac4 IsWindowEnabled 77318->77320 77322 811b67 30 API calls 77319->77322 77320->77319 77321 814ad1 EnableWindow 77320->77321 77321->77319 77323 814aea 77322->77323 77324 814b03 77323->77324 77325 803d7c 132 API calls 77323->77325 77326 814b16 77324->77326 77327 814b3c 77324->77327 77325->77324 77371 8144d5 77326->77371 77328 814b52 77327->77328 77329 814b4b 77327->77329 77389 8159ad 17 API calls _fputc 77328->77389 77388 815908 17 API calls _fputc 77329->77388 77333 814b1d 77334 814b63 EnableWindow 77333->77334 77335 814b74 IsWindow 77333->77335 77334->77335 77336 814b82 SetFocus 77335->77336 77337 814b89 77335->77337 77336->77337 77390 80b27e 139 API calls ~_Task_impl 77337->77390 77339 7c8109 77339->77262 77341 814ba0 124 API calls 2 library calls 77339->77341 77340->77259 77341->77265 77343 7c5c28 77342->77343 77347 7c5c74 77342->77347 77344 7c5c69 77343->77344 77346 7c5c38 77343->77346 77345 7cb9c0 59 API calls 77344->77345 77345->77347 77419 7c61a0 58 API calls _memcpy_s 77346->77419 77347->77269 77349 7c5c3e 77349->77269 77350->77278 77351->77290 77352->77268 77420 92b953 77353->77420 77355 7c8249 77356 7cb510 58 API calls 77355->77356 77356->77294 77357->77297 77359 80a7f4 IsWindow 77358->77359 77364 80a81e 77358->77364 77361 80a801 77359->77361 77360 81092f ~_Task_impl RaiseException 77362 80a82d 77360->77362 77363 80a80d SetWindowTextA 77361->77363 77361->77364 77363->77300 77364->77360 77365->77301 77366->77309 77367->77273 77368->77279 77369->77268 77370->77272 77373 8144e1 __EH_prolog3 77371->77373 77372 814a58 ~_Task_impl 77372->77333 77373->77372 77386 81450d _strlen 77373->77386 77391 80bfb6 77373->77391 77375 80bfb6 118 API calls 77375->77386 77376 81092f ~_Task_impl RaiseException 77376->77386 77377 802d2d 58 API calls ~_Task_impl 77377->77386 77380 8147f2 PathRemoveFileSpecW 77380->77386 77383 814873 77383->77386 77401 819eb9 GetModuleHandleW GetProcAddress EncodePointer DecodePointer 77383->77401 77385 80c38f 61 API calls 77385->77386 77386->77372 77386->77375 77386->77376 77386->77377 77386->77380 77386->77383 77386->77385 77387 92a7ad 58 API calls _memcpy_s 77386->77387 77397 810949 RaiseException __CxxThrowException@8 77386->77397 77398 811712 59 API calls 77386->77398 77399 7c7030 58 API calls _memcpy_s 77386->77399 77400 814430 113 API calls 77386->77400 77387->77386 77388->77333 77389->77333 77390->77339 77392 80bfc2 __EH_prolog3 77391->77392 77402 7c6110 77392->77402 77394 80bfe2 77396 80bff0 ~_Task_impl 77394->77396 77409 80c38f 77394->77409 77396->77386 77398->77386 77399->77386 77400->77386 77401->77383 77403 7c611f 77402->77403 77404 7c6145 77402->77404 77403->77404 77405 8113de 53 API calls 77403->77405 77404->77394 77406 7c6130 77405->77406 77407 7c613d 77406->77407 77416 7c75c0 63 API calls _wmemcpy_s 77406->77416 77407->77394 77410 80c3a4 77409->77410 77411 80c39c 77409->77411 77415 80c3d0 77410->77415 77418 7ca2b0 59 API calls 77410->77418 77417 80c709 MultiByteToWideChar 77411->77417 77414 80c3b7 MultiByteToWideChar 77414->77415 77415->77396 77416->77407 77417->77410 77418->77414 77419->77349 77427 92ad5d 77420->77427 77424 92b974 77436 93542e 9 API calls __mbsrchr_l 77424->77436 77426 92b97f _strrchr 77426->77355 77428 92ad6e 77427->77428 77434 92adbb 77427->77434 77429 933d44 _strtok 58 API calls 77428->77429 77430 92ad74 77429->77430 77431 92ad9b 77430->77431 77437 9356f8 58 API calls 6 library calls 77430->77437 77431->77434 77438 935a7a 58 API calls 6 library calls 77431->77438 77434->77426 77435 92f66f 58 API calls __getptd_noexit 77434->77435 77435->77424 77436->77426 77437->77431 77438->77434 77439 7c8c80 77440 7c8cbe 77439->77440 77441 807e41 143 API calls 77440->77441 77442 7c8cf5 GetClientRect GetCursorPos 77441->77442 77443 7c8d4d PtInRect 77442->77443 77444 7c8d40 77442->77444 77445 7c8d7a DragQueryFileA 77443->77445 77446 7c906b DragQueryFileA 77443->77446 77444->77443 77483 7c9016 77444->77483 77447 7c8db9 77445->77447 77448 7c8d9b 77445->77448 77449 7cb9c0 59 API calls 77446->77449 77452 7c52a0 118 API calls 77447->77452 77451 7c8da0 DragQueryFileA 77448->77451 77449->77483 77450 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77453 7c90ce 77450->77453 77451->77447 77451->77451 77454 7c8dc9 77452->77454 77455 7c52a0 118 API calls 77454->77455 77456 7c8ddd 77455->77456 77457 7cb9c0 59 API calls 77456->77457 77458 7c8e0c 77457->77458 77459 92b93e 58 API calls 77458->77459 77461 7c8e19 77459->77461 77460 7c9061 77460->77446 77461->77460 77462 7c8e51 77461->77462 77548 7c6fb0 58 API calls _memcpy_s 77461->77548 77462->77460 77464 7c8e72 77462->77464 77465 92b93e 58 API calls 77464->77465 77466 7c8e8c 77465->77466 77484 7ca670 58 API calls 77466->77484 77468 7c8eb6 77469 7c8f11 77468->77469 77471 7c8ed8 77468->77471 77474 7c8ede 77468->77474 77470 7cb9c0 59 API calls 77469->77470 77470->77474 77549 7c61a0 58 API calls _memcpy_s 77471->77549 77485 7c70b0 59 API calls 77474->77485 77475 7c8f62 77476 7c52a0 118 API calls 77475->77476 77477 7c8f79 77476->77477 77482 7c8fa3 77477->77482 77550 92a7ad 58 API calls 3 library calls 77477->77550 77480 7c9004 77551 7c70b0 59 API calls 77480->77551 77486 7c99c0 77482->77486 77483->77450 77484->77468 77485->77475 77487 7c5c10 59 API calls 77486->77487 77488 7c9a0b 77487->77488 77489 7c5c10 59 API calls 77488->77489 77490 7c9a1a GetFileAttributesExA 77489->77490 77491 7c9a55 _memset 77490->77491 77492 7c9aa6 77490->77492 77572 92af72 65 API calls 2 library calls 77491->77572 77493 7c52a0 118 API calls 77492->77493 77494 7c9ab7 77493->77494 77496 92b93e 58 API calls 77494->77496 77501 7c9ac8 77496->77501 77497 7c9a86 77573 805c0c 54 API calls ~_Task_impl 77497->77573 77498 7c9ce3 77500 7c9ced IsIconic 77498->77500 77502 7c9d9c 77500->77502 77503 7c9d14 77500->77503 77501->77498 77509 7c9b00 77501->77509 77574 7c6fb0 58 API calls _memcpy_s 77501->77574 77552 7ca390 GetClientRect GetDC 77502->77552 77581 811cd6 112 API calls 2 library calls 77503->77581 77507 7c9a9e 77511 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77507->77511 77508 7c9d1f SendMessageA GetSystemMetrics GetSystemMetrics GetClientRect DrawIcon 77582 811e26 113 API calls 2 library calls 77508->77582 77509->77498 77518 7c9b21 77509->77518 77514 7c9cdd 77511->77514 77514->77480 77515 7c9d8b 77517 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77515->77517 77521 7c9d98 77517->77521 77520 7cb9c0 59 API calls 77518->77520 77519 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77522 7c9db5 77519->77522 77523 7c9b69 77520->77523 77521->77480 77522->77480 77524 7c9b7b 77523->77524 77575 7c6fb0 58 API calls _memcpy_s 77523->77575 77526 80a7ea 3 API calls 77524->77526 77527 7c9b88 77526->77527 77528 7c9b9a 77527->77528 77576 7c6fb0 58 API calls _memcpy_s 77527->77576 77530 80a7ea 3 API calls 77528->77530 77531 7c9ba7 77530->77531 77532 7c52a0 118 API calls 77531->77532 77533 7c9bdc 77532->77533 77534 7cb9c0 59 API calls 77533->77534 77535 7c9c16 77534->77535 77536 7c9c28 77535->77536 77577 7c6fb0 58 API calls _memcpy_s 77535->77577 77538 80a7ea 3 API calls 77536->77538 77539 7c9c35 77538->77539 77541 807e41 143 API calls 77539->77541 77542 7c9c64 77541->77542 77578 7c7d50 204 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 77542->77578 77544 7c9c6b 77579 809e07 EnableWindow 77544->77579 77546 7c9c78 77580 809e07 EnableWindow 77546->77580 77548->77462 77549->77474 77550->77482 77551->77483 77583 81286d 77552->77583 77554 7ca3ca SelectObject FillRect 77555 7ca40b 77554->77555 77556 7ca401 SelectObject 77554->77556 77557 7ca40d Rectangle 77555->77557 77556->77557 77558 7ca42c SelectObject ReleaseDC 77557->77558 77559 7ca426 SelectObject 77557->77559 77560 9299b4 __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 6 API calls 77558->77560 77559->77558 77561 7c9da3 77560->77561 77562 80b1ec 77561->77562 77563 80b1f8 __EH_prolog3_GS 77562->77563 77587 811cd6 112 API calls 2 library calls 77563->77587 77565 80b203 77566 80b21d 77565->77566 77588 8050a9 77565->77588 77597 811e26 113 API calls 2 library calls 77566->77597 77569 80b229 77570 92f6e3 6 API calls 77569->77570 77571 7c9daa 77570->77571 77571->77519 77572->77497 77573->77507 77574->77509 77575->77524 77576->77528 77577->77536 77578->77544 77579->77546 77580->77507 77581->77508 77582->77515 77586 813126 111 API calls 2 library calls 77583->77586 77585 812877 77586->77585 77587->77565 77589 818cf3 ~_Task_impl 30 API calls 77588->77589 77590 8050bb 77589->77590 77591 8050c1 77590->77591 77592 8050d6 77590->77592 77598 80505e 77591->77598 77593 81092f ~_Task_impl RaiseException 77592->77593 77595 8050db 77593->77595 77597->77569 77600 80507b 77598->77600 77603 80506a CallWindowProcA 77598->77603 77602 805095 DefWindowProcA 77600->77602 77600->77603 77601 8050a4 77601->77566 77602->77601 77603->77601

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 375 80ade2-80ae12 call 92f76a call 811b13 380 80ae14-80ae35 call 811b13 FindResourceA LoadResource 375->380 381 80ae38-80ae3a 375->381 380->381 383 80ae48 381->383 384 80ae3c-80ae46 LockResource 381->384 386 80ae4b-80ae4d 383->386 384->386 387 80ae57-80ae73 call 80b2c7 call 8040b3 386->387 388 80ae4f-80ae52 386->388 396 80ae75-80ae7d GetDesktopWindow 387->396 397 80aecf-80aee7 call 803d7c call 805328 call 80ad83 387->397 389 80af9c-80afa1 call 92f6cf 388->389 396->397 399 80ae7f-80ae88 IsWindowEnabled 396->399 408 80aeec-80aeee 397->408 399->397 401 80ae8a-80aea3 EnableWindow call 803d22 399->401 401->397 407 80aea5-80aeb1 401->407 407->397 414 80aeb3-80aebd call 80a445 407->414 409 80aef0-80aef6 408->409 410 80af17-80af4c 408->410 409->410 413 80aef8-80af12 call 811b13 call 805328 call 80ad83 409->413 415 80af58-80af5c 410->415 416 80af4e-80af53 call 809e07 410->416 413->410 414->397 424 80aebf-80aec8 call 809e07 414->424 421 80af67-80af69 415->421 422 80af5e-80af61 EnableWindow 415->422 416->415 425 80af6b-80af74 GetActiveWindow 421->425 426 80af7d-80af8e call 80b27e 421->426 422->421 424->397 425->426 430 80af76-80af77 SetActiveWindow 425->430 436 80af90-80af93 FreeResource 426->436 437 80af99 426->437 430->426 436->437 437->389
      APIs
      • __EH_prolog3_catch.LIBCMT ref: 0080ADE9
      • FindResourceA.KERNEL32(?,?,00000005), ref: 0080AE25
      • LoadResource.KERNEL32(?,00000000), ref: 0080AE2D
        • Part of subcall function 008040B3: UnhookWindowsHookEx.USER32(?), ref: 008040DD
      • LockResource.KERNEL32(?,00000028,007C4F63,?,00000000,0098E220), ref: 0080AE3D
      • GetDesktopWindow.USER32 ref: 0080AE75
      • IsWindowEnabled.USER32(00000000), ref: 0080AE80
      • EnableWindow.USER32(00000000,00000000), ref: 0080AE8C
        • Part of subcall function 0080A445: IsWindowEnabled.USER32(?), ref: 0080A451
        • Part of subcall function 00809E07: EnableWindow.USER32(?,007BC6AB), ref: 00809E19
      • EnableWindow.USER32(00000000,00000001), ref: 0080AF61
      • GetActiveWindow.USER32 ref: 0080AF6B
      • SetActiveWindow.USER32(00000000), ref: 0080AF77
      • FreeResource.KERNEL32(?), ref: 0080AF93
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Window$Resource$Enable$ActiveEnabled$DesktopFindFreeH_prolog3_catchHookLoadLockUnhookWindows
      • String ID: cO|
      • API String ID: 964565984-2609038006
      • Opcode ID: c29e818bfa3ccb350fbe798e98529258cf9cb20626e9d880ba48ee3d99316134
      • Instruction ID: a0382be8e6ac695aee220e429921f67e7af62805bbfb0bda4ea3dbea98642981
      • Opcode Fuzzy Hash: c29e818bfa3ccb350fbe798e98529258cf9cb20626e9d880ba48ee3d99316134
      • Instruction Fuzzy Hash: F0513C70A007059FCB55AFB8DC89AAEBBB5FF48710F140529E516E32E1DB349841DF62
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 500 7c99c0-7c9a53 call 7c5c10 * 2 GetFileAttributesExA 505 7c9a55-7c9aa1 call 92c240 call 92af72 call 805c0c 500->505 506 7c9aa6-7c9acf call 7c52a0 call 92b93e 500->506 523 7c9c85-7c9c9b 505->523 515 7c9ad5-7c9add 506->515 516 7c9ce3-7c9d0e call 781f60 IsIconic 506->516 515->516 518 7c9ae3-7c9ae8 515->518 524 7c9d9c-7c9da5 call 7ca390 call 80b1ec 516->524 525 7c9d14-7c9d9b call 811cd6 SendMessageA GetSystemMetrics * 2 GetClientRect DrawIcon call 811e26 call 9299b4 516->525 518->516 522 7c9aee-7c9af2 518->522 526 7c9af4-7c9b00 call 7c6fb0 522->526 527 7c9b06-7c9b0c 522->527 528 7c9c9d-7c9ca0 523->528 529 7c9ca5-7c9cbc 523->529 549 7c9daa-7c9db8 call 9299b4 524->549 526->527 527->516 532 7c9b12-7c9b1b 527->532 528->529 534 7c9cbe-7c9cc1 529->534 535 7c9cc6-7c9ce0 call 9299b4 529->535 532->516 538 7c9b21-7c9b42 532->538 534->535 542 7c9b48-7c9b4d 538->542 543 7c9b44-7c9b46 538->543 548 7c9b53-7c9b58 542->548 547 7c9b60-7c9b6f call 7cb9c0 543->547 557 7c9b7b-7c9b8e call 80a7ea 547->557 558 7c9b71-7c9b76 call 7c6fb0 547->558 548->548 551 7c9b5a 548->551 551->547 562 7c9b9a-7c9bc1 call 80a7ea 557->562 563 7c9b90-7c9b95 call 7c6fb0 557->563 558->557 567 7c9bcb-7c9be8 call 7c52a0 562->567 568 7c9bc3-7c9bc6 562->568 563->562 571 7c9bee-7c9bf9 567->571 572 7c9bea-7c9bec 567->572 568->567 574 7c9c00-7c9c05 571->574 573 7c9c0d-7c9c1c call 7cb9c0 572->573 578 7c9c1e-7c9c23 call 7c6fb0 573->578 579 7c9c28-7c9c51 call 80a7ea 573->579 574->574 575 7c9c07 574->575 575->573 578->579 583 7c9c5b-7c9c80 call 807e41 call 7c7d50 call 809e07 * 2 579->583 584 7c9c53-7c9c56 579->584 583->523 584->583
      APIs
      • GetFileAttributesExA.KERNEL32(?,00000000,00000000,000000FF,?,6838016B,?), ref: 007C9A46
      • _memset.LIBCMT ref: 007C9A6A
      • _sprintf.LIBCMT ref: 007C9A81
        • Part of subcall function 00805C0C: MessageBoxA.USER32(?,?,00000000,007C8222), ref: 00805C34
        • Part of subcall function 00781F60: InitializeCriticalSectionAndSpinCount.KERNEL32(00000001,00000000,00000000,6838016B,0000676C,?,00000000,009593D8,000000FF,?,00000000,?,0078034D,00000000), ref: 00781FC3
        • Part of subcall function 00781F60: GetLastError.KERNEL32(?,00000000,009593D8,000000FF,?,00000000,?,0078034D,00000000,?,?,00000000), ref: 00781FCD
      • IsIconic.USER32(?), ref: 007C9D06
        • Part of subcall function 00811CD6: __EH_prolog3.LIBCMT ref: 00811CDD
        • Part of subcall function 00811CD6: BeginPaint.USER32(?,?,00000004,0080B203,?,00000058,007C9DAA), ref: 00811D09
      • SendMessageA.USER32(?,00000027,?,00000000), ref: 007C9D29
      • GetSystemMetrics.USER32(0000000B), ref: 007C9D37
      • GetSystemMetrics.USER32(0000000C), ref: 007C9D3D
      • GetClientRect.USER32(?,?), ref: 007C9D50
      • DrawIcon.USER32(?,?,?,?), ref: 007C9D7D
        • Part of subcall function 00811E26: __EH_prolog3.LIBCMT ref: 00811E2D
        • Part of subcall function 00811E26: EndPaint.USER32(?,?,00000004,0080B229,?,?,00000058,007C9DAA), ref: 00811E48
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3MessageMetricsPaintSystem$AttributesBeginClientCountCriticalDrawErrorFileIconIconicInitializeLastRectSectionSendSpin_memset_sprintf
      • String ID: Failed to open %s $Failed to open file
      • API String ID: 1738568364-3141027142
      • Opcode ID: 7302ada5075807da8204d6291f98b6910b72ac56316877022c600b7ab7dd065f
      • Instruction ID: 059ed20aba662959fc2a86d6d72d9b465ff0333af855de2dffcacc29be140259
      • Opcode Fuzzy Hash: 7302ada5075807da8204d6291f98b6910b72ac56316877022c600b7ab7dd065f
      • Instruction Fuzzy Hash: 11C19B71A006199BDB24DF28CC59BEEF7B5FF45310F10829CE959AB291DB346E44CB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup,-00000034,?,0081716F,00000000,00AF81D8,00000010,008281AC,?,?,?,00AE688C,?,00000001,0000000C,00828205), ref: 008099B3
      • GetLastError.KERNEL32(?,-00000034,?,0081716F,00000000,00AF81D8,00000010,008281AC,?,?,?,00AE688C,?,00000001,0000000C,00828205), ref: 008099EA
      Strings
      • IsolationAware function called after IsolationAwareCleanup, xrefs: 008099AE
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: DebugErrorLastOutputString
      • String ID: IsolationAware function called after IsolationAwareCleanup
      • API String ID: 4132100945-2690750368
      • Opcode ID: bb87df127207f39b29304619964548f945007e403f735f6a1abafa375b7ddecf
      • Instruction ID: 335bc548f9f877d82c3af7b468fb0780f465272064306a3e23ebe84bf88f7471
      • Opcode Fuzzy Hash: bb87df127207f39b29304619964548f945007e403f735f6a1abafa375b7ddecf
      • Instruction Fuzzy Hash: A6F0B4312011348BCBB05BAC9C41D6F7E98FB16B413200215FE80C21F2DB60CC2097D1
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 846494-8464f1 call 92f734 call 811d73 GetDeviceCaps 5 8464f3-846502 0->5 6 84650c 0->6 7 846504-84650a 5->7 8 84650e 5->8 6->8 9 846510-84651e 7->9 8->9 10 846530-846538 9->10 11 846520-846524 9->11 13 84654a-846552 10->13 14 84653a-84653e 10->14 11->10 12 846526-84652e call 812763 DeleteObject 11->12 12->10 15 846564-84656c 13->15 16 846554-846558 13->16 14->13 18 846540-846548 call 812763 DeleteObject 14->18 20 84657e-846586 15->20 21 84656e-846572 15->21 16->15 19 84655a-846562 call 812763 DeleteObject 16->19 18->13 19->15 26 846598-8465a0 20->26 27 846588-84658c 20->27 21->20 25 846574-84657c call 812763 DeleteObject 21->25 25->20 29 8465b2-8465ba 26->29 30 8465a2-8465a6 26->30 27->26 33 84658e-846596 call 812763 DeleteObject 27->33 35 8465cc-8465d4 29->35 36 8465bc-8465c0 29->36 30->29 34 8465a8-8465b0 call 812763 DeleteObject 30->34 33->26 34->29 41 8465e6-8465ee 35->41 42 8465d6-8465da 35->42 36->35 40 8465c2-8465ca call 812763 DeleteObject 36->40 40->35 47 846600-846608 41->47 48 8465f0-8465f4 41->48 42->41 46 8465dc-8465e4 call 812763 DeleteObject 42->46 46->41 50 84661a-846672 call 84612a call 92c240 GetTextCharsetInfo 47->50 51 84660a-84660e 47->51 48->47 49 8465f6-8465fe call 812763 DeleteObject 48->49 49->47 64 846674-846677 50->64 65 846679-84667c 50->65 51->50 55 846610-846618 call 812763 DeleteObject 51->55 55->50 66 84667f-846686 64->66 65->66 67 84667e 65->67 68 846688 66->68 69 84668a-8466a3 lstrcpyA 66->69 67->66 68->69 70 8466a5-8466ac 69->70 71 846706-846761 CreateFontIndirectA call 812594 call 92ff5a call 930830 69->71 70->71 72 8466ae-8466c9 EnumFontFamiliesA 70->72 84 846763-846765 71->84 85 846768-84686a CreateFontIndirectA call 812594 call 84612a CreateFontIndirectA call 812594 CreateFontIndirectA call 812594 CreateFontIndirectA call 812594 GetSystemMetrics lstrcpyA CreateFontIndirectA call 812594 GetStockObject 71->85 74 8466dc-8466f5 EnumFontFamiliesA 72->74 75 8466cb-8466da lstrcpyA 72->75 77 8466f7-8466fc 74->77 78 8466fe 74->78 75->71 80 846703-846704 lstrcpyA 77->80 78->80 80->71 84->85 98 8468e0-846941 GetStockObject call 81287f GetObjectA CreateFontIndirectA call 812594 CreateFontIndirectA call 812594 call 846d6b 85->98 99 84686c-846877 GetObjectA 85->99 112 84696f-846971 98->112 99->98 100 846879-8468db lstrcpyA CreateFontIndirectA call 812594 CreateFontIndirectA call 812594 99->100 100->98 113 846943-846947 112->113 114 846973-846987 call 80eef3 112->114 116 8469a1-8469a6 call 81092f 113->116 117 846949-846957 113->117 118 84698c-8469a0 call 811e71 call 92f6e3 114->118 117->116 120 846959-846963 call 805352 117->120 120->112 126 846965-846967 120->126 126->112
      APIs
      • __EH_prolog3_GS.LIBCMT ref: 0084649E
        • Part of subcall function 00811D73: __EH_prolog3.LIBCMT ref: 00811D7A
        • Part of subcall function 00811D73: GetWindowDC.USER32(00000000,00000004,00846A05,00000000,?,?,?,00000000,00B3D508), ref: 00811DA6
      • GetDeviceCaps.GDI32(?,00000058), ref: 008464BE
      • DeleteObject.GDI32(00000000), ref: 0084652E
      • DeleteObject.GDI32(00000000), ref: 00846548
      • DeleteObject.GDI32(00000000), ref: 00846562
      • DeleteObject.GDI32(00000000), ref: 0084657C
      • DeleteObject.GDI32(00000000), ref: 00846596
      • DeleteObject.GDI32(00000000), ref: 008465B0
      • DeleteObject.GDI32(00000000), ref: 008465CA
      • DeleteObject.GDI32(00000000), ref: 008465E4
      • DeleteObject.GDI32(00000000), ref: 008465FE
      • DeleteObject.GDI32(00000000), ref: 00846618
      • _memset.LIBCMT ref: 00846639
      • GetTextCharsetInfo.GDI32(?,00000000,00000000,?,?,?,?,00000000,00B3D508), ref: 00846649
      • lstrcpyA.KERNEL32(?,?), ref: 0084669E
      • EnumFontFamiliesA.GDI32(?,00000000,00845FC8,Segoe UI), ref: 008466C5
      • lstrcpyA.KERNEL32(?,Segoe UI), ref: 008466D4
      • EnumFontFamiliesA.GDI32(?,00000000,00845FC8,Tahoma), ref: 008466EE
      • lstrcpyA.KERNEL32(?,MS Sans Serif), ref: 00846704
      • CreateFontIndirectA.GDI32(?), ref: 00846710
      • CreateFontIndirectA.GDI32(?), ref: 0084676C
      • CreateFontIndirectA.GDI32(?), ref: 008467B1
      • CreateFontIndirectA.GDI32(?), ref: 008467D9
      • CreateFontIndirectA.GDI32(?), ref: 008467F6
      • GetSystemMetrics.USER32(00000048), ref: 00846811
      • lstrcpyA.KERNEL32(?,Marlett), ref: 00846824
      • CreateFontIndirectA.GDI32(?), ref: 0084682A
      • GetStockObject.GDI32(00000011), ref: 00846856
      • GetObjectA.GDI32(00000000,0000003C,?), ref: 00846873
      • lstrcpyA.KERNEL32(?,Arial), ref: 008468AB
      • CreateFontIndirectA.GDI32(?), ref: 008468B1
      • CreateFontIndirectA.GDI32(?), ref: 008468CE
      • GetStockObject.GDI32(00000011), ref: 008468E2
      • GetObjectA.GDI32(?,0000003C,?), ref: 008468F7
      • CreateFontIndirectA.GDI32(?), ref: 00846901
      • CreateFontIndirectA.GDI32(?), ref: 00846922
        • Part of subcall function 00846D6B: __EH_prolog3_GS.LIBCMT ref: 00846D72
        • Part of subcall function 00846D6B: GetTextMetricsA.GDI32(?,?), ref: 00846DAF
        • Part of subcall function 00846D6B: GetTextMetricsA.GDI32(?,?), ref: 00846DF0
        • Part of subcall function 0081092F: __CxxThrowException@8.LIBCMT ref: 00810943
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Object$Font$CreateDeleteIndirect$lstrcpy$MetricsText$EnumFamiliesH_prolog3_Stock$CapsCharsetDeviceException@8H_prolog3InfoSystemThrowWindow_memset
      • String ID: Arial$MS Sans Serif$Marlett$Segoe UI$Tahoma
      • API String ID: 93597958-1395034203
      • Opcode ID: 27c626a1bcde063f9a59c37a26e00fbba5315982ed812beabdac1b6bb6869050
      • Instruction ID: 2e2698eb3344dfe3c0e62719967c970efdf6de0999b98d9c74ebae68a7883b66
      • Opcode Fuzzy Hash: 27c626a1bcde063f9a59c37a26e00fbba5315982ed812beabdac1b6bb6869050
      • Instruction Fuzzy Hash: FEE17DB190120C9BDF25ABA4DD98BDEBBB8FF05304F0544A9E446E3291EB749A54CF12
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • __EH_prolog3.LIBCMT ref: 008469AE
      • GetSysColor.USER32(00000016), ref: 008469C0
      • GetSysColor.USER32(0000000F), ref: 008469CD
      • GetSysColor.USER32(00000015), ref: 008469E0
      • GetSysColor.USER32(0000000F), ref: 008469E8
      • GetDeviceCaps.GDI32(00831CA7,0000000C), ref: 00846A0E
      • GetSysColor.USER32(0000000F), ref: 00846A1C
      • GetSysColor.USER32(00000010), ref: 00846A26
      • GetSysColor.USER32(00000015), ref: 00846A30
      • GetSysColor.USER32(00000016), ref: 00846A3A
      • GetSysColor.USER32(00000014), ref: 00846A44
      • GetSysColor.USER32(00000012), ref: 00846A4E
      • GetSysColor.USER32(00000011), ref: 00846A58
      • GetSysColor.USER32(00000006), ref: 00846A5F
      • GetSysColor.USER32(0000000D), ref: 00846A66
      • GetSysColor.USER32(0000000E), ref: 00846A6D
      • GetSysColor.USER32(00000005), ref: 00846A74
      • GetSysColor.USER32(00000008), ref: 00846A7E
      • GetSysColor.USER32(00000009), ref: 00846A85
      • GetSysColor.USER32(00000007), ref: 00846A8C
      • GetSysColor.USER32(00000002), ref: 00846A93
      • GetSysColor.USER32(00000003), ref: 00846A9A
      • GetSysColor.USER32(0000001B), ref: 00846AA4
      • GetSysColor.USER32(0000001C), ref: 00846AAE
      • GetSysColor.USER32(0000000A), ref: 00846AB8
      • GetSysColor.USER32(0000000B), ref: 00846AC2
      • GetSysColor.USER32(00000013), ref: 00846ACC
      • GetSysColor.USER32(0000001A), ref: 00846AEA
      • GetSysColorBrush.USER32(00000010), ref: 00846B05
      • GetSysColorBrush.USER32(00000014), ref: 00846B1C
      • GetSysColorBrush.USER32(00000005), ref: 00846B2E
      • CreateSolidBrush.GDI32(00000143), ref: 00846B54
      • CreateSolidBrush.GDI32(00000010), ref: 00846B6E
      • CreateSolidBrush.GDI32(?), ref: 00846B88
      • CreateSolidBrush.GDI32(?), ref: 00846BA5
      • CreateSolidBrush.GDI32(?), ref: 00846BBF
      • CreateSolidBrush.GDI32(?), ref: 00846BD9
      • CreateSolidBrush.GDI32(?), ref: 00846BF3
      • CreatePen.GDI32(00000000,00000001,00000000), ref: 00846C1A
      • CreatePen.GDI32(00000000,00000001,00000000), ref: 00846C3B
        • Part of subcall function 0081270B: DeleteObject.GDI32(00000000), ref: 0081271A
      • CreatePen.GDI32(00000000,00000001,00000000), ref: 00846C5C
      • CreateSolidBrush.GDI32(000000FF), ref: 00846CE4
      • CreatePatternBrush.GDI32(00000000), ref: 00846D2D
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Color$BrushCreate$Solid$CapsDeleteDeviceH_prolog3ObjectPattern
      • String ID:
      • API String ID: 3754413814-0
      • Opcode ID: 0fde9f2c76b77b6a437e3be0d845c56250efd302b8bcde2903529f759623ee61
      • Instruction ID: b6d67301f37722d7d880c47c6892fe400e35f3ef810b8ff878f49ead87728dbb
      • Opcode Fuzzy Hash: 0fde9f2c76b77b6a437e3be0d845c56250efd302b8bcde2903529f759623ee61
      • Instruction Fuzzy Hash: 29B19F70A002189ADF55AF748C95BAE3EA5FF04700F04446AED09DF2C6EB748955DF92
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 213 804b8f-804bb3 call 80a305 216 804bb5-804bb8 213->216 217 804bba-804bc0 213->217 218 804bf4-804c31 GetWindowRect 216->218 219 804bc2-804bcb GetParent 217->219 220 804bcd-804bd2 GetWindow 217->220 221 804c37-804c39 218->221 222 804cca-804cf1 GetParent GetClientRect * 2 MapWindowPoints 218->222 223 804bd8-804bdc 219->223 220->223 224 804c54-804c5d 221->224 225 804c3b-804c49 GetWindowLongA 221->225 226 804cf7-804d39 222->226 223->218 227 804bde-804bf0 SendMessageA 223->227 230 804c9b-804cc8 GetWindowRect MonitorFromWindow GetMonitorInfoA CopyRect 224->230 231 804c5f-804c66 call 803d22 224->231 228 804c52 225->228 229 804c4b-804c50 225->229 232 804d44-804d47 226->232 233 804d3b-804d41 226->233 227->218 234 804bf2 227->234 228->224 229->224 229->228 230->226 243 804c68 231->243 244 804c6b-804c99 MonitorFromWindow GetMonitorInfoA CopyRect * 2 231->244 236 804d49 232->236 237 804d4c-804d54 232->237 233->232 234->218 236->237 238 804d56-804d5c 237->238 239 804d5f-804d62 237->239 238->239 241 804d64 239->241 242 804d67-804d74 call 80a7ae 239->242 241->242 246 804d79-804d89 call 9299b4 242->246 243->244 244->226
      APIs
        • Part of subcall function 0080A305: GetWindowLongA.USER32(?,000000F0), ref: 0080A313
      • GetParent.USER32(?), ref: 00804BC5
      • SendMessageA.USER32(00000000,0000036B,00000000,00000000), ref: 00804BE8
      • GetWindowRect.USER32(?,00000000), ref: 00804C0B
      • GetWindowLongA.USER32(00000000,000000F0), ref: 00804C3E
      • MonitorFromWindow.USER32(00000000,00000001), ref: 00804C72
      • GetMonitorInfoA.USER32(00000000), ref: 00804C79
      • CopyRect.USER32(?,?), ref: 00804C8D
      • CopyRect.USER32(?,?), ref: 00804C97
      • GetWindowRect.USER32(00000000,?), ref: 00804CA0
      • MonitorFromWindow.USER32(00000000,00000002), ref: 00804CAD
      • GetMonitorInfoA.USER32(00000000), ref: 00804CB4
      • CopyRect.USER32(?,?), ref: 00804CC2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Window$Rect$Monitor$Copy$FromInfoLong$MessageParentSend
      • String ID: (
      • API String ID: 783970248-3887548279
      • Opcode ID: 57771958ab427e866f1ef9c8801e43be6945667d9485a69c61a7426eb7e258f0
      • Instruction ID: 284fc6c6b1f4a033fb3c702852c5922476087e9d612cae340c8384883c5cff21
      • Opcode Fuzzy Hash: 57771958ab427e866f1ef9c8801e43be6945667d9485a69c61a7426eb7e258f0
      • Instruction Fuzzy Hash: 376119B290120DAFDB50DFE8DD88BAEBBB9FF48314F145125E605E7290DB74A944CB60
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • GetSystemMenu.USER32(?,00000000,6838016B), ref: 007C949F
      • AppendMenuA.USER32(00000000,00000800,00000000,00000000), ref: 007C952B
      • AppendMenuA.USER32(00000000,00000000,00000010,00000010), ref: 007C953B
      • SendMessageA.USER32(?,00000080,00000001,?), ref: 007C957A
      • SendMessageA.USER32(?,00000080,00000000,?), ref: 007C958C
      • _memset.LIBCMT ref: 007C95AD
      • SendMessageA.USER32(?,00000405,00000001,00000002), ref: 007C961F
      • _memset.LIBCMT ref: 007C962F
      • CreateSolidBrush.GDI32 ref: 007C96D7
      • CreatePen.GDI32(00000000,00000000,00000000), ref: 007C96E9
      • _memset.LIBCMT ref: 007C9721
      • SendMessageA.USER32(?,000000F1,00000001,00000000), ref: 007C977E
      • SendMessageA.USER32(?,000000C5,00000014,00000000), ref: 007C9822
      • DragAcceptFiles.SHELL32(?,00000001), ref: 007C9847
        • Part of subcall function 00781F60: InitializeCriticalSectionAndSpinCount.KERNEL32(00000001,00000000,00000000,6838016B,0000676C,?,00000000,009593D8,000000FF,?,00000000,?,0078034D,00000000), ref: 00781FC3
        • Part of subcall function 00781F60: GetLastError.KERNEL32(?,00000000,009593D8,000000FF,?,00000000,?,0078034D,00000000,?,?,00000000), ref: 00781FCD
      Strings
      • ArchivePlayer v2.1.18.60, xrefs: 007C984D
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: MessageSend$Menu_memset$AppendCreate$AcceptBrushCountCriticalDragErrorFilesInitializeLastSectionSolidSpinSystem
      • String ID: ArchivePlayer v2.1.18.60
      • API String ID: 3300540420-3317027810
      • Opcode ID: 0bd2d53086690139dd500d42bbeb19fd5b7c8a075d890e7493b45eefd6508493
      • Instruction ID: 5640248fdb235fa62b8c847c75a8ef82df11a1775eca115fbcde50aeec0fe1b7
      • Opcode Fuzzy Hash: 0bd2d53086690139dd500d42bbeb19fd5b7c8a075d890e7493b45eefd6508493
      • Instruction Fuzzy Hash: 1CB1BA70A04B06AAEB689F24CC09BE9FBA4FF05314F10836CE1686B6D1DBB56555CFC0
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 309 818a31-818a4c EnterCriticalSection 310 818a5b-818a60 309->310 311 818a4e-818a55 309->311 313 818a62-818a65 310->313 314 818a7d-818a87 310->314 311->310 312 818b06-818b09 311->312 316 818b11-818b2d LeaveCriticalSection 312->316 317 818b0b-818b0e 312->317 315 818a68-818a6b 313->315 318 818a89-818a9c call 8115c4 GlobalAlloc 314->318 319 818a9e-818ac9 GlobalHandle GlobalUnlock call 8115c4 GlobalReAlloc 314->319 322 818a75-818a77 315->322 323 818a6d-818a73 315->323 317->316 326 818acc-818ace 318->326 319->326 322->312 322->314 323->315 323->322 327 818ad0-818ad3 326->327 328 818ad7-818b03 GlobalLock call 92c240 326->328 329 818ad5-818b38 GlobalHandle GlobalLock 327->329 330 818b3e-818b63 LeaveCriticalSection call 810949 327->330 328->312 329->330 336 818b65 330->336 337 818bac-818bdb EnterCriticalSection call 818dfd LeaveCriticalSection LocalFree TlsSetValue 330->337 338 818b68-818b6a 336->338 349 818be1-818be7 337->349 341 818b85-818b8d 338->341 342 818b6c-818b73 338->342 344 818b95-818b9b 341->344 345 818b8f-818b91 341->345 342->341 343 818b75-818b7c 342->343 347 818b9f 343->347 348 818b7e-818b83 343->348 344->347 345->344 350 818ba2-818ba6 347->350 348->350 350->338 351 818ba8-818baa 350->351 351->337 351->349
      APIs
      • EnterCriticalSection.KERNEL32(00B3D160,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818A3E
      • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818A96
      • GlobalHandle.KERNEL32(00FA2518), ref: 00818AA1
      • GlobalUnlock.KERNEL32(00000000,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818AAA
      • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 00818AC3
      • GlobalLock.KERNEL32(00000000,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818AD8
      • _memset.LIBCMT ref: 00818AF2
      • LeaveCriticalSection.KERNEL32(00B3D160), ref: 00818B1F
      • GlobalHandle.KERNEL32(00FA2518), ref: 00818B31
      • GlobalLock.KERNEL32(00000000,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818B38
      • LeaveCriticalSection.KERNEL32(00B3D160,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818B3F
      • EnterCriticalSection.KERNEL32(?,00B3D144,00B3D160,00000001,?,?,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61), ref: 00818BB0
      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B), ref: 00818BC0
      • LocalFree.KERNEL32(00000000,?,?,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001), ref: 00818BC9
      • TlsSetValue.KERNEL32(?,00000000,?,?,?,?,?,00B3D144,?,00818D44,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B), ref: 00818BDB
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Global$CriticalSection$Leave$AllocEnterHandleLock$FreeLocalUnlockValue_memset
      • String ID:
      • API String ID: 290045166-0
      • Opcode ID: 10cba77e480ae10accba6fbd2be285045653fa6d534619795b99eeaf5d14c009
      • Instruction ID: 53076b66483cb99d0c4ec906fa207b32f56c9e81704fbdc5a525d8fb497664de
      • Opcode Fuzzy Hash: 10cba77e480ae10accba6fbd2be285045653fa6d534619795b99eeaf5d14c009
      • Instruction Fuzzy Hash: 0951EDB1205615FFCB14DF64DC8AEA9B7B8FF04321B10422AF916C7691CB70E991CB91
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • ___security_init_cookie.LIBCMT ref: 0092C347
      • ___crtGetShowWindowMode.LIBCMT ref: 0092C35D
        • Part of subcall function 00934F53: GetStartupInfoW.KERNEL32(?), ref: 00934F5D
      • _fast_error_exit.LIBCMT ref: 0092C3C0
      • _fast_error_exit.LIBCMT ref: 0092C3D1
      • __RTC_Initialize.LIBCMT ref: 0092C3D7
      • __ioinit.LIBCMT ref: 0092C3E0
      • _fast_error_exit.LIBCMT ref: 0092C3EB
      • GetCommandLineA.KERNEL32(00B067A0,00000014), ref: 0092C3F1
      • ___crtGetEnvironmentStringsA.LIBCMT ref: 0092C3FC
      • __setargv.LIBCMT ref: 0092C406
      • __setenvp.LIBCMT ref: 0092C417
      • __cinit.LIBCMT ref: 0092C42A
      • __wincmdln.LIBCMT ref: 0092C43B
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _fast_error_exit$___crt$CommandEnvironmentInfoInitializeLineModeShowStartupStringsWindow___security_init_cookie__cinit__ioinit__setargv__setenvp__wincmdln
      • String ID:
      • API String ID: 1579532436-0
      • Opcode ID: 0938dccd81def68f5c4851ce7ff00a29242cbfc73b54686a49e7b08be9d3d7aa
      • Instruction ID: 95f0d1f1b809cc2e4989b5e0303627769d0fae2d75b1276f499c920eeccb6207
      • Opcode Fuzzy Hash: 0938dccd81def68f5c4851ce7ff00a29242cbfc73b54686a49e7b08be9d3d7aa
      • Instruction Fuzzy Hash: 5221FDB060033595EB20B7B1BCA7B7E22A45F90755F108879F504EA1EBEFB4C9408B55
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
        • Part of subcall function 00781F60: InitializeCriticalSectionAndSpinCount.KERNEL32(00000001,00000000,00000000,6838016B,0000676C,?,00000000,009593D8,000000FF,?,00000000,?,0078034D,00000000), ref: 00781FC3
        • Part of subcall function 00781F60: GetLastError.KERNEL32(?,00000000,009593D8,000000FF,?,00000000,?,0078034D,00000000,?,?,00000000), ref: 00781FCD
      • _memset.LIBCMT ref: 007C59E0
      • _memset.LIBCMT ref: 007C59FA
      • swprintf.LIBCMT ref: 007C5A11
      • _strtok.LIBCMT ref: 007C5A22
      • swprintf.LIBCMT ref: 007C5A3A
      • LoadIconW.USER32(?,00000080), ref: 007C5A55
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memsetswprintf$CountCriticalErrorIconInitializeLastLoadSectionSpin_strtok
      • String ID: *$<O|
      • API String ID: 4093036633-1629522680
      • Opcode ID: 0f531b77e59e094e5cd599bbeab3fadfd5719830e719672003baa9b8428253f5
      • Instruction ID: bc484895143b72b216883b7c5e9a9315ca683ad9dd27434ed4e53088148ee391
      • Opcode Fuzzy Hash: 0f531b77e59e094e5cd599bbeab3fadfd5719830e719672003baa9b8428253f5
      • Instruction Fuzzy Hash: 16E18174601786EAD708EBB8C919BDDFBA4BF15308F00415CE42997392DBB46718DBA2
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 713 809af7-809b14 call 92f840 716 809b1a-809b21 713->716 717 809cbc-809cbe 713->717 716->717 718 809b27-809b2e 716->718 719 809cbf-809cc6 call 92f888 717->719 721 809b30-809b46 call 809a0f 718->721 722 809b51-809b6d 718->722 721->719 728 809b4c 721->728 722->719 727 809b73-809b7b 722->727 729 809b81-809b97 call 809a0f 727->729 730 809c6c-809c80 call 80966f 727->730 728->722 729->719 735 809b9d-809bab 729->735 730->717 736 809c82-809ca7 call 8097ae 730->736 735->719 740 809bb1-809bcc GetModuleFileNameW 735->740 741 809cb0-809cb7 call 809cc9 736->741 742 809ca9-809caa LoadLibraryW 736->742 740->719 743 809bd2-809bd4 740->743 741->717 742->741 745 809be3-809c1f call 80969f 743->745 746 809bd6-809bde SetLastError 743->746 748 809c24-809c2d 745->748 746->719 749 809c62 748->749 750 809c2f-809c3a GetLastError 748->750 749->730 751 809c5a-809c5c 750->751 752 809c3c-809c41 750->752 751->749 752->751 753 809c43-809c48 752->753 753->751 754 809c4a-809c4f 753->754 754->751 755 809c51-809c54 754->755 755->751 756 809c56-809c58 755->756 756->719 756->751
      APIs
      • GetModuleFileNameW.KERNEL32(?,?,00000105,?,0081716F,00000000,00AF81D8,00000010,008281AC,?,?,?,00AE688C,?,00000001,0000000C), ref: 00809BC4
      • SetLastError.KERNEL32(0000006F,?,0081716F,00000000,00AF81D8,00000010,008281AC,?,?,?,00AE688C,?,00000001,0000000C,00828205,00000000), ref: 00809BD8
        • Part of subcall function 00809A0F: GetProcAddress.KERNEL32(75920AA0,?), ref: 00809A31
      • GetLastError.KERNEL32(00000020), ref: 00809C2F
      • LoadLibraryW.KERNEL32(Comctl32.dll,00000000,00000000,00000002,Comctl32.dll,00000040), ref: 00809CAA
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ErrorLast$AddressFileLibraryLoadModuleNameProc
      • String ID: Comctl32.dll$GetModuleHandleExW$QueryActCtxW
      • API String ID: 3640817601-2998613672
      • Opcode ID: 519133b682974a0b3a7c3b141f495d1a81d7174259ce6e796e555984573c6f90
      • Instruction ID: 23e63ee15a782378b771ee27984d6a512512515bd24d9b15ae2c9ccfd6417ab5
      • Opcode Fuzzy Hash: 519133b682974a0b3a7c3b141f495d1a81d7174259ce6e796e555984573c6f90
      • Instruction Fuzzy Hash: 16417370D40215AAEFB0AB699C49B9E76E8FF44B10F100299E488E62D1DB749F80CF51
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 757 803d7c-803d94 call 818cf3 760 803d96-803d9c 757->760 761 803dca call 81092f 757->761 763 803dc4-803dc7 760->763 764 803d9e-803da2 760->764 765 803dcf-803df3 call 810949 call 81779d call 818ca5 761->765 766 803dc1 764->766 767 803da4-803dbf GetCurrentThreadId SetWindowsHookExA 764->767 774 803df5-803df9 765->774 775 803e4e-803e6f call 81092f CompareStringA 765->775 766->763 767->765 767->766 777 803e33-803e43 call 817812 774->777 778 803dfb-803e0b call 8049e5 774->778 787 803e49-803e4b 777->787 784 803e11-803e22 GetProcAddress 778->784 785 803e0d-803e0f 778->785 784->777 786 803e24-803e31 FreeLibrary 784->786 785->787 786->785
      APIs
        • Part of subcall function 00818CF3: __EH_prolog3.LIBCMT ref: 00818CFA
      • GetCurrentThreadId.KERNEL32 ref: 00803DA4
      • SetWindowsHookExA.USER32(00000005,0080828D,00000000,00000000), ref: 00803DB4
      • GetProcAddress.KERNEL32(00000000,HtmlHelpA), ref: 00803E17
      • FreeLibrary.KERNEL32(?,?,Function_0040502F,?,00000000,?,00804FC7,00000000), ref: 00803E27
      • CompareStringA.KERNEL32(0000007F,00000001,00000000,000000FF,00804FC7,000000FF,?,0080501A,0000000C,00000000,?,Function_0040502F,?,00000000,?,00804FC7), ref: 00803E65
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: AddressCompareCurrentFreeH_prolog3HookLibraryProcStringThreadWindows
      • String ID: HtmlHelpA$hhctrl.ocx
      • API String ID: 2453009749-63838506
      • Opcode ID: 8b751956207a276ba8f914458a285fc4438a758fc22a2916a96b50bb79b6aa3f
      • Instruction ID: cb57749eb6b902dde7a6b1d78c9fbab7d5c5f45098df6846d8f1c0fa3ba35cb9
      • Opcode Fuzzy Hash: 8b751956207a276ba8f914458a285fc4438a758fc22a2916a96b50bb79b6aa3f
      • Instruction Fuzzy Hash: FC214731514B06BBDB612FA9DC06F5B7BACFF00B61F004629FA19D55D1CB70D5808BA2
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • KiUserCallbackDispatcher.NTDLL(0000000B), ref: 00817997
      • GetSystemMetrics.USER32(0000000C), ref: 0081799E
      • GetSystemMetrics.USER32(00000002), ref: 008179A5
      • GetSystemMetrics.USER32(00000003), ref: 008179AF
      • GetDC.USER32(00000000), ref: 008179B9
      • GetDeviceCaps.GDI32(00000000,00000058), ref: 008179CA
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008179D2
      • ReleaseDC.USER32(00000000,00000000), ref: 008179DA
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: MetricsSystem$CapsDevice$CallbackDispatcherReleaseUser
      • String ID:
      • API String ID: 1031845853-0
      • Opcode ID: 5907d1ca35c2246f78730de9e6f0c0159b00a42f1cf82cd6eeeef96b6c448b10
      • Instruction ID: 8d5f08c425a8475f25b03742b9a8b13434329521f03ac2b55edd5a6db4b6e48b
      • Opcode Fuzzy Hash: 5907d1ca35c2246f78730de9e6f0c0159b00a42f1cf82cd6eeeef96b6c448b10
      • Instruction Fuzzy Hash: FAF03071E45314AAEB146F71AC4DF2B3FA8EB41B61F10405BEA049F2D0DAB48801DFD0
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 789 8078cd-8078e4 790 8078f2 789->790 791 8078e6-8078f0 call 80a305 789->791 793 8078f4-807909 GetParent call 80b90b 790->793 791->790 791->793 797 80790c-807910 793->797 798 807912-807923 PeekMessageA 797->798 799 80798b call 80baef 797->799 798->799 801 807925-807927 798->801 802 807990-807992 799->802 803 807929-80793b call 80a82e UpdateWindow 801->803 804 80793d-807941 801->804 807 807994-807996 802->807 808 807a0b-807a12 call 80c57e 802->808 803->804 805 807943-807948 804->805 806 80795e-807962 804->806 805->806 810 80794a-80794c 805->810 811 807964-807978 SendMessageA 806->811 812 80797a-80797f 806->812 813 8079c1-8079cd 807->813 814 807998-8079a2 807->814 825 807a15-807a1b 808->825 810->806 817 80794e-807958 SendMessageA 810->817 811->812 818 807981 811->818 819 807984-807989 812->819 827 807a02-807a09 813->827 828 8079cf-8079da call 80ba96 813->828 820 8079a4-8079ab 814->820 821 8079ad-8079bf call 80a82e UpdateWindow 814->821 817->806 818->819 819->798 819->799 820->813 820->821 821->813 827->825 831 8079e5-8079f8 PeekMessageA 828->831 832 8079dc-8079e3 828->832 831->799 833 8079fa-8079fd 831->833 832->831 833->797
      APIs
      • GetParent.USER32(?), ref: 008078F7
      • PeekMessageA.USER32(0098E220,00000000,00000000,00000000,00000000), ref: 0080791B
      • UpdateWindow.USER32(?), ref: 00807935
      • SendMessageA.USER32(?,00000121,00000000,?), ref: 00807958
      • SendMessageA.USER32(?,0000036A,00000000,00000000), ref: 0080796F
      • UpdateWindow.USER32(?), ref: 008079B9
      • PeekMessageA.USER32(0098E220,00000000,00000000,00000000,00000000), ref: 008079F0
        • Part of subcall function 0080A305: GetWindowLongA.USER32(?,000000F0), ref: 0080A313
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Message$Window$PeekSendUpdate$LongParent
      • String ID:
      • API String ID: 2853195852-0
      • Opcode ID: ce5823de604fb29bc398bf2c6ee3d4c89d739b9ed2954ce8491cbf5bb183731b
      • Instruction ID: 2b40ee3a548552151df43cf4d806b7c28dfae4c4460d01ee284f9fbb75067234
      • Opcode Fuzzy Hash: ce5823de604fb29bc398bf2c6ee3d4c89d739b9ed2954ce8491cbf5bb183731b
      • Instruction Fuzzy Hash: 9C41A270B08308ABEBA09F69CC49B6EBFA4FF40714F244568F545DA1D0DB75AE40D744
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 834 8173d9-8173f7 835 8173f9-8173fb 834->835 836 81746b-817479 call 81092f GetLastError 834->836 835->836 838 8173fd-817429 call 92f510 call 92c240 835->838 841 817483 836->841 842 81747b-81747e 836->842 846 817450-817452 SetWindowTextA 838->846 847 81742b-81743c GetWindowTextA 838->847 842->841 849 817458-817468 call 9299b4 846->849 847->846 848 81743e-81744e lstrcmpA 847->848 848->846 848->849
      APIs
      • _strlen.LIBCMT ref: 008173FE
      • _memset.LIBCMT ref: 0081741A
      • GetWindowTextA.USER32(00000000,00000000,00000100), ref: 00817434
      • lstrcmpA.KERNEL32(00000000,00813EDB,?,?,?,00000000), ref: 00817446
      • SetWindowTextA.USER32(00000000,00813EDB), ref: 00817452
      • GetLastError.KERNEL32(?,?,00000000), ref: 00817471
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: TextWindow$ErrorLast_memset_strlenlstrcmp
      • String ID:
      • API String ID: 602903878-0
      • Opcode ID: 4b2c8f18fa77bfa268b3428e867814d29b2b87e3b229c3665a5ba879fdb21960
      • Instruction ID: 64680d3a4d3258c97c69b027c4adb237fe13c7e71aac0ca2977a21d3425c7935
      • Opcode Fuzzy Hash: 4b2c8f18fa77bfa268b3428e867814d29b2b87e3b229c3665a5ba879fdb21960
      • Instruction Fuzzy Hash: 611125B560511867DB10EB78AC84BFF7BBCFF44700F004069FA05E3241EA749E8097A5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetModuleFileNameA.KERNEL32(?,?,00000104,?,?,?), ref: 00828CDF
      • PathFindExtensionA.KERNELBASE(?,?,?,?), ref: 00828CF9
        • Part of subcall function 00810949: __CxxThrowException@8.LIBCMT ref: 0081095D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Exception@8ExtensionFileFindModuleNamePathThrow
      • String ID: .CHM$.HLP$.INI
      • API String ID: 1938139466-4017452060
      • Opcode ID: 9d06a2d4d80541e8c43e5a6ce3dfca608326f4228750f36465c44bc9c43d9962
      • Instruction ID: 007b4b23a8dfe9ae4225e5437a922c35c73beacfb38b411f2a2ce754a7ca8edc
      • Opcode Fuzzy Hash: 9d06a2d4d80541e8c43e5a6ce3dfca608326f4228750f36465c44bc9c43d9962
      • Instruction Fuzzy Hash: 414180B5901725DADF20EB64E845B96B3ECFF54704F10086AA585D3681EF74D9C8CB21
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID: Edit
      • API String ID: 0-554135844
      • Opcode ID: 8956826d842c6d837d66e35d6f42b585393edaf380320dd04687e66928840f0f
      • Instruction ID: 5915219ee35d27e1eea02bbe8e6606f89fd0fdbd2e460ebf482b66e081a74c2d
      • Opcode Fuzzy Hash: 8956826d842c6d837d66e35d6f42b585393edaf380320dd04687e66928840f0f
      • Instruction Fuzzy Hash: 6A21AE30205205EBEB618B24CD49FA677E9FF01369F3A802DE48AD62E1D775D880D751
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3_catch.LIBCMT ref: 0080AB37
      • GlobalLock.KERNEL32(00000000,?,?), ref: 0080AC23
      • DestroyWindow.USER32(?,?,?,?,0080A946,00000000), ref: 0080ACDA
      • GlobalUnlock.KERNEL32(00000000,?,?,?,0080A946,00000000), ref: 0080ACEA
      • GlobalFree.KERNEL32(00000000), ref: 0080ACF1
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Global$DestroyFreeH_prolog3_catchLockUnlockWindow
      • String ID:
      • API String ID: 571947920-0
      • Opcode ID: a19f93d503a1a31fcb17043efcb47116e5eb11bcd6e8778fd9ce51992d8e4475
      • Instruction ID: d67e8d4c87c1e0e3b48c73aaf3bb1e81b1644fee8e5f1bce7943c80e235ae658
      • Opcode Fuzzy Hash: a19f93d503a1a31fcb17043efcb47116e5eb11bcd6e8778fd9ce51992d8e4475
      • Instruction Fuzzy Hash: 8F515830A0130A9FDB59EFA8C885AEE7BB9FF04314F154528F802E7291DB749A418B52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 00846221
      • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,?,00000000,00B3D508), ref: 00846238
      • VerSetConditionMask.KERNEL32(00000000,?,?,00000000,00B3D508), ref: 0084623C
      • VerifyVersionInfoA.KERNEL32(0000009C,00000003,00000000), ref: 00846249
      • GetSystemMetrics.USER32(00001000), ref: 0084625A
        • Part of subcall function 008469A7: __EH_prolog3.LIBCMT ref: 008469AE
        • Part of subcall function 008469A7: GetSysColor.USER32(00000016), ref: 008469C0
        • Part of subcall function 008469A7: GetSysColor.USER32(0000000F), ref: 008469CD
        • Part of subcall function 008469A7: GetSysColor.USER32(00000015), ref: 008469E0
        • Part of subcall function 008469A7: GetSysColor.USER32(0000000F), ref: 008469E8
        • Part of subcall function 008469A7: GetDeviceCaps.GDI32(00831CA7,0000000C), ref: 00846A0E
        • Part of subcall function 008469A7: GetSysColor.USER32(0000000F), ref: 00846A1C
        • Part of subcall function 008469A7: GetSysColor.USER32(00000010), ref: 00846A26
        • Part of subcall function 008469A7: GetSysColor.USER32(00000015), ref: 00846A30
        • Part of subcall function 008469A7: GetSysColor.USER32(00000016), ref: 00846A3A
        • Part of subcall function 008469A7: GetSysColor.USER32(00000014), ref: 00846A44
        • Part of subcall function 008469A7: GetSysColor.USER32(00000012), ref: 00846A4E
        • Part of subcall function 008469A7: GetSysColor.USER32(00000011), ref: 00846A58
        • Part of subcall function 008469A7: GetSysColor.USER32(00000006), ref: 00846A5F
        • Part of subcall function 008469A7: GetSysColor.USER32(0000000D), ref: 00846A66
        • Part of subcall function 008469A7: GetSysColor.USER32(0000000E), ref: 00846A6D
        • Part of subcall function 008469A7: GetSysColor.USER32(00000005), ref: 00846A74
        • Part of subcall function 008469A7: GetSysColor.USER32(00000008), ref: 00846A7E
        • Part of subcall function 008469A7: GetSysColor.USER32(00000009), ref: 00846A85
        • Part of subcall function 008469A7: GetSysColor.USER32(00000007), ref: 00846A8C
        • Part of subcall function 008469A7: GetSysColor.USER32(00000002), ref: 00846A93
        • Part of subcall function 008469A7: GetSysColor.USER32(00000003), ref: 00846A9A
        • Part of subcall function 008469A7: GetSysColor.USER32(0000001B), ref: 00846AA4
        • Part of subcall function 008469A7: GetSysColor.USER32(0000001C), ref: 00846AAE
        • Part of subcall function 00846494: __EH_prolog3_GS.LIBCMT ref: 0084649E
        • Part of subcall function 00846494: GetDeviceCaps.GDI32(?,00000058), ref: 008464BE
        • Part of subcall function 00846494: DeleteObject.GDI32(00000000), ref: 0084652E
        • Part of subcall function 00846494: DeleteObject.GDI32(00000000), ref: 00846548
        • Part of subcall function 00846494: DeleteObject.GDI32(00000000), ref: 00846562
        • Part of subcall function 00846494: DeleteObject.GDI32(00000000), ref: 0084657C
        • Part of subcall function 00846494: DeleteObject.GDI32(00000000), ref: 00846596
        • Part of subcall function 00846494: DeleteObject.GDI32(00000000), ref: 008465B0
        • Part of subcall function 00846494: DeleteObject.GDI32(00000000), ref: 008465CA
        • Part of subcall function 008462BA: GetSystemMetrics.USER32(00000031), ref: 008462CE
        • Part of subcall function 008462BA: GetSystemMetrics.USER32(00000032), ref: 008462D8
        • Part of subcall function 008462BA: SetRectEmpty.USER32(00B3D674), ref: 008462E7
        • Part of subcall function 008462BA: EnumDisplayMonitors.USER32(00000000,00000000,00846150,00B3D674,?,?,?,00000000,00B3D508), ref: 008462F7
        • Part of subcall function 008462BA: SystemParametersInfoA.USER32(00000030,00000000,00B3D674,00000000), ref: 0084630E
        • Part of subcall function 008462BA: SystemParametersInfoA.USER32(00001002,00000000,00B3D698,00000000), ref: 00846336
        • Part of subcall function 008462BA: SystemParametersInfoA.USER32(00001012,00000000,00B3D69C,00000000), ref: 0084634C
        • Part of subcall function 008462BA: SystemParametersInfoA.USER32(0000100A,00000000,00B3D6AC,00000000), ref: 0084636E
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Color$DeleteObjectSystem$Info$Parameters$Metrics$CapsConditionDeviceMask$DisplayEmptyEnumH_prolog3H_prolog3_MonitorsRectVerifyVersion_memset
      • String ID:
      • API String ID: 2760246569-0
      • Opcode ID: 5d6a92e04ed5e4a706cf843f63cc99d149520d83b5c00514a7c959fc86c3ca64
      • Instruction ID: f526a1ccb39eec7cd94861751da66ad0b3ecca5dd3488aaa9e460739abe790d2
      • Opcode Fuzzy Hash: 5d6a92e04ed5e4a706cf843f63cc99d149520d83b5c00514a7c959fc86c3ca64
      • Instruction Fuzzy Hash: 2F11A770A0031CBFEB109F75AC56FAEBBACFB45714F404159B50997281DB741E148BD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • PathFindFileNameA.SHLWAPI(00000000,?,00828D25,?,?,00000104), ref: 00828C0F
      • _strlen.LIBCMT ref: 00828C1C
      • __cftof.LIBCMT ref: 00828C2E
      • SetErrorMode.KERNELBASE(00000000,00000000,?,00953EF9,?,?,?,?,?,?,00000000,?,0092C44E,00400000,00000000,00000000), ref: 00828C54
      • SetErrorMode.KERNELBASE(00000000,?,00953EF9,?,?,?,?,?,?,00000000,?,0092C44E,00400000,00000000,00000000), ref: 00828C5C
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ErrorMode$FileFindNamePath__cftof_strlen
      • String ID:
      • API String ID: 4036641936-0
      • Opcode ID: 89556a27e8b43e3b57b479ddc09f846e97d44c5f3a7ffdf9de5f5f10f77f54fa
      • Instruction ID: bcb9306561ba99d7b63ebc8ea86865d8c48cba866c95ae59f6e28fb38af6f834
      • Opcode Fuzzy Hash: 89556a27e8b43e3b57b479ddc09f846e97d44c5f3a7ffdf9de5f5f10f77f54fa
      • Instruction Fuzzy Hash: 56119471816218DFCF50BF64E809B5A7B98FF00320F148469F518D7292DB75D9918BA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3_GS.LIBCMT ref: 0081077A
        • Part of subcall function 00818CA5: __EH_prolog3_catch.LIBCMT ref: 00818CAC
      • WSAStartup.WS2_32(00000101,?), ref: 008107BA
        • Part of subcall function 0081092F: __CxxThrowException@8.LIBCMT ref: 00810943
      • WSACleanup.WS2_32 ref: 00810809
      • WSASetLastError.WS2_32(0000276C,?,?,0095A74B,000000FF), ref: 00810814
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CleanupErrorException@8H_prolog3_H_prolog3_catchLastStartupThrow
      • String ID:
      • API String ID: 3542062730-0
      • Opcode ID: 5906fa61086c2f2ef530e232d2457f9895792bfba9bfe0ca65b0fc8375ca9a9d
      • Instruction ID: 392ce7fe22735ad75bef204c84b452fd533f45a8b1950d1ec58d18ec2cc6e3d8
      • Opcode Fuzzy Hash: 5906fa61086c2f2ef530e232d2457f9895792bfba9bfe0ca65b0fc8375ca9a9d
      • Instruction Fuzzy Hash: 1231CD30A4A31AEBEB24AFB84D197D876A9FF44710F104039F546DA6C1DBF088C08F92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset
      • String ID: AfxFrameOrView120s$AfxMDIFrame120s
      • API String ID: 2102423945-1192132332
      • Opcode ID: cdbaa7502b3b6e1496e3dc100f306df1ee81e353ac14d236013ceb6ad0fa543a
      • Instruction ID: 9d1f80be3a7252b14be12ac2e8ebb3f8ea066ffcdf2dddd2e3d48d7bcf15138e
      • Opcode Fuzzy Hash: cdbaa7502b3b6e1496e3dc100f306df1ee81e353ac14d236013ceb6ad0fa543a
      • Instruction Fuzzy Hash: 51813572E40319AAEB91DBE8CD49BDEBAFCFF04354F054125A984F31C1EB749B488690
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FindResourceW.KERNELBASE(?,?,00000006,?,?,00000000,?,007C531C,00000000,?,?,?,?,?,00000000,0095A788), ref: 007C751B
        • Part of subcall function 007CBE30: LoadResource.KERNEL32(?,?,?,007C7531,?,00000000,?,?,?,00000000,?,007C531C,00000000), ref: 007CBE39
      • WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,?,00000000,00000000,00000000,00000000), ref: 007C754E
      • WideCharToMultiByte.KERNEL32(00000003,00000000,00000002,?,?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 007C7588
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ByteCharMultiResourceWide$FindLoad
      • String ID:
      • API String ID: 861045882-0
      • Opcode ID: 4798fa5cdffe2f0a6356bec1023d13c6bafe9837df65d8b314e61b2b1dd9fc54
      • Instruction ID: 6b7788a88953b43b54b89fdde8fd89f8a4b320df4a2e33c68e72391c89a4df39
      • Opcode Fuzzy Hash: 4798fa5cdffe2f0a6356bec1023d13c6bafe9837df65d8b314e61b2b1dd9fc54
      • Instruction Fuzzy Hash: 2121C371255214AFE7249A649C89F76B79CEB04720F10001EFA05DF2C0DAA5A811CBA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • KiUserCallbackDispatcher.NTDLL(00000030,00000000,00000000,00000000), ref: 0080BA64
      • TranslateMessage.USER32(00000030), ref: 0080BA83
      • DispatchMessageA.USER32(00000030), ref: 0080BA8A
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Message$CallbackDispatchDispatcherTranslateUser
      • String ID:
      • API String ID: 2960505505-0
      • Opcode ID: 2e3f8f1cbd8e4581f26279944e3f18cdeae210f942ccd472da27264b027b0401
      • Instruction ID: 67a301eb48d3b9a01a96a61471b6232e59cf12c48e38f9f507ad4de0fd47b33c
      • Opcode Fuzzy Hash: 2e3f8f1cbd8e4581f26279944e3f18cdeae210f942ccd472da27264b027b0401
      • Instruction Fuzzy Hash: 3BF08231317526ABD755AB34AC48EBB33ACFF413253054028F402C6590EB24DD42DBA6
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetClassInfoA.USER32(?,?,00000000), ref: 00828501
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ClassInfo
      • String ID: Button
      • API String ID: 3534257612-1034594571
      • Opcode ID: 61b79b5a47fd0fbf206d48f4949af19ddaf4b167371f533d4362dc5f342aee0a
      • Instruction ID: dd58285fb09c1b54e7c7b98ca9a1d65ad82f48f4ba10a259f8c8cddab1ccd6f3
      • Opcode Fuzzy Hash: 61b79b5a47fd0fbf206d48f4949af19ddaf4b167371f533d4362dc5f342aee0a
      • Instruction Fuzzy Hash: 27F01D72A1520CAFDF10DF99D945ADEBBFCEB08324F104056E904F7250E7719A848BA1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 0080A305: GetWindowLongA.USER32(?,000000F0), ref: 0080A313
      • GetWindowRect.USER32(?,?), ref: 008086FC
      • GetWindow.USER32(?,00000004), ref: 00808719
        • Part of subcall function 0080A445: IsWindowEnabled.USER32(?), ref: 0080A451
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Window$EnabledLongRect
      • String ID:
      • API String ID: 3170195891-0
      • Opcode ID: ba852992430f7d8e1e6aef4ffc8a8c65ffce934b3eb76d9e1e4ee7f6d72b7f88
      • Instruction ID: 6a1b3d51da783da69d47946c2039afdea5d3f0b6624bb568a8f63a4aa1bb6ca3
      • Opcode Fuzzy Hash: ba852992430f7d8e1e6aef4ffc8a8c65ffce934b3eb76d9e1e4ee7f6d72b7f88
      • Instruction Fuzzy Hash: C5114675A00219DBCB50EFA98C94AAEF7B9FF64310F604059E842E7294DB70EA418A52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00818CF3: __EH_prolog3.LIBCMT ref: 00818CFA
      • UnhookWindowsHookEx.USER32(?), ref: 008040DD
      • DefWindowProcA.USER32(00000000,00000360,?,?,00000000,00000000,?,Function_0040502F,00000000,00804FF7,?,6838016B,00000000,?,?,?), ref: 00804140
        • Part of subcall function 008038ED: __EH_prolog3_catch_GS.LIBCMT ref: 008038F4
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3H_prolog3_catch_HookProcUnhookWindowWindows
      • String ID:
      • API String ID: 2533299859-0
      • Opcode ID: 622805342607e46e54512dfc996e55033acbe557233bddd3d6e8dd813c948c6c
      • Instruction ID: df47940e3003682c83dc499b0017488bf7b0de942153a3865a79bebe8e948073
      • Opcode Fuzzy Hash: 622805342607e46e54512dfc996e55033acbe557233bddd3d6e8dd813c948c6c
      • Instruction Fuzzy Hash: 4911A072445A14ABDBB2AF64AC09BAB3BA8FF05321F044425B746D14E1C774C990DBA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetWindowTextLengthA.USER32(00000000), ref: 00813D4E
      • GetWindowTextA.USER32(00000000,00000000,00000000), ref: 00813D63
        • Part of subcall function 0080773C: _strnlen.LIBCMT ref: 00807754
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: TextWindow$Length_strnlen
      • String ID:
      • API String ID: 1159536582-0
      • Opcode ID: 6ae17f20e37951169b69e5cad2c96b2b48fb716fd6e98abf6b712f1d55d5bcbd
      • Instruction ID: f7c82aef210a8002ba3914c8f70be72279f79f24e0771a23a9fa3ad9eba3ccc1
      • Opcode Fuzzy Hash: 6ae17f20e37951169b69e5cad2c96b2b48fb716fd6e98abf6b712f1d55d5bcbd
      • Instruction Fuzzy Hash: 76F03072104209BBCB11AF58EC59DBB376DFF85760B04811DF915C72D0DB759850DBA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetErrorMode.KERNELBASE(00000000,00000000,?,00953EF9,?,?,?,?,?,?,00000000,?,0092C44E,00400000,00000000,00000000), ref: 00828C54
      • SetErrorMode.KERNELBASE(00000000,?,00953EF9,?,?,?,?,?,?,00000000,?,0092C44E,00400000,00000000,00000000), ref: 00828C5C
        • Part of subcall function 00828CA4: GetModuleFileNameA.KERNEL32(?,?,00000104,?,?,?), ref: 00828CDF
        • Part of subcall function 00828CA4: PathFindExtensionA.KERNELBASE(?,?,?,?), ref: 00828CF9
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ErrorMode$ExtensionFileFindModuleNamePath
      • String ID:
      • API String ID: 1764437154-0
      • Opcode ID: 7f343f9f596e78e8067f4371e7d38a34e0059e36b0d2d0792db4c6e7968a22be
      • Instruction ID: fe3b19c69fba48c90b557c22016fd7d0c58087ad5b134882580b9da81a358ba9
      • Opcode Fuzzy Hash: 7f343f9f596e78e8067f4371e7d38a34e0059e36b0d2d0792db4c6e7968a22be
      • Instruction Fuzzy Hash: EBF0907591A2288FCB90FF68E404B597B98FF04320F05845AF604CB252EB75E8818FE2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • DefWindowProcA.USER32(?,?,?,?), ref: 00805095
      • CallWindowProcA.USER32(?,?,?,?,?), ref: 0080509E
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ProcWindow$Call
      • String ID:
      • API String ID: 2316559721-0
      • Opcode ID: bedbac93c351b297c7983987677b80c5e17e069d6843574d0825f62e3e18cd74
      • Instruction ID: f31782965d2169c3899ec32799edfc1211552f957357806fb605241ba01ef9b9
      • Opcode Fuzzy Hash: bedbac93c351b297c7983987677b80c5e17e069d6843574d0825f62e3e18cd74
      • Instruction Fuzzy Hash: D3F09E36105A09EFDF615FA4DC08E9EBBB5FF08355F048819F94586560D776D820EF90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • IsWindow.USER32(?), ref: 0080A7F7
      • SetWindowTextA.USER32(?,000003F4), ref: 0080A813
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Window$Text
      • String ID:
      • API String ID: 848690642-0
      • Opcode ID: d8fea4637104b13693098a2c995308d960b78d292be1deca34fc8a64c8327cb1
      • Instruction ID: 2ffbea6c55cf8040de3fc19e8e9659a5c33cd80e570bf15a2f9d677fcc7f8d22
      • Opcode Fuzzy Hash: d8fea4637104b13693098a2c995308d960b78d292be1deca34fc8a64c8327cb1
      • Instruction Fuzzy Hash: 1CE06D32211714DFCF686B25EC049A6B7A9FF15762B00847AE586C6661EB31A850DB81
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetCurrentThreadId.KERNEL32 ref: 0080B930
      • SetWindowsHookExA.USER32(000000FF,0080BF5A,00000000,00000000), ref: 0080B940
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CurrentHookThreadWindows
      • String ID:
      • API String ID: 1904029216-0
      • Opcode ID: 4977ee2317d7ae1294ddab4ccbdd8d68c43221d8d383756f8124eae2e73d896c
      • Instruction ID: 9f78184dd63f3a0dd69a6cbf2ce7bc63698b49100ea1cddf668ee8d9180e04a1
      • Opcode Fuzzy Hash: 4977ee2317d7ae1294ddab4ccbdd8d68c43221d8d383756f8124eae2e73d896c
      • Instruction Fuzzy Hash: 16D0A93280E2502EEB603B747C0DF8A3B98FF11331F010345F226D22E1FB2488818B66
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3_catch_GS.LIBCMT ref: 008038F4
        • Part of subcall function 00818CF3: __EH_prolog3.LIBCMT ref: 00818CFA
        • Part of subcall function 0081092F: __CxxThrowException@8.LIBCMT ref: 00810943
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Exception@8H_prolog3H_prolog3_catch_Throw
      • String ID:
      • API String ID: 2399685165-0
      • Opcode ID: 6f8e4d3f268c3336cff696dde473f8049bf5a732bd8219e1f26b0c1f399ec38b
      • Instruction ID: f71562a11cacc2b909524bd05411516ce15de12ef4ff57c8755adcb328c7d4b1
      • Opcode Fuzzy Hash: 6f8e4d3f268c3336cff696dde473f8049bf5a732bd8219e1f26b0c1f399ec38b
      • Instruction Fuzzy Hash: 8B31C475D002199BDF05DF98C891ADE7BB9FF49710F14046AF915FB281C7B0AA91CBA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • #17.COMCTL32(6838016B,?,?,0095A74B,000000FF), ref: 007C4EF2
        • Part of subcall function 0080C85A: __EH_prolog3.LIBCMT ref: 0080C861
        • Part of subcall function 00810770: __EH_prolog3_GS.LIBCMT ref: 0081077A
        • Part of subcall function 00810770: WSAStartup.WS2_32(00000101,?), ref: 008107BA
        • Part of subcall function 0080DDC4: __EH_prolog3.LIBCMT ref: 0080DDCB
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3$H_prolog3_Startup
      • String ID:
      • API String ID: 1794641787-0
      • Opcode ID: 709640ee95ec670620f90bd0d33678dab3da59ace8fec6641f854c52fde79ba1
      • Instruction ID: bc65dafe5a803cb57e016486cbf23449e6c8faad42e71b8005a7edfa3dd020e4
      • Opcode Fuzzy Hash: 709640ee95ec670620f90bd0d33678dab3da59ace8fec6641f854c52fde79ba1
      • Instruction Fuzzy Hash: 5911B170944218ABDB14EB68CC12FEEB7B4FB05720F00066DF82A972C1EF35AA408A51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007C6080: FindResourceW.KERNELBASE(?,?,00000006,?,0081140D,?,?,00000000,?,?,00828DA5,0000E006,?,00000100,?,?), ref: 007C6093
      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000002,00000103,?,00000103,00000000,00000000,00000000,00000000,?,?,00828DA5,0000E006,?,00000100), ref: 00811431
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ByteCharFindMultiResourceWide
      • String ID:
      • API String ID: 3726879926-0
      • Opcode ID: 82f85c27a8593146d292ab6b00b973419a4ca8f95e393f593d6ef59dcde3e2b7
      • Instruction ID: 9b995860c60a378e7e50863d34efdb1260a60c7537cf486771b73462e123a7ff
      • Opcode Fuzzy Hash: 82f85c27a8593146d292ab6b00b973419a4ca8f95e393f593d6ef59dcde3e2b7
      • Instruction Fuzzy Hash: CAF0FC73105215AFCB119FA8AC48DEFB75DFE44724311412EF655C7102D531EC808770
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 00818CFA
        • Part of subcall function 0081092F: __CxxThrowException@8.LIBCMT ref: 00810943
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Exception@8H_prolog3Throw
      • String ID:
      • API String ID: 3670251406-0
      • Opcode ID: 70b7c6d24dc37d156d92302b9738964520dbf06d9070e84c4a300b71e8ec0b2b
      • Instruction ID: 38f9d6e4962b808e983d9975677c1fbbaf527bdea1126e7e18d72478840c44e9
      • Opcode Fuzzy Hash: 70b7c6d24dc37d156d92302b9738964520dbf06d9070e84c4a300b71e8ec0b2b
      • Instruction Fuzzy Hash: EA012C75A00712CBEB25AB74A8126AD77A9FF50360B244135E910DB2A0EF70CDC1DB51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3
      • String ID:
      • API String ID: 431132790-0
      • Opcode ID: 5d5ab850e5f765ed4106d38fef9d0545095910cd666907fff57449a7c33bc2b9
      • Instruction ID: 4be9605be7e2c18f7828ae002d8b993921d97c92a2cbfbb45bce3b5bf05dfc06
      • Opcode Fuzzy Hash: 5d5ab850e5f765ed4106d38fef9d0545095910cd666907fff57449a7c33bc2b9
      • Instruction Fuzzy Hash: E5014835A112128FCB54EB64C468BBEB7F5FF84314F194479E51AEB291DF34A804CB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3_catch
      • String ID:
      • API String ID: 3886170330-0
      • Opcode ID: 4500edd831af26ac3ab9578a8708a8ed4e74cd2e420f25abe03dd5b63a4b9313
      • Instruction ID: bcf3a54f130838dcbdc8c22a367abf4f24cd4dcd06d2a2901935d49bb8c559af
      • Opcode Fuzzy Hash: 4500edd831af26ac3ab9578a8708a8ed4e74cd2e420f25abe03dd5b63a4b9313
      • Instruction Fuzzy Hash: 2EF0B2759102098FDB14DFA4D0A5BEEBBF1EF48315F10842AE456AB280DB755944CFA4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateDialogIndirectParamA.USER32(?,?,?,?,?), ref: 0080B3FC
        • Part of subcall function 0080999F: OutputDebugStringA.KERNEL32(IsolationAware function called after IsolationAwareCleanup,-00000034,?,0081716F,00000000,00AF81D8,00000010,008281AC,?,?,?,00AE688C,?,00000001,0000000C,00828205), ref: 008099B3
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CreateDebugDialogIndirectOutputParamString
      • String ID:
      • API String ID: 3066322445-0
      • Opcode ID: 9740dcf67d2f9cbbda79abdf109795cebe2d8f59fa1d6f30f6167cb23eddafba
      • Instruction ID: bb86f99f513e249ba47d0310e057417e6038edd8415a1b6be25a27e058f3c713
      • Opcode Fuzzy Hash: 9740dcf67d2f9cbbda79abdf109795cebe2d8f59fa1d6f30f6167cb23eddafba
      • Instruction Fuzzy Hash: 4EF03A7280021DEFDF109FA4DC05BEE7AB0FF18322F104615F910A11D2C7748A14EB51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _malloc.LIBCMT ref: 00802D49
        • Part of subcall function 0092B455: __FF_MSGBANNER.LIBCMT ref: 0092B46C
        • Part of subcall function 0092B455: __NMSG_WRITE.LIBCMT ref: 0092B473
        • Part of subcall function 0092B455: RtlAllocateHeap.NTDLL(?,00000000,00000001,?,?,?,?,00802D4E,00000001,?,?,007748D8,00000B40,00000000), ref: 0092B498
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: AllocateHeap_malloc
      • String ID:
      • API String ID: 501242067-0
      • Opcode ID: 09f2fa54bc76b3d67b0743a0911ebea177d1b6ec7a64cc59e4d817d8fa23692f
      • Instruction ID: e121dc37dbffaaf81070f624cd7740805750e17aac1e7a946fc52e0efad6e033
      • Opcode Fuzzy Hash: 09f2fa54bc76b3d67b0743a0911ebea177d1b6ec7a64cc59e4d817d8fa23692f
      • Instruction Fuzzy Hash: 2ED0173260552E679B926A99EC087A9779CEA02BA13444121AE08DA1A5EA91CD2143D0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FindResourceW.KERNELBASE(?,?,00000006,?,0081140D,?,?,00000000,?,?,00828DA5,0000E006,?,00000100,?,?), ref: 007C6093
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: FindResource
      • String ID:
      • API String ID: 1635176832-0
      • Opcode ID: a97cf308e2a8341437130e46adfe69a6bcd10f5587b081dc91b1da8f22a313ef
      • Instruction ID: cd259290377ff5d891c71e8756b301f7e59755d6ff71de54f97e38bc017c9c57
      • Opcode Fuzzy Hash: a97cf308e2a8341437130e46adfe69a6bcd10f5587b081dc91b1da8f22a313ef
      • Instruction Fuzzy Hash: 70D05E7111420CBBEF001E54FC41EBA3B9EEB80B18F008024FD1CC91A1E332EDA1AB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 0080BFBD
        • Part of subcall function 0080C38F: MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,00000000,00000000,00000000,?,?,?,0080BFF0,?,?,00000000,00000004,Function_0040502F), ref: 0080C3C2
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ByteCharH_prolog3MultiWide
      • String ID:
      • API String ID: 354187267-0
      • Opcode ID: b7862ec7d1b482703b4fa897afa1711ac4833bcf64a4940522b8737eb3d8d3a0
      • Instruction ID: 35604ef8f41465b66647b075a368005be8510240fd1a68eb36ad530a34c1715c
      • Opcode Fuzzy Hash: b7862ec7d1b482703b4fa897afa1711ac4833bcf64a4940522b8737eb3d8d3a0
      • Instruction Fuzzy Hash: 86E0C2707406299BDF067F249C26BAC2625EF40700F04802CFA00AB386CF7A4F0196DE
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • IsDialogMessageA.USER32(?,?,?,?,008072C5,?,?,0080B3A6,?,?), ref: 0080A3F4
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: DialogMessage
      • String ID:
      • API String ID: 547518314-0
      • Opcode ID: 79f1841fdb7610db474d431788ee911d1dab1c18fb6be770e88cf0871055e375
      • Instruction ID: 3289e885ec3d0ffd71d7e9caf0b2beb9080f82c2824bb757d71634aa5ea8d324
      • Opcode Fuzzy Hash: 79f1841fdb7610db474d431788ee911d1dab1c18fb6be770e88cf0871055e375
      • Instruction Fuzzy Hash: E2E08C32115218EBCB159F59D808CD6BBA8FF09364B120016F90AC6AB1DBB29890EB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SystemParametersInfoA.USER32(00000029,?,?,00000000), ref: 00846146
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: InfoParametersSystem
      • String ID:
      • API String ID: 3098949447-0
      • Opcode ID: 1c84008ee6ae6706a48f2a757a7213782c16bca3a1a0d61972abb7148300abcc
      • Instruction ID: a6745f1936163994c9b0ccae624cc512fe0511ad74a9658a39b44fb27466a8cc
      • Opcode Fuzzy Hash: 1c84008ee6ae6706a48f2a757a7213782c16bca3a1a0d61972abb7148300abcc
      • Instruction Fuzzy Hash: 3FD012B1144708EFF7015F40DC09FA13BA8EB55719F404065F6088E2E1C7B268A1DFA5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • DeleteObject.GDI32(00000000), ref: 0081271A
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: DeleteObject
      • String ID:
      • API String ID: 1531683806-0
      • Opcode ID: fa9da47eafd2a040c2863aeb57f84694cf5f0f9af8f6cebe8a77ee7f82e5a326
      • Instruction ID: 7f9e297856332a1cdc75128369e8bc902ee4c2c5c0ac2ff71abbb48fe3994ca4
      • Opcode Fuzzy Hash: fa9da47eafd2a040c2863aeb57f84694cf5f0f9af8f6cebe8a77ee7f82e5a326
      • Instruction Fuzzy Hash: A1B09270812100AAEE00A730AA4C7573658FF40316F108C94A010C2081DB39C492D651
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,00000000,00000000,00000000,?,?,?,0080BFF0,?,?,00000000,00000004,Function_0040502F), ref: 0080C3C2
        • Part of subcall function 0080C709: MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,00000000,00000000,?,0080C3A4,00000000,?,?,?,0080BFF0,?,?,00000000), ref: 0080C718
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ByteCharMultiWide
      • String ID:
      • API String ID: 626452242-0
      • Opcode ID: c922a7fd82f21ca123314caeb81a4302fff2a015d2f9cfdf48eb3013be509dcd
      • Instruction ID: 4976baf6f68ce33f2a27de994065dc4fd413c2cb1e547b9d2e2461e9188e1702
      • Opcode Fuzzy Hash: c922a7fd82f21ca123314caeb81a4302fff2a015d2f9cfdf48eb3013be509dcd
      • Instruction Fuzzy Hash: 36F05532219128B7D6202B48AC05FAF7A4DEF843A0F21832ABA05E63D0CAA18C1152F5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,00000000,00000000,?,0080C3A4,00000000,?,?,?,0080BFF0,?,?,00000000), ref: 0080C718
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ByteCharMultiWide
      • String ID:
      • API String ID: 626452242-0
      • Opcode ID: 1f0d5490123a210d10b290db80741e45731ba317e14d9d41913e22b6eda35a67
      • Instruction ID: 023cd9da8a5d79547b7047a442c0f41ac738bd7e4d03106e742023f097b541b4
      • Opcode Fuzzy Hash: 1f0d5490123a210d10b290db80741e45731ba317e14d9d41913e22b6eda35a67
      • Instruction Fuzzy Hash: 23C048B125D2097EFA012AA4AC05E763B5CD710620F108214BE28C52E0D961991067A1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FreeLibrary.KERNEL32(?,?,?,?,007D7317,007CCE62,?,?,007D7487,AADP), ref: 007F446F
      • LoadLibraryA.KERNEL32(007CCE62,007CCE62,?,?,00000000), ref: 007F4499
      • GetProcAddress.KERNEL32(?,XInit), ref: 007F44B9
      • GetProcAddress.KERNEL32(?,XCreate), ref: 007F44C6
      • GetProcAddress.KERNEL32(?,XSetMediaConfig4), ref: 007F44D3
      • GetProcAddress.KERNEL32(?,XConnect), ref: 007F44E0
      • GetProcAddress.KERNEL32(?,XSetVideoConfig), ref: 007F44ED
      • GetProcAddress.KERNEL32(?,XGetVideoConfig), ref: 007F44FA
      • GetProcAddress.KERNEL32(?,XGetVideoConfig3), ref: 007F4507
      • GetProcAddress.KERNEL32(?,XStartStreaming), ref: 007F4514
      • GetProcAddress.KERNEL32(?,XStopStreaming), ref: 007F4521
      • GetProcAddress.KERNEL32(?,XStop), ref: 007F452E
      • GetProcAddress.KERNEL32(?,XGetNextFrame), ref: 007F453B
      • GetProcAddress.KERNEL32(?,XGetNextFrame2), ref: 007F4548
      • GetProcAddress.KERNEL32(?,XGetNextIFrame), ref: 007F4555
      • GetProcAddress.KERNEL32(?,XGetNextIFrame2), ref: 007F4562
      • GetProcAddress.KERNEL32(?,XGetPrevFrame), ref: 007F456F
      • GetProcAddress.KERNEL32(?,XGetPrevFrame2), ref: 007F457C
      • GetProcAddress.KERNEL32(?,XGetPrevIFrame), ref: 007F4589
      • GetProcAddress.KERNEL32(?,XGetPrevIFrame2), ref: 007F4596
      • GetProcAddress.KERNEL32(?,XDisconnect), ref: 007F45A3
      • GetProcAddress.KERNEL32(?,XSendCommand), ref: 007F45B0
      • GetProcAddress.KERNEL32(?,XExit), ref: 007F45BD
      • GetProcAddress.KERNEL32(?,XSetControlDataCallBack), ref: 007F45CA
      • GetProcAddress.KERNEL32(?,XSetMotionInfo), ref: 007F45D7
      • GetProcAddress.KERNEL32(?,XGetMotionInfo), ref: 007F45E4
      • GetProcAddress.KERNEL32(?,XGetSupportEvents), ref: 007F45F1
      • GetProcAddress.KERNEL32(?,XGetBeginTime), ref: 007F45FE
      • GetProcAddress.KERNEL32(?,XGetEndTime), ref: 007F460B
      • GetProcAddress.KERNEL32(?,XGetBeginTimeUTC), ref: 007F4618
      • GetProcAddress.KERNEL32(?,XGetEndTimeUTC), ref: 007F4625
      • GetProcAddress.KERNEL32(?,XSetCurrentTime), ref: 007F4632
      • GetProcAddress.KERNEL32(?,XGetCurrentTime), ref: 007F4642
      • GetProcAddress.KERNEL32(?,XSetCurrentTimeUTC), ref: 007F4652
      • GetProcAddress.KERNEL32(?,XGetCurrentTimeUTC), ref: 007F4662
      • GetProcAddress.KERNEL32(?,XGetRawFileInfo2), ref: 007F4672
      • GetProcAddress.KERNEL32(?,XGetRawFileInfo3), ref: 007F4682
      • GetProcAddress.KERNEL32(?,XGetCurrentPos), ref: 007F4692
      • GetProcAddress.KERNEL32(?,XSetDebugMessageLevel), ref: 007F46A2
      • GetProcAddress.KERNEL32(?,XGetVersion), ref: 007F46B2
      • GetProcAddress.KERNEL32(?,XGetSessionID), ref: 007F46C2
      • GetProcAddress.KERNEL32(?,XSetEngineConfig), ref: 007F46D2
      • GetProcAddress.KERNEL32(?,XSetEngineConfig2), ref: 007F46E2
      • GetProcAddress.KERNEL32(?,XStartTransferStreamingEngineData), ref: 007F46F2
      • GetProcAddress.KERNEL32(?,XSetVideoTransformConfig), ref: 007F4702
      • GetProcAddress.KERNEL32(?,XGetCardCount), ref: 007F4712
      • GetProcAddress.KERNEL32(?,XGetChannelCount), ref: 007F4722
      • GetProcAddress.KERNEL32(?,XSearchCapCard), ref: 007F4732
      • GetProcAddress.KERNEL32(?,XSearchCapChannel), ref: 007F4742
      • GetProcAddress.KERNEL32(?,XGetChannelHSync), ref: 007F4752
      • GetProcAddress.KERNEL32(?,XSetMediaConfig), ref: 007F4762
      • GetProcAddress.KERNEL32(?,XAddNthMedia), ref: 007F4772
      • GetProcAddress.KERNEL32(?,XRemoveNthMedia), ref: 007F4782
      • GetProcAddress.KERNEL32(?,XGetNthVideoConfig), ref: 007F4792
      • GetProcAddress.KERNEL32(?,XRemoveAllMedia), ref: 007F47A2
      • GetProcAddress.KERNEL32(?,XGetTotalIFrame), ref: 007F47B2
      • GetProcAddress.KERNEL32(?,XGetNthBeginTime), ref: 007F47C2
      • GetProcAddress.KERNEL32(?,XGetNthEndTime), ref: 007F47D2
      • GetProcAddress.KERNEL32(?,XGetCurrentReadingFileNumber), ref: 007F47E2
      • GetProcAddress.KERNEL32(?,XGetCurrentReadingAbsTime), ref: 007F47F2
      • GetProcAddress.KERNEL32(?,XSetDownloadProgressCallback), ref: 007F4802
      • GetProcAddress.KERNEL32(?,XSetDownloadLocalFileName), ref: 007F4812
      • GetProcAddress.KERNEL32(?,XEnableDeleteFileAfterClose), ref: 007F4822
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: AddressProc$Library$FreeLoad
      • String ID: A4100$XAddNthMedia$XConnect$XCreate$XDisconnect$XEnableDeleteFileAfterClose$XExit$XGetBeginTime$XGetBeginTimeUTC$XGetCardCount$XGetChannelCount$XGetChannelHSync$XGetCurrentPos$XGetCurrentReadingAbsTime$XGetCurrentReadingFileNumber$XGetCurrentTime$XGetCurrentTimeUTC$XGetEndTime$XGetEndTimeUTC$XGetMotionInfo$XGetNextFrame$XGetNextFrame2$XGetNextIFrame$XGetNextIFrame2$XGetNthBeginTime$XGetNthEndTime$XGetNthVideoConfig$XGetPrevFrame$XGetPrevFrame2$XGetPrevIFrame$XGetPrevIFrame2$XGetRawFileInfo2$XGetRawFileInfo3$XGetSessionID$XGetSupportEvents$XGetTotalIFrame$XGetVersion$XGetVideoConfig$XGetVideoConfig3$XInit$XRemoveAllMedia$XRemoveNthMedia$XSearchCapCard$XSearchCapChannel$XSendCommand$XSetControlDataCallBack$XSetCurrentTime$XSetCurrentTimeUTC$XSetDebugMessageLevel$XSetDownloadLocalFileName$XSetDownloadProgressCallback$XSetEngineConfig$XSetEngineConfig2$XSetMediaConfig$XSetMediaConfig4$XSetMotionInfo$XSetVideoConfig$XSetVideoTransformConfig$XStartStreaming$XStartTransferStreamingEngineData$XStop$XStopStreaming
      • API String ID: 2449869053-1343573623
      • Opcode ID: eb8e4c91e286014d497f30805df08584c27c0c331b43aa051175743f02c4f03e
      • Instruction ID: 48cc29ac1a717358ce6dc22ee16b4ae3a608311ec3244f58253e6996389e6542
      • Opcode Fuzzy Hash: eb8e4c91e286014d497f30805df08584c27c0c331b43aa051175743f02c4f03e
      • Instruction Fuzzy Hash: AAE105B4A40B16FBCF259F768D09A46FFA1FF44798B008626E52C52A50D7B9A434DFC0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007C7200: InitializeCriticalSectionEx.KERNEL32(00B3B220,00000000,00000000,007C5BC9,?,?,007C5EAB), ref: 007C7238
        • Part of subcall function 007C7200: GetLastError.KERNEL32(?,?,007C5EAB), ref: 007C7242
      • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 007CA745
      • _malloc.LIBCMT ref: 007CA78B
        • Part of subcall function 0092B455: __FF_MSGBANNER.LIBCMT ref: 0092B46C
        • Part of subcall function 0092B455: __NMSG_WRITE.LIBCMT ref: 0092B473
        • Part of subcall function 0092B455: RtlAllocateHeap.NTDLL(?,00000000,00000001,?,?,?,?,00802D4E,00000001,?,?,007748D8,00000B40,00000000), ref: 0092B498
      • GdipGetImageEncoders.GDIPLUS(?,?,00000008), ref: 007CA7B5
      • PathFindExtensionA.SHLWAPI(?,00000008,?,?,00000008), ref: 007CA7F2
      • GdipSaveImageToFile.GDIPLUS(?,00000000,?,00000000,00000000,?,?,00000003), ref: 007CA8E8
      • GdipDisposeImage.GDIPLUS(?,?,00000000,?,00000000,00000000,?,?,00000003), ref: 007CA8F2
      • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?,00000000,?,?,00000003), ref: 007CA90E
      • GdipSaveImageToFile.GDIPLUS(00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,00000003), ref: 007CA91E
      • GdipDisposeImage.GDIPLUS(00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,00000003), ref: 007CA928
      • GdipDisposeImage.GDIPLUS(00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,00000003), ref: 007CA934
      • _free.LIBCMT ref: 007CA949
      • _memmove.LIBCMT ref: 007CA9BD
      • _memset.LIBCMT ref: 007CA9F5
      • _memset.LIBCMT ref: 007CAAF0
      • _memset.LIBCMT ref: 007CAB07
      • _strtok.LIBCMT ref: 007CAB39
      • _strtok.LIBCMT ref: 007CAB74
      • __snprintf.LIBCMT ref: 007CABB3
      • GetDC.USER32(00000000), ref: 007CABE5
      • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 007CAC12
      • ReleaseDC.USER32(00000000,00000000), ref: 007CAC21
      • CreateCompatibleDC.GDI32(00000000), ref: 007CAC57
      • GetClientRect.USER32(?,?), ref: 007CAC86
      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 007CACB8
      • SelectObject.GDI32(?,00000000), ref: 007CACCB
        • Part of subcall function 007C5FF0: _malloc.LIBCMT ref: 007C6007
      • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 007CAD08
      • CreateFontA.GDI32(00000014,00000000,00000000,00000000,00000014,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,Arial), ref: 007CAD52
      • SetBkColor.GDI32(?,00000000), ref: 007CAD62
      • SelectObject.GDI32(?,00000000), ref: 007CAD70
      • SetTextColor.GDI32(?,00FFFFFF), ref: 007CAD7C
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CAE0B
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CAE65
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CAECA
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CAF15
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CAF28
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CAF3B
      • TextOutA.GDI32(?,00000005,00000000,?,?), ref: 007CAF66
      • DeleteObject.GDI32(?), ref: 007CAF94
      • GetDC.USER32(00000000), ref: 007CB02D
      • CreateDIBitmap.GDI32(00000000,?,00000004,?,?,00000000), ref: 007CB05A
      • ReleaseDC.USER32(00000000,00000000), ref: 007CB069
      • CreateCompatibleDC.GDI32(00000000), ref: 007CB09F
      • GetClientRect.USER32(?,?), ref: 007CB0CE
      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 007CB100
      • SelectObject.GDI32(?,00000000), ref: 007CB113
      • BitBlt.GDI32(?,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 007CB150
      • CreateFontA.GDI32(00000014,00000000,00000000,00000000,00000014,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,Arial), ref: 007CB19A
      • SetBkColor.GDI32(?,00000000), ref: 007CB1AA
      • SelectObject.GDI32(?,00000000), ref: 007CB1B8
      • SetTextColor.GDI32(?,00FFFFFF), ref: 007CB1C4
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CB253
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CB2AD
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CB312
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CB361
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CB374
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007CB387
      • GetDC.USER32(?), ref: 007CB390
      • TextOutA.GDI32(?,00000005,00000000,?,?), ref: 007CB3D0
      • DeleteObject.GDI32(?), ref: 007CB41E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: MessageSend$Create$Gdip$Image$Object$Bitmap$ColorCompatibleSelectText$Dispose_memset$ClientDeleteEncodersFileFontRectReleaseSave_malloc_strtok$AllocateCriticalErrorExtensionFindFromHeapInitializeLastPathSectionSize__snprintf_free_memmove
      • String ID: %s_%s.%s$/: $Arial$CHANNEL$_$bmp$jpg
      • API String ID: 3804205151-906809398
      • Opcode ID: 496eabc450b246697561221677a5db6d548ebdc2d69d1609c477674ae8c7f7d5
      • Instruction ID: 1433367d21130fefc1a0c56bd6249100bc71560f32b49d47a41d971cdfb63ba9
      • Opcode Fuzzy Hash: 496eabc450b246697561221677a5db6d548ebdc2d69d1609c477674ae8c7f7d5
      • Instruction Fuzzy Hash: 83829271901219ABEF21DB64CC4AFEEB7B8AF44314F0401ACF509AA2D2DB756E85CF51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset_sprintf$_memmove
      • String ID: %s&VIDEO_BITRATE&VIDEO_RESOLUTION&VIDEO_FPS_NUM&VIDEO_BRIGHTNESS&VIDEO_CONTRAST&VIDEO_HUE&VIDEO_SATURATION&VIDEO_MJPEG_QUALITY$%s&VIDEO_BITRATE&VIDEO_RESOLUTION&VIDEO_FPS_NUM&VIDEO_BRIGHTNESS&VIDEO_CONTRAST&VIDEO_HUE&VIDEO_SATURATION&VIDEO_MJPEG_QUALITY$%s&VIDEO_BITRATE&VIDEO_RESOLUTION&VIDEO_FPS_NUM&VIDEO_BRIGHTNESS&VIDEO_CONTRAST&VIDEO_HUE&VIDEO_SATURATION&VIDEO_MJPEG_QUALITY$1.2M$1.5M$128K$2.5M$256K$3.5M$384K$4.5M$5.5M$500K$750K$H264$MJPEG$MPEG4$N128$N128$N128$N160$N160$N160$N176$N192$N192$N203$N203$N203$N204$N259$N320$N352$N364$N640$N640$N720$P176$P352$P640$P720$VIDEO_BITRATE=$VIDEO_BRIGHTNESS=$VIDEO_CONTRAST=$VIDEO_ENCODER=$VIDEO_FPS_NUM=$VIDEO_HUE=$VIDEO_MJPEG_QUALITY=$VIDEO_RESOLUTION=$VIDEO_SATURATION=$x120
      • API String ID: 1395474088-3257838334
      • Opcode ID: 9555c257677e50863c8fb10cea77ceb398bff764581125248048cc749f409f58
      • Instruction ID: 6e4bf70fccb29b15580320c90425ee10adeb7c604ca0d4d29b51c42185eb1823
      • Opcode Fuzzy Hash: 9555c257677e50863c8fb10cea77ceb398bff764581125248048cc749f409f58
      • Instruction Fuzzy Hash: FE82ACB5904259CEDF21CF14C940BB8B7B1BF51304F4584EAC6499B343EB78AE89CBA5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf
      • String ID: %smpeg4?USER=%s&PWD=%s&CHANNEL=%d&DIO_OUTPUT=0x%.2x$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&SERIAL_SETTING=%s,%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_BITRATE=%s$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_BRIGHTNESS=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_CONTRAST=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_FPS_NUM=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_HUE=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_RESOLUTION=%s$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_SATURATION=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_VARIABLE_FPS=%d,%d$%smpeg4?USER=%s&PWD=%s&DIO_OUTPUT=0x%.2x$%smpeg4?USER=%s&PWD=%s&SERIAL_SETTING=%s,%d$%smpeg4?USER=%s&PWD=%s&VIDEO_BITRATE=%s$%smpeg4?USER=%s&PWD=%s&VIDEO_BRIGHTNESS=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_CONTRAST=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_FPS_NUM=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_HUE=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_RESOLUTION=%s$%smpeg4?USER=%s&PWD=%s&VIDEO_SATURATION=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_VARIABLE_FPS=%d,%d$%ssystem?USER=%s&PWD=%s&SAVE_REBOOT$1.2M$1.5M$128K$2.5M$256K$28K$3.5M$384K$4.5M$5.5M$500K$56K$750K$7E2$7N2$7O2$8E1$8E2$8N1$8N2$8O1$8O2
      • API String ID: 233258989-116617301
      • Opcode ID: 3f867a15938620fa1e09fed768e41c8bdcefde8b8f944930b3b5eea3cd86b481
      • Instruction ID: 771321b99f79f262641ae88e801f558031ba02ef4caa8823290d973b1a3f376a
      • Opcode Fuzzy Hash: 3f867a15938620fa1e09fed768e41c8bdcefde8b8f944930b3b5eea3cd86b481
      • Instruction Fuzzy Hash: 2D22D572700609BAEF15CA51CC81FFBB3ACFB49340F108657F65E93081DB69A954DBA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: %smpeg4?USER=%s&PWD=%s&CHANNEL=%d&DIO_OUTPUT=0x%.2x$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&SERIAL_SETTING=%s,%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_BITRATE=%s$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_BRIGHTNESS=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_CONTRAST=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_FPS_NUM=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_HUE=%d$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_RESOLUTION=%s$%smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_SATURATION=%d$%smpeg4?USER=%s&PWD=%s&DIO_OUTPUT=0x%.2x$%smpeg4?USER=%s&PWD=%s&SERIAL_SETTING=%s,%d$%smpeg4?USER=%s&PWD=%s&VIDEO_BITRATE=%s$%smpeg4?USER=%s&PWD=%s&VIDEO_BRIGHTNESS=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_CONTRAST=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_FPS_NUM=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_HUE=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_RESOLUTION=%s$%smpeg4?USER=%s&PWD=%s&VIDEO_SATURATION=%d$%ssystem?USER=%s&PWD=%s&SAVE_REBOOT$1.2M$1.5M$128K$2.5M$256K$28K$3.5M$384K$4.5M$5.5M$500K$56K$750K$7E2$7N2$7O2$8E1$8E2$8N1$8N2$8O1$8O2
      • API String ID: 1292703666-3923266174
      • Opcode ID: 734abe606f2d05c061f7ba5f41200c2024b0526d8c59d383102c5d6f132cf9fb
      • Instruction ID: ee90592020a2e61fc36b914dafed2c3d0313b88ee4eb0a00d81a87a7cb6f7e89
      • Opcode Fuzzy Hash: 734abe606f2d05c061f7ba5f41200c2024b0526d8c59d383102c5d6f132cf9fb
      • Instruction Fuzzy Hash: EF12D372604749BADF28CA54CC41FF6B3ACBB0D340F10C6A7F65E93180D768BA559BA1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _swscanf$_memmove_vscan_fn
      • String ID: %X,%X$%X,%X,%X,%X$,$0x%X$ABSZOOM$CHEK$PANCOUNTERCLOCK$P_H1$P_H2$P_HI$P_L1$P_L2$P_LO$SUM$T_H1$T_H2$T_HI$T_L1$T_L2$T_LO$Z_HI$Z_HI1$Z_LO$Z_LO1
      • API String ID: 205277358-72615087
      • Opcode ID: 3eeccb987b11e5b2a6826393334f76ff0f33d530c17acdf9723ada77f9300cba
      • Instruction ID: 49076c047d39fe787fdd1b5afed4b6a614aa41055520ee1705576cb11fc2ef25
      • Opcode Fuzzy Hash: 3eeccb987b11e5b2a6826393334f76ff0f33d530c17acdf9723ada77f9300cba
      • Instruction Fuzzy Hash: 6062F5B4A04258EFDF21CF68C890BBD7BB5AF05314F0441D8E689A7382D775AD85CB52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • A memory allocation failure occurred. , xrefs: 007A049B
      • A temporary failure in name resolution occurred., xrefs: 007A0549
      • The ai_family member of the hints parameter is not supported. , xrefs: 007A04E2
      • The ai_socktype member of the hints parameter is not supported. , xrefs: 007A04B9
      • A nonrecoverable failure in name resolution occurred. , xrefs: 007A052B
      • The servname parameter is not supported for the specified ai_socktype member of the hints parameter. , xrefs: 007A0500
      • The name does not resolve for the supplied parameters or the nodename and servname parameters were not provided. , xrefs: 007A0567
      • An invalid value was provided for the ai_flags member of the hints parameter., xrefs: 007A047D
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _wprintf$freeaddrinfogetaddrinfosocketswprintf
      • String ID: A memory allocation failure occurred. $A nonrecoverable failure in name resolution occurred. $A temporary failure in name resolution occurred.$An invalid value was provided for the ai_flags member of the hints parameter.$The ai_family member of the hints parameter is not supported. $The ai_socktype member of the hints parameter is not supported. $The name does not resolve for the supplied parameters or the nodename and servname parameters were not provided. $The servname parameter is not supported for the specified ai_socktype member of the hints parameter.
      • API String ID: 513888964-48089087
      • Opcode ID: 461abb4359d21f6fed84c1c41455c4296656558da7e7fdba7f89d2d9abbafc56
      • Instruction ID: 21e4c1783aeafe0f62784216a7580f73e516a62c17aac9ab22b19205bca2e706
      • Opcode Fuzzy Hash: 461abb4359d21f6fed84c1c41455c4296656558da7e7fdba7f89d2d9abbafc56
      • Instruction Fuzzy Hash: 38511831E141189BDF04EBB4AC06BFE77B4FF99310F10066AF80AA2281DE694A50DBD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • The ai_family member of the hints parameter is not supported. , xrefs: 007EA5BB
      • The servname parameter is not supported for the specified ai_socktype member of the hints parameter. , xrefs: 007EA5DC
      • A memory allocation failure occurred. , xrefs: 007EA56E
      • A temporary failure in name resolution occurred., xrefs: 007EA62B
      • The name does not resolve for the supplied parameters or the nodename and servname parameters were not provided. , xrefs: 007EA64C
      • An invalid value was provided for the ai_flags member of the hints parameter., xrefs: 007EA54D
      • A nonrecoverable failure in name resolution occurred. , xrefs: 007EA60A
      • The ai_socktype member of the hints parameter is not supported. , xrefs: 007EA58F
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _wprintf$freeaddrinfogetaddrinfoswprintf
      • String ID: A memory allocation failure occurred. $A nonrecoverable failure in name resolution occurred. $A temporary failure in name resolution occurred.$An invalid value was provided for the ai_flags member of the hints parameter.$The ai_family member of the hints parameter is not supported. $The ai_socktype member of the hints parameter is not supported. $The name does not resolve for the supplied parameters or the nodename and servname parameters were not provided. $The servname parameter is not supported for the specified ai_socktype member of the hints parameter.
      • API String ID: 2746762060-48089087
      • Opcode ID: e5785083019620d9ac2fec9e28190a7f5a607603e397b28a6cac3fb3435fc1b1
      • Instruction ID: f00de7bbaeae2869322b8363bbdebd681821103c38bacbac07986ef84f696ee7
      • Opcode Fuzzy Hash: e5785083019620d9ac2fec9e28190a7f5a607603e397b28a6cac3fb3435fc1b1
      • Instruction Fuzzy Hash: 0151FC72E05158ABCF14EB94E806BFF77A4DFEA320F04016FE806A3242DD651964D6D2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strstr$_memset
      • String ID: CSeq:$Cseq:$DESCRIBE$GET_PARAMETER$OPTIONS$PAUSE$PLAY$Public:$SETUP$SET_PARAMETER$TEARDOWN
      • API String ID: 4073161655-2982102744
      • Opcode ID: 845160e4527dc4657d20d9ecb01a900261e44244fe7dc7d9d246f6b8e6d48639
      • Instruction ID: c1502fd58f42371eb5c6c61932a2b855126667840fb79ae96d86bf221fdefa18
      • Opcode Fuzzy Hash: 845160e4527dc4657d20d9ecb01a900261e44244fe7dc7d9d246f6b8e6d48639
      • Instruction Fuzzy Hash: C6E13BB1A451885ADF35CB30A861BFABBA5AB73310F1C44E9D8C787242E67E89C4C750
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 0079607E
        • Part of subcall function 00795F30: _memset.LIBCMT ref: 00795F63
        • Part of subcall function 00795F30: swprintf.LIBCMT ref: 00796005
        • Part of subcall function 007B94E0: ___from_strstr_to_strchr.LIBCMT ref: 007B9501
        • Part of subcall function 007B94E0: ___from_strstr_to_strchr.LIBCMT ref: 007B951F
      • _strstr.LIBCMT ref: 0079610D
      • _strstr.LIBCMT ref: 00796125
      • _strstr.LIBCMT ref: 007961BA
      • _memset.LIBCMT ref: 0079624F
      • swprintf.LIBCMT ref: 00796266
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset_strstr$___from_strstr_to_strchrswprintf
      • String ID: CSeq:$Cseq:$DESCRIBE$OPTIONS$PAUSE$PLAY$Public:$SETUP$SET_PARAMETER$TEARDOWN
      • API String ID: 3439391166-4100872077
      • Opcode ID: 0dd4e0dcf5e12572fc77c7eda5fa68c208129e3996642b85726c1ef6c6d994ba
      • Instruction ID: ab3f3aad54677fafabc8afcb6cccf9161212cc3ed4e3a6cb0b63c0e96dc5d4b0
      • Opcode Fuzzy Hash: 0dd4e0dcf5e12572fc77c7eda5fa68c208129e3996642b85726c1ef6c6d994ba
      • Instruction Fuzzy Hash: CBD16FB1E441995ADF358B30B861BF97B65AF32304F1802E9D9C687242E77E9EC4CB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove
      • String ID: ?$?$list<T> too long
      • API String ID: 4104443479-2182746332
      • Opcode ID: 983aa10fd32f6f437ce15cd8829fe952a31a157b92acbf33cb50f79556e46878
      • Instruction ID: 0b5df5b22b1cd40c0ce939635016c3d73ba6a41b75117b9fbd9b385ec1730162
      • Opcode Fuzzy Hash: 983aa10fd32f6f437ce15cd8829fe952a31a157b92acbf33cb50f79556e46878
      • Instruction Fuzzy Hash: FE927070A002699FDB64CF28C851BA9B7B1FF86304F1482E9E94D9B342E7349E95CF51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • socket.WS2_32(00000002,00000002,00000000), ref: 007B4558
      • setsockopt.WS2_32(00000000,0000FFFF,00000004,00000001,00000004), ref: 007B4575
      • htons.WS2_32(0077CF32), ref: 007B4585
      • htonl.WS2_32(00000000), ref: 007B4591
      • bind.WS2_32(?,?,00000010), ref: 007B45A0
      • inet_addr.WS2_32(?), ref: 007B45AC
      • setsockopt.WS2_32 ref: 007B45C5
      • setsockopt.WS2_32(?,0000FFFF,00001006,00001388,00000004), ref: 007B45E3
      • recvfrom.WS2_32(?,00000000,0000FFFF,00000000,?,?), ref: 007B4650
      • _memmove.LIBCMT ref: 007B467D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: setsockopt$_memmovebindhtonlhtonsinet_addrrecvfromsocket
      • String ID: #y
      • API String ID: 1227263002-377225401
      • Opcode ID: c853e4a2f8343de933ec1f25e97e48420157e9625a600748b26e796139a016d8
      • Instruction ID: b0eb256b6c89362b4f08247d84608e688745487200f7bfdddbb5d5ec804bf3d1
      • Opcode Fuzzy Hash: c853e4a2f8343de933ec1f25e97e48420157e9625a600748b26e796139a016d8
      • Instruction Fuzzy Hash: F851D472901219ABDB149F58DC46FEA77A4FF48310F048228FE489F382D7B5D955CBA1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf_swscanf
      • String ID: 0x%X$=
      • API String ID: 748089147-551125171
      • Opcode ID: 7767d2a32b2d187790a7b99bfd51f448d817e9252146748826d34a027c62505d
      • Instruction ID: 242d95993e2a882e8cc88bfc2f133f6738ac8e70586f233596860135253e3e96
      • Opcode Fuzzy Hash: 7767d2a32b2d187790a7b99bfd51f448d817e9252146748826d34a027c62505d
      • Instruction Fuzzy Hash: 2212D2B0E0425CDFDF24CF64C890BEDBBB5BF45304F644199D449AB242E738AA85CB52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3_GS.LIBCMT ref: 008140E5
      • _memset.LIBCMT ref: 0081414E
      • GetVersionExA.KERNEL32(00000094,6838016B), ref: 00814167
      • _malloc.LIBCMT ref: 0081419E
      • _memset.LIBCMT ref: 008141B7
      • __cftof.LIBCMT ref: 0081428B
      • CoInitializeEx.OLE32(00000000,00000002), ref: 008142E5
      • CoCreateInstance.OLE32(009C23D0,00000000,00000001,009978A0,?), ref: 0081432C
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$CreateH_prolog3_InitializeInstanceVersion__cftof_malloc
      • String ID: @
      • API String ID: 173258153-2766056989
      • Opcode ID: 09795c41a024d154b3c52e609e8ae67e7a8348febe174c364e23bea9c1111172
      • Instruction ID: 5361f7fee19ef8a60b0e6d669ba2c9e1c992bd5ff681141be51c1d665d3216fc
      • Opcode Fuzzy Hash: 09795c41a024d154b3c52e609e8ae67e7a8348febe174c364e23bea9c1111172
      • Instruction Fuzzy Hash: E58105B4A007159FDB60DF38C845B96BBE8FF45314F00856DA5AEDB382DB74A9888B11
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • htons.WS2_32(?), ref: 007A2913
      • _memmove.LIBCMT ref: 007A2B6F
      • _memmove.LIBCMT ref: 007A2B9A
      • _memmove.LIBCMT ref: 007A2BED
      • htons.WS2_32(00008000), ref: 007A2D14
        • Part of subcall function 007A09A0: _memmove.LIBCMT ref: 007A09FA
        • Part of subcall function 007B5930: _memset.LIBCMT ref: 007B5961
      • _memmove.LIBCMT ref: 007A2A71
        • Part of subcall function 007B6600: _memset.LIBCMT ref: 007B6613
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$_memsethtons
      • String ID:
      • API String ID: 4219588475-0
      • Opcode ID: 92011ff9ce2ffd53dc9f33ee29b3988c3ac94f65b2b9bb84da116bd016e74e6f
      • Instruction ID: 1b217188cd1b182c122f02856170075f9e0999ced6d0c6785765fe3a8e215eb4
      • Opcode Fuzzy Hash: 92011ff9ce2ffd53dc9f33ee29b3988c3ac94f65b2b9bb84da116bd016e74e6f
      • Instruction Fuzzy Hash: BE32D3719002498FCF14DF68C885BEEB7B5EF86314F184269E8499F247D738E946CB60
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • socket.WS2_32(00000002,00000002,00000011), ref: 007BAA1E
      • htonl.WS2_32(00000000), ref: 007BAA54
      • htons.WS2_32(?), ref: 007BAA60
      • bind.WS2_32(?,?,00000010), ref: 007BAA73
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: bindhtonlhtonssocket
      • String ID:
      • API String ID: 1577352343-0
      • Opcode ID: 1fe9f24d0f3fcf32a3563d51f6d47f86432bca68bd6790df98e7706a82165b24
      • Instruction ID: 5488b5326b2b3f45700d009a5eeb5ed5154352f13faa621b96d99165b2318323
      • Opcode Fuzzy Hash: 1fe9f24d0f3fcf32a3563d51f6d47f86432bca68bd6790df98e7706a82165b24
      • Instruction Fuzzy Hash: F141F671A10208AADB10EBB0DD46FFEB7B4EF49720F10422AFA11A62D0DB755944DB60
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 00780C0C
      • _memset.LIBCMT ref: 00780C26
      • _memset.LIBCMT ref: 00780C40
      • swprintf.LIBCMT ref: 00780D1C
      • swprintf.LIBCMT ref: 00780D6E
        • Part of subcall function 0092A617: ___report_securityfailure.LIBCMT ref: 0092A61C
        • Part of subcall function 007965C0: _strstr.LIBCMT ref: 00796682
        • Part of subcall function 007965C0: _strstr.LIBCMT ref: 0079669A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$_strstrswprintf$___report_securityfailure
      • String ID: rtsp://%s:%s@%s:%d$rtsp://%s:%s@%s:%d%s$rtsp://%s:%s@%s:%d/%s
      • API String ID: 3702750530-4100196092
      • Opcode ID: e4d75bf11d869541b3f66d004ff42bfef4c59c2990c81a185ece7760c5e78dbe
      • Instruction ID: a8a19cb33e7dbbd4ad220f0c325f781f9e91aa7fec207c86fe788acd1ba734d5
      • Opcode Fuzzy Hash: e4d75bf11d869541b3f66d004ff42bfef4c59c2990c81a185ece7760c5e78dbe
      • Instruction Fuzzy Hash: 7CD127715443048FCB24EF29C894BEFB3E9EF85300F4446ADE999AB241D738A949CBD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007ED160: timeBeginPeriod.WINMM(00000001), ref: 007ED18F
        • Part of subcall function 007ED160: CreateWaitableTimerA.KERNEL32(00000000,00000000,00000000), ref: 007ED19B
        • Part of subcall function 007ED160: SetWaitableTimer.KERNEL32(?,FFFFD8F0,00000000,00000000,00000000,00000000), ref: 007ED1D1
        • Part of subcall function 007ED160: GetCurrentProcess.KERNEL32 ref: 007ED1DD
        • Part of subcall function 007ED160: GetPriorityClass.KERNEL32(00000000), ref: 007ED1E4
        • Part of subcall function 007ED160: GetCurrentThread.KERNEL32 ref: 007ED1ED
        • Part of subcall function 007ED160: GetThreadPriority.KERNEL32(00000000), ref: 007ED1F4
        • Part of subcall function 007ED160: GetCurrentProcess.KERNEL32(00000100), ref: 007ED202
        • Part of subcall function 007ED160: SetPriorityClass.KERNEL32(00000000), ref: 007ED209
        • Part of subcall function 007ED160: GetCurrentThread.KERNEL32 ref: 007ED211
        • Part of subcall function 007ED160: SetThreadPriority.KERNEL32(00000000), ref: 007ED218
        • Part of subcall function 007ED160: QueryPerformanceFrequency.KERNEL32(?), ref: 007ED22E
        • Part of subcall function 007ED160: QueryPerformanceCounter.KERNEL32(?), ref: 007ED23E
        • Part of subcall function 007ED160: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007ED249
        • Part of subcall function 007ED160: QueryPerformanceCounter.KERNEL32(?,?,?,00000010,00000000), ref: 007ED278
      • GetTickCount.KERNEL32 ref: 007DA82D
      • SetEvent.KERNEL32(?), ref: 007DA8DF
      • Sleep.KERNEL32(00000064), ref: 007DA8FA
      • ResetEvent.KERNEL32(?), ref: 007DA914
      • _memmove.LIBCMT ref: 007DAAA7
      • SetEvent.KERNEL32(?,?,00000000,?,6838016B), ref: 007DAABC
      • WaitForSingleObject.KERNEL32(?,?,?,?,000003E8,00000000,00000000,?,00000000,?,6838016B), ref: 007DAE54
      • SetEvent.KERNEL32(?,00000000,?,00000000,6838016B,00000000,00000000), ref: 007DAF9C
        • Part of subcall function 007D1950: CDECCreate.ARCHIVEPLAYER ref: 007D198F
        • Part of subcall function 007D1950: CDECSetFormat.ARCHIVEPLAYER(00000000,?), ref: 007D199B
        • Part of subcall function 007D1950: CDECSetDeblock.ARCHIVEPLAYER(00000000,?,00000000,?), ref: 007D19A6
        • Part of subcall function 007D1950: CDECSetQuality.ARCHIVEPLAYER(00000000,?,00000000,?,00000000,?), ref: 007D19B1
      • CDECRelease.ARCHIVEPLAYER(?,?,00000000,00000000,?,00000000,00000000), ref: 007DB127
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CurrentEventPriorityThread$PerformanceQuery$ClassCounterCreateProcessTimerWaitable$BeginCountDeblockFormatFrequencyObjectPeriodQualityReleaseResetSingleSleepTickUnothrow_t@std@@@Wait__ehfuncinfo$??2@_memmovetime
      • String ID:
      • API String ID: 59148844-0
      • Opcode ID: be2b38da6c5e79805665d49a8a56bbd3bef05576ba113f6b9e1cc957e86bd326
      • Instruction ID: f14f109c1a8ec3b7b3aa93b7b370249c8fae7e32d88eeaaeea6904127afccb88
      • Opcode Fuzzy Hash: be2b38da6c5e79805665d49a8a56bbd3bef05576ba113f6b9e1cc957e86bd326
      • Instruction Fuzzy Hash: F1629F70E00649EBDB19CFB8C854BEDFBB5BF48300F14425AE469A7351DB38A991CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$_memsethtons
      • String ID:
      • API String ID: 4219588475-0
      • Opcode ID: ed1b999751d095e6e4019106e38955daca7299d6b5719e7403b9a726477be569
      • Instruction ID: 9a12ce9b525705ef54da58116dfcb5a4ce74c53463de91cd8aed5b2d8a043246
      • Opcode Fuzzy Hash: ed1b999751d095e6e4019106e38955daca7299d6b5719e7403b9a726477be569
      • Instruction Fuzzy Hash: 4FF10531E00249AFDF14CFA8C495BEEBBB4EF86314F148299D4189B382D339D956CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove
      • String ID: ?$list<T> too long
      • API String ID: 4104443479-2745021669
      • Opcode ID: 5236fb2ffd75115e61c6cb55d284bae180c047ddcbc9907b56396304b88a003a
      • Instruction ID: 34a502b584e582475c98c93024ef4867a3f29d4fa5731b5a219b50179eb67a3f
      • Opcode Fuzzy Hash: 5236fb2ffd75115e61c6cb55d284bae180c047ddcbc9907b56396304b88a003a
      • Instruction Fuzzy Hash: 2232A071A002298FDB64CF28D890BA9B7B1FF46304F1481E9E94D9B342DB759D85CF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 008144DC
      • _strlen.LIBCMT ref: 0081459C
      • _strlen.LIBCMT ref: 008145A5
      • _strlen.LIBCMT ref: 00814611
        • Part of subcall function 0080BFB6: __EH_prolog3.LIBCMT ref: 0080BFBD
      • _memcpy_s.LIBCMT ref: 0081465C
      • _strlen.LIBCMT ref: 00814674
      • _memcpy_s.LIBCMT ref: 008146C2
        • Part of subcall function 0081092F: __CxxThrowException@8.LIBCMT ref: 00810943
      • PathRemoveFileSpecW.SHLWAPI(?,?,?,00000000), ref: 008147F3
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strlen$H_prolog3_memcpy_s$Exception@8FilePathRemoveSpecThrow
      • String ID:
      • API String ID: 3593942973-0
      • Opcode ID: 47e028abe5be338454e931b1181d9b74aea94fac656ae7409b597c391d9efb80
      • Instruction ID: d17b36e57631102482720d306156a7e91bf89c4ca7e7f1df68e34a1cda067413
      • Opcode Fuzzy Hash: 47e028abe5be338454e931b1181d9b74aea94fac656ae7409b597c391d9efb80
      • Instruction Fuzzy Hash: B902DF70A0120A9FDB18DF68C851BEEBBB9FF44315F14926DE511EB2A1DB309D41CB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$htons
      • String ID:
      • API String ID: 1994645662-0
      • Opcode ID: 39b892bba6aef1f61b011bcc2f62b0f1711b02213437491e6fa48f9b71bce64c
      • Instruction ID: 110a2a9fb20b57222edabfd2ea6ea17fc2a075c9ea000a638dcf01efbecf8bb8
      • Opcode Fuzzy Hash: 39b892bba6aef1f61b011bcc2f62b0f1711b02213437491e6fa48f9b71bce64c
      • Instruction Fuzzy Hash: 98F11671A0054A9FDF14DFA8C855BEEBBE4EF86314F048299E4199B383C739DA42CB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007C87C2
      • KEnableStretchMode.ARCHIVEPLAYER(?,00000001), ref: 007C87E7
      • GetClientRect.USER32(?,?), ref: 007C880A
      • __dtol3.LIBCMT ref: 007C8905
      • __dtol3.LIBCMT ref: 007C895E
      • KSetRenderInfo.ARCHIVEPLAYER(?,?), ref: 007C8B14
        • Part of subcall function 007CB6F0: KGetVideoConfig3.ARCHIVEPLAYER ref: 007CB742
        • Part of subcall function 007CB6F0: _memset.LIBCMT ref: 007CB76B
        • Part of subcall function 007CB6F0: _sprintf.LIBCMT ref: 007CB77B
        • Part of subcall function 007CB6F0: _sprintf.LIBCMT ref: 007CB7A8
        • Part of subcall function 007CB6F0: GetClientRect.USER32(?,?), ref: 007CB832
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ClientRect__dtol3_sprintf$Config3EnableInfoMessageModeRenderSendStretchVideo_memset
      • String ID:
      • API String ID: 215431663-0
      • Opcode ID: 4f88c0accaefb2b792c9a418972e3248a9e5b46ee5c6f138c80aeb618da2fdb4
      • Instruction ID: bb5dacfa357f8ebc87b0eaa9bf338d6df69ac11606ac700b6faea75dd09680c8
      • Opcode Fuzzy Hash: 4f88c0accaefb2b792c9a418972e3248a9e5b46ee5c6f138c80aeb618da2fdb4
      • Instruction Fuzzy Hash: 2581E430934B488ED763DB769851B59B3A4EF59380F14872FE40BB6262FB2978D1DB01
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: htons$ErrorLast_memsethtonlrecvfrom
      • String ID:
      • API String ID: 2258917609-0
      • Opcode ID: 4fa9e6ac060727816943418644f873fc43f1a924e45cf45d10a924c012f1c2ba
      • Instruction ID: 34fec0e68258e89363cdac170e35e0f2b8493dfdc312f9de73e6bedd00fd49b2
      • Opcode Fuzzy Hash: 4fa9e6ac060727816943418644f873fc43f1a924e45cf45d10a924c012f1c2ba
      • Instruction Fuzzy Hash: 6951D3319012588BCF39DB24D855BFEB3B1EF89314F10069EE48A56681CBF5A984CB45
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • socket.WS2_32(00000002,00000002,00000000), ref: 007B4876
      • setsockopt.WS2_32(00000000,0000FFFF,00000004,00000001,00000004), ref: 007B4893
      • htons.WS2_32(?), ref: 007B48A3
      • htonl.WS2_32(00000000), ref: 007B48AF
      • bind.WS2_32(?,?,00000010), ref: 007B48BE
      • inet_addr.WS2_32(?), ref: 007B48CA
      • setsockopt.WS2_32 ref: 007B48E3
      • setsockopt.WS2_32(?,0000FFFF,00001006,?), ref: 007B4918
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: setsockopt$bindhtonlhtonsinet_addrsocket
      • String ID:
      • API String ID: 3565660032-0
      • Opcode ID: a84dd1618f550533a1c289aed613cc26ea756dafe8bd5a8999a74eb53458ad98
      • Instruction ID: 8ef89ffa320985436fb44f413e60e267b6d05613b2cd4acf0c5948763f38a2a4
      • Opcode Fuzzy Hash: a84dd1618f550533a1c289aed613cc26ea756dafe8bd5a8999a74eb53458ad98
      • Instruction Fuzzy Hash: 3721B471255306BBEB109F61DC0AF95BBA4FF08720F108219FA08976D0D7B1A964DB94
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetSystemTimeAsFileTime.KERNEL32(?,?,00000000,?), ref: 0092CE2D
      • __aulldiv.LIBCMT ref: 0092CE47
      • GetTimeZoneInformation.KERNEL32(?,?,?,23C34600,00000000), ref: 0092CE61
      • __aulldiv.LIBCMT ref: 0092CEB9
      • __aullrem.LIBCMT ref: 0092CEC7
      • __aulldiv.LIBCMT ref: 0092CEE5
        • Part of subcall function 0092F66F: __getptd_noexit.LIBCMT ref: 0092F66F
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Time__aulldiv$FileInformationSystemZone__aullrem__getptd_noexit
      • String ID:
      • API String ID: 767840697-0
      • Opcode ID: 5b2f00b29573703959cb16870ee4a2519123b201c953c7633a52e949cab0e269
      • Instruction ID: c3ba58b35910167e0915608db3bcc3eb9e8b4132d6bad2cffb5bb6f286630f3e
      • Opcode Fuzzy Hash: 5b2f00b29573703959cb16870ee4a2519123b201c953c7633a52e949cab0e269
      • Instruction Fuzzy Hash: 3C31C2B1A04324ABDB20EB74BC86BAEB3BDEB49300F11455AF105A7295DB309D80CB55
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 008163F8
      • _strlen.LIBCMT ref: 00816419
      • __cftof.LIBCMT ref: 0081644D
      • FtpFindFirstFileA.WININET(?,?,?,?,?), ref: 0081646B
        • Part of subcall function 009303A2: __mbspbrk_l.LIBCMT ref: 009303AD
        • Part of subcall function 008165EE: FtpGetCurrentDirectoryA.WININET(?,00000000,00000000), ref: 0081660E
      • FtpSetCurrentDirectoryA.WININET(?,?), ref: 008164C2
      • FtpSetCurrentDirectoryA.WININET(?,?), ref: 008164DB
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CurrentDirectory$FileFindFirstH_prolog3__cftof__mbspbrk_l_strlen
      • String ID:
      • API String ID: 2660972557-0
      • Opcode ID: 262b7231e8c39c9750d9c08e3e329e80a719c98cf8d2ca9ae1cb80c9fdbd24c3
      • Instruction ID: 78afe59ac590f9dba1054567a92ffb58de933fe4a89bec6e77a65eb99083fd15
      • Opcode Fuzzy Hash: 262b7231e8c39c9750d9c08e3e329e80a719c98cf8d2ca9ae1cb80c9fdbd24c3
      • Instruction Fuzzy Hash: 4441D37160060AABCF14AF68CC96FEA77ADFF40314F048528F955D7282EB34D9A08B50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007A0650: swprintf.LIBCMT ref: 007A06BF
        • Part of subcall function 007A0650: getaddrinfo.WS2_32(?,?,?,?), ref: 007A06D3
        • Part of subcall function 007A0650: _wprintf.LIBCMT ref: 007A0749
        • Part of subcall function 007A0650: freeaddrinfo.WS2_32(?), ref: 007A0753
      • socket.WS2_32(?,?,00000011), ref: 007BAB82
      • freeaddrinfo.WS2_32(00000000,?,?,?,007BB28A,?,?,?,007A13EF), ref: 007BAB95
      • bind.WS2_32(00000000,?,?), ref: 007BABAF
      • freeaddrinfo.WS2_32(00000000,?,?,?,007BB28A,?,?,?,007A13EF), ref: 007BABBC
      • freeaddrinfo.WS2_32(00000000,?,?,?,007BB28A,?,?,?,007A13EF), ref: 007BABDA
      • setsockopt.WS2_32(000000FF,0000FFFF,00000080,?,00000004), ref: 007BAC11
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: freeaddrinfo$_wprintfbindgetaddrinfosetsockoptsocketswprintf
      • String ID:
      • API String ID: 1215792191-0
      • Opcode ID: 2ebf2a542691790100c6300363310f477b2c97ed4b5ba424b45e1acb77f2cbcd
      • Instruction ID: 8d29d28e04152516ec561bcaa92b1b3bcf64b913b96641041b156f9129bb9f6b
      • Opcode Fuzzy Hash: 2ebf2a542691790100c6300363310f477b2c97ed4b5ba424b45e1acb77f2cbcd
      • Instruction Fuzzy Hash: 29219F71524108FFCB14AFA4DD49FED7BA9EF08720F108349F925972E0CB759A10AB51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strlen
      • String ID: none
      • API String ID: 4218353326-2140143823
      • Opcode ID: e86144b83faf2609faa7d8d431108f4df0db19410885fac3b8cd67c8cfb4e814
      • Instruction ID: 0174e0fa88e114d341cd34f4ccac7937bc92479834673c60682fef90a17ef77a
      • Opcode Fuzzy Hash: e86144b83faf2609faa7d8d431108f4df0db19410885fac3b8cd67c8cfb4e814
      • Instruction Fuzzy Hash: E9915C71A083449FD764DF19C48066BBBE2FBC5340F69892EF49987350DB79A8818B86
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __floor_pentium4_abort
      • String ID: $(
      • API String ID: 3575410383-55695022
      • Opcode ID: a41cd5a54a28224d420d982f555b31aece4e1a459780aebca0e6f35b2f39fce7
      • Instruction ID: 4481e013c9a2a6e80960657b97cd7b34fda15f139b77b4a784cdbb93e03b69e7
      • Opcode Fuzzy Hash: a41cd5a54a28224d420d982f555b31aece4e1a459780aebca0e6f35b2f39fce7
      • Instruction Fuzzy Hash: D30311B5A093818BD374DF19C580BDABBE1FBC8300F51892ED8DD97255EB35A854CB82
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID: pow
      • API String ID: 0-2276729525
      • Opcode ID: ee005337c5f265bdf4bbbec04b27e32a1bd544e2a0e900eb98afca22d746bfc5
      • Instruction ID: fa5109d626c35ee204cf83f40eaba4e7ab8c6688f53d617f2c231f95b934109b
      • Opcode Fuzzy Hash: ee005337c5f265bdf4bbbec04b27e32a1bd544e2a0e900eb98afca22d746bfc5
      • Instruction Fuzzy Hash: F4524521D29F014DD723D639E832336A38CAFA63D5F15C727EC5AB5AA5EB28C5C74201
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SendMessageA.USER32(?,000000F0,00000000,00000000), ref: 007C84E9
      • GetSystemMetrics.USER32(00000000), ref: 007C84F9
      • GetSystemMetrics.USER32(00000001), ref: 007C8500
      • KEnableStretchMode.ARCHIVEPLAYER(?,00000001), ref: 007C850D
      • KSetRenderInfo.ARCHIVEPLAYER(?,00000000,00000003,00000001), ref: 007C86CA
        • Part of subcall function 00802D2D: _malloc.LIBCMT ref: 00802D49
        • Part of subcall function 007CCB60: CreateSolidBrush.GDI32(00000000), ref: 007CCBD1
        • Part of subcall function 007CCB60: GetSystemMetrics.USER32(00000000), ref: 007CCBF0
        • Part of subcall function 007CCB60: GetSystemMetrics.USER32(00000001), ref: 007CCBFB
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: MetricsSystem$BrushCreateEnableInfoMessageModeRenderSendSolidStretch_malloc
      • String ID:
      • API String ID: 2271463591-0
      • Opcode ID: 27527369bba3102dda44b2f1d1dfefb352cd91ceb6d025050abb8f300f5fa56d
      • Instruction ID: 55f832caa8987524e81fbdcaac0e21aa511bae6b85067a60cd0217b3a69e2b14
      • Opcode Fuzzy Hash: 27527369bba3102dda44b2f1d1dfefb352cd91ceb6d025050abb8f300f5fa56d
      • Instruction Fuzzy Hash: FA516E71E14B46AFD799CB78D845BA9F7A4FB04354F00432EE42DA7281EB787861CB81
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 0ee4ef1bf8253ed8ff622a961fcae79c1a372775728276131673e8b533c339a6
      • Instruction ID: 4b3854556edd47a83d26e42c2e7b2daa4bad8246add16022fa675f70f83c7b49
      • Opcode Fuzzy Hash: 0ee4ef1bf8253ed8ff622a961fcae79c1a372775728276131673e8b533c339a6
      • Instruction Fuzzy Hash: 2B41E772B002498FDB14DF689C402EEB7B6EFA5300B54466ED556EB342EA34EA05C791
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 0040A690: _malloc.LIBCMT ref: 0040A6C5
        • Part of subcall function 0040A690: _memset.LIBCMT ref: 0040A6EC
        • Part of subcall function 0040A630: _malloc.LIBCMT ref: 0040A64D
        • Part of subcall function 0040A630: _memset.LIBCMT ref: 0040A674
      • _abort.LIBCMT ref: 009750A1
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _malloc_memset$_abort
      • String ID:
      • API String ID: 2765371052-0
      • Opcode ID: 567b1c0c00f03a4c47214a6d34d2b1d883af376b3e858b01461d5edbe980665c
      • Instruction ID: 469ccee32417c07819db4528585a986de9042a87ea79aa6fe2390a532e8e1414
      • Opcode Fuzzy Hash: 567b1c0c00f03a4c47214a6d34d2b1d883af376b3e858b01461d5edbe980665c
      • Instruction Fuzzy Hash: BA52B4F3F042039BCF167E14C4942D23BE5EB84790F2A8975DC899B29AF7358C158AD6
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _localeconv
      • String ID:
      • API String ID: 3179389760-0
      • Opcode ID: 5017e82a91b427257c1af32d99565d0c36173076b9c88a0b203fd541be23ce36
      • Instruction ID: aac39f09f26a72940db8fca3329bc3b5e33a387f6e409b88744a4810763bb3b2
      • Opcode Fuzzy Hash: 5017e82a91b427257c1af32d99565d0c36173076b9c88a0b203fd541be23ce36
      • Instruction Fuzzy Hash: AC32BF71A083518FD720CF29C48472ABBE1BF85324F19896DE8D58B382D379ED49DB52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset
      • String ID:
      • API String ID: 2102423945-0
      • Opcode ID: 986a3148ae4de5fe6e8b2af331abf02cddae61f47f23953e5c797085a352ac5f
      • Instruction ID: 09efc33e26e3e783418edb5691c68d4c452c63a3c3241329b92bdacc31dea654
      • Opcode Fuzzy Hash: 986a3148ae4de5fe6e8b2af331abf02cddae61f47f23953e5c797085a352ac5f
      • Instruction Fuzzy Hash: E642CE71E046A9DADB118B39CC41AE9F7B5BF59300F00839AF98DB2251EB746AD4CF50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset
      • String ID:
      • API String ID: 2102423945-0
      • Opcode ID: df823aa093730bad781b41164d9df677f51e83000b1e85fcb110658d986b7ab1
      • Instruction ID: 6266b4a44d3e3d7e2f019eef1e6d5c982e7272eda644f5346f9978534f1e547b
      • Opcode Fuzzy Hash: df823aa093730bad781b41164d9df677f51e83000b1e85fcb110658d986b7ab1
      • Instruction Fuzzy Hash: 4CD17F3180025C8FCF65CF18C8957E977B4FF5A304F1444E9CA999B346DA785A8ACFA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset
      • String ID:
      • API String ID: 2102423945-0
      • Opcode ID: a9bcaea226ab9ea61bc31ba91d5d4c85bd6a471a636e0ed1e76facb94d9db58d
      • Instruction ID: 3452ebba9a5c29dfb283fabb34424dececf787520d67aef1aac00edf3768e86d
      • Opcode Fuzzy Hash: a9bcaea226ab9ea61bc31ba91d5d4c85bd6a471a636e0ed1e76facb94d9db58d
      • Instruction Fuzzy Hash: AED1AF7584015D8FCF21CF28C8997E977B4EF25304F6440E9D98E9B246DA385B8ACFA1
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bb5a57d6ebcb15df25ee90d298474537237a8622b617871b7c37b9ff0968a0c6
      • Instruction ID: d6a21b54a3021a03e574159c76b0ee5c61b8a8a2a99ca48a9903fe6e19fc5efb
      • Opcode Fuzzy Hash: bb5a57d6ebcb15df25ee90d298474537237a8622b617871b7c37b9ff0968a0c6
      • Instruction Fuzzy Hash: 9A3270B7F516144BDB0CCB5DCCA16ACB3E3AFD821870E813DE84AD7705EA78E8058A44
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: eed3d646ad9b1b85bab7bb8891cc4034c29ec9ebdfb3769b5503cbfe61840675
      • Instruction ID: c22be8e56d46cc74e1efa527b3b2cfeeeb77deadbfcf4f37aa7d45f674d41575
      • Opcode Fuzzy Hash: eed3d646ad9b1b85bab7bb8891cc4034c29ec9ebdfb3769b5503cbfe61840675
      • Instruction Fuzzy Hash: 1E221CB3F211144BCB48CE6DCC927DAB3E3BF9821871E8539A819E7705E639D9158A84
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 235c41d859c4871244f80c50b7dee54b13dd4be5cb530c48ac82d159fa97de91
      • Instruction ID: 7612082652d25ccd4aafad2000837198ddf6d6053ad2f15e2995b3d00f447c23
      • Opcode Fuzzy Hash: 235c41d859c4871244f80c50b7dee54b13dd4be5cb530c48ac82d159fa97de91
      • Instruction Fuzzy Hash: 4FE1A875711B019FE728CE25CC41A66B3D5EF88310B10CA3DE5A6D3B86DB78E942CB90
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bbf21d0b3263a2d21515d7f524aa16152b47aaa55b5aa6e57c7e4267668a084d
      • Instruction ID: afd8576492132893c2abff4c1f47207874036667812e5a79f46ec2a2194a259b
      • Opcode Fuzzy Hash: bbf21d0b3263a2d21515d7f524aa16152b47aaa55b5aa6e57c7e4267668a084d
      • Instruction Fuzzy Hash: F2A18C7271492A9BCB08DE38CD95576B6E1BB58315714833EEA16C7B84EB38E851CB80
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dfb783fd3f79c8a7377f1fb5aa2d7d1a9bfba61698fbbfc5251bf7568590af56
      • Instruction ID: f2a93161cfccb1af66a360d2e4f8cc25f13f885e3bd36ebdcbd034c5b4dc5678
      • Opcode Fuzzy Hash: dfb783fd3f79c8a7377f1fb5aa2d7d1a9bfba61698fbbfc5251bf7568590af56
      • Instruction Fuzzy Hash: B8912D2611ABC06FEF224A3590653E77FE4BF3B354F18A549C4D947643C60A650FEB60
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bd2ea7f0720e5952b0a40817aac4c614d2194e5689529d3bf9b57fab4593847e
      • Instruction ID: 5d3a4bf19be01605c155fdad115a656fb7828c32575d2d28d37d022e87f51cfb
      • Opcode Fuzzy Hash: bd2ea7f0720e5952b0a40817aac4c614d2194e5689529d3bf9b57fab4593847e
      • Instruction Fuzzy Hash: 517180713005159EEB3A6A29C858AFAB7F5FB82301F04852FE8DDCA741C629EC55E730
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f5b846e8f22c508459b4ef9e9f24993d13eae8c6e1824c009fa2576fbf0b0ba0
      • Instruction ID: ce6ee97722e785de65111533b842350f30907c0d8b9110e8319dad0896938101
      • Opcode Fuzzy Hash: f5b846e8f22c508459b4ef9e9f24993d13eae8c6e1824c009fa2576fbf0b0ba0
      • Instruction Fuzzy Hash: 7D41BDB2B097054BD3148E29D89425BB7E3EBD4360F4DC93EE984CB314EA34DC868786
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 04b3a8893dfd304d1d5201099b405c249770eb0159f9c34d1252f7376968e986
      • Instruction ID: e2a2ea3de849b1d7a486994bb0745686724237dfa8c3c2ac1abf44818b084255
      • Opcode Fuzzy Hash: 04b3a8893dfd304d1d5201099b405c249770eb0159f9c34d1252f7376968e986
      • Instruction Fuzzy Hash: 4B216032B083154BCB189E2D909463EB6D3ABDC764F15967EF84DE3340D9709C5A8B85
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
      • Instruction ID: b29fa7fac4d52030b3c46b204b0f5fda813ad3ad00ea363786d39b5c61e60e3d
      • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
      • Instruction Fuzzy Hash: FD112E77A001B287D605862EF8F46BAE3BDEBC532072D4376D1464B75CD2229945950A
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7b779ef2f1cd4e01ab331ae72595d71be2aab2b11cdbee9abd17501f43fb5220
      • Instruction ID: fa4d3cf89520c4c410d1b26f3cefadb5b72038400326fc67723f07761a40a080
      • Opcode Fuzzy Hash: 7b779ef2f1cd4e01ab331ae72595d71be2aab2b11cdbee9abd17501f43fb5220
      • Instruction Fuzzy Hash: 8811A53371192D47F72C8859C861ABDA247DBC1354F2A8339DA078BB95DDBDDC058250
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf
      • String ID: B02$DynaColor$EyeView-V1$EyeView-V2$Kalatel$Kampro$LiLin$Macro$Nicecam$Panasonic$Pelco-D$Pelco-P$Pelco-P-V1$Pelco-P-V2$Pixim$SamSung$TOA$VCL$VISCA$Vicon$Videotrec
      • API String ID: 1467051239-2056317113
      • Opcode ID: d85878ed8222c523c67121096addbcf3c9502e77fa3bf6dc6b4db03b662a168b
      • Instruction ID: 32a2d1d3b21403fc5033d37b9c65b70516f808b37c019d8392ccd2a8fa5cfb70
      • Opcode Fuzzy Hash: d85878ed8222c523c67121096addbcf3c9502e77fa3bf6dc6b4db03b662a168b
      • Instruction Fuzzy Hash: 444154774E010877CF226E54BD42DDDBB146BB2726B14C112F86C29221D237A97BBB71
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FreeLibrary.KERNEL32(?,?,?,?,007DBACC,ADADP), ref: 007F4AEF
      • LoadLibraryA.KERNEL32(?), ref: 007F4B19
      • GetProcAddress.KERNEL32(?,DGetVersion), ref: 007F4B39
      • GetProcAddress.KERNEL32(?,DInit), ref: 007F4B46
      • GetProcAddress.KERNEL32(?,DCreate), ref: 007F4B53
      • GetProcAddress.KERNEL32(?,DExit), ref: 007F4B60
      • GetProcAddress.KERNEL32(?,DEnableFullScreen), ref: 007F4B6D
      • GetProcAddress.KERNEL32(?,DSetStretchMode), ref: 007F4B7A
      • GetProcAddress.KERNEL32(?,DNotifyFullScreenWindow), ref: 007F4B87
      • GetProcAddress.KERNEL32(?,DSetRenderInfo), ref: 007F4B94
      • GetProcAddress.KERNEL32(?,DRender), ref: 007F4BA1
      • GetProcAddress.KERNEL32(?,DRender3), ref: 007F4BAE
      • GetProcAddress.KERNEL32(?,DRender4), ref: 007F4BBB
      • GetProcAddress.KERNEL32(?,DRender5), ref: 007F4BC8
      • GetProcAddress.KERNEL32(?,DRenderFillRect), ref: 007F4BD5
      • GetProcAddress.KERNEL32(?,DEPTZRender), ref: 007F4BE2
      • GetProcAddress.KERNEL32(?,DEPTZRender3), ref: 007F4BEF
      • GetProcAddress.KERNEL32(?,DRegisterAfterBitbltCB), ref: 007F4BFC
      • GetProcAddress.KERNEL32(?,DSetImageLeftToRight), ref: 007F4C09
      • GetProcAddress.KERNEL32(?,DSetImageUpToDown), ref: 007F4C16
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: AddressProc$Library$FreeLoad
      • String ID: DCreate$DEPTZRender$DEPTZRender3$DEnableFullScreen$DExit$DGetVersion$DInit$DNotifyFullScreenWindow$DRegisterAfterBitbltCB$DRender$DRender3$DRender4$DRender5$DRenderFillRect$DSetImageLeftToRight$DSetImageUpToDown$DSetRenderInfo$DSetStretchMode$DXDRAW
      • API String ID: 2449869053-687869286
      • Opcode ID: 1d3577c93752c19ade9ad5330efa9c878af436dbfd9ebebbb57245f438ea513d
      • Instruction ID: 9fe612d40046075af04b0fee1b6e11b170be708352dc4bb36b8ad36242cf6ce5
      • Opcode Fuzzy Hash: 1d3577c93752c19ade9ad5330efa9c878af436dbfd9ebebbb57245f438ea513d
      • Instruction Fuzzy Hash: 135118B0A41B1ABBCB119F66C909A46FFA0FF44798300C62AE41897A50D7B9F434DFD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • OpenThemeData.UXTHEME(?,WINDOW,000000FF,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 00854778
      • OpenThemeData.UXTHEME(?,TOOLBAR,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 00854793
      • OpenThemeData.UXTHEME(?,BUTTON,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 008547AE
      • OpenThemeData.UXTHEME(?,STATUS,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 008547C9
      • OpenThemeData.UXTHEME(?,REBAR,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 008547E4
      • OpenThemeData.UXTHEME(?,COMBOBOX,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 008547FF
      • OpenThemeData.UXTHEME(?,PROGRESS,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 0085481A
      • OpenThemeData.UXTHEME(?,HEADER,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 00854835
      • OpenThemeData.UXTHEME(?,SCROLLBAR,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 00854850
      • OpenThemeData.UXTHEME(?,EXPLORERBAR,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 0085486B
      • OpenThemeData.UXTHEME(?,TREEVIEW,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 00854886
      • OpenThemeData.UXTHEME(?,STARTPANEL,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 008548A1
      • OpenThemeData.UXTHEME(?,TASKBAND,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 008548BC
      • OpenThemeData.UXTHEME(?,TASKBAR,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 008548D7
      • OpenThemeData.UXTHEME(?,SPIN,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 008548F2
      • OpenThemeData.UXTHEME(?,TAB,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 0085490D
      • OpenThemeData.UXTHEME(?,TOOLTIP,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 00854928
      • OpenThemeData.UXTHEME(?,TRACKBAR,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 00854943
      • OpenThemeData.UXTHEME(00000000,MENU,?,75FD6BA0,0084D04A,?,0084D064,00000004,00831CF7,00000000,00000004,0084C661), ref: 0085495A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: DataOpenTheme
      • String ID: BUTTON$COMBOBOX$EXPLORERBAR$HEADER$MENU$PROGRESS$REBAR$SCROLLBAR$SPIN$STARTPANEL$STATUS$TAB$TASKBAND$TASKBAR$TOOLBAR$TOOLTIP$TRACKBAR$TREEVIEW$WINDOW
      • API String ID: 1744092376-1233129369
      • Opcode ID: 4dda0679dc40af02e05f801fc0153c6cc2eb46b7c558545870ba0df7b29db5c3
      • Instruction ID: 839a72535099ca61728923035eff89a7a379794d0d1f25d4427e4bbebc92e30e
      • Opcode Fuzzy Hash: 4dda0679dc40af02e05f801fc0153c6cc2eb46b7c558545870ba0df7b29db5c3
      • Instruction Fuzzy Hash: 9351B2B4B4431AABCF50EBBE8D45D29BA9CFE5C70D3001964BD45DB641E778D8448784
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007CC25C
      • _memset.LIBCMT ref: 007CC276
      • swprintf.LIBCMT ref: 007CC292
      • KOpenInterface.ARCHIVEPLAYER(?,?,?,?,?,?,00000000,00000748,00000000), ref: 007CC2D7
      • KSetSmoothFastPlayback.ARCHIVEPLAYER(00000000,00000001,?,?,?,?,?,?,00000000,00000748,00000000), ref: 007CC2E5
      • KSetMediaConfig4.ARCHIVEPLAYER(000000FF,?,?,?,?,?,?,?,?,?,00000000,00000748,00000000), ref: 007CC303
      • KSetTimeCodeCallback.ARCHIVEPLAYER(000000FF,?,007CBB70,?,?,?,?,?,?,?,?,?,?,00000000,00000748,00000000), ref: 007CC31F
      • KSetTimeCodeCallbackEx.ARCHIVEPLAYER(000000FF,?,007CBB90,000000FF,?,007CBB70), ref: 007CC330
      • KSetFilePlayCompleteCallback.ARCHIVEPLAYER(000000FF,?,Function_003C6C50,000000FF,?,007CBB90,000000FF,?,007CBB70), ref: 007CC341
      • KSetImageCallback3.ARCHIVEPLAYER(000000FF,?,Function_003C7300,000000FF,?,Function_003C6C50,000000FF,?,007CBB90,000000FF,?,007CBB70), ref: 007CC352
      • KSetAfterRenderCallback.ARCHIVEPLAYER(000000FF,?,00776420,000000FF,?,Function_003C7300,000000FF,?,Function_003C6C50,000000FF,?,007CBB90,000000FF,?,007CBB70), ref: 007CC363
      • KSetRenderInfo.ARCHIVEPLAYER(000000FF,?,000000FF,?,00776420,000000FF,?,Function_003C7300,000000FF,?,Function_003C6C50,000000FF,?,007CBB90,000000FF), ref: 007CC375
      • KSetResolutionChangeCallback2.ARCHIVEPLAYER(000000FF,?,007CA5F0), ref: 007CC389
      • KSetRawDataCallback.ARCHIVEPLAYER(000000FF,?,007C9EC0,000000FF,?,007CA5F0), ref: 007CC39A
      • KSetFirstB2Callback.ARCHIVEPLAYER(000000FF,?,007CC220,000000FF,?,007C9EC0,000000FF,?,007CA5F0), ref: 007CC3AB
      • KConnect.ARCHIVEPLAYER(000000FF,000000FF,?,007CC220,000000FF,?,007C9EC0,000000FF,?,007CA5F0), ref: 007CC3B6
      • KStartStreaming.ARCHIVEPLAYER(000000FF), ref: 007CC3CC
      • _memset.LIBCMT ref: 007CC3EF
      • _memset.LIBCMT ref: 007CC400
      • KGetBeginTime.ARCHIVEPLAYER(000000FF,?,?,00000000,0000003F,?,00000000,0000003F), ref: 007CC412
        • Part of subcall function 00809F35: GetDlgItem.USER32(?,000003F4), ref: 00809F47
        • Part of subcall function 0080A7EA: IsWindow.USER32(?), ref: 0080A7F7
        • Part of subcall function 0080A7EA: SetWindowTextA.USER32(?,000003F4), ref: 0080A813
      • _sprintf.LIBCMT ref: 007CC470
      • KGetEndTime.ARCHIVEPLAYER(000000FF,?,00000403,?,?,000003F2,00000000), ref: 007CC49F
      • _sprintf.LIBCMT ref: 007CC4EA
        • Part of subcall function 0092AF72: __output_l.LIBCMT ref: 0092AFCB
      • KGetRawFileInfo2.ARCHIVEPLAYER(000000FF,?,00000404,?,?,000003F3,00000000,00000403,?,?,000003F2,00000000), ref: 007CC524
      • SendMessageA.USER32(?,00000405,00000001,00000000), ref: 007CC5D2
      • KSetMute.ARCHIVEPLAYER(000000FF,00000000,?,000003F3,00000000,00000403,?,?,000003F2,00000000), ref: 007CC5F6
      • KPlay.ARCHIVEPLAYER(000000FF,00000001,?,?,?,?,?,000003F3,00000000,00000403,?,?,000003F2,00000000), ref: 007CC60D
        • Part of subcall function 007CA4D0: KStop.ARCHIVEPLAYER(000000FF,?,007CC6CD,Invalid handle,00000000,00000000,?,?,?,?,?,?,?,?,00000000,00000748), ref: 007CA4DE
        • Part of subcall function 007CA4D0: KStopStreaming.ARCHIVEPLAYER(000000FF,000000FF,?,007CC6CD,Invalid handle,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 007CA4E9
        • Part of subcall function 007CA4D0: KDisconnect.ARCHIVEPLAYER(000000FF,000000FF,000000FF,?,007CC6CD,Invalid handle,00000000,00000000), ref: 007CA4F4
        • Part of subcall function 007CA4D0: KCloseInterface.ARCHIVEPLAYER(000000FF,000000FF,000000FF,000000FF,?,007CC6CD,Invalid handle,00000000,00000000), ref: 007CA4FF
        • Part of subcall function 007CA4D0: SendMessageA.USER32 ref: 007CA534
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Callback$Time_memset$CodeFileInterfaceMessagePlayRenderSendStopStreamingWindow_sprintf$AfterBeginCallback2Callback3ChangeCloseCompleteConfig4ConnectDataDisconnectFastFirstImageInfoInfo2ItemMediaMuteOpenPlaybackResolutionSmoothStartText__output_lswprintf
      • String ID: Invalid handle$Open file fail$Start stream fail$Unable to set Media Configuration$wwww
      • API String ID: 1419686552-2604739742
      • Opcode ID: 173900218371fa2a8e02259abbbcbd97eac9072e554ebfa528ae43be733ac162
      • Instruction ID: 96f0e5268edd8822bbe37ee98e6da365ffbd7e3cf6535db41091fa25226eca3b
      • Opcode Fuzzy Hash: 173900218371fa2a8e02259abbbcbd97eac9072e554ebfa528ae43be733ac162
      • Instruction Fuzzy Hash: 8AC1D070A00705ABDB25EB74DC16FEAB7A9EF44300F00446DF54EAA2C2DE797A049B95
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Task_impl$H_prolog3
      • String ID:
      • API String ID: 1204490572-3916222277
      • Opcode ID: aeeea370f598f81540b2f301c72ab2c86758bd098b109a67469a013511d573b2
      • Instruction ID: 30ace3a7916656fe11502ab856c315f5b3c7c6fbab8add47d01ebf2f9819a5b3
      • Opcode Fuzzy Hash: aeeea370f598f81540b2f301c72ab2c86758bd098b109a67469a013511d573b2
      • Instruction Fuzzy Hash: BDC19C30501A86CFE754DBA8C558BDEFBE0EF15314F4485ACD45A872C3DB786A08DB62
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • LoadLibraryA.KERNEL32(00000000), ref: 007F4DFF
      • GetProcAddress.KERNEL32(?,PTZOpenInterface), ref: 007F4E1F
      • GetProcAddress.KERNEL32(?,PTZCloseInterface), ref: 007F4E2C
      • GetProcAddress.KERNEL32(?,PTZLoadProtocolFile), ref: 007F4E39
      • GetProcAddress.KERNEL32(?,PTZLoadProtocolRS), ref: 007F4E46
      • GetProcAddress.KERNEL32(?,PTZUnloadProtocol), ref: 007F4E53
      • GetProcAddress.KERNEL32(?,PTZGetCommandExt), ref: 007F4E60
      • GetProcAddress.KERNEL32(?,PTZEnumerateProtocol), ref: 007F4E6D
      • GetProcAddress.KERNEL32(?,PTZEnumerateVender), ref: 007F4E7A
      • GetProcAddress.KERNEL32(?,PTZEnumerateFunction), ref: 007F4E87
      • GetProcAddress.KERNEL32(?,PTZGetAbsPTZCommand), ref: 007F4E94
      • GetProcAddress.KERNEL32(?,PTZGetAbsPTZCommandByUnit), ref: 007F4EA1
      • GetProcAddress.KERNEL32(?,PTZUnitToDegree), ref: 007F4EAE
      • GetProcAddress.KERNEL32(?,PTZDegreeToUnit), ref: 007F4EBB
      • GetProcAddress.KERNEL32(?,PTZGetUnitFromBuffer), ref: 007F4EC8
      • GetProcAddress.KERNEL32(?,PTZGetRequestAbsPTZCommand), ref: 007F4ED5
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: AddressProc$LibraryLoad
      • String ID: PTZCloseInterface$PTZDegreeToUnit$PTZEnumerateFunction$PTZEnumerateProtocol$PTZEnumerateVender$PTZGetAbsPTZCommand$PTZGetAbsPTZCommandByUnit$PTZGetCommandExt$PTZGetRequestAbsPTZCommand$PTZGetUnitFromBuffer$PTZLoadProtocolFile$PTZLoadProtocolRS$PTZOpenInterface$PTZParser$PTZUnitToDegree$PTZUnloadProtocol
      • API String ID: 2238633743-3323939279
      • Opcode ID: a251729acaa98b7fc0dc45ce407e7d814275ad33d5c6eb309c1bf05f9cfbe7a1
      • Instruction ID: ff80adb12405893d556454dc38cbed5f4880290bc9d58748796a0d747d938c7c
      • Opcode Fuzzy Hash: a251729acaa98b7fc0dc45ce407e7d814275ad33d5c6eb309c1bf05f9cfbe7a1
      • Instruction Fuzzy Hash: 7F4102B4A41B1ABBCB119F66C908A56FFA0FF54758700822AE61887F40D7B9E474CFC4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00802D2D: _malloc.LIBCMT ref: 00802D49
      • swprintf.LIBCMT ref: 007AB0A5
      • swprintf.LIBCMT ref: 007AB132
        • Part of subcall function 007B72A0: _memset.LIBCMT ref: 007B72CA
        • Part of subcall function 007B72A0: _memset.LIBCMT ref: 007B72F6
        • Part of subcall function 007B72A0: _memset.LIBCMT ref: 007B730F
        • Part of subcall function 007B72A0: _memset.LIBCMT ref: 007B7328
        • Part of subcall function 007B72A0: _memset.LIBCMT ref: 007B733B
        • Part of subcall function 007B72A0: _memset.LIBCMT ref: 007B734E
        • Part of subcall function 007B72A0: _memset.LIBCMT ref: 007B737F
      • swprintf.LIBCMT ref: 007AB17D
      • swprintf.LIBCMT ref: 007AB1CA
      • _memset.LIBCMT ref: 007AB244
      • _memset.LIBCMT ref: 007AB2B4
      • swprintf.LIBCMT ref: 007AB2CB
      • _memset.LIBCMT ref: 007AB304
      • _memset.LIBCMT ref: 007AB408
      • swprintf.LIBCMT ref: 007AB424
      • _strstr.LIBCMT ref: 007AB437
      • _strstr.LIBCMT ref: 007AB454
      • swprintf.LIBCMT ref: 007AB4DA
      • _memset.LIBCMT ref: 007AB51D
      • swprintf.LIBCMT ref: 007AB539
      • swprintf.LIBCMT ref: 007AB60E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$swprintf$_strstr$_malloc
      • String ID: , */*$GET$Keep-Alive$boundary =$boundary=$chunked$gzip, deflate$multipart/x-mixed-replace
      • API String ID: 3999926247-1096947886
      • Opcode ID: 9c308a841d96253f48ebb225bc63a0e0fcec62a6c07de34b18b2bc2489c20c27
      • Instruction ID: 29a636c292ef321bcefab045c8a8bd9988e8c3c74d2ec435f2b7436ca637857f
      • Opcode Fuzzy Hash: 9c308a841d96253f48ebb225bc63a0e0fcec62a6c07de34b18b2bc2489c20c27
      • Instruction Fuzzy Hash: 2C02C671900255ABDF24DF64DC85BDA77A8AF49300F0446A9F849DB283D778EA85CFA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • AVIFileGetStream.AVIFIL32(?,?,73646976,00000000,00000000), ref: 007AED6F
      • AVIFileRelease.AVIFIL32(00000000), ref: 007AED8A
      • AVIFileGetStream.AVIFIL32(?,?,73647561,00000000), ref: 007AEECC
      • AVIFileRelease.AVIFIL32(00000000), ref: 007AEEE1
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: File$ReleaseStream
      • String ID: DIVX$DX50$H264$H265$HEVC$MJPG$XVID$auds$vids
      • API String ID: 3091376681-773731684
      • Opcode ID: 9647d5dfd2b27f076f55a3ae1c621e5e13d830dd3c25e4d428d11cbbc642be40
      • Instruction ID: b5faf9b9eb9bd13479123fb08164d7e1499a7303f3d52ba2db778eed1d6f7bf3
      • Opcode Fuzzy Hash: 9647d5dfd2b27f076f55a3ae1c621e5e13d830dd3c25e4d428d11cbbc642be40
      • Instruction Fuzzy Hash: 4E71F631A09215EFEF248F78CC44BA5BBE4FF46304F104366E8589B290DB79A855DF92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: %08x$%s:%s$%s:%s:%s$%s:%s:%s:%s:%s:%s$auth-int$md5-sess
      • API String ID: 1292703666-2328489966
      • Opcode ID: e6d9b2cddeaab45c64ff83a9d97a3f73b0556b16fd40d1ee6670289cd61046dd
      • Instruction ID: 10853dad5258b10503556eeee95febb36f2b8ad0c3350458c70e93f87224d4bf
      • Opcode Fuzzy Hash: e6d9b2cddeaab45c64ff83a9d97a3f73b0556b16fd40d1ee6670289cd61046dd
      • Instruction Fuzzy Hash: B4B19171108382BBD721DF58CC45FEBB7E8AF94304F444958F98897182EB75EA49CB92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ___from_strstr_to_strchr$_strncmp
      • String ID: RTP/AVP$RTP/AVP/TCP$application$audio$udp$video
      • API String ID: 2516952115-289131259
      • Opcode ID: bf587f595cca463104216a5c8e913490784c32cec0f0e41e220c33ce7b6b62fb
      • Instruction ID: 64183d5d6c6c142e8d0f52f9c7f916a60105cc6b3f1a05e5e5975a6f500772c3
      • Opcode Fuzzy Hash: bf587f595cca463104216a5c8e913490784c32cec0f0e41e220c33ce7b6b62fb
      • Instruction Fuzzy Hash: 0B715D72A0030857DF21EBB5FD86BAF77E8DF94314F140929E809A7243FB79990583A1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ___from_strstr_to_strchr$_strncmp
      • String ID: RTP/AVP$RTP/AVP/TCP$application$audio$udp$video
      • API String ID: 2516952115-289131259
      • Opcode ID: 1e418dd8f0388ff825ee3bf2b9e4b7914fb2f82e4addf5ef5027f06b5acc2a16
      • Instruction ID: 19b96e1097f65ed8eb59c693bb391e397c2486aa43e52b4131afa64502d98a36
      • Opcode Fuzzy Hash: 1e418dd8f0388ff825ee3bf2b9e4b7914fb2f82e4addf5ef5027f06b5acc2a16
      • Instruction Fuzzy Hash: 27613976A0130477DF209BA5FD86BAF37E8AB94311F100829E806A7646E679994487E3
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,6838016B), ref: 007E453D
      • ResetEvent.KERNEL32(00000000), ref: 007E4547
        • Part of subcall function 007D1CF0: EnterCriticalSection.KERNEL32(-00000008,?,?,007D2069,?,00000000,00000000,?,?,?,?,?,?,?,?,007C78B4), ref: 007D1D12
      • TranslateMessage.USER32(?), ref: 007E464C
      • DispatchMessageA.USER32(?), ref: 007E4659
      • SetEvent.KERNEL32(?,00000000,?,0000002C,00000000,00000000), ref: 007E4801
      • TranslateMessage.USER32(?), ref: 007E4A46
      • DispatchMessageA.USER32(?), ref: 007E4A53
      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 007E4A71
      • TranslateMessage.USER32(?), ref: 007E4A82
      • DispatchMessageA.USER32(?), ref: 007E4A8F
      • Sleep.KERNEL32(00000064), ref: 007E4A97
        • Part of subcall function 007E9300: WaitForSingleObject.KERNEL32(?,00000000), ref: 007E9364
        • Part of subcall function 007E9300: ResetEvent.KERNEL32(?,?,00000000,00000000), ref: 007E938C
      • CDECRelease.ARCHIVEPLAYER(?,?,00000000,00000000,?,00000000,00000000), ref: 007E4B08
      • CloseHandle.KERNEL32(?,?,00000000,00000000,?,00000000,00000000), ref: 007E4B4B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Message$Event$DispatchTranslate$Reset$CloseCreateCriticalEnterHandleObjectPeekReleaseSectionSingleSleepWait
      • String ID: ,$d$gfff
      • API String ID: 964170224-720371987
      • Opcode ID: 1dd858289e6bac070d3f39af6a201af3bffd7677559a0201b4edf103675541f3
      • Instruction ID: 9d0fd978e39c15060017d1931cbf2a96b2a24100a75fccca2b5522aa616eb57f
      • Opcode Fuzzy Hash: 1dd858289e6bac070d3f39af6a201af3bffd7677559a0201b4edf103675541f3
      • Instruction Fuzzy Hash: AF12C271D01788EADF20DFA5CC49BEEB7F9BF49300F10451AE599A7280EB78A945CB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3_GS.LIBCMT ref: 0084C445
      • CreateCompatibleDC.GDI32(00000000), ref: 0084C4A8
      • GetObjectA.GDI32(?,00000018,?), ref: 0084C4C6
      • SelectObject.GDI32(?,?), ref: 0084C4FA
      • CreateCompatibleDC.GDI32(?), ref: 0084C51A
      • CreateDIBSection.GDI32(?,00000028,00000000,?,00000000,00000000), ref: 0084C575
      • SelectObject.GDI32(?,?), ref: 0084C587
      • SelectObject.GDI32(?,00000000), ref: 0084C58F
      • SelectObject.GDI32(?,?), ref: 0084C59E
      • DeleteObject.GDI32(?), ref: 0084C5A2
      • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0084C5DA
      • GetPixel.GDI32(?,00000000,00000000), ref: 0084C6AF
      • SetPixel.GDI32(?,00000000,00000000,?), ref: 0084C6C1
      • SelectObject.GDI32(?,?), ref: 0084C6E4
      • SelectObject.GDI32(?,?), ref: 0084C6EC
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Object$Select$Create$CompatiblePixel$DeleteH_prolog3_Section
      • String ID: (
      • API String ID: 1942225872-3887548279
      • Opcode ID: 9d60588c4efaba537a4c7ee1264f01af8c8e25fd44b78d273e4437c0b1f4fa52
      • Instruction ID: 74c16d47e06755069acac75be50f17cd0a8df88e3c5e08080cd43d35c92fe5b7
      • Opcode Fuzzy Hash: 9d60588c4efaba537a4c7ee1264f01af8c8e25fd44b78d273e4437c0b1f4fa52
      • Instruction Fuzzy Hash: 28914331901209DFDF65DFA8CD85AAEBBB9FF08304F208129E416E72A1DB30A945DF51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$EventObjectResetSingleWait_memmoveinet_addrsend$_free
      • String ID: x
      • API String ID: 1122757218-2363233923
      • Opcode ID: d745089a66bcae40b5c977c3a94f185cf1d7535002ffb4f7819e4117c02d5506
      • Instruction ID: 17f593a026abb83ce12077cb25fc3ff3adf536c6356e5fff7947808f1a074484
      • Opcode Fuzzy Hash: d745089a66bcae40b5c977c3a94f185cf1d7535002ffb4f7819e4117c02d5506
      • Instruction Fuzzy Hash: C881B670A44359EFEB20DF64DC49BDAB7A4BF04300F044295E5589B2C6DBB8A998CF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$swprintf$___from_strstr_to_strchr$_memset
      • String ID:
      • API String ID: 4254409416-0
      • Opcode ID: abc956bfd2385c949f18a6d86a1b601bb92575e1ec83b180eebe94b6e237b62f
      • Instruction ID: a4b3c25958a4a084ceba23f668a04dacc2208399110d4ad8116824e771b41136
      • Opcode Fuzzy Hash: abc956bfd2385c949f18a6d86a1b601bb92575e1ec83b180eebe94b6e237b62f
      • Instruction Fuzzy Hash: 67D1D8B1900219AFDB14DF28DC85BDAF7A8FF15304F0042A5E55D97241DBB4AA88CFE1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007B82F7
        • Part of subcall function 007BA0F0: _memset.LIBCMT ref: 007BA15D
        • Part of subcall function 007BA0F0: _memset.LIBCMT ref: 007BA179
        • Part of subcall function 007BA0F0: _memset.LIBCMT ref: 007BA195
        • Part of subcall function 007BA0F0: swprintf.LIBCMT ref: 007BA1AF
        • Part of subcall function 007BA0F0: swprintf.LIBCMT ref: 007BA211
        • Part of subcall function 007BA0F0: swprintf.LIBCMT ref: 007BA25E
      • swprintf.LIBCMT ref: 007B83EB
      • swprintf.LIBCMT ref: 007B8433
      • swprintf.LIBCMT ref: 007B84B5
      • swprintf.LIBCMT ref: 007B851B
      • swprintf.LIBCMT ref: 007B8572
      • swprintf.LIBCMT ref: 007B85A2
      Strings
      • Digest username="%s",realm="%s",nonce="%s",uri="%s",response="%s", xrefs: 007B8597
      • md5, xrefs: 007B8448
      • Digest username="%s",realm="%s",nonce="%s",algorithm=%s,uri="%s",qop="%s",nc=%08d,cnonce="%s",response="%s", xrefs: 007B8428
      • Digest username="%s",realm="%s",nonce="%s",algorithm=%s,uri="%s",qop=%s,response="%s",opaque="%s", xrefs: 007B84AA
      • Digest username="%s",realm="%s",nonce="%s",algorithm=%s,uri="%s",qop="%s",nc=%08d,cnonce="%s",response="%s",opaque="%s", xrefs: 007B83E0
      • Digest username="%s",realm="%s",nonce="%s",uri="%s",response="%s",cnonce="%s",qop="%s",nc="%08d", xrefs: 007B8567
      • md5-sess, xrefs: 007B836F
      • Digest username="%s",realm="%s",nonce="%s",algorithm=%s,uri="%s",response="%s", xrefs: 007B8510
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: Digest username="%s",realm="%s",nonce="%s",algorithm=%s,uri="%s",qop="%s",nc=%08d,cnonce="%s",response="%s"$Digest username="%s",realm="%s",nonce="%s",algorithm=%s,uri="%s",qop="%s",nc=%08d,cnonce="%s",response="%s",opaque="%s"$Digest username="%s",realm="%s",nonce="%s",algorithm=%s,uri="%s",qop=%s,response="%s",opaque="%s"$Digest username="%s",realm="%s",nonce="%s",algorithm=%s,uri="%s",response="%s"$Digest username="%s",realm="%s",nonce="%s",uri="%s",response="%s"$Digest username="%s",realm="%s",nonce="%s",uri="%s",response="%s",cnonce="%s",qop="%s",nc="%08d"$md5$md5-sess
      • API String ID: 1292703666-4135896896
      • Opcode ID: 1a3daef24b10615defec829bf1e164c370af80f7b754cfaf0cf897b57fb3c965
      • Instruction ID: f43d5dbb5a19119673212b9b3400cce41468d514b362c79d6696c9cc65633558
      • Opcode Fuzzy Hash: 1a3daef24b10615defec829bf1e164c370af80f7b754cfaf0cf897b57fb3c965
      • Instruction Fuzzy Hash: F99182F650011ABBCB65CE54CD80FEAB7BCBF44304F0481A5E709A7101EB316A96CBA5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ___from_strstr_to_strchr$_strncmp$swprintf
      • String ID: IP4$IP6
      • API String ID: 4050511901-835370894
      • Opcode ID: 06ab2133cea61bdc03bf75ba635ba1183cbeb8d8910c915c4d808a8a3447ac5e
      • Instruction ID: 8e9d6c9b424bed7225d908270b9584fa9136b82456f01a9027e43fad591ec86e
      • Opcode Fuzzy Hash: 06ab2133cea61bdc03bf75ba635ba1183cbeb8d8910c915c4d808a8a3447ac5e
      • Instruction Fuzzy Hash: EA513B7270030427DF14EAB5BC86BBE77A89FD9314F04057DF905A7247EA65AA0583A1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ___from_strstr_to_strchr$_strncmpswprintf
      • String ID: IP4$IP6
      • API String ID: 3150634765-835370894
      • Opcode ID: 31b1fddfadec079dcd0a312371712decf427864a5a574250da9fd560eb3bdb69
      • Instruction ID: d5cf89330678b0e5aae657e6e72dbc2a750b1c1a104f1387949a6415a8dce362
      • Opcode Fuzzy Hash: 31b1fddfadec079dcd0a312371712decf427864a5a574250da9fd560eb3bdb69
      • Instruction Fuzzy Hash: 67512E736003446BDF20EAA5BD86BBF73B8DFD9314F00052DF941A7147EB66AA0583A1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • 2.5M, xrefs: 0077A6B8
      • 1.5M, xrefs: 0077A6C6
      • 384K, xrefs: 0077A68E
      • 56K, xrefs: 0077A679
      • %smpeg4?USER=%s&PWD=%s&VIDEO_BITRATE=%s&VIDEO_RESOLUTION=%s&VIDEO_FPS_NUM=%d&VIDEO_BRIGHTNESS=%d&VIDEO_CONTRAST=%d&VIDEO_HUE=%d&VIDEO_SATURATION=%d, xrefs: 0077A70F
      • 1.2M, xrefs: 0077A6AA
      • %smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_BITRATE=%s&VIDEO_RESOLUTION=%s&VIDEO_FPS_NUM=%d&VIDEO_BRIGHTNESS=%d&VIDEO_CONTRAST=%d&VIDEO_HUE=%d&VIDEO_SATURATION=%d, xrefs: 0077A74B
      • 500K, xrefs: 0077A695
      • 28K, xrefs: 0077A672
      • 256K, xrefs: 0077A687
      • 128K, xrefs: 0077A680
      • 750K, xrefs: 0077A69C
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf
      • String ID: %smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_BITRATE=%s&VIDEO_RESOLUTION=%s&VIDEO_FPS_NUM=%d&VIDEO_BRIGHTNESS=%d&VIDEO_CONTRAST=%d&VIDEO_HUE=%d&VIDEO_SATURATION=%d$%smpeg4?USER=%s&PWD=%s&VIDEO_BITRATE=%s&VIDEO_RESOLUTION=%s&VIDEO_FPS_NUM=%d&VIDEO_BRIGHTNESS=%d&VIDEO_CONTRAST=%d&VIDEO_HUE=%d&VIDEO_SATURATION=%d$1.2M$1.5M$128K$2.5M$256K$28K$384K$500K$56K$750K
      • API String ID: 233258989-1779723003
      • Opcode ID: b21983d95d981ac878bf38b6952092dd330deb241161a91137e3f43ec5421d6d
      • Instruction ID: b1a77803e5b95f57a106307de21d6b5f93e2047faa950d624d38c04987926626
      • Opcode Fuzzy Hash: b21983d95d981ac878bf38b6952092dd330deb241161a91137e3f43ec5421d6d
      • Instruction Fuzzy Hash: 2241D872A40348F6DB10CA91CF41FEBB3BCFB4C740F148956B609E2091DA75F6549B96
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __fseeki64$__fread_nolock$__ftelli64_memset
      • String ID:
      • API String ID: 631097316-0
      • Opcode ID: 96f68c488a3ee7d96a9b6f3a383387eebe9b55b5b1451fb65a1655a8f49c0dc9
      • Instruction ID: 40e6114d68405b7e0e8d1c9dd984c104b1695f80dcd9f7c0d892260873b151b8
      • Opcode Fuzzy Hash: 96f68c488a3ee7d96a9b6f3a383387eebe9b55b5b1451fb65a1655a8f49c0dc9
      • Instruction Fuzzy Hash: 75D1B3B0900714ABDF71EF35DC41BAAB7F8FF44300F0485A9E5D9A2252EB74A9858F91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __fseeki64$__fread_nolock$__ftelli64
      • String ID:
      • API String ID: 4209442585-0
      • Opcode ID: da7f02965ec7513b7b98a47bab1cfb6b8a7fa5a37511e7c5e9908519703d821c
      • Instruction ID: 7ca2885800d8b0fe8fc90ba223ec8429aff6f5d13edb32b69685706ce5e881e0
      • Opcode Fuzzy Hash: da7f02965ec7513b7b98a47bab1cfb6b8a7fa5a37511e7c5e9908519703d821c
      • Instruction Fuzzy Hash: ABB1B770640B01ABEF35AF35DC05B6BB7E5FF44700F00492DF9A9962A1EB35A945CB41
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strstr$_memset$___from_strstr_to_strchrswprintf$_memmove
      • String ID: CSeq:$Cseq:
      • API String ID: 3550871217-1220783797
      • Opcode ID: 3f7fb9e271ac08a8fba65765857980f07d559727c69bff8cd450aba271d88e3a
      • Instruction ID: 61395960380f784e3045c2bf957b617525fcc1556742d94bdfb84882664e7010
      • Opcode Fuzzy Hash: 3f7fb9e271ac08a8fba65765857980f07d559727c69bff8cd450aba271d88e3a
      • Instruction Fuzzy Hash: 2DB12FB1D0026497DF25DB24DC45FDE73B89B85310F0802A9EA49F7285E778AAC9CF90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 0079ED10: _memset.LIBCMT ref: 0079ED43
        • Part of subcall function 0079ED10: swprintf.LIBCMT ref: 0079EDE5
        • Part of subcall function 0079ED10: swprintf.LIBCMT ref: 0079EE3C
        • Part of subcall function 007B94E0: ___from_strstr_to_strchr.LIBCMT ref: 007B9501
        • Part of subcall function 007B94E0: ___from_strstr_to_strchr.LIBCMT ref: 007B951F
      • _strstr.LIBCMT ref: 0079EF3D
      • _strstr.LIBCMT ref: 0079EF56
      • _memset.LIBCMT ref: 0079EFA3
      • swprintf.LIBCMT ref: 0079EFE4
      • _strstr.LIBCMT ref: 0079F059
      • _strstr.LIBCMT ref: 0079F074
      • _strstr.LIBCMT ref: 0079F088
      • _memset.LIBCMT ref: 0079F0AB
      • _memmove.LIBCMT ref: 0079F0BC
      • _strstr.LIBCMT ref: 0079F147
      • _strstr.LIBCMT ref: 0079F16A
      • _memset.LIBCMT ref: 0079F1BF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strstr$_memset$swprintf$___from_strstr_to_strchr$_memmove
      • String ID: CSeq:$Cseq:
      • API String ID: 1259512227-1220783797
      • Opcode ID: cb1c853a11e202ee36ab7cb6add42e8d273f6b3fef9c55195f1f4a9756862299
      • Instruction ID: 60b5f977292fda822c05f3fcc122941ba265413022a7eb28f2160374cb2fbae5
      • Opcode Fuzzy Hash: cb1c853a11e202ee36ab7cb6add42e8d273f6b3fef9c55195f1f4a9756862299
      • Instruction Fuzzy Hash: 71A1F4B1A04344ABCB20DB64EC45BAFB3D9ABD4314F14093DF999D7282E778D909C792
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: %s%s$%s/%s$SETUP$SETUP %s RTSP/%d.%dCSeq: %d%s%s%sUser-Agent: %s$Session: %s$Transport: RTP/AVP/TCP;unicast;interleaved=%d-%d$rtsp://
      • API String ID: 1292703666-2399744120
      • Opcode ID: fce68e3c1e603a85b24f32d8d15aef131b7237283fac036ad9035ac9f96f2d74
      • Instruction ID: 7eb4cc204d2949c910baafb34844eb2133593437bee303a9b66078bf14d041d1
      • Opcode Fuzzy Hash: fce68e3c1e603a85b24f32d8d15aef131b7237283fac036ad9035ac9f96f2d74
      • Instruction Fuzzy Hash: 7381B7B2A00519BBCB14CB64CC41FE7B379FB55300F0442AAE659E7141DB76BA69CFA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memsetsetsockopt
      • String ID: */*$Keep-Alive$POST$gzip, deflate$multipart/x-mixed-replace; boundary=myboundary$no-cache
      • API String ID: 287978192-2728928735
      • Opcode ID: 73eb7a7d8a77f9d8bbbf5b73200ecc523d3e5530cad5c7ab7854040bf92fc794
      • Instruction ID: 3a9e5b6306e2b8ab0d2ce1a6d3540281bef601e0939d83e3709c42688e35c546
      • Opcode Fuzzy Hash: 73eb7a7d8a77f9d8bbbf5b73200ecc523d3e5530cad5c7ab7854040bf92fc794
      • Instruction Fuzzy Hash: 466191B2640701BBD7249B29D946AE7B7D4FF14314B04492DF8ADD3391DBB8B894CB80
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$___from_strstr_to_strchr$_memsetswprintf
      • String ID:
      • API String ID: 2113892423-0
      • Opcode ID: f791398174e80ea0661323f86acd2f70f6fe384da9d77d5555170d67bd0a1714
      • Instruction ID: af4eb2c1f5e13cb06f5eb72910b6a87782b63f064a8863eb1463ac9fb2856c4e
      • Opcode Fuzzy Hash: f791398174e80ea0661323f86acd2f70f6fe384da9d77d5555170d67bd0a1714
      • Instruction Fuzzy Hash: 12128371E0011D9BDB29CF18CC95BE9B7B5EF85304F0442F5E94997246DBB8AA88CF90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 0084AAA0
      • CreateCompatibleDC.GDI32(00000000), ref: 0084AACE
      • GetObjectA.GDI32(?,00000018,?), ref: 0084AAE7
      • SelectObject.GDI32(?,?), ref: 0084AB01
      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0084AB24
      • SelectObject.GDI32(?,00000000), ref: 0084AB35
      • CreateCompatibleDC.GDI32(?), ref: 0084AB5E
      • SelectObject.GDI32(?,00000024), ref: 0084AB73
      • SelectObject.GDI32(?,00000000), ref: 0084AB80
      • DeleteObject.GDI32(00000024), ref: 0084AB85
      • BitBlt.GDI32(?,00000000,00000000,000000FF,?,?,00000000,00000000,00CC0020), ref: 0084ABA9
      • GetPixel.GDI32(?,00000000,00000000), ref: 0084ABCB
      • SetPixel.GDI32(?,00000000,00000000,00000000), ref: 0084AC12
      • SelectObject.GDI32(?,?), ref: 0084AC37
      • SelectObject.GDI32(?,00000000), ref: 0084AC3D
      • DeleteObject.GDI32(?), ref: 0084AC41
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Object$Select$CompatibleCreate$DeletePixel$BitmapH_prolog3
      • String ID:
      • API String ID: 3639146769-0
      • Opcode ID: ba49408f22b121c195472452abdeb9c76016546259941d121eb2b1850092bfc8
      • Instruction ID: 5bf5df1aadf764115a108385f26b8f745b24d0ebb5db3c94bbdbdefa9fab3d19
      • Opcode Fuzzy Hash: ba49408f22b121c195472452abdeb9c76016546259941d121eb2b1850092bfc8
      • Instruction Fuzzy Hash: 5551373195421EEFDF159FA4CD84AAEBBBAFF04320F100125F511EA2A0DB319D51EB62
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmoveswprintf$_strstr$___from_strstr_to_strchr_memset
      • String ID: CSeq:$Cseq:
      • API String ID: 1992464398-1220783797
      • Opcode ID: d7c01c9cdcc85ab8712df3995e86cb6d01b12aa9c20cd233056bcca156726c8a
      • Instruction ID: afe04fe083eee8ac3af170130dd79c16617a7e9e08b47572998e079d9cb4f262
      • Opcode Fuzzy Hash: d7c01c9cdcc85ab8712df3995e86cb6d01b12aa9c20cd233056bcca156726c8a
      • Instruction Fuzzy Hash: EC02E771A0411C8BDF24CF18DC99FE9B7B5BF45304F0402E9E88997246DB75AA89CFA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007EE547
      • _memset.LIBCMT ref: 007EE561
      • _memset.LIBCMT ref: 007EE57B
      • _sprintf.LIBCMT ref: 007EE592
      • __CxxThrowException@8.LIBCMT ref: 007EE5E8
        • Part of subcall function 009299C3: RaiseException.KERNEL32(?,?,?,00B06F54,0000674C,?,?,?,?,00948D40,?,00B06F54,00781E65,00000001), ref: 00929A18
      • _memset.LIBCMT ref: 007EE61C
      • _strtok.LIBCMT ref: 007EE6E6
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$ExceptionException@8RaiseThrow_sprintf_strtok
      • String ID: %s&MOTION_ENABLED&MOTION_CONFIG$MOTION_CONFIG=$MOTION_ENABLED=
      • API String ID: 4052914692-2859979939
      • Opcode ID: 85a8433f737fd0c6af5f9161cbad6645970403fed99ac6892fc56a4806878e9f
      • Instruction ID: 48fef291b22fc2f292a974129b0b257461f00f4169fa530fec11be9413593404
      • Opcode Fuzzy Hash: 85a8433f737fd0c6af5f9161cbad6645970403fed99ac6892fc56a4806878e9f
      • Instruction Fuzzy Hash: 9BF192B1D022599FEB20DF69DC45BDAB7B4BF44304F0048E9E409A7243E775AA84CF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$_memmove$_strtok$_sprintf_strstr
      • String ID: %s&MOTION_ENABLED&MOTION_STATUS$MOTION_ENABLED=$MOTION_STATUS=
      • API String ID: 2886996804-3163552027
      • Opcode ID: 4bd890ccb65f3a4810f91c70ead9633b3a9a53120599aea4c3e4f8ebfd5ecbb1
      • Instruction ID: e86fd2a946b1e7a8e03c512afc49fddd7fbf4a85770a5d6ff03faa0e4586ed0d
      • Opcode Fuzzy Hash: 4bd890ccb65f3a4810f91c70ead9633b3a9a53120599aea4c3e4f8ebfd5ecbb1
      • Instruction Fuzzy Hash: B3E1C4B1E022599BEB20CF54DC45BEAB7B4BF48304F1409E9D409A7283E775AB84CF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • A memory allocation failure occurred. , xrefs: 0079C30B
      • A temporary failure in name resolution occurred., xrefs: 0079C342
      • The ai_family member of the hints parameter is not supported. , xrefs: 0079C320
      • The ai_socktype member of the hints parameter is not supported. , xrefs: 0079C312
      • A nonrecoverable failure in name resolution occurred. , xrefs: 0079C33B
      • The servname parameter is not supported for the specified ai_socktype member of the hints parameter. , xrefs: 0079C327
      • The name does not resolve for the supplied parameters or the nodename and servname parameters were not provided. , xrefs: 0079C349
      • An invalid value was provided for the ai_flags member of the hints parameter., xrefs: 0079C304
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: freeaddrinfo$_wprintfgetaddrinfoswprintf
      • String ID: A memory allocation failure occurred. $A nonrecoverable failure in name resolution occurred. $A temporary failure in name resolution occurred.$An invalid value was provided for the ai_flags member of the hints parameter.$The ai_family member of the hints parameter is not supported. $The ai_socktype member of the hints parameter is not supported. $The name does not resolve for the supplied parameters or the nodename and servname parameters were not provided. $The servname parameter is not supported for the specified ai_socktype member of the hints parameter.
      • API String ID: 663564245-48089087
      • Opcode ID: f7ccdb1cf6026c59bcec1f3545771fc2c0af6a9f5af0e316e9fc194a076e0fd4
      • Instruction ID: d3f5bf2aac3cde1e1c147637f2be4fca9e4077c607c329f14593c6422ce14eeb
      • Opcode Fuzzy Hash: f7ccdb1cf6026c59bcec1f3545771fc2c0af6a9f5af0e316e9fc194a076e0fd4
      • Instruction Fuzzy Hash: 3B31E63160C380AADF21CB18EC05B6BB7E4FB99750F148A1EF49586280D77999449793
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$Message$CloseHandleObjectSingleWait$DeleteDispatchEventFilePeekTranslate
      • String ID:
      • API String ID: 3902834599-0
      • Opcode ID: 37e43aede52b59d1a8304bf808c3ed2be29c1a9a3fc0ec3a35dfe6e9c490cda6
      • Instruction ID: 1a7ebb8954aab4abbf2bf18e3947734926e3a15b02ebd6e5d63cfdd28fc26191
      • Opcode Fuzzy Hash: 37e43aede52b59d1a8304bf808c3ed2be29c1a9a3fc0ec3a35dfe6e9c490cda6
      • Instruction Fuzzy Hash: C7515BB1601B059BD720EFB8DC89FD6B7ECBB18310F144A18E2AA971D1DBB9B445CB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetDC.USER32(?), ref: 007BCAD2
      • SetStretchBltMode.GDI32(00000000,00000003), ref: 007BCAE8
      • StretchDIBits.GDI32(?,00000000,00000000,?,?,?,?,00000000,?,?,?,00000000,00CC0020), ref: 007BCB48
      • ReleaseDC.USER32(00000000,00000000), ref: 007BCDBE
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Stretch$BitsModeRelease
      • String ID:
      • API String ID: 3030403192-0
      • Opcode ID: 71bd87ae5a9a93ab331b2463f97f47531e920b871bb7bc70c5c796ab31f0ffe5
      • Instruction ID: 3e8d0bb2daaf659b6f85090b621a8d4e156937345b36489b26ef60a3b4522965
      • Opcode Fuzzy Hash: 71bd87ae5a9a93ab331b2463f97f47531e920b871bb7bc70c5c796ab31f0ffe5
      • Instruction Fuzzy Hash: E8D15671A00704AFDB26CF69C945BAABBF2BF48700F148A2DE556A66A0D775F840DB10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetDC.USER32(?), ref: 007BC6C4
      • SetStretchBltMode.GDI32(00000000,00000003), ref: 007BC6FA
      • StretchDIBits.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,?,00000000,00CC0020), ref: 007BC755
      • ReleaseDC.USER32(?,?), ref: 007BC9C4
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Stretch$BitsModeRelease
      • String ID:
      • API String ID: 3030403192-0
      • Opcode ID: f1b5d7b5f8581787a904e2e7da235cc4d422ea13b47ab0ec76e275bc9be25eaf
      • Instruction ID: 719a1fb0d6d0e3b0781fba691f1c24f01ab09d122aa817bacd3aaa36b2a93757
      • Opcode Fuzzy Hash: f1b5d7b5f8581787a904e2e7da235cc4d422ea13b47ab0ec76e275bc9be25eaf
      • Instruction Fuzzy Hash: CCD15871A00704AFDB26CFA5C985BAABBF5BF08304F148A2DF556A2A90D775F850DF10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetDC.USER32(?), ref: 007BCECE
      • SetStretchBltMode.GDI32(00000000,00000003), ref: 007BCEE4
      • StretchDIBits.GDI32(?,00000000,00000000,?,?,?,?,?,?,00000000,?,00000000,00CC0020), ref: 007BCF41
      • ReleaseDC.USER32(?,?), ref: 007BD1B2
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Stretch$BitsModeRelease
      • String ID:
      • API String ID: 3030403192-0
      • Opcode ID: ed3c797b55d09f5da9a67714399204222a2195e5fcf39f5cf6d23e07b469f8bd
      • Instruction ID: fd84bbe249d10169f34671ba29b8f8196e02d1fce8aaaca7b0f2ceb81c1255e3
      • Opcode Fuzzy Hash: ed3c797b55d09f5da9a67714399204222a2195e5fcf39f5cf6d23e07b469f8bd
      • Instruction Fuzzy Hash: BFD15971A00708EFDB26DF69C844BAABBF5BF48700F148A1DF556A2A90D775F850DB10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007964C0: _memset.LIBCMT ref: 007964F3
        • Part of subcall function 007964C0: swprintf.LIBCMT ref: 00796595
        • Part of subcall function 007B94E0: ___from_strstr_to_strchr.LIBCMT ref: 007B9501
        • Part of subcall function 007B94E0: ___from_strstr_to_strchr.LIBCMT ref: 007B951F
      • _strstr.LIBCMT ref: 00796682
      • _strstr.LIBCMT ref: 0079669A
      • _strstr.LIBCMT ref: 0079674C
      • _strstr.LIBCMT ref: 00796767
      • _strstr.LIBCMT ref: 0079677B
      • _memset.LIBCMT ref: 007967A2
      • _memmove.LIBCMT ref: 007967B5
      • _strstr.LIBCMT ref: 00796857
      • _memset.LIBCMT ref: 0079687E
      • _strstr.LIBCMT ref: 0079688F
        • Part of subcall function 0079B870: _strncmp.LIBCMT ref: 0079B8D0
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strstr$_memset$___from_strstr_to_strchr$_memmove_strncmpswprintf
      • String ID: CSeq:$Cseq:
      • API String ID: 2263177842-1220783797
      • Opcode ID: 04bdc7ae32917f8de517cace5e6ddae6dabd2f07a40d955888ac9e7c57e44efd
      • Instruction ID: b38bfd94cea663340d549aed6aec150af5216de10f1bf78fe3289953b5ed5abe
      • Opcode Fuzzy Hash: 04bdc7ae32917f8de517cace5e6ddae6dabd2f07a40d955888ac9e7c57e44efd
      • Instruction Fuzzy Hash: 47A10DB1D002289BCF20DB25EC45FDEB7F9AB54350F0406A9E848A7241E7B5AAC58FD0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GlobalAlloc.KERNEL32(00000002,?,00000000,?,00000000,?,0084A784,?,00000000,?,0099DC30,?,0084B530,?,00000000,?), ref: 0084A7A5
      • GlobalLock.KERNEL32(00000000,?,0084A784,?,00000000,?,0099DC30,?,0084B530,?,00000000,?), ref: 0084A7BD
      • _memmove.LIBCMT ref: 0084A7CA
      • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000), ref: 0084A7D9
      • EnterCriticalSection.KERNEL32(00B3D750,00000000), ref: 0084A7F2
      • LeaveCriticalSection.KERNEL32(00B3D750,00000000), ref: 0084A853
        • Part of subcall function 0081092F: __CxxThrowException@8.LIBCMT ref: 00810943
      • __EH_prolog3.LIBCMT ref: 0084A871
      • GetObjectA.GDI32(00000000,00000018,?), ref: 0084A96C
      • DeleteObject.GDI32(?), ref: 0084A979
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Global$CriticalObjectSection$AllocCreateDeleteEnterException@8H_prolog3LeaveLockStreamThrow_memmove
      • String ID:
      • API String ID: 4133277357-3916222277
      • Opcode ID: 50566097a575cc560fa9d3ebfe5e6b868ebb22476c6e8c7cc201ba601312e045
      • Instruction ID: 83ab27b18d86972c8da573dfdfc0c325011748e8acca15cbe2cf98cb9bcf786c
      • Opcode Fuzzy Hash: 50566097a575cc560fa9d3ebfe5e6b868ebb22476c6e8c7cc201ba601312e045
      • Instruction Fuzzy Hash: F581BF7194021EEBDF18AF64CC85AAEBBB8FF04314F104529F815DB291EB309E51DB92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 00828589
        • Part of subcall function 00802D2D: _malloc.LIBCMT ref: 00802D49
        • Part of subcall function 008315CB: __EH_prolog3.LIBCMT ref: 008315D2
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3$_malloc
      • String ID: MFCButton$MFCColorButton$MFCEditBrowse$MFCFontComboBox$MFCLink$MFCMaskedEdit$MFCMenuButton$MFCPropertyGrid$MFCShellList$MFCShellTree$MFCVSListBox
      • API String ID: 1683881009-2110171958
      • Opcode ID: 6363ddbeb9153196cdd836dd2b8176577490895d12fe24ba57dcd59aad368b73
      • Instruction ID: 4e815185699964c46852cc2d815a6413dd2a81c6cc1e44772a2ba0dee70bc572
      • Opcode Fuzzy Hash: 6363ddbeb9153196cdd836dd2b8176577490895d12fe24ba57dcd59aad368b73
      • Instruction Fuzzy Hash: 0351E62060535DEAEF40E77C9D45B6E26D1FF60348F24442CBD05DA1C2EFB4CE848696
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • SETUP, xrefs: 00796AE6
      • Session: %s, xrefs: 00796A12
      • rtsp://, xrefs: 00796B1E
      • SETUP %s/%s RTSP/%d.%dCSeq: %d%s%s%sUser-Agent: %s, xrefs: 00796B94
      • Transport: RTP/AVP/TCP;unicast;interleaved=%d-%d, xrefs: 00796A81
      • SETUP %s RTSP/%d.%dCSeq: %d%s%s%sUser-Agent: %s, xrefs: 00796B70
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: SETUP$SETUP %s RTSP/%d.%dCSeq: %d%s%s%sUser-Agent: %s$SETUP %s/%s RTSP/%d.%dCSeq: %d%s%s%sUser-Agent: %s$Session: %s$Transport: RTP/AVP/TCP;unicast;interleaved=%d-%d$rtsp://
      • API String ID: 1292703666-1707111129
      • Opcode ID: bd285ac4417f521704e98d18c12331a52441aaccc01bdb4484fec86e6054937e
      • Instruction ID: a7e3d7cebaa6b302e717db92b2eb09deda51f0b2eacafb726ffbe54429c69572
      • Opcode Fuzzy Hash: bd285ac4417f521704e98d18c12331a52441aaccc01bdb4484fec86e6054937e
      • Instruction Fuzzy Hash: E451D6B2A00219BBDB15DB68DC41FE6B37DFF14300F044266F549E7241EA75AA988BE1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • A memory allocation failure occurred. , xrefs: 007A0706
      • A temporary failure in name resolution occurred., xrefs: 007A073D
      • The ai_family member of the hints parameter is not supported. , xrefs: 007A071B
      • The ai_socktype member of the hints parameter is not supported. , xrefs: 007A070D
      • A nonrecoverable failure in name resolution occurred. , xrefs: 007A0736
      • The servname parameter is not supported for the specified ai_socktype member of the hints parameter. , xrefs: 007A0722
      • The name does not resolve for the supplied parameters or the nodename and servname parameters were not provided. , xrefs: 007A0744
      • An invalid value was provided for the ai_flags member of the hints parameter., xrefs: 007A06FF
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _wprintffreeaddrinfogetaddrinfoswprintf
      • String ID: A memory allocation failure occurred. $A nonrecoverable failure in name resolution occurred. $A temporary failure in name resolution occurred.$An invalid value was provided for the ai_flags member of the hints parameter.$The ai_family member of the hints parameter is not supported. $The ai_socktype member of the hints parameter is not supported. $The name does not resolve for the supplied parameters or the nodename and servname parameters were not provided. $The servname parameter is not supported for the specified ai_socktype member of the hints parameter.
      • API String ID: 4112073193-48089087
      • Opcode ID: 73bf332ea374ac72403baf94d93ab64f4c69cb22ce791a52ddad776b72eaf78e
      • Instruction ID: ee0db01d2cdfcab13356034bbcbf49f9b4613fca85f28e78b6764f4dde11b1d9
      • Opcode Fuzzy Hash: 73bf332ea374ac72403baf94d93ab64f4c69cb22ce791a52ddad776b72eaf78e
      • Instruction Fuzzy Hash: BE31B335508384ABDF108B15D84AB6BB7A4FBDA750F144F1EF48581280D7BDA9449BD3
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • socket.WS2_32(?,?,?), ref: 0079C3D3
      • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 0079C413
      • shutdown.WS2_32(?,00000002), ref: 0079C42F
      • closesocket.WS2_32(?), ref: 0079C436
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: closesocketioctlsocketshutdownsocket
      • String ID:
      • API String ID: 4217546151-0
      • Opcode ID: f62c2d021527f69ea6d66c70ea35cc13ab5ffce295f9bd512f1af655de37a000
      • Instruction ID: 93c7b0fed5c625b8350b4b2db60af38f90a9623eb20e95346005f02fbb14e5ab
      • Opcode Fuzzy Hash: f62c2d021527f69ea6d66c70ea35cc13ab5ffce295f9bd512f1af655de37a000
      • Instruction Fuzzy Hash: 986104705006089BDF25DF24DC45BE9B3B8FF18720F104699EA6A932D0DB74AE94CF90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetWindowDC.USER32(?,00000003,00000001), ref: 007BF020
      • SetStretchBltMode.GDI32(00000000,00000003), ref: 007BF033
      • FillRect.USER32(00000000,?,?), ref: 007BF061
      • SelectObject.GDI32(?,?), ref: 007BF0BC
      • DeleteObject.GDI32(00000000), ref: 007BF0C3
      • DeleteDC.GDI32(?), ref: 007BF0CC
      • CreateCompatibleDC.GDI32(00000000), ref: 007BF0E8
      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 007BF0F8
      • SelectObject.GDI32(?,00000000), ref: 007BF105
      • SetStretchBltMode.GDI32(?,00000003), ref: 007BF113
      • FillRect.USER32(?,?), ref: 007BF13D
      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 007BF17D
      • ReleaseDC.USER32(?,00000000), ref: 007BF185
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Object$CompatibleCreateDeleteFillModeRectSelectStretch$BitmapReleaseWindow
      • String ID:
      • API String ID: 2592894486-0
      • Opcode ID: 9f5c85ac55af0fe340444beaab88289609d05974f3f92881e07d80b5a73d2151
      • Instruction ID: afbcaa21b8e36672110975e3ef72f90d9633a896a43ec22101549bb87ab0ed56
      • Opcode Fuzzy Hash: 9f5c85ac55af0fe340444beaab88289609d05974f3f92881e07d80b5a73d2151
      • Instruction Fuzzy Hash: 5A712571605B04AFDB20DF69DD88BAABBF4FF08B04F10492CE59696AA0D775E804DB10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$Message$ObjectSingleWait$CloseDeleteDispatchFileHandlePeekTranslate
      • String ID:
      • API String ID: 3164521406-0
      • Opcode ID: 754e2681dad14d81c85c77efde58c74e5b6f5b078ccc439737a59b9557ee0c3a
      • Instruction ID: 61e98e0c660771f62fbcea81e37ebfa488f00b17439c62b0b5426cc172c5d9cd
      • Opcode Fuzzy Hash: 754e2681dad14d81c85c77efde58c74e5b6f5b078ccc439737a59b9557ee0c3a
      • Instruction Fuzzy Hash: 1C511670641B059BE720AF78C849FA7B7E8BF04710F148A1DA5AA9A2D1DF75B844CB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetClientRect.USER32(?,?), ref: 007C8D21
      • GetCursorPos.USER32(00000000), ref: 007C8D2E
      • PtInRect.USER32(?,00000000,00000000), ref: 007C8D60
      • DragQueryFileA.SHELL32 ref: 007C8D8D
      • DragQueryFileA.SHELL32(?,00000000,?,00000104), ref: 007C8DAE
        • Part of subcall function 00781F60: InitializeCriticalSectionAndSpinCount.KERNEL32(00000001,00000000,00000000,6838016B,0000676C,?,00000000,009593D8,000000FF,?,00000000,?,0078034D,00000000), ref: 00781FC3
        • Part of subcall function 00781F60: GetLastError.KERNEL32(?,00000000,009593D8,000000FF,?,00000000,?,0078034D,00000000,?,?,00000000), ref: 00781FCD
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: DragFileQueryRect$ClientCountCriticalCursorErrorInitializeLastSectionSpin
      • String ID: %s%s$.raw$Number of Dropped File(s) : %d$Number of Droppped File : 1
      • API String ID: 991619952-3451760269
      • Opcode ID: 3069d8fa31c7797eb9bb80e0cd9ad3a6cad6fd23fc9b8b6cac1fa22d9dadcab9
      • Instruction ID: f60dfe30166e54301618aae3533074d49b2d60335ed76158fecf3cf1eff9212a
      • Opcode Fuzzy Hash: 3069d8fa31c7797eb9bb80e0cd9ad3a6cad6fd23fc9b8b6cac1fa22d9dadcab9
      • Instruction Fuzzy Hash: 0ED1BC70A01609DFCB24CB28CC89FD9B7B9BF49324F10429DE51997291DB74AE84CF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 00790572
      • swprintf.LIBCMT ref: 0079058F
      • _fprintf.LIBCMT ref: 007905C3
        • Part of subcall function 0079C6C0: recv.WS2_32(?,00000000,0078A5CC,00000000), ref: 0079C6D7
        • Part of subcall function 0079C6C0: WSAGetLastError.WS2_32(?,0078A5CC,00000000,0000000D), ref: 0079C6E1
        • Part of subcall function 0079C6C0: shutdown.WS2_32(?,00000002), ref: 0079C701
        • Part of subcall function 0079C6C0: closesocket.WS2_32(?), ref: 0079C708
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ErrorLast_fprintf_memsetclosesocketrecvshutdownswprintf
      • String ID: ATCP20\VideoStreaming_2_0.cpp$C:\ADKLog\0x%08x_%d.txt$CVideoStreaming_2_0::GetOneFrame2$ERR.%s, %s-%d$ERR.%s, ret:%d, %s-%d
      • API String ID: 939975575-3614675859
      • Opcode ID: 23785b1e4439f6aa2c764b2234ee33d26360fee3d5f9ee1cfa7409a0eba61964
      • Instruction ID: 95e3507239faa1cd548fe62d7d0bc3c1b1aaca86339e711129e0d5b38a7ddd05
      • Opcode Fuzzy Hash: 23785b1e4439f6aa2c764b2234ee33d26360fee3d5f9ee1cfa7409a0eba61964
      • Instruction Fuzzy Hash: BB812470A01358AFCF20DBB8DC85BDAB7F5AF59310F0445A9F459A7281DB38AA41CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: MOVEDOWNLEFT$MOVEDOWNRIGHT$MOVEUPLEFT$MOVEUPRIGHT$PANLEFT$PANRIGHT$PANTILTSTOP$TILTDOWN$TILTUP
      • API String ID: 3555123492-3566327323
      • Opcode ID: 945e840d51e591c77be894154acd62a6338ad20eeaf5c4f6458daeef838c0d21
      • Instruction ID: 180f775cbd0e279c08c64bf82751b3a7fcdfe4d88bf0b89458c99b26ce9b0a81
      • Opcode Fuzzy Hash: 945e840d51e591c77be894154acd62a6338ad20eeaf5c4f6458daeef838c0d21
      • Instruction Fuzzy Hash: 49617C7290025CABDF21CE94CC41FEAB77CFB49300F5080A6FA4DD6192DA759E999F50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: OSDDOWN$OSDENTER$OSDLEAVE$OSDLEFT$OSDOFF$OSDON$OSDRIGHT$OSDSTOP$OSDUP
      • API String ID: 3555123492-871765484
      • Opcode ID: be50502cd1d9c5c1e554f72eda29fca572df52f4e8f25c8e5aba41dc51262807
      • Instruction ID: cf99dc01b2718e39b142b352e6c5bbcdd8e86215896c9642c040f1565f55c206
      • Opcode Fuzzy Hash: be50502cd1d9c5c1e554f72eda29fca572df52f4e8f25c8e5aba41dc51262807
      • Instruction Fuzzy Hash: C351B67254021CBADF30DA54CC42FEA73BCFF48300F5080A6FA4DE6182DA75AA899F51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3Object_memmove
      • String ID:
      • API String ID: 107514201-3916222277
      • Opcode ID: 27129543ed83dbb4ec5ccf8b2258b87152631e2ca0e326fc5be28d2b67645b7d
      • Instruction ID: 1c8300890c2885fe7e125cc0c06b123893774d98c248014255dab2f0339ab2af
      • Opcode Fuzzy Hash: 27129543ed83dbb4ec5ccf8b2258b87152631e2ca0e326fc5be28d2b67645b7d
      • Instruction Fuzzy Hash: 5741AD71901118ABDF11DFA4CC44BEEBBB9FF84316F148114F911E62A0DB719E89DB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strstr$_strncmpswprintf$_memset
      • String ID: Basic$Digest$WWW-Authenticate:
      • API String ID: 100654304-1218964282
      • Opcode ID: 7137a70cf82be5b7574a3245b1ab5b28ba796cb872b4323a545dd20a7db06589
      • Instruction ID: 5f7998c4ffa108a329b6bffccae8547c6ec1f6ca83fdad543446ee59506b8032
      • Opcode Fuzzy Hash: 7137a70cf82be5b7574a3245b1ab5b28ba796cb872b4323a545dd20a7db06589
      • Instruction Fuzzy Hash: 122136B3A4176037EA20E6217C43FDBB3486B70750F040521FD08A22C3F7A9AA55C6E6
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _malloc.LIBCMT ref: 0040A0CB
        • Part of subcall function 0092FEAF: _malloc.LIBCMT ref: 0092FEBB
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _malloc
      • String ID:
      • API String ID: 1579825452-0
      • Opcode ID: 6a0a78d1259318583f6e162a636e4274a15254ffcb8150f07363ec3420578a21
      • Instruction ID: 72c4af456ab4c509686c487288c2eac8a918bc3698bbc9d057e70a8c01b9b361
      • Opcode Fuzzy Hash: 6a0a78d1259318583f6e162a636e4274a15254ffcb8150f07363ec3420578a21
      • Instruction Fuzzy Hash: F5E19C716087528BD710DF39888432EF7E1AFC8304F48897EE884AB396E779D9558B47
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3_GS.LIBCMT ref: 0084A48C
      • GetModuleFileNameA.KERNEL32(00000000,?,00000104,009964B8,00000000,00AE68A4,00000000,00996540,00000000,?,?,0000052C,0084B46C,?,00000000,00000038), ref: 0084A52A
      • __splitpath_s.LIBCMT ref: 0084A55A
      • __splitpath_s.LIBCMT ref: 0084A57B
      • __makepath_s.LIBCMT ref: 0084A5AB
      • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00996540,00000000,?,?,0000052C,0084B46C,?,00000000,00000038), ref: 0084A5DA
      • GetFileSize.KERNEL32(00000000,00000000,?,?,00000000,0081A508), ref: 0084A5EE
      • CloseHandle.KERNEL32(?,?,?,00000000,0081A508), ref: 0084A5FC
        • Part of subcall function 0081092F: __CxxThrowException@8.LIBCMT ref: 00810943
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: File$__splitpath_s$CloseCreateException@8H_prolog3_HandleModuleNameSizeThrow__makepath_s
      • String ID:
      • API String ID: 3103951209-0
      • Opcode ID: 522eb52521575003361218d7102b698d6e44ca608dc4db60eb36c1cf092241c9
      • Instruction ID: e73e9dcc0cc0a5b4c82ce5c3d2712283374b6608493d18132449915e7577051a
      • Opcode Fuzzy Hash: 522eb52521575003361218d7102b698d6e44ca608dc4db60eb36c1cf092241c9
      • Instruction Fuzzy Hash: 6D619FB1940618ABDB24AB60CC45FEA77BCFF14311F040599B515EA1D1EB70AE818F62
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 0078258C
      • _memset.LIBCMT ref: 007825A6
      • _memset.LIBCMT ref: 007825C0
      • swprintf.LIBCMT ref: 0078269C
      • swprintf.LIBCMT ref: 007826D9
        • Part of subcall function 0092A617: ___report_securityfailure.LIBCMT ref: 0092A61C
        • Part of subcall function 00782010: _memset.LIBCMT ref: 00782028
        • Part of subcall function 0079EE70: _strstr.LIBCMT ref: 0079EF3D
        • Part of subcall function 0079EE70: _strstr.LIBCMT ref: 0079EF56
        • Part of subcall function 0079EE70: _memset.LIBCMT ref: 0079EFA3
      • ResetEvent.KERNEL32(?), ref: 00782920
      • CreateThread.KERNEL32(00000000,00000000,Function_003821B0,?,00000000,00000000), ref: 0078293E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$_strstrswprintf$CreateEventResetThread___report_securityfailure
      • String ID: rtsp://%s:%s@%s:%d$rtsp://%s:%s@%s:%d%s$rtsp://%s:%s@%s:%d/%s
      • API String ID: 11235787-4100196092
      • Opcode ID: 2c6bef8beb366fe9549eedc2cb87ecf555ea1aee26230fcce4ef91f0f36cfe11
      • Instruction ID: 14d2d3255ebe36f7da8bd757addc502daea1eab33100cafc19df924d8edb72d7
      • Opcode Fuzzy Hash: 2c6bef8beb366fe9549eedc2cb87ecf555ea1aee26230fcce4ef91f0f36cfe11
      • Instruction Fuzzy Hash: 91B15C70B84205ABCF35EA24C844BEEB3A5EF45311F1441AAD549E7282DB39A987CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 0079A5B0: _strstr.LIBCMT ref: 0079A5BD
      • _strstr.LIBCMT ref: 0079A863
      • ___from_strstr_to_strchr.LIBCMT ref: 0079A883
      • ___from_strstr_to_strchr.LIBCMT ref: 0079A8AF
      • _memset.LIBCMT ref: 0079A905
      • ___from_strstr_to_strchr.LIBCMT ref: 0079A915
      • ___from_strstr_to_strchr.LIBCMT ref: 0079A92D
      • _strstr.LIBCMT ref: 0079AB2D
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ___from_strstr_to_strchr$_strstr$_memset
      • String ID: RTP-Info:$seq=$url=
      • API String ID: 882429815-3042264529
      • Opcode ID: 49f4c491f17c887ba62dcb1e8b2f7896d41586839d1539f265625eac588eb360
      • Instruction ID: 11eb1f2d181976fac6e58620f67726ca341b42199474cef308353b2863872d3d
      • Opcode Fuzzy Hash: 49f4c491f17c887ba62dcb1e8b2f7896d41586839d1539f265625eac588eb360
      • Instruction Fuzzy Hash: 75911671E012546FCF21CF24AD50BEABBF5AF55345F0840E9D848AB242EB35AE45CF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • %smpeg4?USER=%s&PWD=%s&CHANNEL=%d&MOTION_ENABLED&MOTION_STATUS, xrefs: 0077C41A
      • %smpeg4?USER=%s&PWD=%s&MOTION_ENABLED&MOTION_STATUS, xrefs: 0077C3E6
      • MOTION_ENABLED=, xrefs: 0077C4A2
      • MOTION_STATUS=, xrefs: 0077C4F7
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$swprintf
      • String ID: %smpeg4?USER=%s&PWD=%s&CHANNEL=%d&MOTION_ENABLED&MOTION_STATUS$%smpeg4?USER=%s&PWD=%s&MOTION_ENABLED&MOTION_STATUS$MOTION_ENABLED=$MOTION_STATUS=
      • API String ID: 1874130743-877558633
      • Opcode ID: 26f0317cacd6e3352da22fddae7dfab5373f6c7e8aa98d1e9ecf9b5c981cc3f9
      • Instruction ID: 78542eb8a7e5ff2b015fc3f84300b4b2d45716f40bb015e9dca4a5c7e04233ea
      • Opcode Fuzzy Hash: 26f0317cacd6e3352da22fddae7dfab5373f6c7e8aa98d1e9ecf9b5c981cc3f9
      • Instruction Fuzzy Hash: 14A1C5B1D002589BDB11DF54DC80BEEB7F8BB49304F5481EDD589A7241EB399A85CF81
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _swscanf.LIBCMT ref: 004AC77D
        • Part of subcall function 0092D9BB: _vscan_fn.LIBCMT ref: 0092D9CF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _swscanf_vscan_fn
      • String ID: 8$film$ntsc$ntsc-film$pal$qntsc$qpal$sntsc$spal
      • API String ID: 1942008592-4255372462
      • Opcode ID: 10625f7223a155b091545ef2cd3498bbfeaa018627bf05c12592ef8dd66a63be
      • Instruction ID: d48a76e6323bd0c94aafc6a93b5fe61b0d6b5a598d4bab0fb1576bbd59e44221
      • Opcode Fuzzy Hash: 10625f7223a155b091545ef2cd3498bbfeaa018627bf05c12592ef8dd66a63be
      • Instruction Fuzzy Hash: 1C518A71A083449BE740DF15C58036B7BE1FB91726F19882EF5498B380E73ECD459B8A
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$CountCriticalErrorInitializeLastSectionSpinswprintf
      • String ID: C:\download.raw
      • API String ID: 3752311886-2121772504
      • Opcode ID: cde8bb136b8c4de9a48c8629faa5c7cbcea7039a223d21dcf0f0f48234827694
      • Instruction ID: 7a1e8f1dc9f2c39436cf8acf093192dc01fc2d766d4f50eb8976c1c0306091e3
      • Opcode Fuzzy Hash: cde8bb136b8c4de9a48c8629faa5c7cbcea7039a223d21dcf0f0f48234827694
      • Instruction Fuzzy Hash: 32517CB0644B46FAE354EF75C809B96FBE8FB04714F108319E1B89A2C0DBB971588BD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: htons$_memset$_memmovehtonlsend
      • String ID: $
      • API String ID: 1448673075-3993045852
      • Opcode ID: 278a6377f1dce09f35a41b413edb285ed03d10bc1d5eebc94cc00a718b034dff
      • Instruction ID: e6236e7369583fb6d8ca5d1a049c12dd241ade9078684648e8cde627600ddfba
      • Opcode Fuzzy Hash: 278a6377f1dce09f35a41b413edb285ed03d10bc1d5eebc94cc00a718b034dff
      • Instruction Fuzzy Hash: 034150B4E14218AADB24DB64CC45BD9B7B8FF48304F000296E60CE7281D7746A95CF99
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • socket.WS2_32(?,?,?), ref: 007EA6C7
      • ioctlsocket.WS2_32(00000000,8004667E,?), ref: 007EA6F0
      • connect.WS2_32(000000FF,?,?), ref: 007EA720
      • WSAGetLastError.WS2_32 ref: 007EA7A3
        • Part of subcall function 007EAAC0: setsockopt.WS2_32(000000FF,0000FFFF,00001002,007EA765,00000004), ref: 007EAAE6
        • Part of subcall function 007EAB30: setsockopt.WS2_32(000000FF,0000FFFF,00001001,?,00000004), ref: 007EAB56
      • closesocket.WS2_32(000000FF), ref: 007EA927
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: setsockopt$ErrorLastclosesocketconnectioctlsocketsocket
      • String ID:
      • API String ID: 1871432493-0
      • Opcode ID: 03a418917cb084717a5c01a98864f9d7e19baf2ecadd14379699d084357ff9a3
      • Instruction ID: 523c63e65e8a0045ac5161dba174b637f04312e29edf54cfd4b01d8558ccf599
      • Opcode Fuzzy Hash: 03a418917cb084717a5c01a98864f9d7e19baf2ecadd14379699d084357ff9a3
      • Instruction Fuzzy Hash: D761F370A05245BBDB28CB26CC44AE9B3B4BF1D310F114358E9A9936D0E778BE85DF91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007880DF
      • InitializeCriticalSectionAndSpinCount.KERNEL32(00000B3C,00000000), ref: 0078814F
      • GetLastError.KERNEL32 ref: 00788159
      • _memset.LIBCMT ref: 0078819B
      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,?,?,?,00000000,6838016B), ref: 007881B8
      • ResetEvent.KERNEL32(00000000,?,?,?,00000000,6838016B), ref: 007881C1
      • CreateEventA.KERNEL32(0000001F,00000001,0000001F,0000001F,?,?,?,00000000,6838016B), ref: 007881D2
      • ResetEvent.KERNEL32(00000000,?,?,?,00000000,6838016B), ref: 007881E2
      • _memset.LIBCMT ref: 007881F6
      • _memset.LIBCMT ref: 00788209
      • _memset.LIBCMT ref: 0078822C
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$Event$CreateReset$CountCriticalErrorInitializeLastSectionSpin
      • String ID:
      • API String ID: 3825420614-0
      • Opcode ID: 666e401901fa6b40d08d0195832c96e15154fe5e74d035f837a881949b4b912e
      • Instruction ID: 8f74a65129d3fc34677e8ac717d2d6189a67a7efa8d603fb1926b4d2c0c9a771
      • Opcode Fuzzy Hash: 666e401901fa6b40d08d0195832c96e15154fe5e74d035f837a881949b4b912e
      • Instruction Fuzzy Hash: F651AFB1B40B46BAE354DF64CC09BCAFBA8BF45708F104308E1689B2C1DBB96164CBD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _strncmp.LIBCMT ref: 007E8B48
      • ___from_strstr_to_strchr.LIBCMT ref: 007E8B5B
      • ___from_strstr_to_strchr.LIBCMT ref: 007E8B70
      • ___from_strstr_to_strchr.LIBCMT ref: 007E8C16
      • ___from_strstr_to_strchr.LIBCMT ref: 007E8C2B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ___from_strstr_to_strchr$_strncmp
      • String ID: http://
      • API String ID: 2516952115-1121587658
      • Opcode ID: eb69fa0bffd30ac08c501756572070e958a3cca669360300f162eed5669ea111
      • Instruction ID: 212c5f1ca23b1b43eea650edfec421d3f1fa92a1d09d8a6266708ff42ca4a9d8
      • Opcode Fuzzy Hash: eb69fa0bffd30ac08c501756572070e958a3cca669360300f162eed5669ea111
      • Instruction Fuzzy Hash: 59B16C72B012546FDB14DE79DD81BEE77A8AF5D310F040169F909E7282DE78A90483E2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007D86BB
        • Part of subcall function 007ED540: _sprintf.LIBCMT ref: 007ED586
        • Part of subcall function 007D95C0: _memmove.LIBCMT ref: 007D95DE
        • Part of subcall function 007D95C0: _memmove.LIBCMT ref: 007D95FB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$_memset_sprintf
      • String ID: PORT_CONTROL=$PORT_HTTP=$PORT_MULTICAST=$PORT_REGISTER=$PORT_SEARCH_1=$PORT_SEARCH_2=$PORT_VIDEO=$V2_PORT_RTSP=
      • API String ID: 4268269830-4087695887
      • Opcode ID: 28fd27d49352577e1eb448af7ac0d061db343f7dc8c8cd965c4b62f3d0a0b521
      • Instruction ID: 7eb835b1169b8be6887931b347b1df2b699aa64694a99431ad793ea14d73420c
      • Opcode Fuzzy Hash: 28fd27d49352577e1eb448af7ac0d061db343f7dc8c8cd965c4b62f3d0a0b521
      • Instruction Fuzzy Hash: E871A8B194021DAADF10DFA0DD49FEE77B9AF54304F1001A6E909B7341EB35AB54CBA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • http://%s:%d/cgi-bin/quad?USER=%s&PWD=%s&%s, xrefs: 007E0AAC
      • http://%s:%d/cgi-bin/quad?USER=%s&PWD=%s&CHANNEL=%d&%s, xrefs: 007E0ADE
      • Quad, xrefs: 007E0BA5
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset_sprintf$_memmove
      • String ID: Quad$http://%s:%d/cgi-bin/quad?USER=%s&PWD=%s&%s$http://%s:%d/cgi-bin/quad?USER=%s&PWD=%s&CHANNEL=%d&%s
      • API String ID: 1395474088-2745833304
      • Opcode ID: 7882ae565e317a050afe0d5caadeaf527f6263ba9431b48edb32acdea3951e6b
      • Instruction ID: 7a8a73f0fec6e3fcc618c0977f680c26c89dc3e342715e2482e7edfa646dea9e
      • Opcode Fuzzy Hash: 7882ae565e317a050afe0d5caadeaf527f6263ba9431b48edb32acdea3951e6b
      • Instruction Fuzzy Hash: 4F41B7B290025DABDB20DE64EC49FEFB3FCEB49304F0040DAE949D7241D675AE548BA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000), ref: 00804A0B
      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00804A1B
      • EncodePointer.KERNEL32(00000000), ref: 00804A24
      • DecodePointer.KERNEL32(00000000,?,00000000), ref: 00804A32
      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800), ref: 00804A46
      • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 00804A5B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Pointer$AddressDecodeDirectoryEncodeHandleLibraryLoadModuleProcSystem
      • String ID: SetDefaultDllDirectories$\$kernel32.dll
      • API String ID: 4227638471-3881611067
      • Opcode ID: 3702aed92e0ae78bfa5afc8daf6e7e91be134070cbb3978b59d0e6779c24499b
      • Instruction ID: 8b6f5bdb42b24d4bb39d6b0680477309f8d1c1d52d7bdafd06d34add1c81496c
      • Opcode Fuzzy Hash: 3702aed92e0ae78bfa5afc8daf6e7e91be134070cbb3978b59d0e6779c24499b
      • Instruction Fuzzy Hash: DE21B0B1BC1238ABCB60DBA4AC49FAA37BCFB54714F040469F905E3280EB709D448B95
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3_GS.LIBCMT ref: 0084AE9E
      • GetObjectA.GDI32(?,00000018,?), ref: 0084AECA
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3_Object
      • String ID:
      • API String ID: 2214263146-0
      • Opcode ID: 55b71a967dbe10b5c939e4a0f51622c108401ebd9b38206cf902603c58d23942
      • Instruction ID: c1a011b1526886d0ee1219e70aa440a21baf61d5a1ad38683a358cadef60883c
      • Opcode Fuzzy Hash: 55b71a967dbe10b5c939e4a0f51622c108401ebd9b38206cf902603c58d23942
      • Instruction Fuzzy Hash: 69811875E002298BDB24CFA9C884A9DBBB6FF58300F248169E919EB351DB319D85DF50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 00810DC9
        • Part of subcall function 00802D2D: _malloc.LIBCMT ref: 00802D49
      • __CxxThrowException@8.LIBCMT ref: 00810E0E
      • GetMenuItemCount.USER32(6838016B), ref: 00810E1D
      • GetMenuItemCount.USER32(00000000), ref: 00810E29
      • GetSubMenu.USER32(00000000,-00000001), ref: 00810E3E
      • GetMenuItemCount.USER32(00000000), ref: 00810E51
      • GetSubMenu.USER32(00000000,00000000), ref: 00810E62
      • RemoveMenu.USER32(00000000,00000000,00000400,?,?,?,?,00000000,00AF7A98,00000004,00781F78,00000000,?,0078034D,00000000), ref: 00810E7C
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Menu$CountItem$Exception@8H_prolog3RemoveThrow_malloc
      • String ID:
      • API String ID: 638606686-0
      • Opcode ID: 5bc6d9e9eca4274dbcb6a8c00587d495e390b164f1d10dd8ba9e5b442dd6b7f6
      • Instruction ID: da945ba3ee6d7e3a38cfa9d2b9f00589ad5f7b6a00024bb5c1c9aff36307e21c
      • Opcode Fuzzy Hash: 5bc6d9e9eca4274dbcb6a8c00587d495e390b164f1d10dd8ba9e5b442dd6b7f6
      • Instruction Fuzzy Hash: AB31BFB1905319EBDB129F56DC49ADF7BADFF40321F208919F905D6290CBB09AC0AB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __fread_nolock$__ftelli64_memset
      • String ID: g;y
      • API String ID: 2955018052-2813469207
      • Opcode ID: a23c3464d7c00ca3ac4992253cdf28e7a0becba025d533c079e27fe902c0bd77
      • Instruction ID: 8b8a1afbaf8f5e51269fb3b8c04f0cd2da0ffb84ef8a4cf140e48f5c6d87e649
      • Opcode Fuzzy Hash: a23c3464d7c00ca3ac4992253cdf28e7a0becba025d533c079e27fe902c0bd77
      • Instruction Fuzzy Hash: DA615D70A0011ABADF38FB68ECD17E8B764FB10300F0441A9D754B2153EA785DDB8B94
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007B05C8
      • shutdown.WS2_32(?,00000002), ref: 007B0637
      • closesocket.WS2_32(?), ref: 007B063E
      • swprintf.LIBCMT ref: 007B066C
      • send.WS2_32(?,00000000,00000001,00000000), ref: 007B06A5
      • send.WS2_32(?,?,?,00000000), ref: 007B06C3
      • send.WS2_32(?,00AE6888,00000002,00000000), ref: 007B06DE
      Strings
      • --%sContent-Type: %sContent-Length: %d, xrefs: 007B065B
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: send$_memsetclosesocketshutdownswprintf
      • String ID: --%sContent-Type: %sContent-Length: %d
      • API String ID: 735003360-387703119
      • Opcode ID: 41c8610decc42bcf10dad361bb5670626eb281590866ef302598b50f10458889
      • Instruction ID: b7afcacdbbdb31dc0d8a311b8b1ad496d2384fccc0152bed3caf69a94c4aa1c6
      • Opcode Fuzzy Hash: 41c8610decc42bcf10dad361bb5670626eb281590866ef302598b50f10458889
      • Instruction Fuzzy Hash: 2641E671600215ABCB24DF68CC99FEEB764EF45324F104289E92AD72C2CB34AD65C790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetStockObject.GDI32(00000011), ref: 0081A9EB
      • GetStockObject.GDI32(0000000D), ref: 0081A9F3
      • GetObjectA.GDI32(00000000,0000003C,?), ref: 0081AA00
      • GetDC.USER32(00000000), ref: 0081AA0F
      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0081AA26
      • MulDiv.KERNEL32(?,00000048,00000000), ref: 0081AA32
      • ReleaseDC.USER32(00000000,00000000), ref: 0081AA3E
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Object$Stock$CapsDeviceRelease
      • String ID: System
      • API String ID: 46613423-3470857405
      • Opcode ID: 1cc633f5de185172e1fac5294f6d4412fe18bda2706cb1d4b585fdb0bdd0c076
      • Instruction ID: d1929bc0fa0ad1baa39aa781f874009303780ceb7ef9184aa2f746b9e157d289
      • Opcode Fuzzy Hash: 1cc633f5de185172e1fac5294f6d4412fe18bda2706cb1d4b585fdb0bdd0c076
      • Instruction Fuzzy Hash: F7118E71A12328ABEB18EBA4DD49FAE7B68FF05741F000019FA05E62C0DA309D41D761
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _free.LIBCMT ref: 007C42F4
      • _malloc.LIBCMT ref: 007C4310
      • _free.LIBCMT ref: 007C436A
      • _malloc.LIBCMT ref: 007C438C
      • EnterCriticalSection.KERNEL32(00C098A0), ref: 007C4473
      • LeaveCriticalSection.KERNEL32(00C098A0), ref: 007C4487
      • EnterCriticalSection.KERNEL32 ref: 007C45E8
      • LeaveCriticalSection.KERNEL32(00C098A0), ref: 007C4605
      • LeaveCriticalSection.KERNEL32(00C098A0), ref: 007C461D
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CriticalSection$Leave$Enter_free_malloc
      • String ID:
      • API String ID: 1917710520-0
      • Opcode ID: ec984e7dd16d32010300e76bbeb5bed5035c08cb221c2887aa1cc63e6a55b948
      • Instruction ID: 3756cca22ac651e4336311f9ab8e1839da8b5df0a39b52b3ca080d662e0ea663
      • Opcode Fuzzy Hash: ec984e7dd16d32010300e76bbeb5bed5035c08cb221c2887aa1cc63e6a55b948
      • Instruction Fuzzy Hash: E0D149B0A00A05AFDB20CF65C994F6AB7F4FF48314F10862DE9199B681E735F990CB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • AVIStreamLength.AVIFIL32(?), ref: 007C0FB4
      • AVIStreamEndStreaming.AVIFIL32(?), ref: 007C0FB9
      • AVIFileRelease.AVIFIL32(?), ref: 007C0FBE
      • AVIStreamLength.AVIFIL32(?), ref: 007C0FD3
      • AVIStreamEndStreaming.AVIFIL32(?), ref: 007C0FD8
      • AVIFileRelease.AVIFIL32(?), ref: 007C0FDD
      • AVIFileRelease.AVIFIL32(?), ref: 007C0FF4
      • AVIFileExit.AVIFIL32 ref: 007C1001
      • CoUninitialize.OLE32 ref: 007C1007
        • Part of subcall function 007C1440: AVIStreamLength.AVIFIL32(?,?,007C0EC1), ref: 007C144B
        • Part of subcall function 007C1440: AVIStreamWrite.AVIFIL32(?,00000000,00000001,?,?,00000010,00000000,00000000), ref: 007C1469
        • Part of subcall function 007C1440: _memset.LIBCMT ref: 007C149A
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Stream$File$LengthRelease$Streaming$ExitUninitializeWrite_memset
      • String ID:
      • API String ID: 378301645-0
      • Opcode ID: 926ddb105ee2b7ab5ac6f38f7008413f86e8a271ed60bd1d42ed5b966625a7de
      • Instruction ID: 9de3e9d9078bce9a2a3a86041f96e707063a15c2908f0851d9f14222ea21f1fb
      • Opcode Fuzzy Hash: 926ddb105ee2b7ab5ac6f38f7008413f86e8a271ed60bd1d42ed5b966625a7de
      • Instruction Fuzzy Hash: 99518E71910744CBD731AF36C845F9BB7F8AF49344F044B1DE89AA7291DB79A885CB80
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _free$AtomDeleteGlobal$H_prolog3_catch_Uninitialize
      • String ID:
      • API String ID: 4252385502-0
      • Opcode ID: 75cc78514ded60435b7150c60d7ec6ca14b96d7fde7e6622fedeedebe3137809
      • Instruction ID: f8dc3881c66dc23c65ada50bcff94161b2a0615d7517016e3dcc44e08a4626d9
      • Opcode Fuzzy Hash: 75cc78514ded60435b7150c60d7ec6ca14b96d7fde7e6622fedeedebe3137809
      • Instruction Fuzzy Hash: 29416570605700CFDB64AFB5DC99A2ABBE5FF40700F1489ADA456D76B2CB30E840CB10
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3_catch.LIBCMT ref: 00818E6B
      • EnterCriticalSection.KERNEL32(?,00000010,00818D70,?,00000000,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000,?,80070057), ref: 00818E7C
      • TlsGetValue.KERNEL32(?,?,00000000,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000,?,80070057,00000000,000081E4), ref: 00818E98
      • LocalAlloc.KERNEL32(00000000,00000000,00000000,00000010,?,?,00000000,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818F08
      • LocalReAlloc.KERNEL32(?,00000000,00000002,00000000,00000010,?,?,00000000,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001), ref: 00818F22
      • LeaveCriticalSection.KERNEL32(6838016B,?,?,00000000,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000,?,80070057,00000000), ref: 00818F31
      • _memset.LIBCMT ref: 00818F50
      • TlsSetValue.KERNEL32(?,00000000), ref: 00818F61
      • LeaveCriticalSection.KERNEL32(?,?,00000000,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000,?,80070057,00000000,000081E4), ref: 00818F98
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CriticalSection$AllocLeaveLocalValue$EnterH_prolog3_catch_memset
      • String ID:
      • API String ID: 4057217241-0
      • Opcode ID: c4bbbbc956b7702d63f6cf1779ceef8667cbc755b5f9ea16ea8625684a1cb1d8
      • Instruction ID: 41ca8631b9806bcbbc315ba0b7a5581ce9b09ffa99cd327c214c36f07cc92880
      • Opcode Fuzzy Hash: c4bbbbc956b7702d63f6cf1779ceef8667cbc755b5f9ea16ea8625684a1cb1d8
      • Instruction Fuzzy Hash: B531DD70400706EFDB209F19D886EAAFBBAFF80320B20852AE555C7290CF30A881CF51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ObjectSelect$Rect$ClientFillRectangleRelease
      • String ID:
      • API String ID: 1805211394-0
      • Opcode ID: 161b6f7569a70e3cd54a0c7cc601af948391ef9281cc7058e5de8ed2981431e1
      • Instruction ID: 3fba9418189869b3ee337024ff31d77f7e3bb5e0033ca5f89a3d25b8e0d8fb26
      • Opcode Fuzzy Hash: 161b6f7569a70e3cd54a0c7cc601af948391ef9281cc7058e5de8ed2981431e1
      • Instruction Fuzzy Hash: 0821E836901609AFCF159FA5DD49DAFFBBAFF48311B004129E519A2260CB31A961EF90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset_sprintf_strncmp
      • String ID: %d,$ACM-8211
      • API String ID: 1569155853-243664484
      • Opcode ID: d99915160c095df99f90bf3b82a10c87d2b189a07817654200d48ab6812b57ab
      • Instruction ID: 2beffa6ca4e56dbeb79471155bfa7bda4e36698f3cf6f3a5419dd4b2dcb68b64
      • Opcode Fuzzy Hash: d99915160c095df99f90bf3b82a10c87d2b189a07817654200d48ab6812b57ab
      • Instruction Fuzzy Hash: 4A81AA71A0026CDEEF25DF28CC40BFAB7B5AB52304F0441E9D9496B252D77A1A89CB61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __fread_nolock__fseeki64__ftelli64_memset
      • String ID: 97y
      • API String ID: 3853309350-1831169697
      • Opcode ID: d9db015e2d661f8430e46ef0c267ec263dcec7eea0d961e24f2459128ee90ce6
      • Instruction ID: ba7b896708dc6bdd88f7f46754c9ddd5568d218b1965366d2e29749b243f90b9
      • Opcode Fuzzy Hash: d9db015e2d661f8430e46ef0c267ec263dcec7eea0d961e24f2459128ee90ce6
      • Instruction Fuzzy Hash: 73513571A00098B6DF74FA68BC417ED73A1EB90310F4841B6DA58BB177D63C9D838B95
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset
      • String ID: @
      • API String ID: 2102423945-2766056989
      • Opcode ID: 3038fed797323d9ceba8c07b4a2aef93ef44767872fdf5cf71b1b187af89a3d3
      • Instruction ID: 0e7cacf89a9f8b9bfe74a043ad4d64418be3844440e02a30cc0c49848279136e
      • Opcode Fuzzy Hash: 3038fed797323d9ceba8c07b4a2aef93ef44767872fdf5cf71b1b187af89a3d3
      • Instruction Fuzzy Hash: 6D515CB0410B45DAE310CF24C85CBE7FBE8BF45308F1446ADE5695F282DBBA6188CB95
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf
      • String ID: rtsp://%s$rtsp://%s%s$rtsp://%s:%ld$rtsp://%s:%ld%s
      • API String ID: 233258989-161322902
      • Opcode ID: 609a224a5263308a9cc3b949b2f9836ee359185292c6d52c685a2255666790fa
      • Instruction ID: 0f62a1516c758248354437c5d66129b98913e84797475e784bfa65dc59a99f6c
      • Opcode Fuzzy Hash: 609a224a5263308a9cc3b949b2f9836ee359185292c6d52c685a2255666790fa
      • Instruction Fuzzy Hash: 9B212BB36043447ADB60DA64FC85FFB739EDBA0310F440C36E65DC7141E626B4498761
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: EventReset
      • String ID:
      • API String ID: 2632953641-0
      • Opcode ID: 4ea337236f88d35c39452209453860bbffae661bf4ff60954174839b568e0b9f
      • Instruction ID: aa487b17f08c8c56bcd8dfef2e4fdd2cbad83d9126a44fe2c40835518e23ea84
      • Opcode Fuzzy Hash: 4ea337236f88d35c39452209453860bbffae661bf4ff60954174839b568e0b9f
      • Instruction Fuzzy Hash: 71C1EEB4501B84DADB30DF24CC4DB9AB7F4AB44314F14495EE8AA963C0DBBDA944CB61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ResetEvent.KERNEL32(?), ref: 0078ACCF
      • __time64.LIBCMT ref: 0078ACD7
      • __time64.LIBCMT ref: 0078ACE4
      • WaitForSingleObject.KERNEL32(?,00000064), ref: 0078ACF9
      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 0078AD0F
      • TranslateMessage.USER32(?), ref: 0078AD1D
      • DispatchMessageA.USER32(?), ref: 0078AD27
      • __time64.LIBCMT ref: 0078AD2F
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Message__time64$DispatchEventObjectPeekResetSingleTranslateWait
      • String ID:
      • API String ID: 3185327525-0
      • Opcode ID: e81bffb18982e655b049be56c4e94e6ab9581c1d5f747d218666bc1d80db8f94
      • Instruction ID: ef1257a54b9e6346b7829d3f3df8f1cbd4066556ae3c9fffd5651ca0df1a938e
      • Opcode Fuzzy Hash: e81bffb18982e655b049be56c4e94e6ab9581c1d5f747d218666bc1d80db8f94
      • Instruction Fuzzy Hash: 7A410472E44745EBEB10EF64CC05B99B7B4FF84711F10862BED95A7280EB789A40C791
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _strlen.LIBCMT ref: 00814A71
      • _memset.LIBCMT ref: 00814A8B
      • GetFocus.USER32 ref: 00814A93
        • Part of subcall function 008040B3: UnhookWindowsHookEx.USER32(?), ref: 008040DD
      • IsWindowEnabled.USER32(00000000), ref: 00814AC7
      • EnableWindow.USER32(00000000,00000000), ref: 00814ADF
      • EnableWindow.USER32(00000000,00000001), ref: 00814B6E
      • IsWindow.USER32(?), ref: 00814B78
      • SetFocus.USER32(?), ref: 00814B83
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Window$EnableFocus$EnabledHookUnhookWindows_memset_strlen
      • String ID:
      • API String ID: 1437217444-0
      • Opcode ID: bba3130bcd9784a45d1e99cdec1dd50bdbc677d8c3250492a1c6dda450fb595f
      • Instruction ID: 26b3b67d491b040327f453c909abf49f85e8dceb35963a6b16184d559754e629
      • Opcode Fuzzy Hash: bba3130bcd9784a45d1e99cdec1dd50bdbc677d8c3250492a1c6dda450fb595f
      • Instruction Fuzzy Hash: DB31B170314601EFDB14AFB4D889FA9F7A8FF05324F048268E419D7292DB30E894DB81
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memmove.LIBCMT ref: 007848D4
      • SetEvent.KERNEL32(?,?,?,?,?,?,00783BDF,6838016B), ref: 007848F7
      • WaitForSingleObject.KERNEL32(?,00000064), ref: 0078491A
      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00784932
      • TranslateMessage.USER32(?), ref: 0078493C
      • DispatchMessageA.USER32(?), ref: 00784946
      • WaitForSingleObject.KERNEL32(?,00000064), ref: 00784954
      • CloseHandle.KERNEL32(?), ref: 00784960
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Message$ObjectSingleWait$CloseDispatchEventHandlePeekTranslate_memmove
      • String ID:
      • API String ID: 3496235885-0
      • Opcode ID: e309e39c4dd2a0bc2c813d7c0f88af4e28c69762538b6527db89f78a30af395c
      • Instruction ID: f05b085e5eef611fd6b49df9aee3b296708f54f8526e0b83822b0a103ea3e7fa
      • Opcode Fuzzy Hash: e309e39c4dd2a0bc2c813d7c0f88af4e28c69762538b6527db89f78a30af395c
      • Instruction Fuzzy Hash: 19310D31740B06AFEB28EB65DC99FABB764BF04311F440214E5299B290DFA4BC15CFA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$EventReset__time64$send
      • String ID:
      • API String ID: 2820246906-0
      • Opcode ID: 76acf40f357e80a461e5ef14c507df513da1c4cb786cc087ce025875ab1b1626
      • Instruction ID: cba7103f68e05de54006b97df4cb27535344610ecd1091ed07b29b39f21d8102
      • Opcode Fuzzy Hash: 76acf40f357e80a461e5ef14c507df513da1c4cb786cc087ce025875ab1b1626
      • Instruction Fuzzy Hash: 1B21FC70501254AFE720EB68DC0ABDDB3B4EF44701F000158F969972D1DBB46954DB92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetSystemMetrics.USER32(00000031), ref: 008462CE
      • GetSystemMetrics.USER32(00000032), ref: 008462D8
      • SetRectEmpty.USER32(00B3D674), ref: 008462E7
      • EnumDisplayMonitors.USER32(00000000,00000000,00846150,00B3D674,?,?,?,00000000,00B3D508), ref: 008462F7
      • SystemParametersInfoA.USER32(00000030,00000000,00B3D674,00000000), ref: 0084630E
      • SystemParametersInfoA.USER32(00001002,00000000,00B3D698,00000000), ref: 00846336
      • SystemParametersInfoA.USER32(00001012,00000000,00B3D69C,00000000), ref: 0084634C
      • SystemParametersInfoA.USER32(0000100A,00000000,00B3D6AC,00000000), ref: 0084636E
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: System$InfoParameters$Metrics$DisplayEmptyEnumMonitorsRect
      • String ID:
      • API String ID: 2614369430-0
      • Opcode ID: 7923fa95ace019383893548069a2f5253629fbcd9e8e9b846acce4f5fc0af28f
      • Instruction ID: f69a1ac0d0263738f4d78fe274fb18bb8b0155b31cb6258147254b0851abb450
      • Opcode Fuzzy Hash: 7923fa95ace019383893548069a2f5253629fbcd9e8e9b846acce4f5fc0af28f
      • Instruction Fuzzy Hash: F91159B2712611BFE7198F609C4AFE6FB68FB05711F00022EE66897280D7B079508BA5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __libm_sse2_sin_precise.LIBCMT ref: 0094CFF7
      • __libm_sse2_cos_precise.LIBCMT ref: 0094D00B
      • __libm_sse2_sin_precise.LIBCMT ref: 0094D01F
      • __libm_sse2_cos_precise.LIBCMT ref: 0094D033
      • __libm_sse2_sin_precise.LIBCMT ref: 0094D047
      • __libm_sse2_sin_precise.LIBCMT ref: 0094D067
      • __libm_sse2_cos_precise.LIBCMT ref: 0094D078
        • Part of subcall function 0094B420: __libm_sse2_atan_precise.LIBCMT ref: 0094B44D
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __libm_sse2_sin_precise$__libm_sse2_cos_precise$__libm_sse2_atan_precise
      • String ID:
      • API String ID: 1098618227-0
      • Opcode ID: fd0d9a54fd5b3644c96a6ed4cc23a7c5d6191428b2436c5089f2f78c95a1d8db
      • Instruction ID: d9d5fce22c2ca1715700d6551cfbbf18fec5eaa522c12f0693da685b7c2f3934
      • Opcode Fuzzy Hash: fd0d9a54fd5b3644c96a6ed4cc23a7c5d6191428b2436c5089f2f78c95a1d8db
      • Instruction Fuzzy Hash: A3128371929B408FC327DE38C45165AF7E9BFDA380F018B2BF859A7651E7709842CB41
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$_free_malloc
      • String ID:
      • API String ID: 2856543016-0
      • Opcode ID: 1ed4d2bcd2a961f14afcd9a80426c018cbb8e581d5f3cd92006eecce87fd05b6
      • Instruction ID: 795a107c67a3d09ca222e3b0e4f68cca8b6e8138d2c4d3e8ee6638f7cab28ebc
      • Opcode Fuzzy Hash: 1ed4d2bcd2a961f14afcd9a80426c018cbb8e581d5f3cd92006eecce87fd05b6
      • Instruction Fuzzy Hash: A4020375604701DFCB24CF29C981B1ABBE1BF88304F14496DE8999B766D734E852CF92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __libm_sse2_sin_precise.LIBCMT ref: 0094E671
      • __libm_sse2_cos_precise.LIBCMT ref: 0094E682
      • __libm_sse2_sin_precise.LIBCMT ref: 0094E696
      • __libm_sse2_cos_precise.LIBCMT ref: 0094E6A7
      • __libm_sse2_sin_precise.LIBCMT ref: 0094E6BB
      • __libm_sse2_sin_precise.LIBCMT ref: 0094E6D8
      • __libm_sse2_cos_precise.LIBCMT ref: 0094E6E9
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __libm_sse2_sin_precise$__libm_sse2_cos_precise
      • String ID:
      • API String ID: 840099537-0
      • Opcode ID: ee84320d98b0e46b7d2cde8065681f14ade4284d25f9997d1e25682c618e7c5e
      • Instruction ID: 75ea8681870356fe7ec1ea984cd37e332565a2f1d5d20e008b98ec2f23d229a1
      • Opcode Fuzzy Hash: ee84320d98b0e46b7d2cde8065681f14ade4284d25f9997d1e25682c618e7c5e
      • Instruction Fuzzy Hash: 3AD1B631939F848EC313DE39C46155AF7E9AFEB2D4F00D71BF85AB6562EB2094838601
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$_memset$_malloc
      • String ID: list<T> too long
      • API String ID: 1916901494-4027344264
      • Opcode ID: 8fbf2f7869e2fc49064892f7dd3b6d58f39147b4f6b5215d350f6f4a25d2d3eb
      • Instruction ID: aba31402cf15b42f9afb45509787c4912375a4256fbc02a8c7d9f7e4dc9977e9
      • Opcode Fuzzy Hash: 8fbf2f7869e2fc49064892f7dd3b6d58f39147b4f6b5215d350f6f4a25d2d3eb
      • Instruction Fuzzy Hash: 01B1E5B1D006059FDB10DF28C840AAAB7E1FF89314F148369EC589B352EB79ED55CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 008140DB: __EH_prolog3_GS.LIBCMT ref: 008140E5
        • Part of subcall function 008140DB: _memset.LIBCMT ref: 0081414E
        • Part of subcall function 008140DB: GetVersionExA.KERNEL32(00000094,6838016B), ref: 00814167
        • Part of subcall function 008140DB: _malloc.LIBCMT ref: 0081419E
        • Part of subcall function 008140DB: _memset.LIBCMT ref: 008141B7
        • Part of subcall function 00814A5E: _strlen.LIBCMT ref: 00814A71
        • Part of subcall function 00814A5E: _memset.LIBCMT ref: 00814A8B
        • Part of subcall function 00814A5E: GetFocus.USER32 ref: 00814A93
        • Part of subcall function 00814A5E: IsWindowEnabled.USER32(00000000), ref: 00814AC7
        • Part of subcall function 00814A5E: EnableWindow.USER32(00000000,00000000), ref: 00814ADF
        • Part of subcall function 00814A5E: EnableWindow.USER32(00000000,00000001), ref: 00814B6E
        • Part of subcall function 00814A5E: IsWindow.USER32(?), ref: 00814B78
        • Part of subcall function 00814A5E: SetFocus.USER32(?), ref: 00814B83
        • Part of subcall function 00814BA0: __EH_prolog3.LIBCMT ref: 00814BA7
        • Part of subcall function 00814BA0: CoTaskMemFree.OLE32(?,?), ref: 00814BEE
      • GetFileAttributesExA.KERNEL32(?,00000000,?,00000000,?,00000000,?,00000001,00000000,00000000,00080000,Raw Date Files (*.raw)|*.raw|,00000000,00000000,00000001,6838016B), ref: 007C81CA
      • _memset.LIBCMT ref: 007C81EE
      • _sprintf.LIBCMT ref: 007C8205
        • Part of subcall function 0092B93E: __mbsrchr_l.LIBCMT ref: 0092B949
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Window_memset$EnableFocus$AttributesEnabledFileFreeH_prolog3H_prolog3_TaskVersion__mbsrchr_l_malloc_sprintf_strlen
      • String ID: Failed to open %s $Failed to open file$Raw Date Files (*.raw)|*.raw|
      • API String ID: 3170006331-915368369
      • Opcode ID: 15d2ca1201d2c2c05ecb032c8136c921165c9c6a912eb3f1e3ecec1fe5b1a092
      • Instruction ID: bbd318e7578705d2a9489ffeff66fc8b98786818cf60cf0ef6fba914d20e29c2
      • Opcode Fuzzy Hash: 15d2ca1201d2c2c05ecb032c8136c921165c9c6a912eb3f1e3ecec1fe5b1a092
      • Instruction Fuzzy Hash: B4A1DD30A00A499BDB65DB28CC55FEDF7B8FF40314F10828CE459AB2D1DB786A84CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ___from_strstr_to_strchr_strtoul
      • String ID: @
      • API String ID: 657614464-2766056989
      • Opcode ID: 8ef88a21dd27abdaa8041790c9f678a8723379f2acb3f52f567faf40fc16019d
      • Instruction ID: 39a84b6440e06eb67ecef190d98ff233cd8d1be25f71fe82703caeb2f36e0bbe
      • Opcode Fuzzy Hash: 8ef88a21dd27abdaa8041790c9f678a8723379f2acb3f52f567faf40fc16019d
      • Instruction Fuzzy Hash: B591CDB0508341DBC3609F25D4C17ABBBE1EFE1310F14C96EE8C88B391E37988859B5A
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00849E7E: GdipGetImagePixelFormat.GDIPLUS(?,00B3D750,00000000,00000000,?,00848A93,00000000,00000000,00B3D750), ref: 00849E8C
      • GdipBitmapLockBits.GDIPLUS(00000005,?,00000001,?,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00B3D750), ref: 00848C79
        • Part of subcall function 00849E58: GdipGetImagePaletteSize.GDIPLUS(00000005,00000000,00000000,?,?,00848B59,00000000,00000000,?,00000000,00000000,?,00000000,00000000), ref: 00849E6A
      • GdipBitmapUnlockBits.GDIPLUS(00000005,?,00000005,?,00000001,?,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00B3D750), ref: 00848D36
        • Part of subcall function 007C5500: GdipCreateBitmapFromScan0.GDIPLUS(?,?,?,?,?,?), ref: 007C5527
        • Part of subcall function 008472F4: GdipGetImageGraphicsContext.GDIPLUS(?,00B3D750,00000000,?,?,00848D6E,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00B3D750), ref: 0084730E
        • Part of subcall function 00849B76: GdipDrawImageI.GDIPLUS(?,00000000,00000000,?,00000000,?,00848D81,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000), ref: 00849B93
      • GdipDeleteGraphics.GDIPLUS(?,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00B3D750), ref: 00848D87
      • GdipDisposeImage.GDIPLUS(?,?,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00B3D750), ref: 00848D92
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Gdip$Image$Bitmap$BitsGraphics$ContextCreateDeleteDisposeDrawFormatFromLockPalettePixelScan0SizeUnlock
      • String ID: &
      • API String ID: 1598553542-3042966939
      • Opcode ID: 4aa70df8a0f06441e05376c4198efb1e75cd3d4c88d4db945adcd706f9cf04f8
      • Instruction ID: d721c1b29a63ced7453e7da8ea47488ddea80a63eab3f728769aca2c7743863d
      • Opcode Fuzzy Hash: 4aa70df8a0f06441e05376c4198efb1e75cd3d4c88d4db945adcd706f9cf04f8
      • Instruction Fuzzy Hash: 44910AF1A0122DDBCB649F15CD80BADB7B5FB48314F4441E9AA09A7241DB30AEC5CF99
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: htons$_memmove$htonl
      • String ID:
      • API String ID: 3516799724-0
      • Opcode ID: 29b68f4607eb36b4e9ec505090877fbca7d4e1cb168bdf8d0795041f932945b5
      • Instruction ID: 1c6892a17a89dc6195beccc191b932c0b5c195a68245119c4ee054dee8cc4507
      • Opcode Fuzzy Hash: 29b68f4607eb36b4e9ec505090877fbca7d4e1cb168bdf8d0795041f932945b5
      • Instruction Fuzzy Hash: F3716F76D0464A9FCB10CF68C884AAAF7F4FF89310F15865AEC599B341D738E951CBA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetEvent.KERNEL32(?,00000000), ref: 0078A1FE
      • _memset.LIBCMT ref: 0078A219
      • SetEvent.KERNEL32(?,00000000,?,?), ref: 0078A256
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Event$_memset
      • String ID:
      • API String ID: 3124960789-0
      • Opcode ID: a908d78b029d3b9b2159a895bb3b6be733e46decfd117656af5c77577b5bd5b0
      • Instruction ID: 187fae868b57cbaab45fcd6bcc5e27d3174c2c7c5a69c755e220dc4152bf8c06
      • Opcode Fuzzy Hash: a908d78b029d3b9b2159a895bb3b6be733e46decfd117656af5c77577b5bd5b0
      • Instruction Fuzzy Hash: AA618871E11B46ABE705CF2DD841AE4F760FFEA310F109346EDA856312E73565A1DB80
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: DAYNIGHT$DAYNIGHT$DAYNIGHTAUTO$DAYNIGHTAUTO
      • API String ID: 3555123492-2626325013
      • Opcode ID: e0a716e81790eadefd4d5941a3975c4217c1deb7536d481d73bcc62e7fb804c3
      • Instruction ID: 18eec588780a3ef73b920f76cc3df66fa503e71b34fcb0451714f106abd35260
      • Opcode Fuzzy Hash: e0a716e81790eadefd4d5941a3975c4217c1deb7536d481d73bcc62e7fb804c3
      • Instruction Fuzzy Hash: D041A232A01268AADF20DF64CC45FEAB3B8FB49300F50809AF549E6242DE755E999B50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 00838E26
        • Part of subcall function 0080FBD2: __EH_prolog3.LIBCMT ref: 0080FBD9
        • Part of subcall function 00870DE8: SetRectEmpty.USER32(?), ref: 00870E16
      • SetRectEmpty.USER32(?), ref: 00838F6A
      • SetRectEmpty.USER32(?), ref: 00838F77
      • SetRectEmpty.USER32 ref: 00838F7A
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: EmptyRect$H_prolog3
      • String ID: False$True
      • API String ID: 3752103406-1895882422
      • Opcode ID: 94a6ee396cc52c68742491247cb9dbabb2da4071eb6ddb665a18d2d0166e1496
      • Instruction ID: 20aed3cbaf63d46b7e3409a271649ac4a5c56b85a50b62d6d232aa06c18a6c46
      • Opcode Fuzzy Hash: 94a6ee396cc52c68742491247cb9dbabb2da4071eb6ddb665a18d2d0166e1496
      • Instruction Fuzzy Hash: 495102B0915345DFCB46DF68C588799BBE8BF08700F1881BEE85C9F296DBB41604CBA1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GetSystemTimeAsFileTime.KERNEL32(?,?,?,00000000), ref: 0092CF7B
      • __aulldiv.LIBCMT ref: 0092CF95
      • __aulldiv.LIBCMT ref: 0092D026
      • __aullrem.LIBCMT ref: 0092D034
      • __aulldiv.LIBCMT ref: 0092D052
        • Part of subcall function 0092F66F: __getptd_noexit.LIBCMT ref: 0092F66F
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __aulldiv$Time$FileSystem__aullrem__getptd_noexit
      • String ID:
      • API String ID: 2101487081-0
      • Opcode ID: 0efe14cce885909655315c00616bccb1fd74ff8dc8d4ea022eea7a66248e9240
      • Instruction ID: 10e569fe48cd66614bb61cebd8e5f6c6c62c2c410437cfa8cf96d0d936ed1857
      • Opcode Fuzzy Hash: 0efe14cce885909655315c00616bccb1fd74ff8dc8d4ea022eea7a66248e9240
      • Instruction Fuzzy Hash: 4841C4B5A113249BDB20EF64FD85FAE73B9FF88310F10449AE609D7295DB309A80CB55
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 0079ED43
      • swprintf.LIBCMT ref: 0079EDE5
      • swprintf.LIBCMT ref: 0079EE3C
        • Part of subcall function 007B9150: swprintf.LIBCMT ref: 007B9189
        • Part of subcall function 007B9150: swprintf.LIBCMT ref: 007B91AE
      Strings
      • Require: www.onvif.org/ver20/backchannel, xrefs: 0079EE0D
      • DESCRIBE, xrefs: 0079ED86
      • DESCRIBE %s RTSP/%d.%dCSeq: %dAccept: application/sdp%sUser-Agent: %s, xrefs: 0079EDDA
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: DESCRIBE$DESCRIBE %s RTSP/%d.%dCSeq: %dAccept: application/sdp%sUser-Agent: %s$Require: www.onvif.org/ver20/backchannel
      • API String ID: 1292703666-1788268500
      • Opcode ID: e5b5c47e555193162fbf19b3ef9c4dd35dd185cef068dcae3370a979c3172996
      • Instruction ID: d01d891270e5b5fe974f9858bbbeabb55606861f7422dc3d2facaa8238df56bc
      • Opcode Fuzzy Hash: e5b5c47e555193162fbf19b3ef9c4dd35dd185cef068dcae3370a979c3172996
      • Instruction Fuzzy Hash: 514128B6600616BBCB15CE24E844BEAF7ACFF46300F004396E899D7246DB756A49C7E0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007A0E0D
      • _memset.LIBCMT ref: 007A0E34
        • Part of subcall function 007B5520: _memset.LIBCMT ref: 007B55C4
        • Part of subcall function 007B5520: _memset.LIBCMT ref: 007B55D7
        • Part of subcall function 007B5520: _memset.LIBCMT ref: 007B55F5
        • Part of subcall function 007B5520: _memset.LIBCMT ref: 007B5613
      • _memset.LIBCMT ref: 007A0ECC
      • __time64.LIBCMT ref: 007A0ED5
        • Part of subcall function 00953F46: GetSystemTimeAsFileTime.KERNEL32(0078ACDC,?,?,?,0078ACDC,00000000), ref: 00953F4F
        • Part of subcall function 00953F46: __aulldiv.LIBCMT ref: 00953F6F
      • _rand.LIBCMT ref: 007A0EE5
      • htonl.WS2_32(00000000), ref: 007A0EEB
      • _memset.LIBCMT ref: 007A0F25
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$Time$FileSystem__aulldiv__time64_randhtonl
      • String ID:
      • API String ID: 1794877277-0
      • Opcode ID: f55f793b596b37e02191487c3324a7ab3519b6fd041aa943e5402add73ddc37d
      • Instruction ID: 9e2f392669542774a93a87e6b3319fb9260f87db4ad7cf10b7dfcd1d14b81286
      • Opcode Fuzzy Hash: f55f793b596b37e02191487c3324a7ab3519b6fd041aa943e5402add73ddc37d
      • Instruction Fuzzy Hash: B841ABB1604B46FBE304DF65C809B8AFBB4BF44314F104309E528AB6C1D7F661688BD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • %smpeg4?USER=%s&PWD=%s&VIDEO_BITRATE&VIDEO_RESOLUTION&VIDEO_FPS_NUM&VIDEO_BRIGHTNESS&VIDEO_CONTRAST&VIDEO_HUE&VIDEO_SATURATION, xrefs: 0077A559
      • %smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_BITRATE&VIDEO_RESOLUTION&VIDEO_FPS_NUM&VIDEO_BRIGHTNESS&VIDEO_CONTRAST&VIDEO_HUE&VIDEO_SATURATION, xrefs: 0077A58D
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memsetswprintf
      • String ID: %smpeg4?USER=%s&PWD=%s&CHANNEL=%d&VIDEO_BITRATE&VIDEO_RESOLUTION&VIDEO_FPS_NUM&VIDEO_BRIGHTNESS&VIDEO_CONTRAST&VIDEO_HUE&VIDEO_SATURATION$%smpeg4?USER=%s&PWD=%s&VIDEO_BITRATE&VIDEO_RESOLUTION&VIDEO_FPS_NUM&VIDEO_BRIGHTNESS&VIDEO_CONTRAST&VIDEO_HUE&VIDEO_SATURATION
      • API String ID: 104879626-2982240094
      • Opcode ID: e69004553b8f2f9f1742e29bc081cd4c676201593a39e6ce79422c93d371f3d0
      • Instruction ID: 083fca7842f9886889b1d9fbaaf9a621df7e0f10335c3b3fcd82a8369849bbd2
      • Opcode Fuzzy Hash: e69004553b8f2f9f1742e29bc081cd4c676201593a39e6ce79422c93d371f3d0
      • Instruction Fuzzy Hash: B031BCB2D00318A7D760DB54DC01FEBB3ACAF85304F404596AB89A7141EF346788C7D5
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007C1B50: EnterCriticalSection.KERNEL32(00C098A0,00000000,007C1DF2), ref: 007C1B8F
        • Part of subcall function 007C1B50: LeaveCriticalSection.KERNEL32(00C098A0), ref: 007C1BA3
        • Part of subcall function 007C1C70: EnterCriticalSection.KERNEL32(00C098A0,?), ref: 007C1CAF
        • Part of subcall function 007C1C70: LeaveCriticalSection.KERNEL32(00C098A0), ref: 007C1CC3
      • _free.LIBCMT ref: 007C2165
        • Part of subcall function 0092B41D: HeapFree.KERNEL32(00000000,00000000,?,00933DBC,00000000,0092F674,0092B4DC,?,?,00802D4E,00000001,?,?,007748D8,00000B40,00000000), ref: 0092B431
        • Part of subcall function 0092B41D: GetLastError.KERNEL32(00000000,?,00933DBC,00000000,0092F674,0092B4DC,?,?,00802D4E,00000001,?,?,007748D8,00000B40,00000000), ref: 0092B443
      • _free.LIBCMT ref: 007C217C
      • _free.LIBCMT ref: 007C2193
      • _free.LIBCMT ref: 007C21AD
      • _free.LIBCMT ref: 007C21CA
      • _free.LIBCMT ref: 007C21E4
      • _free.LIBCMT ref: 007C21F4
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _free$CriticalSection$EnterLeave$ErrorFreeHeapLast
      • String ID:
      • API String ID: 3435269767-0
      • Opcode ID: 2d64c3d462b5572c6d05e6627c233a33bfb96802b583f6a6613f53d747ac0df6
      • Instruction ID: e3a33487d603419d7cad6afe6640e6fbba3adfaefa4da94251d37f98e43e75cf
      • Opcode Fuzzy Hash: 2d64c3d462b5572c6d05e6627c233a33bfb96802b583f6a6613f53d747ac0df6
      • Instruction Fuzzy Hash: 741133F1E00B1457EA20BB36E855B5777D86F40740F08083CE94A87252EB39F9058B92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • FindResourceA.KERNEL32(?,?,PNG), ref: 0084A743
      • LoadResource.KERNEL32(?,00000000,?,?,0099DC30,?,0084B530,?,00000000,?), ref: 0084A752
      • LockResource.KERNEL32(00000000,?,0099DC30,?,0084B530,?,00000000,?), ref: 0084A75F
      • SizeofResource.KERNEL32(?,00000000,?,0099DC30,?,0084B530,?,00000000,?), ref: 0084A772
        • Part of subcall function 0084A798: GlobalAlloc.KERNEL32(00000002,?,00000000,?,00000000,?,0084A784,?,00000000,?,0099DC30,?,0084B530,?,00000000,?), ref: 0084A7A5
      • FreeResource.KERNEL32(00000000,?,00000000,?,0099DC30,?,0084B530,?,00000000,?), ref: 0084A787
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Resource$AllocFindFreeGlobalLoadLockSizeof
      • String ID: PNG
      • API String ID: 169377235-364855578
      • Opcode ID: 578f9755debc76e3c8da39b1e2ff08b38cea7226e64d0781fef3091681fe7ff6
      • Instruction ID: e3aa5a2fab8aeb44b0035316f733fba8ea649541f8284c0e1086cf6e707b834f
      • Opcode Fuzzy Hash: 578f9755debc76e3c8da39b1e2ff08b38cea7226e64d0781fef3091681fe7ff6
      • Instruction Fuzzy Hash: 0B018F3A55A219BB9B265B94AC84C6EB77CFF45364301812AFD50E7310DB709D01ABA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __time64.LIBCMT ref: 00784091
        • Part of subcall function 00953F46: GetSystemTimeAsFileTime.KERNEL32(0078ACDC,?,?,?,0078ACDC,00000000), ref: 00953F4F
        • Part of subcall function 00953F46: __aulldiv.LIBCMT ref: 00953F6F
        • Part of subcall function 00780520: WaitForSingleObject.KERNEL32(?,?,6838016B), ref: 00780555
      • _memmove.LIBCMT ref: 00784105
      • _memmove.LIBCMT ref: 00784123
      • __time64.LIBCMT ref: 007841A4
      • _memmove.LIBCMT ref: 00784200
      • _memmove.LIBCMT ref: 0078421C
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$Time__time64$FileObjectSingleSystemWait__aulldiv
      • String ID:
      • API String ID: 2602992768-0
      • Opcode ID: 5338f377d5d234f79894110678bc7b60ab706a8cf48ec334c2548eab590e8ee9
      • Instruction ID: 531a3c5bda08e5ed000f7551a0a7f2022dda85f06437be92da3453cda5d8eac7
      • Opcode Fuzzy Hash: 5338f377d5d234f79894110678bc7b60ab706a8cf48ec334c2548eab590e8ee9
      • Instruction Fuzzy Hash: F9515D719443065ED730EF38DC45B27B7A4AFA1710F08865DF46987282E7B5EC85C792
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __time64.LIBCMT ref: 00782971
        • Part of subcall function 00953F46: GetSystemTimeAsFileTime.KERNEL32(0078ACDC,?,?,?,0078ACDC,00000000), ref: 00953F4F
        • Part of subcall function 00953F46: __aulldiv.LIBCMT ref: 00953F6F
        • Part of subcall function 00780520: WaitForSingleObject.KERNEL32(?,?,6838016B), ref: 00780555
      • _memmove.LIBCMT ref: 007829E5
      • _memmove.LIBCMT ref: 00782A03
      • __time64.LIBCMT ref: 00782A84
      • _memmove.LIBCMT ref: 00782AE0
      • _memmove.LIBCMT ref: 00782AFC
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove$Time__time64$FileObjectSingleSystemWait__aulldiv
      • String ID:
      • API String ID: 2602992768-0
      • Opcode ID: e67f5951ad535993ebc0e8df40f4d97fad64b4020a89994b7c566254d7e3d3a4
      • Instruction ID: 0e4e3d54046bd7ad7d50a9ed9d52cfca6870dac75654fab9cfc7fa38c6a165c6
      • Opcode Fuzzy Hash: e67f5951ad535993ebc0e8df40f4d97fad64b4020a89994b7c566254d7e3d3a4
      • Instruction Fuzzy Hash: 555127715443005ED735EF38CC81B26B7E5AF55311F08C65EECAA8A293D735E84A8793
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 00814D0E
      • CoTaskMemFree.OLE32(?,000000FF,?), ref: 00814DB4
      • GetParent.USER32(?), ref: 00814E2B
      • SendMessageA.USER32(?,00000464,00000104,00000000), ref: 00814E42
      • GetParent.USER32(?), ref: 00814E74
      • SendMessageA.USER32(?,00000465,00000104,00000000), ref: 00814E8A
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: MessageParentSend$FreeH_prolog3Task
      • String ID:
      • API String ID: 526180827-0
      • Opcode ID: 23c3d09bfdfa773d814bd9158cc09e4320f1d56683800d63ef9886248ef5b5f5
      • Instruction ID: 698e27816e6a3ec31ed039b1ef3ed52d8cf0c48cf723188bf0b604e9740bae36
      • Opcode Fuzzy Hash: 23c3d09bfdfa773d814bd9158cc09e4320f1d56683800d63ef9886248ef5b5f5
      • Instruction Fuzzy Hash: 73512B71A0021AAFCB04EFA4CC85EAEB7B9FF44314B104618F515E72E1DB70A985CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _fputc$_localeconv_mbrtowc_wcrtomb
      • String ID:
      • API String ID: 1718412160-0
      • Opcode ID: b60c00b35f63edd407ed56825602ecfbf87f82de7784667ff72807f386b571a4
      • Instruction ID: e5f5825ec02dde43b4a1812fe0daa9bf0b04a83b9066f8e0695f174d335080e7
      • Opcode Fuzzy Hash: b60c00b35f63edd407ed56825602ecfbf87f82de7784667ff72807f386b571a4
      • Instruction Fuzzy Hash: 91517971905284CFCF18DF1AC0853AABBE4BF95311F204989D9889B28AD374ED54CFA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007A03D0: swprintf.LIBCMT ref: 007A0430
        • Part of subcall function 007A03D0: getaddrinfo.WS2_32(?,00000000,?,00000000), ref: 007A0445
        • Part of subcall function 007A03D0: _wprintf.LIBCMT ref: 007A0482
      • getsockname.WS2_32(00000000,?,?), ref: 007A10B4
      • htons.WS2_32(?), ref: 007A10C1
        • Part of subcall function 007A03D0: _wprintf.LIBCMT ref: 007A04A0
      • getsockname.WS2_32(00000000,?,?), ref: 007A10DC
      • htons.WS2_32(?), ref: 007A10E9
      • closesocket.WS2_32(00000000), ref: 007A1157
      • Sleep.KERNEL32(0000000A), ref: 007A115F
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _wprintfgetsocknamehtons$Sleepclosesocketgetaddrinfoswprintf
      • String ID:
      • API String ID: 3562786552-0
      • Opcode ID: 6c938368eb52a412415f512b459289643959798458a1915fe3d2e8f8e673bdf6
      • Instruction ID: 095cd4b5b08144df498a135a11590b44f2420ba2f7f3854021ce69356c907b7f
      • Opcode Fuzzy Hash: 6c938368eb52a412415f512b459289643959798458a1915fe3d2e8f8e673bdf6
      • Instruction Fuzzy Hash: C341F631A01508ABCB04EFB5E9445AEF7F5EF9A320F60472AF426D7390DB385941DB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00799A70: swprintf.LIBCMT ref: 00799AA8
        • Part of subcall function 00799A70: _memset.LIBCMT ref: 00799AB8
        • Part of subcall function 00799A70: _memset.LIBCMT ref: 00799ACB
        • Part of subcall function 00780290: InitializeCriticalSectionAndSpinCount.KERNEL32(00006774,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00780327
        • Part of subcall function 00780290: GetLastError.KERNEL32(?,?,00000000), ref: 00780331
        • Part of subcall function 00780290: CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0078038A
        • Part of subcall function 00780290: ResetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00780394
      • _memset.LIBCMT ref: 007822D8
      • _rand.LIBCMT ref: 007822FF
      • _memset.LIBCMT ref: 00782322
      • _memset.LIBCMT ref: 00782334
      • CreateEventA.KERNEL32(00000009,00000001,00000009,00000009,?,?,?,?,?,?), ref: 00782347
      • ResetEvent.KERNEL32(00000000,?,?,?,?,?,?), ref: 00782354
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$Event$CreateReset$CountCriticalErrorInitializeLastSectionSpin_randswprintf
      • String ID:
      • API String ID: 3381198503-0
      • Opcode ID: 3b79452379e2e978ff8506daf651cd482409daad2a25a6fa1012653864b86272
      • Instruction ID: 84587a0a5f13183316a689408fa7df0b3e08f5c7fcc19abe8008117c971ba4ba
      • Opcode Fuzzy Hash: 3b79452379e2e978ff8506daf651cd482409daad2a25a6fa1012653864b86272
      • Instruction Fuzzy Hash: 1D415FB1608B05FFE704DF64C85979AFBE9FB44308F004219E42C97281DBBA6528CBE1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • shutdown.WS2_32(?,00000002), ref: 00790969
      • closesocket.WS2_32(?), ref: 00790970
      • DeleteCriticalSection.KERNEL32(?,?,?,?,0077CA94), ref: 007909A7
      • shutdown.WS2_32(?,00000002), ref: 007909CF
      • closesocket.WS2_32(?), ref: 007909D6
      • closesocket.WS2_32(?), ref: 007909E4
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: closesocket$shutdown$CriticalDeleteSection
      • String ID:
      • API String ID: 1529986119-0
      • Opcode ID: 46ea01dc8ab5798d6fab3470e4b7840193c2ae72ad2173ac20518c7dde54b740
      • Instruction ID: 7636a783edb06accaf0948fd35dda9b618bb93285011b70a9f30e37f8652f559
      • Opcode Fuzzy Hash: 46ea01dc8ab5798d6fab3470e4b7840193c2ae72ad2173ac20518c7dde54b740
      • Instruction Fuzzy Hash: FA113DB15157005BE6209B799C49B57B3E9BB51330F140B09E4BDC22E1D778B8068B91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset
      • String ID:
      • API String ID: 2102423945-0
      • Opcode ID: adbd4fa1b594ad9587f93d94a392c138bde91c5381459046fb2e56ee438ecc05
      • Instruction ID: 0412c077d7ba91ed0d812127a913576fe7f67de8fc9feff2a3e1f2469c351dfe
      • Opcode Fuzzy Hash: adbd4fa1b594ad9587f93d94a392c138bde91c5381459046fb2e56ee438ecc05
      • Instruction Fuzzy Hash: 3A110DB0541B04ABE371DB75D866BC7B6DCAF18704F10091DF2A99A1C5D7F4B2888BD4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • WaitForSingleObject.KERNEL32(?,00000064), ref: 00780867
      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00780880
      • TranslateMessage.USER32(?), ref: 0078088A
      • DispatchMessageA.USER32(?), ref: 00780894
      • WaitForSingleObject.KERNEL32(?,00000064), ref: 007808A2
      • CloseHandle.KERNEL32(?), ref: 007808AF
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Message$ObjectSingleWait$CloseDispatchHandlePeekTranslate
      • String ID:
      • API String ID: 629631254-0
      • Opcode ID: 8614b9a24146fedd9362b8beaf364257987688e2dd455843a41f6e266e7b1188
      • Instruction ID: 53ea8ede04ebf30ac4f6d8ddcd7f4999368f0a3d1ca094b75a35ff5b20e2825d
      • Opcode Fuzzy Hash: 8614b9a24146fedd9362b8beaf364257987688e2dd455843a41f6e266e7b1188
      • Instruction Fuzzy Hash: CC018F72A8530D6BEB20ABA9DC49F9BB3FDAB08710F000025E614D22D0D7B5E8058BE0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00802D2D: _malloc.LIBCMT ref: 00802D49
      • ~_Task_impl.LIBCPMT ref: 007B0D38
      • CreateThread.KERNEL32 ref: 007B0D8E
        • Part of subcall function 00815DA5: InternetOpenA.WININET(00000000,00000001,00000001,?,007F1C62), ref: 00815DDB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CreateInternetOpenTask_implThread_malloc
      • String ID: /Data/$/mnt/hd/Data/$client
      • API String ID: 1876871433-3358146206
      • Opcode ID: f0019fb3d5315a5c9d806ffd7585d247ce4e4c674aff858d97aeb66778eab218
      • Instruction ID: 2ea203189347ef8eeb25efe319afbf7dc67fb9788b3c2dd9976c1f8a58acbeaa
      • Opcode Fuzzy Hash: f0019fb3d5315a5c9d806ffd7585d247ce4e4c674aff858d97aeb66778eab218
      • Instruction Fuzzy Hash: 18917B707007059FEB24DFA8C945BEBBBE4FF45700F14846EE59A9B680DBB5A840CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf_strncpy
      • String ID: %d,$ACM-8211
      • API String ID: 1069910716-243664484
      • Opcode ID: 84fa59ff1650b53813987f3baae64941395d5743389c1178a098dd2cddac9e9b
      • Instruction ID: 778b3732bcaaf856d12d1d82a8461e3b10a8aac8e755f21b396aae74d5ad09d9
      • Opcode Fuzzy Hash: 84fa59ff1650b53813987f3baae64941395d5743389c1178a098dd2cddac9e9b
      • Instruction Fuzzy Hash: 8C51DA71D00258EFDF25DFA8C844BEEBBB4FF06304F004269E4026B296D7BA2945CB61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • GlobalLock.KERNEL32(?,75FD5E50,System,0000000A), ref: 0081A87B
      • _strlen.LIBCMT ref: 0081A8C3
      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000020), ref: 0081A8DF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ByteCharGlobalLockMultiWide_strlen
      • String ID: System
      • API String ID: 3265272279-3470857405
      • Opcode ID: 4dfa595118ec5ef762ae6798f6abae487990de25a85874938069070c46e7498d
      • Instruction ID: 102f6930b509344a7a47d35fdee8c19ebfbfea72510e238ad2b7535f5f0543c8
      • Opcode Fuzzy Hash: 4dfa595118ec5ef762ae6798f6abae487990de25a85874938069070c46e7498d
      • Instruction Fuzzy Hash: 3941C4719012099FDB18DFA8D884AFEBBF8FF44314F158529E426DB290E73099C6CB51
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: ZOOMIN$ZOOMOUT$ZOOMSTOP
      • API String ID: 3555123492-911756540
      • Opcode ID: db3e15bf2d8f20597f72bb3ed28f3080594003e8c85283062c9b9ad31f5bb996
      • Instruction ID: df082e87c507f8547e5fee005f7a78196cec7a2c2ce23678e6a38bd2cd28d7c0
      • Opcode Fuzzy Hash: db3e15bf2d8f20597f72bb3ed28f3080594003e8c85283062c9b9ad31f5bb996
      • Instruction Fuzzy Hash: F341A271901258AADF30DA69CC45FEAB3BCFB49300F1041DAF849D3242DA746E99CB61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: FOCUSIN$FOCUSOUT$FOCUSSTOP
      • API String ID: 3555123492-3230474604
      • Opcode ID: c8028dc4645a6f2b84d75b397042048c1aa74f965231193a9253befa52dcb99c
      • Instruction ID: 9e75b2a5226a57e35dd259aac0f627d11abbaa5801fa1f9d91ffdddbaa990ed8
      • Opcode Fuzzy Hash: c8028dc4645a6f2b84d75b397042048c1aa74f965231193a9253befa52dcb99c
      • Instruction Fuzzy Hash: F541B132901218AAEF20DF65CC41FEAB3B8FF49300F40809AF54DE6242DE755E99DB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf$_memset
      • String ID: %s&%s$%s&%s
      • API String ID: 2003622500-3982938970
      • Opcode ID: dc3b311849e5c28cd70c3754e7fbcc9c53a36f544a913578f840eb8c3c532ab4
      • Instruction ID: 169b85aa46b19ef50fe4d96b674cdf140e62899c88e6981e89d8ca44a1eb7c5d
      • Opcode Fuzzy Hash: dc3b311849e5c28cd70c3754e7fbcc9c53a36f544a913578f840eb8c3c532ab4
      • Instruction Fuzzy Hash: CD31B9B564021CABDB20CF58CD85FAAB3B8BF44704F104099B709B7342DA75AD458B64
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: %s:%s$Basic %s
      • API String ID: 1292703666-993552642
      • Opcode ID: ade44ca23121a4b7e4cb3b977f42f9ee465fe29e29c415b999d8a8a6430e163d
      • Instruction ID: 79677e84c8a940bd90d9181b6799b2121df69f5643537ca072e7d39b8c37f266
      • Opcode Fuzzy Hash: ade44ca23121a4b7e4cb3b977f42f9ee465fe29e29c415b999d8a8a6430e163d
      • Instruction Fuzzy Hash: 18115B71B0021C67DB20EA699C42BFFB3ACEF95700F1000B9FD49D3241DEB49D448291
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      • %04d/%02d/%02d %02d:%02d:%02d, xrefs: 007CA139
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CurrentTime__localtime64_memset_sprintf
      • String ID: %04d/%02d/%02d %02d:%02d:%02d
      • API String ID: 425097752-2911751566
      • Opcode ID: a0dcd63b40c182b4081b9039e77b68a2404fad260fcd5cf4b3936343c7c9d96a
      • Instruction ID: af53625aad1089a5056c4576da48c573d069aba0e80d41b3487eaee064ffb008
      • Opcode Fuzzy Hash: a0dcd63b40c182b4081b9039e77b68a2404fad260fcd5cf4b3936343c7c9d96a
      • Instruction Fuzzy Hash: 2211B171900219EFCB21DB64DD05FAAB7B8FB44300F0480DCA589A7252EE39EA489B91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf
      • String ID: http://%s:%d/cgi-bin/
      • API String ID: 233258989-3528032135
      • Opcode ID: d58eb1f8f268216ef84ede86db4b7a045534afd7df6ef14152f7d7bb9f5fe530
      • Instruction ID: e813439ecc25912901c815c9279c5e4535d9584844d147818f25c7cbc10e4c7e
      • Opcode Fuzzy Hash: d58eb1f8f268216ef84ede86db4b7a045534afd7df6ef14152f7d7bb9f5fe530
      • Instruction Fuzzy Hash: 4D111CB6541294AADB00DF91D9C1BE233ACAF4D710F0840B2FE489F18BE778A544C775
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: htons$_memmove_memsethtonl
      • String ID:
      • API String ID: 3132012031-0
      • Opcode ID: ba9e602bcee60c997314b7bc09e7e0943041f41c930c847fc45e2b54ef387b6d
      • Instruction ID: e5d9637ce023ec6fe1eb07496afbcb9796d74246203552e753fe051d36667ccd
      • Opcode Fuzzy Hash: ba9e602bcee60c997314b7bc09e7e0943041f41c930c847fc45e2b54ef387b6d
      • Instruction Fuzzy Hash: 9C91C331204605AFDB54DF64D844BFAF3A8FB8A315F04461AE95DCB291DB38A851CBA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ___from_strstr_to_strchr.LIBCMT ref: 0079CE1A
      • ___from_strstr_to_strchr.LIBCMT ref: 0079CE79
      • ___from_strstr_to_strchr.LIBCMT ref: 0079CEB1
      • swprintf.LIBCMT ref: 0079CF1B
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ___from_strstr_to_strchr$swprintf
      • String ID:
      • API String ID: 2916680332-0
      • Opcode ID: 21b21ae2aa6be5ba14bde9f7ca0de64503b831c7ea8f431d538f0e30308c2240
      • Instruction ID: 441e2b01a0ded080b47a448182cba1aba4444e495df875132eadf8144c60cf38
      • Opcode Fuzzy Hash: 21b21ae2aa6be5ba14bde9f7ca0de64503b831c7ea8f431d538f0e30308c2240
      • Instruction Fuzzy Hash: CF417F73A002185BDF25EA78BC45BFE77AADF89310F0401A9EC09AB247E9259D0187E1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetEvent.KERNEL32(?,?,00000000,000000FF,?,?,00788F5D,?,00000000), ref: 00788FFB
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Event
      • String ID:
      • API String ID: 4201588131-0
      • Opcode ID: 06ca633c7ce6c499b3fbe7f60800d88cbb417c05def37a621f5423003ab8d514
      • Instruction ID: a1ed2e22d0253750741b7c15fd23d5d618b6cfbaa85c2239d7066f527fdef593
      • Opcode Fuzzy Hash: 06ca633c7ce6c499b3fbe7f60800d88cbb417c05def37a621f5423003ab8d514
      • Instruction Fuzzy Hash: D641AF32B407469BD718DF28D880EB6F364FF85311F14436AEE989A241EB39E964C7D1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 0078A55B
      • send.WS2_32(?,?,?,00000000), ref: 0078A57F
      • __time64.LIBCMT ref: 0078A58C
        • Part of subcall function 00953F46: GetSystemTimeAsFileTime.KERNEL32(0078ACDC,?,?,?,0078ACDC,00000000), ref: 00953F4F
        • Part of subcall function 00953F46: __aulldiv.LIBCMT ref: 00953F6F
      • __time64.LIBCMT ref: 0078A5D7
      • WSAGetLastError.WS2_32(00000000,0000000D,00000000,0000000D), ref: 0078A5E9
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Time__time64$ErrorFileLastSystem__aulldiv_memsetsend
      • String ID:
      • API String ID: 1122307660-0
      • Opcode ID: 479b33b9efb30b57f547eb459ba74d0e264cd82cf146f6baeba2fc9bd12ed475
      • Instruction ID: 983c76203f5b406fabfda0451b2f0ab2886025850d5b554648260e2d48f06c9d
      • Opcode Fuzzy Hash: 479b33b9efb30b57f547eb459ba74d0e264cd82cf146f6baeba2fc9bd12ed475
      • Instruction Fuzzy Hash: 07412C71E40114ABEB34DF28CC45BD9B7A4EB44730F184666E81997380E7389D85CB92
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 00788D0B
      • send.WS2_32(?,?,?,00000000), ref: 00788D2C
      • __time64.LIBCMT ref: 00788D39
        • Part of subcall function 00953F46: GetSystemTimeAsFileTime.KERNEL32(0078ACDC,?,?,?,0078ACDC,00000000), ref: 00953F4F
        • Part of subcall function 00953F46: __aulldiv.LIBCMT ref: 00953F6F
      • __time64.LIBCMT ref: 00788D84
      • WSAGetLastError.WS2_32(00000000,0000000D,00000000,0000000D), ref: 00788D96
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Time__time64$ErrorFileLastSystem__aulldiv_memsetsend
      • String ID:
      • API String ID: 1122307660-0
      • Opcode ID: 54b619cd39507bf1a65870ae6ffe63214ae12807ed5a543122037192346a40c3
      • Instruction ID: cb68073fc9246b63b25611a951d8073357a1e43ef68175556cd34432eb7ad099
      • Opcode Fuzzy Hash: 54b619cd39507bf1a65870ae6ffe63214ae12807ed5a543122037192346a40c3
      • Instruction Fuzzy Hash: BC415771B401188BCB64EF24CC45B9AB7B0EB58730F644265E8299B3C0DB389D41CBE2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __time64.LIBCMT ref: 00788E49
        • Part of subcall function 00953F46: GetSystemTimeAsFileTime.KERNEL32(0078ACDC,?,?,?,0078ACDC,00000000), ref: 00953F4F
        • Part of subcall function 00953F46: __aulldiv.LIBCMT ref: 00953F6F
      • WSAGetLastError.WS2_32(?,?), ref: 00788E89
      • __time64.LIBCMT ref: 00788EC9
      • __time64.LIBCMT ref: 00788F25
      • _memset.LIBCMT ref: 00788F6A
        • Part of subcall function 0079C6C0: recv.WS2_32(?,00000000,0078A5CC,00000000), ref: 0079C6D7
        • Part of subcall function 0079C6C0: WSAGetLastError.WS2_32(?,0078A5CC,00000000,0000000D), ref: 0079C6E1
        • Part of subcall function 0079C6C0: shutdown.WS2_32(?,00000002), ref: 0079C701
        • Part of subcall function 0079C6C0: closesocket.WS2_32(?), ref: 0079C708
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __time64$ErrorLastTime$FileSystem__aulldiv_memsetclosesocketrecvshutdown
      • String ID:
      • API String ID: 2463973982-0
      • Opcode ID: c45eaa51680ae1d88cab5b6612d888dec04d1a8cb0421b58fe87c9478b5d0774
      • Instruction ID: bec57a1ed69f840fb408840d6ec3f891bcdc4a2445d51daa8f8a9cbdc34df2cc
      • Opcode Fuzzy Hash: c45eaa51680ae1d88cab5b6612d888dec04d1a8cb0421b58fe87c9478b5d0774
      • Instruction Fuzzy Hash: 1A413872B446016BD764FA39CC49B99F791AF40324F884715E93DC22C1DB78A96487D3
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007B2350: WaitForSingleObject.KERNEL32(?,00000064), ref: 007B237E
        • Part of subcall function 007B2350: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 007B239C
        • Part of subcall function 007B2350: TranslateMessage.USER32(?), ref: 007B23A6
        • Part of subcall function 007B2350: DispatchMessageA.USER32(?), ref: 007B23B0
        • Part of subcall function 007B2350: WaitForSingleObject.KERNEL32(?,00000064), ref: 007B23BE
        • Part of subcall function 007B2350: CloseHandle.KERNEL32(?), ref: 007B23D0
        • Part of subcall function 007B2350: DeleteFileA.KERNEL32(?), ref: 007B2441
        • Part of subcall function 007B2350: _memset.LIBCMT ref: 007B2452
        • Part of subcall function 007B2350: _memset.LIBCMT ref: 007B2475
        • Part of subcall function 007B2350: _memset.LIBCMT ref: 007B2485
        • Part of subcall function 007B2350: _memset.LIBCMT ref: 007B2495
        • Part of subcall function 007B2350: _memset.LIBCMT ref: 007B24A5
        • Part of subcall function 007B2350: _memset.LIBCMT ref: 007B24B5
        • Part of subcall function 007D1CF0: EnterCriticalSection.KERNEL32(-00000008,?,?,007D2069,?,00000000,00000000,?,?,?,?,?,?,?,?,007C78B4), ref: 007D1D12
      • CloseHandle.KERNEL32(?,?,00000000,00000000,6838016B), ref: 007B20AD
      • DeleteCriticalSection.KERNEL32(?,?,00000000,00000000,6838016B), ref: 007B20D3
      • CloseHandle.KERNEL32(?,?,00000000,00000000), ref: 007B210F
      • DeleteCriticalSection.KERNEL32(?,?,00000000,00000000), ref: 007B2135
      • DeleteCriticalSection.KERNEL32(?), ref: 007B2157
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$CriticalDeleteSection$CloseHandleMessage$ObjectSingleWait$DispatchEnterFilePeekTranslate
      • String ID:
      • API String ID: 1833447330-0
      • Opcode ID: 668e717bbf0ceae840fd4920e42971642cbeb4f409cdbf1587e8845ba1c87617
      • Instruction ID: fd765888839c1efb8cb67821d03c84430d17caaaa632cedc8e1d6ce2234114d6
      • Opcode Fuzzy Hash: 668e717bbf0ceae840fd4920e42971642cbeb4f409cdbf1587e8845ba1c87617
      • Instruction Fuzzy Hash: 6A415CB1905745EBCB10EF65C859B8EFBF8FF18710F500A19E869A3381E774AA04CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • Sleep.KERNEL32(0000000A), ref: 007DC7FF
      • WaitForSingleObject.KERNEL32(?,00000064), ref: 007DC89C
      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 007DC8B1
      • TranslateMessage.USER32(?), ref: 007DC8BB
      • DispatchMessageA.USER32(?), ref: 007DC8C5
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Message$DispatchObjectPeekSingleSleepTranslateWait
      • String ID:
      • API String ID: 191415731-0
      • Opcode ID: fe306714ef6b28353a4fce1c94a01250836b219c239b2425a93fa1c0730de85e
      • Instruction ID: 502f0ff89547cb83d823d43bd3406e92c92b1ef4f9d21dc5b0813f7f72ad001d
      • Opcode Fuzzy Hash: fe306714ef6b28353a4fce1c94a01250836b219c239b2425a93fa1c0730de85e
      • Instruction Fuzzy Hash: A231C371A0020BABDB15CBA8CC49FADF7B8BF15310F140127E524E6391DB78A891DB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: htons$htonl
      • String ID:
      • API String ID: 3369762329-0
      • Opcode ID: ea9e58208fcf107d63b450e3e62090619fe47e5c1961e22bd3252c8bee3790c1
      • Instruction ID: 9ee0e0057a4124d94adb0e590fd5a0f8da18c06490fd740389e16260dbd66510
      • Opcode Fuzzy Hash: ea9e58208fcf107d63b450e3e62090619fe47e5c1961e22bd3252c8bee3790c1
      • Instruction Fuzzy Hash: 9431AF35909708AFDB248F68D4447BAB3A4FF5A311F10462AEC5DCB290D738A850DBA2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • ResetEvent.KERNEL32(?,6838016B,?,?,?,?,00959B0B,000000FF), ref: 0078E817
      • _memset.LIBCMT ref: 0078E855
      • _memset.LIBCMT ref: 0078E894
      • send.WS2_32(?,?,0000000C,00000000), ref: 0078E8C5
      • WaitForSingleObject.KERNEL32(?,00000BB8), ref: 0078E8D6
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$EventObjectResetSingleWaitsend
      • String ID:
      • API String ID: 1000429611-0
      • Opcode ID: 37927da25a5ea78ceb587bc8aaca77a3277f4dd3e1ea178354b7078decf45d88
      • Instruction ID: eb12f63c731e69f52d1463219a2834607873bd9137bc6805fbe818339c37088a
      • Opcode Fuzzy Hash: 37927da25a5ea78ceb587bc8aaca77a3277f4dd3e1ea178354b7078decf45d88
      • Instruction Fuzzy Hash: 4341D671D00B94DBE720DF58CC49BEAB7B4FB84710F104759E999AA2C1EBB859C4CB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007B0EC0: WaitForSingleObject.KERNEL32(?,00000064), ref: 007B0EE7
        • Part of subcall function 007B0EC0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 007B0F00
        • Part of subcall function 007B0EC0: TranslateMessage.USER32(?), ref: 007B0F0A
        • Part of subcall function 007B0EC0: DispatchMessageA.USER32(?), ref: 007B0F14
        • Part of subcall function 007B0EC0: WaitForSingleObject.KERNEL32(?,00000064), ref: 007B0F22
        • Part of subcall function 007B0EC0: CloseHandle.KERNEL32(?), ref: 007B0F2F
        • Part of subcall function 007B0EC0: DeleteFileA.KERNEL32(?), ref: 007B1004
        • Part of subcall function 007B0EC0: _memset.LIBCMT ref: 007B1015
        • Part of subcall function 007D1CF0: EnterCriticalSection.KERNEL32(-00000008,?,?,007D2069,?,00000000,00000000,?,?,?,?,?,?,?,?,007C78B4), ref: 007D1D12
      • CloseHandle.KERNEL32(?,?,00000000,00000000,6838016B), ref: 007B0A94
      • DeleteCriticalSection.KERNEL32(?,?,00000000,00000000,6838016B), ref: 007B0AB6
      • CloseHandle.KERNEL32(?,?,00000000,00000000), ref: 007B0AF2
      • DeleteCriticalSection.KERNEL32(?,?,00000000,00000000), ref: 007B0B1A
      • DeleteCriticalSection.KERNEL32(?), ref: 007B0B38
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CriticalDeleteSection$CloseHandleMessage$ObjectSingleWait$DispatchEnterFilePeekTranslate_memset
      • String ID:
      • API String ID: 879072588-0
      • Opcode ID: 6b64ee670b5fcc5bc29761f8eb04be3a38aee6b261837a87ee206ae8d24cbdd8
      • Instruction ID: 486f27a02fea68b330eac82f54591329516f20b6b1481a49c4fbca579781278f
      • Opcode Fuzzy Hash: 6b64ee670b5fcc5bc29761f8eb04be3a38aee6b261837a87ee206ae8d24cbdd8
      • Instruction Fuzzy Hash: 73414D71904745EBC710DFA9C845B9EFBF8FF04724F504619E469A3381EB74AA04CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 007C5FF0: _malloc.LIBCMT ref: 007C6007
      • _memset.LIBCMT ref: 008489B0
      • _memset.LIBCMT ref: 008489EA
      • _memcpy_s.LIBCMT ref: 00848A04
      • CreateDIBSection.GDI32(00000000,00000000,00000000,00000008,00000000,00000000), ref: 00848A1D
      • _free.LIBCMT ref: 00848A50
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$CreateSection_free_malloc_memcpy_s
      • String ID:
      • API String ID: 3499028860-0
      • Opcode ID: 99fce8aee95ec146f7d34ada12637cd3de7d049a61146db2196bd731ab2d03f5
      • Instruction ID: 6c53aef5761ab84f730ca0a5f2d52b6217a685d7b5411ffc0e88291821dc793f
      • Opcode Fuzzy Hash: 99fce8aee95ec146f7d34ada12637cd3de7d049a61146db2196bd731ab2d03f5
      • Instruction Fuzzy Hash: 1A21F2B1900218EBDB20DF69D842F6BB7ACFF04714F04852EF915E3241EAB4ED448BA1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strstr$_memmove
      • String ID:
      • API String ID: 894065678-0
      • Opcode ID: c5a14e69c78d133d80d75ff0809d91250cf426b36be2efbf27b9883b928a2ac8
      • Instruction ID: 420570e5b36004c51a76555fd8422c4d79d51c175b55f278c696f41e07aeaeee
      • Opcode Fuzzy Hash: c5a14e69c78d133d80d75ff0809d91250cf426b36be2efbf27b9883b928a2ac8
      • Instruction Fuzzy Hash: 8A1127775082613BEB260924BC05BA6BB4ADAD2374B08066DE88843206E65A5906C3F1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset$send
      • String ID:
      • API String ID: 699141727-0
      • Opcode ID: f65bec9ec393103fca5023a2feb515723f65be879b0ebac9a82ae63ffa4fecd0
      • Instruction ID: b5b54581a597ef7b1031233b3f15ce455717dc040d1b9c5e15a16ba088089adc
      • Opcode Fuzzy Hash: f65bec9ec393103fca5023a2feb515723f65be879b0ebac9a82ae63ffa4fecd0
      • Instruction Fuzzy Hash: 6C2108B1540618BBE720EB68DC06FEA739CAB04721F000155F6589B1D1DBF4A984C7A6
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • KStop.ARCHIVEPLAYER(000000FF,?,007CC6CD,Invalid handle,00000000,00000000,?,?,?,?,?,?,?,?,00000000,00000748), ref: 007CA4DE
      • KStopStreaming.ARCHIVEPLAYER(000000FF,000000FF,?,007CC6CD,Invalid handle,00000000,00000000,?,?,?,?,?,?,?,?,00000000), ref: 007CA4E9
      • KDisconnect.ARCHIVEPLAYER(000000FF,000000FF,000000FF,?,007CC6CD,Invalid handle,00000000,00000000), ref: 007CA4F4
      • KCloseInterface.ARCHIVEPLAYER(000000FF,000000FF,000000FF,000000FF,?,007CC6CD,Invalid handle,00000000,00000000), ref: 007CA4FF
      • SendMessageA.USER32 ref: 007CA534
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Stop$CloseDisconnectInterfaceMessageSendStreaming
      • String ID:
      • API String ID: 162833227-0
      • Opcode ID: b19f983eef6c3c809aa2187dcaed8426b3239c02038aca21018f2cae8305e0c4
      • Instruction ID: 33529827352bd42a071a07640fccb7be632cd6626644c96756d865c764b756ce
      • Opcode Fuzzy Hash: b19f983eef6c3c809aa2187dcaed8426b3239c02038aca21018f2cae8305e0c4
      • Instruction Fuzzy Hash: 79216070654B41D6E7716B38881ABAB7AE1AB45704F00882CF1EE5A2C3CBB924049B96
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: getsocknamehtons$ErrorLast
      • String ID:
      • API String ID: 2660464709-0
      • Opcode ID: 278b668a31bfebbdcb39e186ee4414064fa61772f4c65c197d48d8be3e012e56
      • Instruction ID: 231694595c9ac4717ac17fb1b153043139ac417ec35d9607984242c6c2527965
      • Opcode Fuzzy Hash: 278b668a31bfebbdcb39e186ee4414064fa61772f4c65c197d48d8be3e012e56
      • Instruction Fuzzy Hash: F9117031A1501CABCB10EFA5ED45AFEB7F8EF49311F50016AFC4AA3290DB355914EB80
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 00788C68
      • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 00788C7A
      • TranslateMessage.USER32(?), ref: 00788C84
      • DispatchMessageA.USER32(?), ref: 00788C8E
      • CloseHandle.KERNEL32(00000000), ref: 00788CA5
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Message$CloseDispatchHandleObjectPeekSingleTranslateWait
      • String ID:
      • API String ID: 4180978587-0
      • Opcode ID: f667af0f9270335d647e2858b5a51c4d7bdcd9f04d9377382683fb31f2aaee88
      • Instruction ID: fda6792050f685027fb600bbd92275dd3bb9d077f0c484b7eada8f307a4238ba
      • Opcode Fuzzy Hash: f667af0f9270335d647e2858b5a51c4d7bdcd9f04d9377382683fb31f2aaee88
      • Instruction Fuzzy Hash: 5D01AF31951309ABDB60ABA8DC88F9BB3FCAB04714F400069E655E22D0DFB8AC45CB70
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • shutdown.WS2_32(000000FF,00000002), ref: 0078ECCB
      • closesocket.WS2_32(000000FF), ref: 0078ECD2
      • DeleteCriticalSection.KERNEL32(?,?,?,00778E1A), ref: 0078ECFD
      • shutdown.WS2_32(000000FF,00000002), ref: 0078ED25
      • closesocket.WS2_32(000000FF), ref: 0078ED2C
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: closesocketshutdown$CriticalDeleteSection
      • String ID:
      • API String ID: 2179659606-0
      • Opcode ID: a48197ce1c3dd5dcf2cb1e2d07a674620d225964edbbc533b2291c4295671800
      • Instruction ID: 0f91b77e7e2338b8b382be69b8080049e0db57c7d7c059b923567a9bc32984dd
      • Opcode Fuzzy Hash: a48197ce1c3dd5dcf2cb1e2d07a674620d225964edbbc533b2291c4295671800
      • Instruction Fuzzy Hash: AA014C719197408BD3205F69980DB56B7B8FB55330F144B1DE4BA922E0D7786845DF60
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: closesocketshutdown$_memset
      • String ID:
      • API String ID: 1004331854-0
      • Opcode ID: cd0d9290dd27fff8a1783545bcf0fbdeaf64acb249095052c91cffbd005dcf36
      • Instruction ID: cef44ab2c3c0b173e4f1775bbc5b365bf0c8f316cc778f01d9494f2830296200
      • Opcode Fuzzy Hash: cd0d9290dd27fff8a1783545bcf0fbdeaf64acb249095052c91cffbd005dcf36
      • Instruction Fuzzy Hash: 8BF03A70109B01DBD7345FA8ED4AA0677A4AF05730B208B18F5BA96AE1C774A8459B94
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: closesocketshutdown$_memset
      • String ID:
      • API String ID: 1004331854-0
      • Opcode ID: 34f1a74138473a0e35b440bccf17aca14ca223177cb52368456fed66cc3d0ce7
      • Instruction ID: f92e57041f01630dbc63c4d47a2ce54a2c91399bbccba6c18e8af028cf57b504
      • Opcode Fuzzy Hash: 34f1a74138473a0e35b440bccf17aca14ca223177cb52368456fed66cc3d0ce7
      • Instruction Fuzzy Hash: E6F03A70009B01DBC7345FA8ED4AF4A77B4AF05B30F208B08F5BA97AE0D774A8459B50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf_strncpy
      • String ID: %d,
      • API String ID: 1069910716-4069433177
      • Opcode ID: baa9681cbca6a6183a9fa3e2da780de893684e2b510644f6c164dc0462405667
      • Instruction ID: 6abb8cc637606d2bed120c236f8def5483b1842673168231cfc6d7aadf275480
      • Opcode Fuzzy Hash: baa9681cbca6a6183a9fa3e2da780de893684e2b510644f6c164dc0462405667
      • Instruction Fuzzy Hash: 97519970900258AFDF14CFA4C884BFEBBB5EB49314F14416DE8026B296E7796945CB61
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _strstr
      • String ID: CSeq:$Cseq:
      • API String ID: 2882301372-1220783797
      • Opcode ID: 84a02978bdfb3f96663560bd2b150d2abbb78a0361c65d0ca5f26855c5d45ab2
      • Instruction ID: a71b0ec3dd68865f9d292c5eb4a2a30aa72a1d9abe61523240523b5541a0747e
      • Opcode Fuzzy Hash: 84a02978bdfb3f96663560bd2b150d2abbb78a0361c65d0ca5f26855c5d45ab2
      • Instruction Fuzzy Hash: 9441967190021C9BCF21DB54DC49FEDB368BB9A315F0006E9E59D93181DA749AC5CF90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: PRESETGOTO$PRESETSET
      • API String ID: 3555123492-3341356999
      • Opcode ID: 67beca134e9e8cfbbdcd3b892844552d981f31a0392f8822aa9d23b71c092066
      • Instruction ID: e24129bb797100a29c6450eddb9403e431a9fb115b2fb6fd035a718ced31cc53
      • Opcode Fuzzy Hash: 67beca134e9e8cfbbdcd3b892844552d981f31a0392f8822aa9d23b71c092066
      • Instruction Fuzzy Hash: 6A41C071901218AADF20DF69DC41FEEB3B8FB59310F40819AE94DD7242DE359E89DB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: BLC$BLC
      • API String ID: 3555123492-3328582212
      • Opcode ID: 51454702493f6c1a4db0855ee8298ecff249a980ec4397c8a1caa7a0224166dc
      • Instruction ID: c250a489c260a4adf7f2fb3835caeb08aa637f357700bc9834e0e30f61b60314
      • Opcode Fuzzy Hash: 51454702493f6c1a4db0855ee8298ecff249a980ec4397c8a1caa7a0224166dc
      • Instruction Fuzzy Hash: 1041E4719012189ADF20DF69DC41BEEB3B8FB59300F50819AE44DE7252DE759EC9CB50
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf
      • String ID: http://%s:%d/cgi-bin/
      • API String ID: 233258989-3528032135
      • Opcode ID: e9bc186f31c0dae776bf1a8e31d50e8afbf1555527d4262eb3d396236c909401
      • Instruction ID: d5ab4d1bfe3e9980c4ca471fe750e0a97608995a71f736f47956664c5bba4dd8
      • Opcode Fuzzy Hash: e9bc186f31c0dae776bf1a8e31d50e8afbf1555527d4262eb3d396236c909401
      • Instruction Fuzzy Hash: 9A51FC72919BC195EB428F6888C5BF27764BF9A710F0C52B6EDCC5D24BEB684284C371
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007A6513
      • swprintf.LIBCMT ref: 007A65B5
        • Part of subcall function 007B9150: swprintf.LIBCMT ref: 007B9189
        • Part of subcall function 007B9150: swprintf.LIBCMT ref: 007B91AE
      Strings
      • DESCRIBE, xrefs: 007A6556
      • DESCRIBE %s RTSP/%d.%dCSeq: %dAccept: application/sdp%sUser-Agent: %s, xrefs: 007A65AA
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: DESCRIBE$DESCRIBE %s RTSP/%d.%dCSeq: %dAccept: application/sdp%sUser-Agent: %s
      • API String ID: 1292703666-645310430
      • Opcode ID: 6fa5abb425e42168d5e39e8be238f68534fcd9ee3f981d087f6a90003e16a56b
      • Instruction ID: 39a7584dd0721a3803eaf21d0ace4c8de75211efdc9dd59ea575e14837b1ce80
      • Opcode Fuzzy Hash: 6fa5abb425e42168d5e39e8be238f68534fcd9ee3f981d087f6a90003e16a56b
      • Instruction Fuzzy Hash: 7421A0B2900519BBC715DB64DC80FEAF7ACBB55300F000366FA2993145EB316668CBE0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 007964F3
      • swprintf.LIBCMT ref: 00796595
        • Part of subcall function 007B9150: swprintf.LIBCMT ref: 007B9189
        • Part of subcall function 007B9150: swprintf.LIBCMT ref: 007B91AE
      Strings
      • DESCRIBE, xrefs: 00796536
      • DESCRIBE %s RTSP/%d.%dCSeq: %dAccept: application/sdp%sUser-Agent: %s, xrefs: 0079658A
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: DESCRIBE$DESCRIBE %s RTSP/%d.%dCSeq: %dAccept: application/sdp%sUser-Agent: %s
      • API String ID: 1292703666-645310430
      • Opcode ID: 9c2fe2c4d0651b432d1814513f675c786e2cc89b8a971d0782c91cd17aeefb6e
      • Instruction ID: 2ee76f43adb8fb4e8baed431f99d5bfdced3eb9040efaa78fbf9fa8078f915bd
      • Opcode Fuzzy Hash: 9c2fe2c4d0651b432d1814513f675c786e2cc89b8a971d0782c91cd17aeefb6e
      • Instruction Fuzzy Hash: 692182B2500119BACB15DB64DC85FE6F7ADBF15300F000266F52997245EB7467588BE1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 0079E773
      • swprintf.LIBCMT ref: 0079E815
        • Part of subcall function 007B9150: swprintf.LIBCMT ref: 007B9189
        • Part of subcall function 007B9150: swprintf.LIBCMT ref: 007B91AE
      Strings
      • OPTIONS, xrefs: 0079E7B6
      • OPTIONS %s RTSP/%d.%dCSeq: %d%sUser-Agent: %s, xrefs: 0079E80A
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: swprintf$_memset
      • String ID: OPTIONS$OPTIONS %s RTSP/%d.%dCSeq: %d%sUser-Agent: %s
      • API String ID: 1292703666-1189510008
      • Opcode ID: f732f87933008b4f26fb9af8a32ea741cb43182546bf75997d31b3a784b5e173
      • Instruction ID: d1f15444c0d55eda562a2c356e458c81da93526fb2d7be39be222b6a5e0f462d
      • Opcode Fuzzy Hash: f732f87933008b4f26fb9af8a32ea741cb43182546bf75997d31b3a784b5e173
      • Instruction Fuzzy Hash: 8121A6B2601119BBCB15DB54DC85FEAF3ACBB15310F004266F62DD3141EB74AA548BE1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • CreateSolidBrush.GDI32(00000000), ref: 007CCBD1
        • Part of subcall function 00803E70: __EH_prolog3_catch.LIBCMT ref: 00803E77
        • Part of subcall function 00803E70: GetClassInfoA.USER32(75C98508,78418B28,00000000), ref: 00803E89
      • GetSystemMetrics.USER32(00000000), ref: 007CCBF0
      • GetSystemMetrics.USER32(00000001), ref: 007CCBFB
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: MetricsSystem$BrushClassCreateH_prolog3_catchInfoSolid
      • String ID: CVideoWindow
      • API String ID: 4084342392-1478591617
      • Opcode ID: 835cff7457e4ab90b4adc9d467b6e0647ebdb6ba3b15b0a134af7b9cb5247546
      • Instruction ID: 26164390c5b3bcea47d3d32b4f866888471dad3522c6b38a34aca91715c1cc4b
      • Opcode Fuzzy Hash: 835cff7457e4ab90b4adc9d467b6e0647ebdb6ba3b15b0a134af7b9cb5247546
      • Instruction Fuzzy Hash: 79213CB1E44305ABDB10DFA9DC45B9DBBF8FB48710F20421AF510A63D0EBB4A540CB54
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _free_malloc
      • String ID:
      • API String ID: 845055658-0
      • Opcode ID: 31bce6e7a558acba0b4f6518e9b3bb131259e18419f8ea2e9a815d07808ac748
      • Instruction ID: a3374e237551a74293b140db7b9ea68131450179fc8dcb9e72dfdff492307ef7
      • Opcode Fuzzy Hash: 31bce6e7a558acba0b4f6518e9b3bb131259e18419f8ea2e9a815d07808ac748
      • Instruction Fuzzy Hash: E60202B56047419FCB25CF29C581B2BBBE1BF88304F14896EE8999B351D734EA50CF52
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _free.LIBCMT ref: 007C2C9E
      • _malloc.LIBCMT ref: 007C2CBA
      • _free.LIBCMT ref: 007C2DF3
      • _malloc.LIBCMT ref: 007C2E0C
        • Part of subcall function 0040D6B0: VirtualFree.KERNEL32 ref: 0040D81F
        • Part of subcall function 0040D6B0: VirtualFree.KERNEL32 ref: 0040D844
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: FreeVirtual_free_malloc
      • String ID:
      • API String ID: 723007099-0
      • Opcode ID: bd1f03eff116f69fd67c1875be06cabebf570d28e8825e95d7354b61ce72cc96
      • Instruction ID: 49afe656c7d45fcd17f145828454e89110bfb35d6578ab002b3ac0c592c734fa
      • Opcode Fuzzy Hash: bd1f03eff116f69fd67c1875be06cabebf570d28e8825e95d7354b61ce72cc96
      • Instruction Fuzzy Hash: EFE112B5A00609DFCB24CF58D981BAABBF1FF48300F14456EE819AB356D735E941DBA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove
      • String ID:
      • API String ID: 4104443479-0
      • Opcode ID: 0a211743bb04db475156d7fa1c9bd4c54fa0f2b494ab29d23c7c860cd1725c70
      • Instruction ID: 47f59449dc363ee2e4c98dda96b45fa6f0e183dfb67ce3a5b5bb6600f281bc17
      • Opcode Fuzzy Hash: 0a211743bb04db475156d7fa1c9bd4c54fa0f2b494ab29d23c7c860cd1725c70
      • Instruction Fuzzy Hash: A951C172904B858AD331CF1CD840796BBE0AF66300F05CA6DE8DA67742E775E689C791
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
      • String ID:
      • API String ID: 2782032738-0
      • Opcode ID: e65442a150b882e73c2a119cfcecbd600c6c15dbcba83df7e500aed34af6d209
      • Instruction ID: aac0d373f6e1de54917210151f90c0d86ea48b275876981431da02767484ec36
      • Opcode Fuzzy Hash: e65442a150b882e73c2a119cfcecbd600c6c15dbcba83df7e500aed34af6d209
      • Instruction Fuzzy Hash: EA41C331B04706AFDB1C8FA9C980AAE7BAAAF853A0F24853DE915C7250DA75DD45CF40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __time64.LIBCMT ref: 007A45DF
        • Part of subcall function 00953F46: GetSystemTimeAsFileTime.KERNEL32(0078ACDC,?,?,?,0078ACDC,00000000), ref: 00953F4F
        • Part of subcall function 00953F46: __aulldiv.LIBCMT ref: 00953F6F
      • select.WS2_32(00000000,?,00000000,00000000,00000003), ref: 007A468F
      • __WSAFDIsSet.WS2_32(000000FF,00000001), ref: 007A46A2
      • __WSAFDIsSet.WS2_32(?,00000001), ref: 007A46DA
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Time$FileSystem__aulldiv__time64select
      • String ID:
      • API String ID: 702641846-0
      • Opcode ID: a6434af232f2987e34b31022d766d11d237d72fb50b890bfcefe91eb73ce701c
      • Instruction ID: ec231293c0c16b9381b7a6a1569b17a17aed8ca3c851c0342bc7e793035fedad
      • Opcode Fuzzy Hash: a6434af232f2987e34b31022d766d11d237d72fb50b890bfcefe91eb73ce701c
      • Instruction Fuzzy Hash: 00418C71608701CBD728DF28D845B6AB3E5BBCB314F100B2DE49AC3691D7BAE905CB56
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __time64.LIBCMT ref: 0078E3CC
        • Part of subcall function 00953F46: GetSystemTimeAsFileTime.KERNEL32(0078ACDC,?,?,?,0078ACDC,00000000), ref: 00953F4F
        • Part of subcall function 00953F46: __aulldiv.LIBCMT ref: 00953F6F
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Time$FileSystem__aulldiv__time64
      • String ID:
      • API String ID: 2893107130-0
      • Opcode ID: 1f33c36f887e3fa4b47f5528685c082459fdef55540fb19a68fbbcca0c25a730
      • Instruction ID: 5485e60889e7a25f3fdff3a39a1038c9170d3ad47a134ce4f76a3fa1b5a70946
      • Opcode Fuzzy Hash: 1f33c36f887e3fa4b47f5528685c082459fdef55540fb19a68fbbcca0c25a730
      • Instruction Fuzzy Hash: 1B314E71A40168ABCF24EB68EC46BEDB378EF45320F10029AF94D97181DB786E85D7D1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memset.LIBCMT ref: 0078C13B
      • send.WS2_32(?,?,00000080,00000000), ref: 0078C1CA
      • _memset.LIBCMT ref: 0078C1EF
        • Part of subcall function 0079C6C0: recv.WS2_32(?,00000000,0078A5CC,00000000), ref: 0079C6D7
        • Part of subcall function 0079C6C0: WSAGetLastError.WS2_32(?,0078A5CC,00000000,0000000D), ref: 0079C6E1
        • Part of subcall function 0079C6C0: shutdown.WS2_32(?,00000002), ref: 0079C701
        • Part of subcall function 0079C6C0: closesocket.WS2_32(?), ref: 0079C708
      • WSAGetLastError.WS2_32(?,00000080), ref: 0078C255
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ErrorLast_memset$closesocketrecvsendshutdown
      • String ID:
      • API String ID: 687015408-0
      • Opcode ID: 38bce758be0d350f4fa6b58a41f0f9da823e5e4384490294a9ded96ba96a7bc7
      • Instruction ID: 7ab96b501583e2aafe540dcfedcc6cb45887131d2b35d2f04d7a1f7f4abded9b
      • Opcode Fuzzy Hash: 38bce758be0d350f4fa6b58a41f0f9da823e5e4384490294a9ded96ba96a7bc7
      • Instruction Fuzzy Hash: 57419B72A0878096D721DB68D846BEBB7A4FFD9310F10472DEDD89A281EF745548C3A2
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • SetEvent.KERNEL32(?), ref: 007883C2
      • DeleteCriticalSection.KERNEL32(?), ref: 00788439
      • shutdown.WS2_32(?,00000002), ref: 00788463
      • closesocket.WS2_32(?), ref: 0078846A
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CriticalDeleteEventSectionclosesocketshutdown
      • String ID:
      • API String ID: 1029466065-0
      • Opcode ID: 183559593e402e785228538473eb36c60f4c3ce39aab344b4a6953ebb7a961f5
      • Instruction ID: 3684e98deb1d4737e0e85d70979779ef2447af411433184f43b1eeab49238ef1
      • Opcode Fuzzy Hash: 183559593e402e785228538473eb36c60f4c3ce39aab344b4a6953ebb7a961f5
      • Instruction Fuzzy Hash: 9A4183B1701A06ABD714DF64D888B9AF7A8FF04328F144715E829977D0EB78B918CBD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$_memmovesend
      • String ID:
      • API String ID: 3966344026-0
      • Opcode ID: d105c1f066e1e645e25933f6cad1e53ca14359a629dc9f43751c11b131f0d99f
      • Instruction ID: c4ed5e211f0b583eca152f811017fd0ae97d32400cc4b2478dc0093120b6e384
      • Opcode Fuzzy Hash: d105c1f066e1e645e25933f6cad1e53ca14359a629dc9f43751c11b131f0d99f
      • Instruction Fuzzy Hash: 6C314871D40268ABDB30EB68DC49BDEB7A4EF55310F100195F948A7281D7B99EC4CBD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 00814BA7
      • CoTaskMemFree.OLE32(?,?), ref: 00814BEE
      • GetParent.USER32(?), ref: 00814C4E
      • SendMessageA.USER32(?,00000464,00000104,00000000), ref: 00814C64
        • Part of subcall function 00810A9F: __EH_prolog3.LIBCMT ref: 00810AA6
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3$FreeMessageParentSendTask
      • String ID:
      • API String ID: 2222212998-0
      • Opcode ID: 0f0be20dc9750d8a76794698901175cd0000b3ce4b0fdfc59e8a299db235efc9
      • Instruction ID: 7cf8e7db3490b0d516375d185e95b643ce9cae0e0fd92781694e77ae4eebef8f
      • Opcode Fuzzy Hash: 0f0be20dc9750d8a76794698901175cd0000b3ce4b0fdfc59e8a299db235efc9
      • Instruction Fuzzy Hash: 86314D71A0121ADBCF14EFA8CC85EAEB778FF54324B14461CF525A72E2DB34A940CB95
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00781E30: Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 00781E60
      • InitializeCriticalSectionAndSpinCount.KERNEL32(00006774,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00780327
      • GetLastError.KERNEL32(?,?,00000000), ref: 00780331
      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000), ref: 0078038A
      • ResetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00780394
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Event$Concurrency::details::_Concurrent_queue_base_v4::_CountCreateCriticalErrorInitializeInternal_throw_exceptionLastResetSectionSpin
      • String ID:
      • API String ID: 26333842-0
      • Opcode ID: 3775e1397dfd97476c06edefdcd5482fc7fa192533e5ac4876cdde8008cfb687
      • Instruction ID: 69c1ede53b6cb14667fbbe6e29a0c0d1ff7d6b31d11f35c1d20390a903020933
      • Opcode Fuzzy Hash: 3775e1397dfd97476c06edefdcd5482fc7fa192533e5ac4876cdde8008cfb687
      • Instruction Fuzzy Hash: 713149B0644B05EBD710EF65C809B5AFBB8FB04714F108219E9199BB80D7B9A9148BD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset
      • String ID:
      • API String ID: 2102423945-0
      • Opcode ID: 906be4b4a00aa31600f467983d218176ba682c6f0800a5ce3d0736ea8c775305
      • Instruction ID: 1f234843dbbbdfa62f8f3184e1fd4c0193176e89d16ff17f92497ac21ff24cc0
      • Opcode Fuzzy Hash: 906be4b4a00aa31600f467983d218176ba682c6f0800a5ce3d0736ea8c775305
      • Instruction Fuzzy Hash: 45314BB1114200AFDB12DFA4D8C5B9677ECEF08704F4441BAED188F28AEB7566088B65
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 00809E07: EnableWindow.USER32(?,007BC6AB), ref: 00809E19
      • SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 007C8C05
      • SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 007C8C1A
      • SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 007C8C2F
      • SendMessageA.USER32(?,00000405,00000001,00000000), ref: 007C8C48
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: MessageSend$EnableWindow
      • String ID:
      • API String ID: 1554173715-0
      • Opcode ID: 4f1c8c10a4c95eae80b862ea090097e1f3316878b95f1f9a2288fb6d2e2bd574
      • Instruction ID: bfc84d07ee3829937221f68321617235a9f6476f5814686d63b981b3a2298fe7
      • Opcode Fuzzy Hash: 4f1c8c10a4c95eae80b862ea090097e1f3316878b95f1f9a2288fb6d2e2bd574
      • Instruction Fuzzy Hash: C01181751817006AD270A728EC42FF77BA8FB91B00F10056CF2D7A50E29DA23A80DA64
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset
      • String ID:
      • API String ID: 2102423945-0
      • Opcode ID: 74eb64cc1541fbfe0296be2ccfd36843cfbe81e8431e00ad89e5bf7ad14a8c4a
      • Instruction ID: 784b9d3a833c60fe3155261003ac596077f70cc44c7022e4c90ce2199cfdf7be
      • Opcode Fuzzy Hash: 74eb64cc1541fbfe0296be2ccfd36843cfbe81e8431e00ad89e5bf7ad14a8c4a
      • Instruction Fuzzy Hash: 7001CCB1A40701BBD211EB5CEC41F9AB768AFA5700F100225F50496686FB74F599C7F4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$EventResetsend
      • String ID:
      • API String ID: 1880740665-0
      • Opcode ID: 2890da0eed71dc62334518df73d4e2005a3b2dd4efc4bc8134c7869575f56134
      • Instruction ID: 778f6d5dff75cc1c8e11cd03413feb93d40fa0662649877e47b4ee7aaa1607d9
      • Opcode Fuzzy Hash: 2890da0eed71dc62334518df73d4e2005a3b2dd4efc4bc8134c7869575f56134
      • Instruction Fuzzy Hash: 3811CA70501254ABD720EB68DC06BDDB7B4EF44700F004158F6689B2D1DBF5AA95DBA1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: getsocknamehtons
      • String ID:
      • API String ID: 300858678-0
      • Opcode ID: 79e20558bb582c337009845ae8a171c8071a121efcf9ed87ad97462bade319ba
      • Instruction ID: d674248c84b6719c9129c9e4010d44e4c0b89d15ac6d528d19d200eb16022e1f
      • Opcode Fuzzy Hash: 79e20558bb582c337009845ae8a171c8071a121efcf9ed87ad97462bade319ba
      • Instruction Fuzzy Hash: E101823161501CABCB00EFA5E905AFEB7BCEF5A311F10025AFC06A3290DB345A14AB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$EventResetsend
      • String ID:
      • API String ID: 1880740665-0
      • Opcode ID: 72646341ce57f7c6a98f5bafef2162ce9078e86d733c685744394d4f04b2ec58
      • Instruction ID: 49d04ae3c0563a00f935101c57eafaf9f9a7493abddf1a0d11f618b24781c330
      • Opcode Fuzzy Hash: 72646341ce57f7c6a98f5bafef2162ce9078e86d733c685744394d4f04b2ec58
      • Instruction Fuzzy Hash: 6C110A70501214ABD720EB68EC06BDDB774EF44700F000298F6189B2D1DBF5AA949B91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: DeleteObject$Select
      • String ID:
      • API String ID: 207189511-0
      • Opcode ID: e9030c5256e9867309f61431ff88a51fa0c48dde5eb53978e1b9ca06aaa64203
      • Instruction ID: ac6a483388f7f4c2a6f7034816264f51f72d7000a8949c4ee2e30fae762cf7bf
      • Opcode Fuzzy Hash: e9030c5256e9867309f61431ff88a51fa0c48dde5eb53978e1b9ca06aaa64203
      • Instruction Fuzzy Hash: C91106B15147419FDB208F65D948B5BBBE8FF08718F108A5DE462C7B90D7BAE800CB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3TextWindow__cftof_strlen
      • String ID:
      • API String ID: 721212129-0
      • Opcode ID: 168a3b11a529152f093fe28567c4745b5bdba6cc33649ca3c4b0dcf3d15b5eea
      • Instruction ID: c5c5f554891d65d1395ba94b5cc44f0b32f5bf6bccc29d73549352ce87e1a159
      • Opcode Fuzzy Hash: 168a3b11a529152f093fe28567c4745b5bdba6cc33649ca3c4b0dcf3d15b5eea
      • Instruction Fuzzy Hash: 2E01D476400119EBCF05EBA4DC15EAE7775FF44720B15822CF515A72E5DB31A910CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
        • Part of subcall function 0079E430: shutdown.WS2_32(?,00000002), ref: 0079E44D
        • Part of subcall function 0079E430: closesocket.WS2_32(?), ref: 0079E454
        • Part of subcall function 0079E430: swprintf.LIBCMT ref: 0079E46B
        • Part of subcall function 0079E430: _memset.LIBCMT ref: 0079E4A6
      • _memset.LIBCMT ref: 00782122
      • _memset.LIBCMT ref: 00782138
      • shutdown.WS2_32(?,00000002), ref: 00782158
      • closesocket.WS2_32(?), ref: 0078215F
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$closesocketshutdown$swprintf
      • String ID:
      • API String ID: 3870429283-0
      • Opcode ID: e9de87721f67105eb13fdd45031c2e20fb25d5d34c8e9121e4ef36f2c2f9c524
      • Instruction ID: 2b6114221a7fb8010fdfff88356b10598509b6719031e162244666abbaafdfe9
      • Opcode Fuzzy Hash: e9de87721f67105eb13fdd45031c2e20fb25d5d34c8e9121e4ef36f2c2f9c524
      • Instruction Fuzzy Hash: EE01F971A41304D7D730AB659C4AB9BB3E8EF44B31F340919F365D21D2EBB4E5428750
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 00816286
      • GetLastError.KERNEL32(00000000,00815C34,?,00000000,?,?,?,?,?,?,00000004,007F1C87,?,?,?,?), ref: 00816292
      • __CxxThrowException@8.LIBCMT ref: 008162CE
      • InternetCloseHandle.WININET(00000000), ref: 008162E0
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CloseErrorException@8H_prolog3HandleInternetLastThrow
      • String ID:
      • API String ID: 3257456058-0
      • Opcode ID: 90cb55bd1c4f49a09510fa1dc781ec15297cbbba55c4c39390d7c5f140e4ed36
      • Instruction ID: 88413b79d2ec1a06f14b9b17b788ec9a50d64703f843be5b340e247c160ff993
      • Opcode Fuzzy Hash: 90cb55bd1c4f49a09510fa1dc781ec15297cbbba55c4c39390d7c5f140e4ed36
      • Instruction Fuzzy Hash: 4C014F76901724ABCB24AF68D8057A937E9FF44720F11C66DF9A9DB280DB759D408B40
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memsetclosesocketshutdownswprintf
      • String ID:
      • API String ID: 2215933679-0
      • Opcode ID: afdd5e26eec13f277241bb6e04a6177e53e1119ac98f14894442cd044293ab8d
      • Instruction ID: db510b518a7e6714ebd852540238a5ea705831a83162885a79dbbb658ed0bccb
      • Opcode Fuzzy Hash: afdd5e26eec13f277241bb6e04a6177e53e1119ac98f14894442cd044293ab8d
      • Instruction Fuzzy Hash: 3B01F47110178097DB30CBB9ED45BDBB3ECAF41B30F14451AF5BAD22E1E7A8A4858B11
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • recvfrom.WS2_32(000000FF,?,00040000,00000000,?,?), ref: 007B4744
      • WSAGetLastError.WS2_32(?,00790B22,?,?), ref: 007B474E
      • shutdown.WS2_32(000000FF,00000002), ref: 007B476E
      • closesocket.WS2_32(000000FF), ref: 007B4775
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ErrorLastclosesocketrecvfromshutdown
      • String ID:
      • API String ID: 758111957-0
      • Opcode ID: dc58d2b974bb7b0207df6e88e59f784baac9098c63a23bd80a311746c50162a7
      • Instruction ID: 8cef5c91f9ddf763b58cf5d76788094e0e010e606c4e6a6575752602df08df8c
      • Opcode Fuzzy Hash: dc58d2b974bb7b0207df6e88e59f784baac9098c63a23bd80a311746c50162a7
      • Instruction Fuzzy Hash: 16F0C232119600A7C2245BBCEC48FE6B7ADAF46730F64471EF27AD25E1DB60A840D790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • recvfrom.WS2_32(?,?,00040000,00000000,?,?), ref: 007B4954
      • WSAGetLastError.WS2_32(?,00790F27,?,?,?,?,?,?), ref: 007B495E
      • shutdown.WS2_32(?,00000002), ref: 007B497E
      • closesocket.WS2_32(?), ref: 007B4985
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ErrorLastclosesocketrecvfromshutdown
      • String ID:
      • API String ID: 758111957-0
      • Opcode ID: f2a7d2890f00f3877c916bd80096811bb9e8ccd94643be0698ec913054168734
      • Instruction ID: 2e926174ddf0f06f984ddf4490d977273eca5242e209a11f2ed76ffec24d6a00
      • Opcode Fuzzy Hash: f2a7d2890f00f3877c916bd80096811bb9e8ccd94643be0698ec913054168734
      • Instruction Fuzzy Hash: 4FF0C272118600A7C2245BBCEC48FE7B7ADAF45770F24471EF27AD29E0C764B8409750
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memset$closesocketshutdown
      • String ID:
      • API String ID: 2108469968-0
      • Opcode ID: 04744a7b67dae4c2eba1449ebe717338f2baf957376950a3a9827675b9a8a830
      • Instruction ID: 15efc9813371c1e155d8e950cdfee5d23db9eabea63e5d120b44f9a772d7b1c3
      • Opcode Fuzzy Hash: 04744a7b67dae4c2eba1449ebe717338f2baf957376950a3a9827675b9a8a830
      • Instruction Fuzzy Hash: F401A471201700AFD3249B69DC49F9A77E8AF46720F14860DF1769B2E1C7B4E484CB90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • recv.WS2_32(?,00000000,0078A5CC,00000000), ref: 0079C6D7
      • WSAGetLastError.WS2_32(?,0078A5CC,00000000,0000000D), ref: 0079C6E1
      • shutdown.WS2_32(?,00000002), ref: 0079C701
      • closesocket.WS2_32(?), ref: 0079C708
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: ErrorLastclosesocketrecvshutdown
      • String ID:
      • API String ID: 1486353823-0
      • Opcode ID: d6d64e6cb4e8b7203f841573d84098560470db3445a1cf740acc4171485e5a03
      • Instruction ID: 771264123a97d2477332a0f8b7d24a8d774170d44c8b5d35cc0e2ec3e50bd615
      • Opcode Fuzzy Hash: d6d64e6cb4e8b7203f841573d84098560470db3445a1cf740acc4171485e5a03
      • Instruction Fuzzy Hash: DBF0B43211950077DA155BFCAC48A49B72DBF41331B244316F578D26E0C7749C519BA0
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID: ,iB$log
      • API String ID: 0-3348582547
      • Opcode ID: aa5749a22969d39e7108d1d50b469034c97402e5625fd04af76964ec8ced80e8
      • Instruction ID: 5bcf287832def6e019418c20d2081eb520ad2e172bc7a1af01703b3646e0086b
      • Opcode Fuzzy Hash: aa5749a22969d39e7108d1d50b469034c97402e5625fd04af76964ec8ced80e8
      • Instruction Fuzzy Hash: 2E711320928B404DD762DB39D42137AB3ECBF613C5F11DB2BEC96615A5EB3899C78601
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID: Content-Length:
      • API String ID: 0-1197855069
      • Opcode ID: 5a5878e39305fdc04dc11a6f38ac294bcb66a53e93f589c778ab55b436865d28
      • Instruction ID: abbace7bc376c85148213812399c7dcebe0f0e0b0fda2d01c8566196f3adfe9b
      • Opcode Fuzzy Hash: 5a5878e39305fdc04dc11a6f38ac294bcb66a53e93f589c778ab55b436865d28
      • Instruction Fuzzy Hash: EC411572A042559FCF31CE18EC4476677E4EF62328F1501A9F801CB251E779DDA1C7A1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memmove.LIBCMT ref: 007947CC
      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 00794806
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception_memmove
      • String ID: vector<T> too long
      • API String ID: 2765667529-3788999226
      • Opcode ID: b86fe54c0a78172f898cf112bd07717a5e789ab7769348e9615b229cb9a97afd
      • Instruction ID: 6ca6a68aba7bacf00a1dca9fa65309a59d53a3ad9f1b2e4e1a02bc71e63d4d09
      • Opcode Fuzzy Hash: b86fe54c0a78172f898cf112bd07717a5e789ab7769348e9615b229cb9a97afd
      • Instruction Fuzzy Hash: 9B31F572B0062D5BCB00DEBDEC84DAAB799EB85760724863AE918C7244D771E912C7D0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memmove.LIBCMT ref: 007FEBBF
      • Concurrency::details::_Concurrent_queue_base_v4::_Internal_throw_exception.LIBCPMT ref: 007FEBF6
        • Part of subcall function 00948D10: std::exception::exception.LIBCMT ref: 00948D26
        • Part of subcall function 00948D10: __CxxThrowException@8.LIBCMT ref: 00948D3B
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: Concurrency::details::_Concurrent_queue_base_v4::_Exception@8Internal_throw_exceptionThrow_memmovestd::exception::exception
      • String ID: vector<T> too long
      • API String ID: 3224774664-3788999226
      • Opcode ID: d96ddfadb316fac0916e04c1f325b5fbbe795c9b2ede6fd24615f181265186da
      • Instruction ID: 48bba37c2467aecbbd3d02637eb539b9ea7cf53b7240a77340a554ad09b75382
      • Opcode Fuzzy Hash: d96ddfadb316fac0916e04c1f325b5fbbe795c9b2ede6fd24615f181265186da
      • Instruction Fuzzy Hash: C62107727001285F8711DE6DDC8487A7B9AEAC4760328823AEE19CB359D630EC05C7E1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf
      • String ID: ME=$TITLE_NAME
      • API String ID: 1467051239-129296734
      • Opcode ID: 9b697d122eec51e2b9441ad44a4fc45f0932fd8e235a19d477cc261bb81f8236
      • Instruction ID: ac42c15fc7710598caed2cb8bf0591fa17992726d231c1529b6b53b4541d9d15
      • Opcode Fuzzy Hash: 9b697d122eec51e2b9441ad44a4fc45f0932fd8e235a19d477cc261bb81f8236
      • Instruction Fuzzy Hash: 1C310A7190029D9BCF14DFA4DD54AFEB7B8EB8A310F1041AAD949D7341EA34AE48CB91
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf
      • String ID: BRIGHTNESS$SS=
      • API String ID: 1467051239-3205083591
      • Opcode ID: d261d67706758e151eda78b72bb4706338571ac69c5d5ccf1871f81576be8cca
      • Instruction ID: 6b22de9c276afe4190ef29b45f735014c98853bfa7d362cc39fdcf0d4b438632
      • Opcode Fuzzy Hash: d261d67706758e151eda78b72bb4706338571ac69c5d5ccf1871f81576be8cca
      • Instruction Fuzzy Hash: 4D21D8B190015C9BCF14DB69EC55DEDB778DB95310F0041BAD909D7241EB74AE88CBA0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf
      • String ID: ON=$SATURATION
      • API String ID: 1467051239-4278301861
      • Opcode ID: 20757390c726bf27b4942edc55686fe8eb33af17fb92abdc18f456f34f479a35
      • Instruction ID: 983ea32d7806e86ecbeb0c64dcabc113823d3149f72b2806096b914a96ddae1c
      • Opcode Fuzzy Hash: 20757390c726bf27b4942edc55686fe8eb33af17fb92abdc18f456f34f479a35
      • Instruction Fuzzy Hash: 9221D6B19006589FCF10DB68DC659EDB778EF85310F0041AAE949D7241EB74AE88CBD4
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _sprintf
      • String ID: HUE$HUE=
      • API String ID: 1467051239-1691531746
      • Opcode ID: 59d231712c1c2e377cb0e52c1d6ebc5d3332430afbbf4763af96de9c14dc9fab
      • Instruction ID: 1af5af35bd2dd7bf3a95d80c0bafab43836c0cece648ffaa779c220acb4bd00e
      • Opcode Fuzzy Hash: 59d231712c1c2e377cb0e52c1d6ebc5d3332430afbbf4763af96de9c14dc9fab
      • Instruction Fuzzy Hash: CA2195B59011589BDF14DF69EC559EEB3BCEB89310F0041AAE909D7343EB74AE88C790
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memmove.LIBCMT ref: 0078C39C
      • send.WS2_32(?,69544341,0000000C,00000000), ref: 0078C3C4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmovesend
      • String ID: ACTi
      • API String ID: 135662524-2592707185
      • Opcode ID: 617f173fef3316abdc35ff61413555616b54cf686d05d6c6c6e745571947a1a1
      • Instruction ID: ff113f823dbcd6a96895a9cd666b8b8d6cdf37c898c9d2dc30b80be830fe5bed
      • Opcode Fuzzy Hash: 617f173fef3316abdc35ff61413555616b54cf686d05d6c6c6e745571947a1a1
      • Instruction Fuzzy Hash: DA115E7294012897CB11EF55EC41BEEB3A8EF59320F10819AF849E7640CA75AD91DBE1
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID:
      • String ID: none
      • API String ID: 0-2140143823
      • Opcode ID: 9ef5a4ddaae57b732fc775a5f9ed24316fe889c012e8a04df1549fde5f0e650a
      • Instruction ID: a50a3364744651d5c71b892e212d7b096bc48df93cef57d3a1a9686f4115987d
      • Opcode Fuzzy Hash: 9ef5a4ddaae57b732fc775a5f9ed24316fe889c012e8a04df1549fde5f0e650a
      • Instruction Fuzzy Hash: D31179B1A083009FD340CF68D5C061BBBE0AFA6300F55992EF8948B360E374DC428B86
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memmove.LIBCMT ref: 0078C2EB
      • send.WS2_32(000000FF,ACTi,0000000C,00000000), ref: 0078C313
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmovesend
      • String ID: ACTi
      • API String ID: 135662524-2592707185
      • Opcode ID: afd04afc83978701e9c6de12ce543fe4e07bb1d4419a626445e0986816bff6fc
      • Instruction ID: 0123a1d1a62047c92cf2ef1eb4dcec489b2425707338b6dd8254b5ffbefe2451
      • Opcode Fuzzy Hash: afd04afc83978701e9c6de12ce543fe4e07bb1d4419a626445e0986816bff6fc
      • Instruction Fuzzy Hash: 0011EC72D0012897CB21DF59EC41BDEB3B8FF59720F11819AF85997244D6749E819BE0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • _memmove.LIBCMT ref: 0079017C
      • send.WS2_32(?,69544341,0000000C,00000000), ref: 007901A4
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmovesend
      • String ID: ACTi
      • API String ID: 135662524-2592707185
      • Opcode ID: b52fb7008259308ba0181b4ead4de83de72304f52f644a9051544239b3cb0995
      • Instruction ID: 138c7c01688bd4bf46dba2e77077eac9ea533302b10834fd92565d4f47d81f43
      • Opcode Fuzzy Hash: b52fb7008259308ba0181b4ead4de83de72304f52f644a9051544239b3cb0995
      • Instruction Fuzzy Hash: 1011A972E11128ABCF10DF68AC01BEEF3A8EF55720F15419AFD4997244DA749E809BD0
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: h
      • API String ID: 3555123492-2439710439
      • Opcode ID: 6885c2a40d4cd5cb42e40b0334231dde07b21fa7812394733359ce591e762b2d
      • Instruction ID: 37b435117a1dae31e877509d37706e6a23a5ac9a3bbca5e786308fb93e25e582
      • Opcode Fuzzy Hash: 6885c2a40d4cd5cb42e40b0334231dde07b21fa7812394733359ce591e762b2d
      • Instruction Fuzzy Hash: 4011A275A003049FE710EF68D845B8BBBE8BF56318F84459EE4E997242CB35A504CBD1
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: _memmove_memset
      • String ID: h
      • API String ID: 3555123492-2439710439
      • Opcode ID: 7843620571283efc22b73fff1e4c6c3001dcad990fc48e809533cbefd1e7e435
      • Instruction ID: 2f1318b2644f059ebc22e79e417657c32397437b2b3460289e15fded97933605
      • Opcode Fuzzy Hash: 7843620571283efc22b73fff1e4c6c3001dcad990fc48e809533cbefd1e7e435
      • Instruction Fuzzy Hash: 3111C4B1A00244BBC754CB78D884BCDFBB8AF45318F54819DE6689B381DF346959CBE8
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • __EH_prolog3.LIBCMT ref: 00816A65
      • HttpOpenRequestA.WININET(?,?,?,00000000,?,00000000,00000000,?), ref: 00816A97
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: H_prolog3HttpOpenRequest
      • String ID: HTTP/1.0
      • API String ID: 3788906437-401229808
      • Opcode ID: b996ceda6cd2b3eed0790c7ce8fe851375768cb343a27deec99ea9a86303e340
      • Instruction ID: 0cc3b8de432b841ae95a5b870d932c4dc2b25e0728524a69bfa493926ddf5016
      • Opcode Fuzzy Hash: b996ceda6cd2b3eed0790c7ce8fe851375768cb343a27deec99ea9a86303e340
      • Instruction Fuzzy Hash: AE014B76601219ABCF119FA59C01EDE3BAAFF08310F048029F958EB261D732CD609B90
      Uniqueness

      Uniqueness Score: -1.00%

      APIs
      • EnterCriticalSection.KERNEL32(00B3D160,?,?,?,?,00818D57,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818DB9
      • TlsGetValue.KERNEL32(00B3D144,?,?,?,?,00818D57,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818DCD
      • LeaveCriticalSection.KERNEL32(00B3D160,?,?,?,?,00818D57,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818DE3
      • LeaveCriticalSection.KERNEL32(00B3D160,?,?,?,?,00818D57,?,00000004,00811B76,0080502F,00807E61,00000024,007C6B2B,00000001,00000000), ref: 00818DEE
      Memory Dump Source
      • Source File: 00000000.00000002.3282128499.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.3282110156.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.000000000098D000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009EE000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009F2000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282454359.00000000009FB000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282620758.0000000000B0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282637533.0000000000B13000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282651791.0000000000B15000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B3B000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000B41000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282675149.0000000000C0D000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282749195.0000000000C0E000.00000008.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.3282763858.0000000000C0F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_ArchivePlayer.jbxd
      Similarity
      • API ID: CriticalSection$Leave$EnterValue
      • String ID:
      • API String ID: 3969253408-0
      • Opcode ID: 06bb3daa34bd3d56f6ab0661304d0852217f85e5de61991cd2f0620390824528
      • Instruction ID: eac76a537cd1440aed477a2b68542beeb57d0ef8948f4fcb7a6c5a7c07fe2c89
      • Opcode Fuzzy Hash: 06bb3daa34bd3d56f6ab0661304d0852217f85e5de61991cd2f0620390824528
      • Instruction Fuzzy Hash: 16F08932605210DF8B115F5DFC89CAAB7BCFF55B603054056E915EB261CE60FC45EB91
      Uniqueness

      Uniqueness Score: -1.00%