Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
uddisrw.exe

Overview

General Information

Sample name:uddisrw.exe
Analysis ID:1428519
MD5:15b03679ef8ddd85d6af560205265ac9
SHA1:10edae785656a023cc73b8de403bbf969d4d1c3b
SHA256:9be8ed92ccdf8f8c499cfe6ba1d6981ec38a076d8de2a1f25a9a484a4ff1c52a
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to detect sleep reduction / modifications
Deletes shadow drive data (may be related to ransomware)
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May check if the current machine is a sandbox (GetTickCount - Sleep)
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • uddisrw.exe (PID: 5568 cmdline: "C:\Users\user\Desktop\uddisrw.exe" MD5: 15B03679EF8DDD85D6AF560205265AC9)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: uddisrw.exeReversingLabs: Detection: 75%
Source: uddisrw.exeVirustotal: Detection: 62%Perma Link
Source: uddisrw.exeJoe Sandbox ML: detected
Source: uddisrw.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00404F50 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00404F50
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00426ACC OpenClipboard,GlobalAlloc,GlobalFix,EmptyClipboard,SetClipboardData,GlobalUnWire,0_2_00426ACC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00426ACC OpenClipboard,GlobalAlloc,GlobalFix,EmptyClipboard,SetClipboardData,GlobalUnWire,0_2_00426ACC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00420564 GetClipboardData,CopyEnhMetaFileA,GetEnhMetaFileHeader,0_2_00420564
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00433E78 GetKeyboardState,0_2_00433E78

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: uddisrw.exeBinary or memory string: vssadmin delete shadows /for=c: /all
Source: uddisrw.exeBinary or memory string: vssadmin delete shadows /for=f: /all
Source: uddisrw.exeBinary or memory string: vssadmin delete shadows /for=d: /all
Source: uddisrw.exeBinary or memory string: vssadmin delete shadows /for=e: /all
Source: uddisrw.exe, 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vssadmin delete shadows /for=c: /all
Source: uddisrw.exe, 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vssadmin delete shadows /for=d: /all
Source: uddisrw.exe, 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vssadmin delete shadows /for=e: /all
Source: uddisrw.exe, 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vssadmin delete shadows /for=f: /all
Source: uddisrw.exe, 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: vssadmin delete shadows /for=c: /allvssadmin delete shadows /for=d: /allvssadmin delete shadows /for=e: /allvssadmin delete shadows /for=f: /allRDP Admin RestoreSystem Restore Points cleared!Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.comU
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00436DF4 NtdllDefWindowProc_A,GetCapture,0_2_00436DF4
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004514F4 NtdllDefWindowProc_A,0_2_004514F4
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0042842C NtdllDefWindowProc_A,0_2_0042842C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00446820 GetSubMenu,SaveDC,RestoreDC,SaveDC,RestoreDC,NtdllDefWindowProc_A,0_2_00446820
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00451C9C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_00451C9C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00451D4C IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_00451D4C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004468200_2_00446820
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0044B9EC0_2_0044B9EC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: String function: 00403E4C appears 68 times
Source: C:\Users\user\Desktop\uddisrw.exeCode function: String function: 00405F08 appears 61 times
Source: uddisrw.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: uddisrw.exeStatic PE information: Section: UPX1 ZLIB complexity 0.9916666666666667
Source: classification engineClassification label: mal60.rans.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0041D9EC GetLastError,FormatMessageA,0_2_0041D9EC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004082EA GetDiskFreeSpaceA,0_2_004082EA
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00413670 FindResourceA,0_2_00413670
Source: C:\Users\user\Desktop\uddisrw.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\uddisrw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: uddisrw.exeReversingLabs: Detection: 75%
Source: uddisrw.exeVirustotal: Detection: 62%
Source: C:\Users\user\Desktop\uddisrw.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\uddisrw.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\uddisrw.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00425A1C LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00425A1C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0043E388 push 0043E415h; ret 0_2_0043E40D
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004261A8 push 004261F7h; ret 0_2_004261EF
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00426250 push 0042627Ch; ret 0_2_00426274
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00426218 push 00426244h; ret 0_2_0042623C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004262C8 push 004262F4h; ret 0_2_004262EC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004242EC push 00424318h; ret 0_2_00424310
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00426290 push 004262BCh; ret 0_2_004262B4
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004242AC push 004242D8h; ret 0_2_004242D0
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00426300 push 0042632Ch; ret 0_2_00426324
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0043E320 push 0043E386h; ret 0_2_0043E37E
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00426338 push 00426364h; ret 0_2_0042635C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004263F0 push 0042641Ch; ret 0_2_00426414
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00426380 push 004263ACh; ret 0_2_004263A4
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004263B8 push 004263E4h; ret 0_2_004263DC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004105D2 push 0041064Ah; ret 0_2_00410642
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004105D4 push 0041064Ah; ret 0_2_00410642
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0041064C push 004106F4h; ret 0_2_004106EC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0041A686 push 0041A733h; ret 0_2_0041A72B
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0041A688 push 0041A733h; ret 0_2_0041A72B
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0041A738 push 0041A7C8h; ret 0_2_0041A7C0
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004107E0 push 0041080Ch; ret 0_2_00410804
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004067F4 push ecx; mov dword ptr [esp], eax0_2_004067F5
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0042886C push 004288AFh; ret 0_2_004288A7
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004288E4 push 00428910h; ret 0_2_00428908
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0042891C push 00428954h; ret 0_2_0042894C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00412938 push ecx; mov dword ptr [esp], edx0_2_0041293D
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004069D8 push 00406A04h; ret 0_2_004069FC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004289B0 push 004289DCh; ret 0_2_004289D4
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0041AA50 push 0041AA80h; ret 0_2_0041AA78
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0041AA54 push 0041AA80h; ret 0_2_0041AA78
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00406A10 push 00406A3Ch; ret 0_2_00406A34
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0045157C PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,0_2_0045157C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00438518 IsIconic,GetCapture,0_2_00438518
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0044E5A4 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,0_2_0044E5A4
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00438DCC IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,0_2_00438DCC
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_004396F0 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_004396F0
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00451C9C IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,0_2_00451C9C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00451D4C IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,0_2_00451D4C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00423D64 IsIconic,GetWindowPlacement,GetWindowRect,0_2_00423D64
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00425A1C LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00425A1C

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0042D70C0_2_0042D70C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_00450AEC
Source: C:\Users\user\Desktop\uddisrw.exeAPI coverage: 5.9 %
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0042D70C0_2_0042D70C
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00404F50 GetModuleHandleA,GetProcAddress,lstrcpyn,lstrcpyn,lstrcpyn,FindFirstFileA,FindClose,lstrlen,lstrcpyn,lstrlen,lstrcpyn,0_2_00404F50
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0041DF7C GetSystemInfo,0_2_0041DF7C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_00425A1C LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00425A1C
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\uddisrw.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,0_2_00405108
Source: C:\Users\user\Desktop\uddisrw.exeCode function: GetLocaleInfoA,GetACP,0_2_0040C228
Source: C:\Users\user\Desktop\uddisrw.exeCode function: GetLocaleInfoA,0_2_0040ABC0
Source: C:\Users\user\Desktop\uddisrw.exeCode function: GetLocaleInfoA,0_2_0040AC0C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: GetLocaleInfoA,0_2_004059FE
Source: C:\Users\user\Desktop\uddisrw.exeCode function: GetLocaleInfoA,0_2_00405A00
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0040965C GetLocalTime,0_2_0040965C
Source: C:\Users\user\Desktop\uddisrw.exeCode function: 0_2_0043E388 GetVersion,0_2_0043E388
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
11
Input Capture
1
System Time Discovery
Remote Services11
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts21
Obfuscated Files or Information
LSASS Memory12
Security Software Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Software Packing
Security Account Manager11
Application Window Discovery
SMB/Windows Admin Shares3
Clipboard Data
SteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
File Deletion
LSA Secrets15
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
uddisrw.exe75%ReversingLabsWin32.Trojan.RDPAdminRestore
uddisrw.exe63%VirustotalBrowse
uddisrw.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1428519
Start date and time:2024-04-19 05:20:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 16s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:uddisrw.exe
Detection:MAL
Classification:mal60.rans.evad.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 87%
  • Number of executed functions: 29
  • Number of non-executed functions: 124
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Entropy (8bit):7.607167615324382
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.37%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Win16/32 Executable Delphi generic (2074/23) 0.02%
  • Generic Win/DOS Executable (2004/3) 0.02%
File name:uddisrw.exe
File size:188'416 bytes
MD5:15b03679ef8ddd85d6af560205265ac9
SHA1:10edae785656a023cc73b8de403bbf969d4d1c3b
SHA256:9be8ed92ccdf8f8c499cfe6ba1d6981ec38a076d8de2a1f25a9a484a4ff1c52a
SHA512:b6abc10e6354ee97b86e273721ac496aedf00c7eb6939a4f05fcebf0f8cac2b6d395b051ac195ee339ed21bd1e7c386b01fd5cb2caeb37b8eb987e37c11271c4
SSDEEP:3072:5b4n6sCXsSn2FUyrrE9CWoEyNzEubORHOhYHg+JBHEADZ4G0XKjITBI:9GIG0VyNovHHGASGU
TLSH:D004D012B3EA4542F5FA5B74587B07A40A76FC52B8B6CE0E5150BD4F2C30A40AEB2777
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
Icon Hash:8d8db280a28080a0
Entrypoint:0x46e5e0
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
DLL Characteristics:
Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:c70d1b73499e57495a114d2449dd6bf7
Instruction
pushad
mov esi, 00449000h
lea edi, dword ptr [esi-00048000h]
mov dword ptr [edi+0005409Ch], E486D0DCh
push edi
or ebp, FFFFFFFFh
jmp 00007F288DA13720h
nop
nop
nop
nop
mov al, byte ptr [esi]
inc esi
mov byte ptr [edi], al
inc edi
add ebx, ebx
jne 00007F288DA13719h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F288DA136FFh
mov eax, 00000001h
add ebx, ebx
jne 00007F288DA13719h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
add ebx, ebx
jnc 00007F288DA1371Dh
jne 00007F288DA1373Ah
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F288DA13731h
dec eax
add ebx, ebx
jne 00007F288DA13719h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
jmp 00007F288DA136E6h
add ebx, ebx
jne 00007F288DA13719h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
jmp 00007F288DA13764h
xor ecx, ecx
sub eax, 03h
jc 00007F288DA13723h
shl eax, 08h
mov al, byte ptr [esi]
inc esi
xor eax, FFFFFFFFh
je 00007F288DA13787h
sar eax, 1
mov ebp, eax
jmp 00007F288DA1371Dh
add ebx, ebx
jne 00007F288DA13719h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F288DA136DEh
inc ecx
add ebx, ebx
jne 00007F288DA13719h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F288DA136D0h
add ebx, ebx
jne 00007F288DA13719h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jnc 00007F288DA13701h
jne 00007F288DA1371Bh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007F288DA136F6h
add ecx, 02h
cmp ebp, 00000000h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x76fc00x254.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0x6f0000x7fc0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x6e7980x18UPX1
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x480000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
UPX10x490000x260000x25800ae0ce72c135a8980724195d15068a33eFalse0.9916666666666667data7.921188737893131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x6f0000x90000x8400f064885f40ad42f0f51177e0d97124eeFalse0.3166133996212121data4.6643193231062625IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0x6fadc0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"0.38636363636363635
RT_CURSOR0x6fc140x134data0.4642857142857143
RT_CURSOR0x6fd4c0x134data0.4805194805194805
RT_CURSOR0x6fe840x134data0.38311688311688313
RT_CURSOR0x6ffbc0x134data0.36038961038961037
RT_CURSOR0x700f40x134data0.4090909090909091
RT_CURSOR0x7022c0x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"0.4967532467532468
RT_BITMAP0x703640x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
RT_BITMAP0x705380x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 3800.46487603305785125
RT_BITMAP0x707200x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.43103448275862066
RT_BITMAP0x708f40x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39870689655172414
RT_BITMAP0x70ac80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.4245689655172414
RT_BITMAP0x70c9c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5021551724137931
RT_BITMAP0x70e700x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5064655172413793
RT_BITMAP0x710440x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
RT_BITMAP0x712180x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.5344827586206896
RT_BITMAP0x713ec0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 3600.39655172413793105
RT_BITMAP0x715c00xe8Device independent bitmap graphic, 16 x 16 x 4, image size 1280.4870689655172414
RT_ICON0x716ac0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640RussianRussia0.1586021505376344
RT_ICON0x719980x128Device independent bitmap graphic, 16 x 32 x 4, image size 192RussianRussia0.3310810810810811
RT_DIALOG0x71ac40x52data0.7682926829268293
RT_STRING0x71b1c0x1d4AmigaOS bitmap font "n", fc_YSize 27392, 18688 elements, 2nd "S", 3rd0.43162393162393164
RT_STRING0x71cf40x1c8data0.4298245614035088
RT_STRING0x71ec00xe8data0.603448275862069
RT_STRING0x71fac0x31cdata0.43844221105527637
RT_STRING0x722cc0xd4data0.6037735849056604
RT_STRING0x723a40x110data0.5882352941176471
RT_STRING0x724b80x24cdata0.4846938775510204
RT_STRING0x727080x3f8data0.37401574803149606
RT_STRING0x72b040x384data0.39444444444444443
RT_STRING0x72e8c0x440data0.34650735294117646
RT_STRING0x732d00x160data0.48011363636363635
RT_STRING0x734340xecdata0.538135593220339
RT_STRING0x735240x20cdata0.5076335877862596
RT_STRING0x737340x3d0data0.3176229508196721
RT_STRING0x73b080x374data0.39705882352941174
RT_STRING0x73e800x2c4data0.4166666666666667
RT_RCDATA0x741480x10data1.5
RT_RCDATA0x7415c0x264data0.7450980392156863
RT_RCDATA0x743c40x2b2bDelphi compiled form 'TForm1'0.3548095195004977
RT_GROUP_CURSOR0x76ef40x14Lotus unknown worksheet or configuration, revision 0x11.25
RT_GROUP_CURSOR0x76f0c0x14Lotus unknown worksheet or configuration, revision 0x11.25
RT_GROUP_CURSOR0x76f240x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x76f3c0x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x76f540x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x76f6c0x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_CURSOR0x76f840x14Lotus unknown worksheet or configuration, revision 0x11.3
RT_GROUP_ICON0x76f9c0x22dataRussianRussia1.0
DLLImport
KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
advapi32.dllRegCloseKey
comctl32.dllImageList_Add
gdi32.dllSaveDC
ole32.dllCoTaskMemFree
oleaut32.dllVariantCopy
shell32.dllShellExecuteA
user32.dllGetDC
version.dllVerQueryValueA
Language of compilation systemCountry where language is spokenMap
RussianRussia
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:05:20:58
Start date:19/04/2024
Path:C:\Users\user\Desktop\uddisrw.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\uddisrw.exe"
Imagebase:0x400000
File size:188'416 bytes
MD5 hash:15B03679EF8DDD85D6AF560205265AC9
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:4%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:17.6%
    Total number of Nodes:716
    Total number of Limit Nodes:42
    execution_graph 29304 405c60 GetModuleHandleA 29305 405c93 29304->29305 29308 403b94 29305->29308 29309 403bc7 29308->29309 29312 403b34 29309->29312 29313 403b43 29312->29313 29314 403b70 29312->29314 29313->29314 29318 43e388 29313->29318 29332 404ecc 29313->29332 29336 4026bc 29313->29336 29319 43e3a2 GetVersion 29318->29319 29320 43e400 29318->29320 29342 43e154 GetCurrentProcessId 29319->29342 29320->29313 29324 43e3c6 29374 41339c 58 API calls 29324->29374 29326 43e3d0 29375 413348 58 API calls 29326->29375 29328 43e3e0 29376 413348 58 API calls 29328->29376 29330 43e3f0 29377 413348 58 API calls 29330->29377 29333 404ef8 29332->29333 29334 404edc GetModuleFileNameA 29332->29334 29333->29313 29614 405108 GetModuleFileNameA RegOpenKeyExA 29334->29614 29337 4026c1 29336->29337 29340 4026d4 29336->29340 29633 4020e8 29337->29633 29338 4026c7 29338->29340 29644 4027cc 11 API calls 29338->29644 29340->29313 29378 408a28 29342->29378 29346 43e19d 29347 43e1a7 GlobalAddAtomA GetCurrentThreadId 29346->29347 29348 408a28 56 API calls 29347->29348 29349 43e1e1 29348->29349 29350 403ea0 25 API calls 29349->29350 29351 43e1ee 29350->29351 29352 43e1f8 GlobalAddAtomA 29351->29352 29387 40430c 29352->29387 29356 43e225 29393 43dd58 29356->29393 29358 43e22f 29401 43db80 29358->29401 29360 43e23b 29405 44fc10 29360->29405 29362 43e24e 29420 450cf4 29362->29420 29364 43e264 29434 413488 58 API calls 29364->29434 29366 43e28e GetModuleHandleA 29367 43e2ae 29366->29367 29368 43e29e GetProcAddress 29366->29368 29435 403e4c 29367->29435 29368->29367 29371 403e4c 11 API calls 29372 43e2cb 29371->29372 29373 4132fc 58 API calls 29372->29373 29373->29324 29374->29326 29375->29328 29376->29330 29377->29320 29439 408a3c 29378->29439 29381 403ea0 29382 403ea4 29381->29382 29385 403eb4 29381->29385 29384 403f10 25 API calls 29382->29384 29382->29385 29383 403ee2 29383->29346 29384->29385 29385->29383 29466 4026dc 11 API calls 29385->29466 29388 404310 RegisterClipboardFormatA 29387->29388 29389 413cd4 29388->29389 29390 413cda 29389->29390 29391 413cef RtlInitializeCriticalSection 29390->29391 29392 413d04 29391->29392 29392->29356 29394 43dec5 29393->29394 29395 43dd6c SetErrorMode 29393->29395 29394->29358 29396 43dd90 GetModuleHandleA GetProcAddress 29395->29396 29397 43ddac 29395->29397 29396->29397 29398 43dea7 SetErrorMode 29397->29398 29399 43ddb9 LoadLibraryA 29397->29399 29398->29358 29399->29398 29400 43ddd5 10 API calls 29399->29400 29400->29398 29402 43db86 29401->29402 29467 43dcf4 29402->29467 29404 43dbf4 29404->29360 29406 44fc1a 29405->29406 29503 419460 29406->29503 29408 44fc30 29507 44ffcc LoadCursorA 29408->29507 29411 44fc69 29512 41c628 29411->29512 29413 44fce7 29414 41c628 27 API calls 29413->29414 29415 44fcf9 29414->29415 29416 41c628 27 API calls 29415->29416 29417 44fd0b 29416->29417 29516 4503ec 29417->29516 29419 44fd18 29419->29362 29421 450d03 29420->29421 29422 419460 56 API calls 29421->29422 29423 450d19 29422->29423 29424 450dc4 LoadIconA 29423->29424 29556 4230dc 29424->29556 29426 450de7 GetModuleFileNameA OemToCharA 29427 450e30 29426->29427 29428 450e56 CharLowerA 29427->29428 29429 450e79 29428->29429 29430 450e8a 29429->29430 29558 450ffc 29429->29558 29582 452dd0 11 API calls 29430->29582 29433 450eac 29433->29364 29434->29366 29436 403e52 29435->29436 29437 403e6d 29435->29437 29436->29437 29613 4026dc 11 API calls 29436->29613 29437->29371 29440 408a60 29439->29440 29442 408a8b 29440->29442 29452 408630 56 API calls 29440->29452 29443 408ae3 29442->29443 29450 408aa0 29442->29450 29456 403f3c 29443->29456 29445 408ad9 29455 404498 25 API calls 29445->29455 29446 408a37 29446->29381 29448 403e4c 11 API calls 29448->29450 29450->29445 29450->29448 29453 404498 25 API calls 29450->29453 29454 408630 56 API calls 29450->29454 29452->29442 29453->29450 29454->29450 29455->29446 29461 403f10 29456->29461 29458 403f4c 29459 403e4c 11 API calls 29458->29459 29460 403f64 29459->29460 29460->29446 29462 403f14 29461->29462 29463 403f38 29461->29463 29464 4026bc 25 API calls 29462->29464 29463->29458 29465 403f21 29464->29465 29465->29458 29466->29383 29468 43dd03 29467->29468 29469 43dcfc 29467->29469 29480 43dc58 29468->29480 29474 43dd3f SendMessageA 29469->29474 29475 43dd2e SystemParametersInfoA 29469->29475 29478 43dd01 29469->29478 29472 43dd10 29483 43dca4 6 API calls 29472->29483 29473 43dd19 29484 43dc74 SystemParametersInfoA 29473->29484 29474->29478 29475->29478 29478->29404 29479 43dd20 29479->29404 29485 423c4c 29480->29485 29483->29478 29484->29479 29486 423c5c 29485->29486 29489 423c7c 29485->29489 29492 423b64 29486->29492 29490 423cb3 29489->29490 29491 423cad GetSystemMetrics 29489->29491 29490->29472 29490->29473 29491->29490 29493 423b7a 29492->29493 29495 423bd5 29493->29495 29497 423bed 29493->29497 29498 423b64 11 API calls 29493->29498 29494 403e4c 11 API calls 29496 423c22 KiUserCallbackDispatcher 29494->29496 29499 423bdd GetProcAddress 29495->29499 29496->29490 29497->29494 29500 423bbf 29498->29500 29499->29497 29500->29495 29501 423bcd 29500->29501 29502 403e4c 11 API calls 29501->29502 29502->29495 29504 419467 29503->29504 29505 41948a 29504->29505 29534 419618 56 API calls 29504->29534 29505->29408 29508 44ffeb 29507->29508 29509 450004 LoadCursorA 29508->29509 29511 44fc53 GetKeyboardLayout 29508->29511 29535 450084 29509->29535 29511->29411 29513 41c62e 29512->29513 29538 41bb6c 29513->29538 29515 41c650 29515->29413 29518 450405 29516->29518 29517 450436 SystemParametersInfoA 29519 450461 GetStockObject 29517->29519 29520 450449 CreateFontIndirectA 29517->29520 29518->29517 29522 41c9b8 30 API calls 29519->29522 29548 41c9b8 29520->29548 29524 450475 SystemParametersInfoA 29522->29524 29525 450495 CreateFontIndirectA 29524->29525 29526 4504c9 29524->29526 29528 41c9b8 30 API calls 29525->29528 29553 41ca9c 30 API calls 29526->29553 29530 4504ae CreateFontIndirectA 29528->29530 29529 4504d9 GetStockObject 29531 41c9b8 30 API calls 29529->29531 29532 41c9b8 30 API calls 29530->29532 29533 4504c7 29531->29533 29532->29533 29533->29419 29534->29505 29536 4026bc 25 API calls 29535->29536 29537 450097 29536->29537 29537->29508 29539 41bb87 29538->29539 29546 41bb54 RtlEnterCriticalSection 29539->29546 29541 41bb91 29542 4026bc 25 API calls 29541->29542 29543 41bbee 29541->29543 29542->29543 29547 41bb60 RtlLeaveCriticalSection 29543->29547 29545 41bc3f 29545->29515 29546->29541 29547->29545 29554 41c574 GetObjectA 29548->29554 29550 41c9ca 29555 41c7ac 29 API calls 29550->29555 29552 41c9d3 29552->29524 29553->29529 29554->29550 29555->29552 29557 4230e8 29556->29557 29557->29426 29559 451025 29558->29559 29560 451187 29558->29560 29559->29560 29583 41a4f0 29559->29583 29561 403e4c 11 API calls 29560->29561 29563 45119c 29561->29563 29563->29430 29564 45103e GetClassInfoA 29565 451064 RegisterClassA 29564->29565 29570 451099 29564->29570 29566 45107d 29565->29566 29565->29570 29595 4059a8 56 API calls 29566->29595 29568 45108a 29596 40b37c 25 API calls 29568->29596 29586 406888 29570->29586 29572 4510f0 29573 403e4c 11 API calls 29572->29573 29574 4510fe SetWindowLongA 29573->29574 29575 45111e 29574->29575 29576 451149 GetSystemMenu DeleteMenu DeleteMenu 29574->29576 29590 451c80 29575->29590 29576->29560 29578 45117a DeleteMenu 29576->29578 29578->29560 29580 451c80 59 API calls 29581 45113d SetClassLongA 29580->29581 29581->29576 29582->29433 29584 41a500 VirtualAlloc 29583->29584 29585 41a52e 29583->29585 29584->29585 29585->29564 29597 402908 29586->29597 29588 40689b CreateWindowExA 29589 4068d3 29588->29589 29589->29572 29598 422e48 29590->29598 29593 451c8f LoadIconA 29594 451125 SendMessageA 29593->29594 29594->29580 29595->29568 29596->29570 29597->29588 29601 422e84 29598->29601 29602 422e52 29601->29602 29603 422e94 29601->29603 29602->29593 29602->29594 29603->29602 29610 41592c 56 API calls 29603->29610 29605 422eb3 29605->29602 29606 422ec0 29605->29606 29607 422ecd 29605->29607 29612 41d980 56 API calls 29606->29612 29611 41e4d4 58 API calls 29607->29611 29610->29605 29611->29602 29612->29602 29613->29437 29615 40518b 29614->29615 29616 40514b RegOpenKeyExA 29614->29616 29632 404f50 12 API calls 29615->29632 29616->29615 29618 405169 RegOpenKeyExA 29616->29618 29618->29615 29619 405214 lstrcpyn GetThreadLocale GetLocaleInfoA 29618->29619 29623 40524b 29619->29623 29624 40532e 29619->29624 29620 4051b0 RegQueryValueExA 29621 4051d0 RegQueryValueExA 29620->29621 29622 4051ee RegCloseKey 29620->29622 29621->29622 29622->29333 29623->29624 29626 40525b lstrlen 29623->29626 29624->29333 29627 405273 29626->29627 29627->29624 29628 4052c0 29627->29628 29629 405298 lstrcpyn LoadLibraryExA 29627->29629 29628->29624 29630 4052ca lstrcpyn LoadLibraryExA 29628->29630 29629->29628 29630->29624 29631 4052fc lstrcpyn LoadLibraryExA 29630->29631 29631->29624 29632->29620 29634 402101 29633->29634 29635 4020fc 29633->29635 29637 40212e RtlEnterCriticalSection 29634->29637 29638 402138 29634->29638 29641 40210d 29634->29641 29645 4019fc RtlInitializeCriticalSection 29635->29645 29637->29638 29638->29641 29652 401ff4 29638->29652 29641->29338 29642 402263 29642->29338 29643 402259 RtlLeaveCriticalSection 29643->29642 29644->29340 29646 401a20 RtlEnterCriticalSection 29645->29646 29647 401a2a 29645->29647 29646->29647 29648 401a48 LocalAlloc 29647->29648 29649 401a62 29648->29649 29650 401ab1 29649->29650 29651 401aa7 RtlLeaveCriticalSection 29649->29651 29650->29634 29651->29650 29655 402004 29652->29655 29653 402030 29657 402054 29653->29657 29663 401e08 29653->29663 29655->29653 29655->29657 29658 401f68 29655->29658 29657->29642 29657->29643 29667 4017bc 29658->29667 29662 401f85 29662->29655 29664 401e5d 29663->29664 29665 401e26 29663->29665 29664->29665 29690 401d58 29664->29690 29665->29657 29668 4017d8 29667->29668 29670 4017e2 29668->29670 29672 40183f 29668->29672 29675 401833 29668->29675 29678 401514 29668->29678 29687 401410 LocalAlloc 29668->29687 29686 4016a8 VirtualAlloc 29670->29686 29672->29662 29677 401edc 9 API calls 29672->29677 29674 4017ee 29674->29672 29688 4015f0 VirtualFree 29675->29688 29677->29662 29679 401523 VirtualAlloc 29678->29679 29681 401550 29679->29681 29682 401573 29679->29682 29689 4013c8 LocalAlloc 29681->29689 29682->29668 29684 40155c 29684->29682 29685 401560 VirtualFree 29684->29685 29685->29682 29686->29674 29687->29668 29688->29672 29689->29684 29692 401d6e 29690->29692 29691 401df6 29691->29665 29692->29691 29693 401d99 29692->29693 29694 401dad 29692->29694 29703 401970 29693->29703 29696 401970 3 API calls 29694->29696 29697 401dab 29696->29697 29697->29691 29713 401c34 9 API calls 29697->29713 29699 401dd1 29700 401deb 29699->29700 29714 401c88 9 API calls 29699->29714 29715 401480 LocalAlloc 29700->29715 29704 401996 29703->29704 29712 4019ef 29703->29712 29716 40173c 29704->29716 29708 4019b3 29709 4019ca 29708->29709 29721 4015f0 VirtualFree 29708->29721 29709->29712 29722 401480 LocalAlloc 29709->29722 29712->29697 29713->29699 29714->29700 29715->29691 29718 401773 29716->29718 29717 4017b3 29720 401410 LocalAlloc 29717->29720 29718->29717 29719 40178d VirtualFree 29718->29719 29719->29718 29720->29708 29721->29709 29722->29712 29723 407bc0 29724 407bcd 29723->29724 29725 407be5 CompareStringA 29724->29725 29726 449ff0 29727 449ff9 29726->29727 29730 44a530 29727->29730 29729 44a006 29731 44a622 29730->29731 29732 44a547 29730->29732 29731->29729 29732->29731 29751 449ad0 29732->29751 29735 44a5a7 29738 449ad0 2 API calls 29735->29738 29736 44a581 29737 44a13c 62 API calls 29736->29737 29739 44a593 29737->29739 29740 44a5b5 29738->29740 29741 44a13c 62 API calls 29739->29741 29742 44a5df 29740->29742 29743 44a5b9 29740->29743 29746 44a5a5 29741->29746 29754 44a13c 29742->29754 29744 44a13c 62 API calls 29743->29744 29747 44a5cb 29744->29747 29746->29729 29750 44a13c 62 API calls 29747->29750 29749 44a13c 62 API calls 29749->29746 29750->29746 29766 449a50 29751->29766 29753 449ade 29753->29735 29753->29736 29755 44a162 29754->29755 29756 44a17b 29755->29756 29757 449a50 2 API calls 29755->29757 29758 449a50 2 API calls 29756->29758 29757->29756 29759 44a1c9 29758->29759 29778 44a034 29759->29778 29761 44a1e3 29782 449eb8 59 API calls 29761->29782 29763 44a214 29764 449a50 2 API calls 29763->29764 29765 44a21f 29764->29765 29765->29749 29774 4393e0 29766->29774 29768 449a6d GetWindowLongA 29769 449aaa 29768->29769 29770 449a8a 29768->29770 29777 4499d4 GetWindowLongA 29769->29777 29776 4499d4 GetWindowLongA 29770->29776 29773 449a96 29773->29753 29775 4393ea 29774->29775 29775->29768 29776->29773 29777->29773 29779 44a071 29778->29779 29783 41c33c 29779->29783 29781 44a116 29781->29761 29782->29763 29784 41c340 GetSysColor 29783->29784 29785 41c34b 29783->29785 29784->29785 29785->29781 29786 42c104 29789 436398 29786->29789 29793 4363cb 29789->29793 29790 436444 GetClassInfoA 29791 43646b 29790->29791 29792 4364a9 29791->29792 29794 436489 RegisterClassA 29791->29794 29795 43647c UnregisterClassA 29791->29795 29817 436568 29792->29817 29793->29790 29803 4363f8 29793->29803 29820 4059a8 56 API calls 29793->29820 29794->29792 29796 4364a4 29794->29796 29795->29794 29822 40c93c 58 API calls 29796->29822 29800 43642d 29821 40b3b8 56 API calls 29800->29821 29801 4364cd GetWindowLongA 29805 436503 29801->29805 29806 4364e2 GetWindowLongA 29801->29806 29803->29790 29824 408598 11 API calls 29805->29824 29806->29805 29807 4364f4 SetWindowLongA 29806->29807 29807->29805 29809 43650b 29825 4396f0 7 API calls 29809->29825 29811 436517 29826 41c810 15 API calls 29811->29826 29813 436521 29814 403e4c 11 API calls 29813->29814 29815 42c12b 29814->29815 29827 406830 29817->29827 29819 4364bf 29819->29801 29823 40c93c 58 API calls 29819->29823 29820->29800 29821->29803 29822->29792 29823->29801 29824->29809 29825->29811 29826->29813 29831 402908 29827->29831 29829 406843 CreateWindowExA 29830 40687d 29829->29830 29830->29819 29831->29829 29832 41a4c8 29836 45157c 29832->29836 29920 436b9c 29832->29920 29833 41a4de 29837 4515e4 29836->29837 29841 4515b2 29836->29841 29927 451430 29837->29927 29840 4515ef 29842 4516ad 29840->29842 29843 4515ff 29840->29843 29841->29837 29884 4515d3 29841->29884 29935 413ac0 56 API calls 29841->29935 29844 4516b4 29842->29844 29845 451703 29842->29845 29846 451605 29843->29846 29847 451b4b 29843->29847 29849 4516ba 29844->29849 29876 451a23 29844->29876 29852 451b65 29845->29852 29853 451710 29845->29853 29858 451691 29845->29858 29850 451696 29846->29850 29851 451679 29846->29851 29846->29858 29846->29884 29946 45272c 12 API calls 29847->29946 29854 4516c1 29849->29854 29855 4516ea 29849->29855 29861 45169f 29850->29861 29862 4517db 29850->29862 29859 451bef 29851->29859 29860 45167f 29851->29860 29863 451b86 29852->29863 29864 451b6e 29852->29864 29856 451b0c IsIconic 29853->29856 29857 45171b 29853->29857 29865 451745 29854->29865 29866 4516ce 29854->29866 29854->29884 29855->29858 29868 451a01 29855->29868 29855->29884 29869 451b20 GetFocus 29856->29869 29856->29884 29857->29847 29857->29858 29858->29884 29934 4514f4 NtdllDefWindowProc_A 29858->29934 29951 4514f4 NtdllDefWindowProc_A 29859->29951 29870 451bc9 29860->29870 29871 451688 29860->29871 29861->29858 29872 45192c 29861->29872 29873 451c80 59 API calls 29862->29873 29948 452248 57 API calls 29863->29948 29947 4521ec 26 API calls 29864->29947 29879 451757 29865->29879 29880 451760 29865->29880 29866->29858 29877 4518e4 SendMessageA 29866->29877 29943 4520c4 IsWindowEnabled 29868->29943 29881 451b31 29869->29881 29869->29884 29878 43dcf4 23 API calls 29870->29878 29871->29858 29882 45180f 29871->29882 29872->29884 29895 45195a 29872->29895 29873->29884 29876->29884 29893 451a49 IsWindowEnabled 29876->29893 29877->29884 29885 451bdb 29878->29885 29886 45176d 29879->29886 29887 45175e 29879->29887 29936 451c9c 68 API calls 29880->29936 29945 4493b4 GetCurrentThreadId 29881->29945 29939 4514f4 NtdllDefWindowProc_A 29882->29939 29884->29833 29949 451488 11 API calls 29885->29949 29937 451d4c 67 API calls 29886->29937 29938 4514f4 NtdllDefWindowProc_A 29887->29938 29892 451815 29898 451854 29892->29898 29899 451832 29892->29899 29893->29884 29900 451a57 29893->29900 29942 40cf64 SetErrorMode LoadLibraryA 29895->29942 29897 451b38 29897->29884 29904 451b40 SetFocus 29897->29904 29941 451384 60 API calls 29898->29941 29940 451394 57 API calls 29899->29940 29911 451a5e IsWindowVisible 29900->29911 29901 451be6 29950 4514f4 NtdllDefWindowProc_A 29901->29950 29904->29884 29908 451969 29912 4519b8 GetLastError 29908->29912 29913 451978 GetProcAddress 29908->29913 29909 45183a PostMessageA 29909->29884 29910 45185c PostMessageA 29910->29884 29911->29884 29914 451a6c GetFocus 29911->29914 29912->29884 29913->29884 29915 4519a0 29913->29915 29916 4393e0 29914->29916 29915->29884 29917 451a81 SetFocus 29916->29917 29944 433dac 29917->29944 29919 451aa0 SetFocus 29919->29884 29953 436df4 29920->29953 29923 436bdd 29970 4206b8 90 API calls 29923->29970 29925 436be2 29925->29833 29928 451443 29927->29928 29929 45146d 29928->29929 29930 45145d 29928->29930 29931 45144e SetThreadLocale 29928->29931 29929->29840 29930->29929 29933 4503ec 38 API calls 29930->29933 29952 40c488 74 API calls 29931->29952 29933->29929 29934->29884 29935->29841 29936->29884 29937->29884 29938->29884 29939->29892 29940->29909 29941->29910 29942->29908 29943->29884 29944->29919 29945->29897 29946->29915 29947->29915 29948->29915 29949->29901 29950->29884 29951->29884 29952->29930 29954 436e07 29953->29954 29955 436e1f 29953->29955 29957 436e79 29954->29957 29963 436e09 29954->29963 29956 436e1a 29955->29956 29982 436d60 58 API calls 29955->29982 29967 436bcb 29956->29967 29971 433e78 29956->29971 29958 433e78 150 API calls 29957->29958 29960 436e82 29958->29960 29960->29967 29981 436ccc 57 API calls 29960->29981 29961 436ed3 29961->29956 29966 436ed7 29961->29966 29963->29956 29964 436f16 GetCapture 29963->29964 29964->29956 29966->29967 29968 436efa NtdllDefWindowProc_A 29966->29968 29969 43162c 88 API calls 29967->29969 29968->29967 29969->29923 29970->29925 29973 433e8e 29971->29973 29972 433ed4 29975 433f65 29972->29975 29983 44dc64 29972->29983 29973->29972 29974 433f4a 29973->29974 29973->29975 29977 433f3f 29973->29977 29989 452e64 116 API calls 29974->29989 29975->29967 29977->29972 29978 433fa6 GetKeyboardState 29977->29978 29979 433fc2 29978->29979 29979->29975 29981->29967 29982->29961 29984 44dc73 29983->29984 29990 44c68c 29984->29990 29988 44dc93 29988->29975 29989->29972 29991 44c720 29990->29991 30004 44c6b0 29990->30004 29993 44c731 29991->29993 30021 44619c 72 API calls 29991->30021 29994 44c771 29993->29994 29997 44c809 29993->29997 29995 44c7e4 29994->29995 30005 44c78c 29994->30005 29998 44c823 29995->29998 30009 44c7f8 29995->30009 29996 44fea8 56 API calls 29996->30004 29997->29998 30001 44c81d SetMenu 29997->30001 29999 44c835 29998->29999 30000 44c7e2 29998->30000 30024 44c5c4 62 API calls 29999->30024 30000->29998 30023 44d750 64 API calls 30000->30023 30001->29998 30004->29991 30004->29996 30019 4059a8 56 API calls 30004->30019 30020 40b3b8 56 API calls 30004->30020 30005->29998 30013 44c7af GetMenu 30005->30013 30006 44c83c 30008 403e4c 11 API calls 30006->30008 30010 44c851 30008->30010 30012 44c801 SetMenu 30009->30012 30010->29988 30018 44db68 10 API calls 30010->30018 30012->29998 30014 44c7d2 30013->30014 30015 44c7b9 30013->30015 30022 44619c 72 API calls 30014->30022 30017 44c7cc SetMenu 30015->30017 30017->30014 30018->29988 30019->30004 30020->30004 30021->29993 30022->30000 30023->29999 30024->30006 30025 4522dc 30026 4522ef 30025->30026 30029 44aa84 30026->30029 30027 452310 30031 44aa9a 30029->30031 30030 44abae 30030->30027 30031->30030 30038 413880 30031->30038 30033 44ab2a 30037 44ab73 30033->30037 30048 4059a8 56 API calls 30033->30048 30035 44ab61 30049 40b3b8 56 API calls 30035->30049 30037->30027 30039 413896 30038->30039 30040 4138cb 30039->30040 30062 4136f4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 30039->30062 30050 4137d8 30040->30050 30044 4138f6 30046 41390e 30044->30046 30064 41377c 56 API calls 30044->30064 30046->30033 30048->30035 30049->30037 30051 413856 30050->30051 30053 413802 30050->30053 30052 403e4c 11 API calls 30051->30052 30054 41386d 30052->30054 30053->30051 30055 4137d8 132 API calls 30053->30055 30054->30044 30063 41374c 56 API calls 30054->30063 30056 41381a 30055->30056 30065 404ec4 30056->30065 30060 413848 30073 413670 30060->30073 30062->30040 30063->30044 30064->30046 30082 404e9c VirtualQuery 30065->30082 30068 404f14 30069 404f3b 30068->30069 30070 404f1e 30068->30070 30069->30060 30070->30069 30071 404ecc 30 API calls 30070->30071 30072 404f34 30071->30072 30072->30060 30074 413681 30073->30074 30075 413690 FindResourceA 30074->30075 30076 4136a0 30075->30076 30077 4136ed 30075->30077 30084 415f90 30076->30084 30077->30051 30079 4136b1 30088 415a90 30079->30088 30081 4136cc 30081->30051 30083 404eb6 30082->30083 30083->30068 30085 415f9a 30084->30085 30093 416058 FindResourceA 30085->30093 30087 415fc8 30087->30079 30105 416114 30088->30105 30090 415aac 30109 418148 30090->30109 30092 415ac7 30092->30081 30094 416084 LoadResource 30093->30094 30095 41607d 30093->30095 30097 416097 30094->30097 30098 41609e SizeofResource LockResource 30094->30098 30103 415fe8 56 API calls 30095->30103 30104 415fe8 56 API calls 30097->30104 30101 4160bc 30098->30101 30099 416083 30099->30094 30101->30087 30102 41609d 30102->30098 30103->30099 30104->30102 30106 41611e 30105->30106 30107 4026bc 25 API calls 30106->30107 30108 416137 30107->30108 30108->30090 30138 418530 30109->30138 30112 4181c0 30201 418554 30112->30201 30113 4181f5 30115 418554 56 API calls 30113->30115 30116 418206 30115->30116 30118 41821c 30116->30118 30119 41820f 30116->30119 30122 418554 56 API calls 30118->30122 30121 418554 56 API calls 30119->30121 30127 4181e8 30121->30127 30124 418237 30122->30124 30123 4181d3 30126 418554 56 API calls 30123->30126 30211 4180e8 56 API calls 30124->30211 30126->30127 30143 412f70 30127->30143 30131 418290 30162 44b134 30131->30162 30189 432a90 30131->30189 30191 41d770 30131->30191 30132 418320 30134 418360 30132->30134 30212 413ac0 56 API calls 30132->30212 30134->30092 30213 416cf4 30138->30213 30141 418181 30141->30112 30141->30113 30144 412f7d 30143->30144 30219 412e5c RtlEnterCriticalSection 30144->30219 30146 413057 30220 412f14 RtlLeaveCriticalSection 30146->30220 30150 41306e 30154 405c14 30150->30154 30152 412fb4 30153 413016 30152->30153 30221 413ac0 56 API calls 30152->30221 30222 412998 56 API calls 30152->30222 30153->30146 30223 413ac0 56 API calls 30153->30223 30155 405c23 30154->30155 30156 405c49 TlsGetValue 30154->30156 30155->30131 30157 405c53 30156->30157 30158 405c2e 30156->30158 30157->30131 30224 405bd0 LocalAlloc TlsSetValue 30158->30224 30160 405c33 TlsGetValue 30161 405c42 30160->30161 30161->30131 30163 44b147 30162->30163 30225 4353d4 30163->30225 30165 44b2fe 30166 44b315 30165->30166 30233 432620 KiUserCallbackDispatcher 30165->30233 30170 44b32c 30166->30170 30234 432664 KiUserCallbackDispatcher 30166->30234 30167 44b201 30230 44b4bc 74 API calls 30167->30230 30168 44b192 30168->30165 30168->30167 30176 44b1f2 MulDiv 30168->30176 30179 44b363 30170->30179 30235 44a794 64 API calls 30170->30235 30174 44b21a 30174->30165 30231 44a794 64 API calls 30174->30231 30175 44b351 30236 438ea4 56 API calls 30175->30236 30229 41c9e4 29 API calls 30176->30229 30179->30132 30181 44b23b 30232 438ea4 56 API calls 30181->30232 30183 44b24e 30184 44b27d 30183->30184 30185 44b25a MulDiv 30183->30185 30186 44b2ac 30184->30186 30187 44b289 MulDiv 30184->30187 30185->30184 30186->30165 30188 44b2b8 MulDiv MulDiv 30186->30188 30187->30186 30188->30165 30190 432aaa KiUserCallbackDispatcher 30189->30190 30190->30132 30192 41d7d6 30191->30192 30198 41d789 30191->30198 30192->30132 30193 41d7ad 30194 41d7be 30193->30194 30245 41d80c 18 API calls 30193->30245 30196 41d7ca 30194->30196 30246 41d838 6 API calls 30194->30246 30196->30192 30247 41d868 10 API calls 30196->30247 30198->30193 30244 40b438 56 API calls 30198->30244 30202 416cf4 56 API calls 30201->30202 30203 418569 30202->30203 30204 403f3c 25 API calls 30203->30204 30205 418577 30204->30205 30248 404364 30205->30248 30208 416cf4 56 API calls 30209 4181cb 30208->30209 30210 413220 58 API calls 30209->30210 30210->30123 30211->30127 30212->30132 30216 416cff 30213->30216 30214 416d39 30214->30141 30217 4167b4 56 API calls 30214->30217 30216->30214 30218 416d40 56 API calls 30216->30218 30217->30141 30218->30216 30219->30152 30220->30150 30221->30152 30222->30152 30223->30153 30224->30160 30226 4353e6 30225->30226 30237 432040 30226->30237 30228 4353fe 30228->30168 30229->30167 30230->30174 30231->30181 30232->30183 30233->30166 30234->30170 30235->30175 30236->30179 30238 43205c 30237->30238 30241 4198c0 30238->30241 30240 432072 30240->30228 30242 4174e4 93 API calls 30241->30242 30243 4198c6 30242->30243 30243->30240 30244->30193 30245->30194 30246->30196 30247->30192 30249 404318 30248->30249 30250 404353 30249->30250 30251 403f10 25 API calls 30249->30251 30250->30208 30252 40432f 30251->30252 30252->30250 30254 4026dc 11 API calls 30252->30254 30254->30250

    Control-flow Graph

    APIs
    • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00405124
    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405142
    • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405160
    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 0040517E
    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,0040520D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 004051C7
    • RegQueryValueExA.ADVAPI32(?,00405374,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,0040520D,?,80000001), ref: 004051E5
    • RegCloseKey.ADVAPI32(?,00405214,00000000,00000000,00000005,00000000,0040520D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405207
    • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 00405224
    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 00405231
    • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 00405237
    • lstrlen.KERNEL32(00000000), ref: 00405262
    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 004052A9
    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 004052B9
    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 004052E1
    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 004052F1
    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00405317
    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 00405327
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
    • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
    • API String ID: 1759228003-3917250287
    • Opcode ID: a96ba6f3d57858a31642be91c2c1660e2566413ffa2324dc1f5ed153a5c36293
    • Instruction ID: f39e2658e630fc983f2e356cc4e51d520bdebfd9d9cba258cf95575af5e6b52e
    • Opcode Fuzzy Hash: a96ba6f3d57858a31642be91c2c1660e2566413ffa2324dc1f5ed153a5c36293
    • Instruction Fuzzy Hash: 28513675A4065C7AEB21D6A49C46FEF77ACDB04744F4001FABA04F61C2D6BC9A448FA4
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 25 45157c-4515b0 26 4515e4-4515f9 call 451430 25->26 27 4515b2-4515b3 25->27 33 4516ad-4516b2 26->33 34 4515ff 26->34 28 4515b5-4515d1 call 413ac0 27->28 51 4515e0-4515e2 28->51 52 4515d3-4515db 28->52 35 4516b4 33->35 36 451703-451708 33->36 37 451605-451608 34->37 38 451b4b-451b60 call 45272c 34->38 45 451a23-451a2b 35->45 46 4516ba-4516bf 35->46 42 451729-45172e 36->42 43 45170a 36->43 39 451674-451677 37->39 40 45160a 37->40 59 451c2c-451c34 38->59 49 451696-451699 39->49 50 451679 39->50 47 451910-451917 40->47 48 451610-451613 40->48 56 451734-45173a 42->56 57 451b9e-451ba5 42->57 53 451b65-451b6c 43->53 54 451710-451715 43->54 58 451a31-451a3c call 4393e0 45->58 45->59 60 4516c1 46->60 61 4516ea-4516ef 46->61 47->59 69 45191d-451927 47->69 74 451c25-451c26 call 4514f4 48->74 75 451619 48->75 78 45169f-4516a2 49->78 79 4517db-4517e9 call 451c80 49->79 76 451bef-451c00 call 450a34 call 4514f4 50->76 77 45167f-451682 50->77 51->26 51->28 64 451c4b-451c51 52->64 80 451b86-451b99 call 452248 53->80 81 451b6e-451b81 call 4521ec 53->81 70 451b0c-451b1a IsIconic 54->70 71 45171b-45171e 54->71 72 4519e0-4519fc call 453658 56->72 73 451740 56->73 65 451ba7-451bb6 57->65 66 451bb8-451bc7 57->66 58->59 103 451a42-451a51 call 4393e0 IsWindowEnabled 58->103 59->64 62 4516c7-4516cc 60->62 63 451abc-451ac7 60->63 67 4516f5-4516f8 61->67 68 451ae4-451aef 61->68 84 451745-451755 62->84 85 4516ce-4516d4 62->85 63->59 90 451acd-451adf 63->90 65->59 66->59 87 451a01-451a0e call 4520c4 67->87 88 4516fe 67->88 68->59 92 451af5-451b07 68->92 69->59 70->59 93 451b20-451b2b GetFocus 70->93 71->38 89 451724 71->89 72->59 73->74 118 451c2b 74->118 75->39 76->59 95 451bc9-451bed call 43dcf4 call 451488 call 4514f4 77->95 96 451688-45168b 77->96 97 45192c-451938 78->97 98 4516a8 78->98 79->59 80->59 81->59 109 451757-45175c 84->109 110 451760-451768 call 451c9c 84->110 104 4518e4-45190b SendMessageA 85->104 105 4516da-4516df 85->105 87->59 144 451a14-451a1e 87->144 88->74 89->74 90->59 92->59 93->59 112 451b31-451b3a call 4493b4 93->112 95->59 114 451691 96->114 115 45180f-451830 call 4514f4 96->115 97->59 108 45193e-451948 97->108 98->74 103->59 147 451a57-451a66 call 4393e0 IsWindowVisible 103->147 104->59 120 4516e5 105->120 121 451c02-451c0e call 42908c call 42916c 105->121 108->59 123 45194e-451958 108->123 125 45176d-451775 call 451d4c 109->125 126 45175e-451781 call 4514f4 109->126 110->59 112->59 153 451b40-451b46 SetFocus 112->153 114->74 145 451854-451871 call 451384 PostMessageA 115->145 146 451832-45184f call 451394 PostMessageA 115->146 118->59 120->74 121->59 170 451c10-451c1a call 42908c call 4291c8 121->170 136 4519d3-4519db 123->136 137 45195a-451976 call 40cf64 123->137 125->59 126->59 136->59 165 4519b8-4519ce GetLastError 137->165 166 451978-45199a GetProcAddress 137->166 144->59 145->59 146->59 147->59 168 451a6c-451ab7 GetFocus call 4393e0 SetFocus call 433dac SetFocus 147->168 153->59 165->59 166->59 169 4519a0-4519b3 166->169 168->59 169->59 170->59
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID:
    • String ID: <{E$RegisterAutomation$vcltest3.dll
    • API String ID: 0-1603752472
    • Opcode ID: 347ced46e12611a09298e37c1193e6f9c6ead222187cce7752a62d8540588f59
    • Instruction ID: b88bb157845385af098c6dfddcc3ac8cf4832e5f2524dcb4476ef96b31299d50
    • Opcode Fuzzy Hash: 347ced46e12611a09298e37c1193e6f9c6ead222187cce7752a62d8540588f59
    • Instruction Fuzzy Hash: 35E16E34A00204EFD711EB69C585B9EB7B1AF08312F1885A6EC559B363C739EE49DB0D
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 493 436df4-436e05 494 436e07 493->494 495 436e1f-436e27 493->495 498 436e79-436e86 call 433e78 494->498 499 436e09-436e0c 494->499 496 436f02-436f0b call 433368 495->496 497 436e2d-436e35 495->497 513 436f50-436f56 496->513 514 436f0d 496->514 501 436e3b 497->501 502 436eca-436ed5 call 436d60 497->502 498->513 519 436e8c-436eb8 call 4067f4 call 432748 call 436ccc 498->519 504 436e40-436e4b call 449628 499->504 505 436e0e-436e0f 499->505 507 436f47-436f4b call 433e78 501->507 502->507 524 436ed7-436edb 502->524 504->507 522 436e51-436e5f 504->522 511 436e11-436e14 505->511 512 436e6a-436e6e 505->512 507->513 520 436e1a 511->520 521 436f0f-436f1f call 4393e0 GetCapture 511->521 512->513 517 436e74 512->517 514->507 517->507 519->513 543 436ebe-436ec5 519->543 520->507 521->507 531 436f21-436f28 521->531 522->513 534 436e65 522->534 524->513 528 436edd-436ee6 call 4396e4 524->528 528->513 539 436ee8-436f00 call 4393e0 NtdllDefWindowProc_A 528->539 531->507 535 436f2a-436f32 531->535 534->507 535->507 538 436f34-436f42 call 433dac 535->538 538->507 539->513 543->513
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Capture
    • String ID:
    • API String ID: 1145282425-3916222277
    • Opcode ID: 07c41cdc35437ce162e86322c0d51968cb14c4815cb58b7b6ffbb32da317c318
    • Instruction ID: 554812eb1dae3392a82452ce206b10fbd2ba2e02b10e8cfea73f80493650c722
    • Opcode Fuzzy Hash: 07c41cdc35437ce162e86322c0d51968cb14c4815cb58b7b6ffbb32da317c318
    • Instruction Fuzzy Hash: 2531927130020267C6209A3DE98AB1B62969B4C318F12E97FF95AC7796DA3CDC09874D
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 560 43e388-43e3a0 561 43e3a2-43e3b7 GetVersion call 43e154 560->561 562 43e400-43e40d 560->562 564 43e3bc-43e3fb call 4132fc call 41339c call 413348 * 3 561->564 564->562
    APIs
    • GetVersion.KERNEL32(00000000,0043E40E), ref: 0043E3A2
      • Part of subcall function 0043E154: GetCurrentProcessId.KERNEL32(?,00000000,0043E2CC), ref: 0043E175
      • Part of subcall function 0043E154: GlobalAddAtomA.KERNEL32(00000000), ref: 0043E1A8
      • Part of subcall function 0043E154: GetCurrentThreadId.KERNEL32 ref: 0043E1C3
      • Part of subcall function 0043E154: GlobalAddAtomA.KERNEL32(00000000), ref: 0043E1F9
      • Part of subcall function 0043E154: RegisterClipboardFormatA.USER32(00000000), ref: 0043E20F
      • Part of subcall function 0043E154: GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,0043E2CC), ref: 0043E293
      • Part of subcall function 0043E154: GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 0043E2A4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AtomCurrentGlobal$AddressClipboardFormatHandleModuleProcProcessRegisterThreadVersion
    • String ID: dC$pB
    • API String ID: 3775504709-249962129
    • Opcode ID: 19d89e689092043ce1489251b45bcd79277814a2984b4c0b6d5fe934b3eff3aa
    • Instruction ID: 4e3c793b71e5f5dd87916ac53aa81f21ee996455f42a11da73aec5289c8e53e5
    • Opcode Fuzzy Hash: 19d89e689092043ce1489251b45bcd79277814a2984b4c0b6d5fe934b3eff3aa
    • Instruction Fuzzy Hash: E1F087752062409BDA21AF67ED4292877E5E78E7093905437E800876B2CA3DAC82CA1E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetKeyboardState.USER32(?), ref: 00433FAD
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: KeyboardState
    • String ID:
    • API String ID: 1724228437-0
    • Opcode ID: 5b50e5dddf23abd1af27664baab8fe48e233c7832484fa6403225e376df905c6
    • Instruction ID: dd2d9c4184fe1fe8c051bfea4c191e6a93290c365499a4c21227d04fdb2ddd14
    • Opcode Fuzzy Hash: 5b50e5dddf23abd1af27664baab8fe48e233c7832484fa6403225e376df905c6
    • Instruction Fuzzy Hash: 3B41D335A002458BCB24CF28C5897AAB7B0FF0D706F9451ABE406D7391C778DE81CB9A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindResourceA.KERNEL32(?,00000000,0000000A), ref: 00413692
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: FindResource
    • String ID:
    • API String ID: 1635176832-0
    • Opcode ID: af64b7274bdfc717c57d1347c2e11009f3a843c81ef647ff9d3472dfa5c6db4a
    • Instruction ID: 58c8ebf466a5e2a4c2c8ed80f9096650ecd981e0c89ab2eab555b394c5652303
    • Opcode Fuzzy Hash: af64b7274bdfc717c57d1347c2e11009f3a843c81ef647ff9d3472dfa5c6db4a
    • Instruction Fuzzy Hash: 6A014231304700BFE310DF6AEC82DABB7EDEB89358751407AF90093381DA3A9D018268
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 0045151E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: NtdllProc_Window
    • String ID:
    • API String ID: 4255912815-0
    • Opcode ID: b32ebc1d6237c860dae1a55d69654799d2a833a100e58c7b0d16655b954f0a80
    • Instruction ID: bd16abde2db3fb653f2c583f866146c42fe2942542061f9507577dc58bb8ac38
    • Opcode Fuzzy Hash: b32ebc1d6237c860dae1a55d69654799d2a833a100e58c7b0d16655b954f0a80
    • Instruction Fuzzy Hash: 4EF0C579205608AFCB40DF9DC588D4AFBE8BB4C360B058195BD88CB322C234FD808F90
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • GetCurrentProcessId.KERNEL32(?,00000000,0043E2CC), ref: 0043E175
    • GlobalAddAtomA.KERNEL32(00000000), ref: 0043E1A8
    • GetCurrentThreadId.KERNEL32 ref: 0043E1C3
    • GlobalAddAtomA.KERNEL32(00000000), ref: 0043E1F9
    • RegisterClipboardFormatA.USER32(00000000), ref: 0043E20F
      • Part of subcall function 00413CD4: RtlInitializeCriticalSection.NTDLL(00411810), ref: 00413CF3
      • Part of subcall function 0043DD58: SetErrorMode.KERNEL32(00008000), ref: 0043DD71
      • Part of subcall function 0043DD58: GetModuleHandleA.KERNEL32(USER32,00000000,0043DEBE,?,00008000), ref: 0043DD95
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 0043DDA2
      • Part of subcall function 0043DD58: LoadLibraryA.KERNEL32(imm32.dll,00000000,0043DEBE,?,00008000), ref: 0043DDBE
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 0043DDE0
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 0043DDF5
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 0043DE0A
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 0043DE1F
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 0043DE34
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 0043DE49
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 0043DE5E
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 0043DE73
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 0043DE88
      • Part of subcall function 0043DD58: GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 0043DE9D
      • Part of subcall function 0043DD58: SetErrorMode.KERNEL32(?,0043DEC5,00008000), ref: 0043DEB8
      • Part of subcall function 0044FC10: GetKeyboardLayout.USER32(00000000), ref: 0044FC55
      • Part of subcall function 00450CF4: LoadIconA.USER32(00400000,MAINICON), ref: 00450DD9
      • Part of subcall function 00450CF4: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,0043E264,00000000,00000000,?,?,00000000,0043E2CC), ref: 00450E0B
      • Part of subcall function 00450CF4: OemToCharA.USER32(?,?), ref: 00450E1E
      • Part of subcall function 00450CF4: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,0043E264,00000000,00000000,?,?,00000000,0043E2CC), ref: 00450E5E
    • GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,0043E2CC), ref: 0043E293
    • GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 0043E2A4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AddressProc$Module$AtomCharCurrentErrorGlobalHandleLoadMode$ClipboardCriticalFileFormatIconInitializeKeyboardLayoutLibraryLowerNameProcessRegisterSectionThread
    • String ID: AnimateWindow$ControlOfs%.8X%.8X$Delphi%.8X$USER32${E
    • API String ID: 4060921093-4086590436
    • Opcode ID: 6c3ece6ce0b5074ceffad0ee257d3876fa7edf604c8ffbf1a10c5e346894de3b
    • Instruction ID: c7dd393140008b957a32242479e46f18357502d5fb7d4021e294ecd5359a9ed4
    • Opcode Fuzzy Hash: 6c3ece6ce0b5074ceffad0ee257d3876fa7edf604c8ffbf1a10c5e346894de3b
    • Instruction Fuzzy Hash: 684153706043059BC700EFB6EC41A9E77A9EB49309B50557BF504E7392DB3CA9048F9C
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
      • Part of subcall function 0041A4F0: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 0041A50E
    • GetClassInfoA.USER32(00400000,00450CE4,?), ref: 0045105B
    • RegisterClassA.USER32(00455D90), ref: 00451073
      • Part of subcall function 004059A8: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004059D9
    • SetWindowLongA.USER32(0000000E,000000FC,10940000), ref: 0045110F
    • SendMessageA.USER32(0000000E,00000080,00000001,00000000), ref: 00451131
    • SetClassLongA.USER32(0000000E,000000F2,00000000), ref: 00451144
    • GetSystemMenu.USER32(0000000E,00000000,0000000E,000000FC,10940000,004490E4), ref: 0045114F
    • DeleteMenu.USER32(00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,004490E4), ref: 0045115E
    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,004490E4), ref: 0045116B
    • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,004490E4), ref: 00451182
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Menu$ClassDelete$Long$AllocInfoLoadMessageRegisterSendStringSystemVirtualWindow
    • String ID: @{E$HpE
    • API String ID: 2103932818-1354868932
    • Opcode ID: 4abbe94da188854a3975917ea57042f9d34f2a31a5084c9916c742c163426a69
    • Instruction ID: 6a0a22d6e1fa7804b16bdb6940df3865478dc4194053cda8d262482591844620
    • Opcode Fuzzy Hash: 4abbe94da188854a3975917ea57042f9d34f2a31a5084c9916c742c163426a69
    • Instruction Fuzzy Hash: CC418D716007406FE710EB69DC92F6A37A8AB08705F54457AFE00EB2E3D679AC448B2C
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 250 436398-4363cf 252 4363d1-4363d8 250->252 253 436444-436469 GetClassInfoA 250->253 252->253 254 4363da-4363df 252->254 255 43646b-436476 253->255 256 436478-43647a 253->256 258 4363e1-4363e5 254->258 259 436404-43643f call 4059a8 call 40b3b8 call 403888 254->259 255->256 257 4364a9-4364b9 call 436568 255->257 260 436489-4364a2 RegisterClassA 256->260 261 43647c-436484 UnregisterClassA 256->261 267 4364bf-4364c6 257->267 258->259 262 4363e7-4363f6 call 403288 258->262 259->253 260->257 263 4364a4 call 40c93c 260->263 261->260 262->259 273 4363f8-436402 call 4393e0 262->273 263->257 270 4364c8 call 40c93c 267->270 271 4364cd-4364e0 GetWindowLongA 267->271 270->271 275 436503-436533 call 408598 call 4396f0 call 41c810 call 433dac 271->275 276 4364e2-4364f2 GetWindowLongA 271->276 273->253 290 436540-436558 call 403e4c 275->290 291 436535-43653b call 4032f8 275->291 276->275 279 4364f4-4364fe SetWindowLongA 276->279 279->275 291->290
    APIs
    • GetClassInfoA.USER32(?,?,?), ref: 0043645C
    • UnregisterClassA.USER32(?,?), ref: 00436484
    • RegisterClassA.USER32(?), ref: 0043649A
    • GetWindowLongA.USER32(00000000,000000F0), ref: 004364D6
    • GetWindowLongA.USER32(00000000,000000F4), ref: 004364EB
    • SetWindowLongA.USER32(00000000,000000F4,00000000), ref: 004364FE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ClassLongWindow$InfoRegisterUnregister
    • String ID: @
    • API String ID: 717780171-2766056989
    • Opcode ID: 9d41f88d78ae07b292a5db163ba29e7f9bde713654d9c0a1859c5e72553215cc
    • Instruction ID: 4296d43c3148fcb51ebbad4fe7a53b0e5fccd305e52e79590bc99f5e139ffeb6
    • Opcode Fuzzy Hash: 9d41f88d78ae07b292a5db163ba29e7f9bde713654d9c0a1859c5e72553215cc
    • Instruction Fuzzy Hash: 46519470A00755ABDB20DF69CC41B9A77E8AB08308F51867EF845E7392DB38AD45CB58
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • LoadIconA.USER32(00400000,MAINICON), ref: 00450DD9
    • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,0043E264,00000000,00000000,?,?,00000000,0043E2CC), ref: 00450E0B
    • OemToCharA.USER32(?,?), ref: 00450E1E
    • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,0043E264,00000000,00000000,?,?,00000000,0043E2CC), ref: 00450E5E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Char$FileIconLoadLowerModuleName
    • String ID: ,pE$4pE$MAINICON
    • API String ID: 3935243913-1334955646
    • Opcode ID: 8c1f4943065310d99cae21c39aaea1722175e661cd09995e554d317816210388
    • Instruction ID: 193c8e7524abc82f34fd93deeb3206cf4df592068f72f6e6ac474e9293ca7284
    • Opcode Fuzzy Hash: 8c1f4943065310d99cae21c39aaea1722175e661cd09995e554d317816210388
    • Instruction Fuzzy Hash: 57516E706042449FDB10DF29C8C5B853BE4AB15309F4484BAEC48DF397DBBAD988CB69
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • SystemParametersInfoA.USER32(0000001F,0000003C,?,00000000), ref: 00450440
    • CreateFontIndirectA.GDI32(?), ref: 0045044D
    • GetStockObject.GDI32(0000000D), ref: 00450463
      • Part of subcall function 0041CA9C: MulDiv.KERNEL32(00000000,?,00000048), ref: 0041CAA9
    • SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 0045048C
    • CreateFontIndirectA.GDI32(?), ref: 0045049C
    • CreateFontIndirectA.GDI32(?), ref: 004504B5
    • GetStockObject.GDI32(0000000D), ref: 004504DB
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CreateFontIndirect$InfoObjectParametersStockSystem
    • String ID:
    • API String ID: 2891467149-0
    • Opcode ID: ad41d8092ca48c4981d37cf6ca9ba28f30a9f4910c0603dbb32acb65ca7139c3
    • Instruction ID: a628e6160f79baa54a51fc7ba6408d02271e89fe82e949b845d254c86157f910
    • Opcode Fuzzy Hash: ad41d8092ca48c4981d37cf6ca9ba28f30a9f4910c0603dbb32acb65ca7139c3
    • Instruction Fuzzy Hash: BC319430644344AFD750EB69DC82BDA33E4AB05309F448077B948EB3D7DA78A849CB2D
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 365 4019fc-401a1e RtlInitializeCriticalSection 366 401a20-401a25 RtlEnterCriticalSection 365->366 367 401a2a-401a60 call 4013c0 * 3 LocalAlloc 365->367 366->367 374 401a91-401aa5 367->374 375 401a62 367->375 379 401ab1 374->379 380 401aa7-401aac RtlLeaveCriticalSection 374->380 376 401a67-401a79 375->376 376->376 378 401a7b-401a8a 376->378 378->374 380->379
    APIs
    • RtlInitializeCriticalSection.NTDLL(004575C8), ref: 00401A12
    • RtlEnterCriticalSection.NTDLL(004575C8), ref: 00401A25
    • LocalAlloc.KERNEL32(00000000,00000FF8,00000000,00401AB2), ref: 00401A4F
    • RtlLeaveCriticalSection.NTDLL(004575C8), ref: 00401AAC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
    • String ID: $fT
    • API String ID: 730355536-2678353634
    • Opcode ID: 688a74191adbd4945856128e2e41dd901a7c4e7e6ba2938a945e01d5e641732d
    • Instruction ID: b230f1932cda428b8260cbae10276f21d1a3b3272c4d895e69353b5cd3ab0692
    • Opcode Fuzzy Hash: 688a74191adbd4945856128e2e41dd901a7c4e7e6ba2938a945e01d5e641732d
    • Instruction Fuzzy Hash: 4B01D2B034C7806EE319AB6DB806B193AC5E74971AF40847BF901A6AF3D77C98448B1D
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 381 44b134-44b18d call 435c78 call 4353d4 385 44b192-44b19c 381->385 386 44b1a2-44b1ac 385->386 387 44b2fe-44b309 385->387 386->387 388 44b1b2-44b1bc 386->388 389 44b315-44b320 387->389 390 44b30b-44b310 call 432620 387->390 391 44b201-44b227 call 44b4bc 388->391 392 44b1be-44b1d0 388->392 394 44b322-44b327 call 432664 389->394 395 44b32c-44b33d 389->395 390->389 391->387 408 44b22d-44b258 call 44a794 call 438ea4 391->408 392->391 398 44b1d2-44b1fc call 41c9dc MulDiv call 41c9e4 392->398 394->395 396 44b363-44b389 call 433dac call 435c80 395->396 397 44b33f-44b35e call 44a794 call 438ea4 395->397 397->396 398->391 417 44b27d-44b287 408->417 418 44b25a-44b277 MulDiv 408->418 419 44b2ac-44b2b6 417->419 420 44b289-44b2a6 MulDiv 417->420 418->417 419->387 421 44b2b8-44b2f8 MulDiv * 2 419->421 420->419 421->387
    APIs
    • MulDiv.KERNEL32(00000000,?,00000000), ref: 0044B1F3
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0044B26F
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0044B29E
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0044B2CD
    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0044B2F0
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3ff56948b75102b2e80e7556844d65bd8fdcdb1231d0562fde3b5e5c82b6e0c7
    • Instruction ID: 33cc6e31086da4e56aed25d9d1255d91e9a888dda6e866561224b6b03eea3de1
    • Opcode Fuzzy Hash: 3ff56948b75102b2e80e7556844d65bd8fdcdb1231d0562fde3b5e5c82b6e0c7
    • Instruction Fuzzy Hash: 1F71C434A04204EFDB44DBA9C589AAEB7F5FF48304F2541F6E808DB362D779AE419B44
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 422 44c68c-44c6ae 423 44c720-44c728 422->423 424 44c6b0-44c6bd call 44febc 422->424 426 44c731-44c735 423->426 427 44c72a-44c72c call 44619c 423->427 424->423 432 44c6bf-44c6c3 424->432 430 44c737-44c739 426->430 431 44c741 426->431 427->426 433 44c743-44c74b 430->433 434 44c73b-44c73f 430->434 431->433 435 44c6c5-44c6d7 call 44fea8 432->435 436 44c756-44c758 433->436 437 44c74d-44c751 call 419530 433->437 434->431 434->433 448 44c6d9-44c6e7 call 44fea8 435->448 449 44c71a-44c71e 435->449 440 44c75e-44c762 436->440 441 44c809-44c812 call 4396e4 436->441 437->436 444 44c764-44c76b 440->444 445 44c771-44c77b 440->445 454 44c814-44c81e call 4393e0 SetMenu 441->454 455 44c823-44c82a 441->455 444->441 444->445 446 44c786-44c78a 445->446 447 44c77d-44c784 445->447 451 44c78c-44c795 call 4396e4 446->451 452 44c7e4-44c7eb 446->452 447->446 447->451 448->449 467 44c6e9-44c715 call 4059a8 call 40b3b8 call 403888 448->467 449->423 449->435 451->455 468 44c79b-44c7b7 call 4393e0 GetMenu 451->468 452->455 459 44c7ed-44c7f6 call 4396e4 452->459 454->455 456 44c835-44c851 call 44c5c4 call 403e4c 455->456 457 44c82c-44c830 call 44d750 455->457 457->456 459->455 473 44c7f8-44c807 call 4393e0 SetMenu 459->473 467->449 484 44c7d2-44c7e2 call 4393e0 call 44619c 468->484 485 44c7b9-44c7cd call 4393e0 SetMenu 468->485 473->455 484->455 485->484
    APIs
    • GetMenu.USER32(00000000), ref: 0044C7B0
    • SetMenu.USER32(00000000,00000000), ref: 0044C7CD
    • SetMenu.USER32(00000000,00000000), ref: 0044C802
    • SetMenu.USER32(00000000,00000000), ref: 0044C81E
      • Part of subcall function 004059A8: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004059D9
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Menu$LoadString
    • String ID:
    • API String ID: 3688185913-0
    • Opcode ID: a2e5e0b89e530da24886f40fe45cdb062893a23d31f7ff79b50e9f1078e0baa3
    • Instruction ID: 5ca13b8030b52ac30ea9c87479a86cb73ed16ed427c8110f87ed8e9fbe7240d2
    • Opcode Fuzzy Hash: a2e5e0b89e530da24886f40fe45cdb062893a23d31f7ff79b50e9f1078e0baa3
    • Instruction Fuzzy Hash: BE51CF31A062025BEB90AF7A88C575A7794AF08308F1D557BAC04DB397CB7CDC458B9D
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 545 423c4c-423c5a 546 423c7c-423c87 545->546 547 423c5c-423c7a call 423b64 KiUserCallbackDispatcher 545->547 549 423c9b-423c9d 546->549 550 423c89 546->550 555 423cb3-423cb5 547->555 554 423ca8-423cab 549->554 552 423c8b-423c8c 550->552 553 423c9f-423ca1 550->553 557 423ca3 552->557 558 423c8e-423c92 552->558 553->554 554->555 556 423cad-423cae GetSystemMetrics 554->556 556->555 557->554 558->554 559 423c94-423c99 558->559 559->554
    APIs
    • GetSystemMetrics.USER32(?), ref: 00423CAE
      • Part of subcall function 00423B64: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 00423BE4
    • KiUserCallbackDispatcher.NTDLL(?), ref: 00423C74
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AddressCallbackDispatcherMetricsProcSystemUser
    • String ID: GetSystemMetrics
    • API String ID: 54681038-96882338
    • Opcode ID: 051c793e55aa9cb20c5bdfec64bbba10a9f07d0f0052bcdc44b092a2488ce68c
    • Instruction ID: c93a458202d15a70f1552a38c32cf454053aac7a36a6548499e2b65510db751f
    • Opcode Fuzzy Hash: 051c793e55aa9cb20c5bdfec64bbba10a9f07d0f0052bcdc44b092a2488ce68c
    • Instruction Fuzzy Hash: F3F0F6327187306BC7101F3ABC882223966D786337FE08B33E522662D6C23CCA80925C
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 574 401514-401521 575 401523-401528 574->575 576 40152a-401530 574->576 577 401536-40154e VirtualAlloc 575->577 576->577 578 401550-40155e call 4013c8 577->578 579 401573-401576 577->579 578->579 582 401560-401571 VirtualFree 578->582 582->579
    APIs
    • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,0040181D), ref: 00401543
    • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,0040181D), ref: 0040156A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Virtual$AllocFree
    • String ID: $fT
    • API String ID: 2087232378-2678353634
    • Opcode ID: 55ad27b4d9be78aaded14158e98809db540f20d495c412bcff766984091452c0
    • Instruction ID: ecd54b832418f8b547674ed0810c5eac96f77702ef0ad0a1f87835ef73e5f5c2
    • Opcode Fuzzy Hash: 55ad27b4d9be78aaded14158e98809db540f20d495c412bcff766984091452c0
    • Instruction Fuzzy Hash: C8F08272F0062027EB605AAA5C81B535A849B857A0F1540B6FE09FF3E9D6B58C0142AD
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 004019FC: RtlInitializeCriticalSection.NTDLL(004575C8), ref: 00401A12
      • Part of subcall function 004019FC: RtlEnterCriticalSection.NTDLL(004575C8), ref: 00401A25
      • Part of subcall function 004019FC: LocalAlloc.KERNEL32(00000000,00000FF8,00000000,00401AB2), ref: 00401A4F
      • Part of subcall function 004019FC: RtlLeaveCriticalSection.NTDLL(004575C8), ref: 00401AAC
    • RtlEnterCriticalSection.NTDLL(004575C8), ref: 00402133
    • RtlLeaveCriticalSection.NTDLL(004575C8), ref: 0040225E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
    • String ID:
    • API String ID: 2227675388-0
    • Opcode ID: 512bae4e56b6d948be3375ffe5907b21c3443cf355e0a3ae2a46fd843fb0ae5c
    • Instruction ID: 6e3522476744b8091debb4a1f8ccbd30798f8b1ed913e5f96cfb48642d89c3db
    • Opcode Fuzzy Hash: 512bae4e56b6d948be3375ffe5907b21c3443cf355e0a3ae2a46fd843fb0ae5c
    • Instruction Fuzzy Hash: 084103B2A08B059FD714CF69ED8922977E0FB45329B2541BFD405E77E2E2789901CB0C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualFree.KERNEL32(?,?,00004000,?,?,?,?,?,004019A3), ref: 00401796
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: FreeVirtual
    • String ID: $fT
    • API String ID: 1263568516-2678353634
    • Opcode ID: 35ff8af073e1aa1b0eda225f0ca734fe8a36c63184a5147fd2c964975d1f05aa
    • Instruction ID: 5347538302289b39a87cc1cbf9147b4efb0275ef4e1199c83e105687328eea09
    • Opcode Fuzzy Hash: 35ff8af073e1aa1b0eda225f0ca734fe8a36c63184a5147fd2c964975d1f05aa
    • Instruction Fuzzy Hash: 9601FC7A6483045FC3109E19ECC0E2677E8E7C4324F15057EDE8467791D23A7C0187D8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • LoadCursorA.USER32(00000000,00007F00), ref: 0044FFD9
    • LoadCursorA.USER32(00000000,00000000), ref: 00450008
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CursorLoad
    • String ID:
    • API String ID: 3238433803-0
    • Opcode ID: c90d29dfdef8e3a9b86e636cd5345329ba546c4c78376db4b6e43d579b86f580
    • Instruction ID: 89c2db2620ae318e77c9e771658941828715bcb9550915bfc688f32212b20cb9
    • Opcode Fuzzy Hash: c90d29dfdef8e3a9b86e636cd5345329ba546c4c78376db4b6e43d579b86f580
    • Instruction Fuzzy Hash: F8F0825260460517A660153E6CD1E7A72549F87735B71033BFE3AD72D2C6396C094269
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Global$Alloc
    • String ID:
    • API String ID: 2558781224-0
    • Opcode ID: d0913a57199ed994952fa2cb2aa43fc8775aa1ebc4189e77b53c8f1b771751b3
    • Instruction ID: 2b8c684d91631cc22b0dedc1caa53351a7ec1879717826d0b172dfe36e651fef
    • Opcode Fuzzy Hash: d0913a57199ed994952fa2cb2aa43fc8775aa1ebc4189e77b53c8f1b771751b3
    • Instruction Fuzzy Hash: 7E9002C4C44A4624DC0032B20C0EC2B011CD8D07893D0486E3204B30C2883C8408087C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetKeyboardLayout.USER32(00000000), ref: 0044FC55
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: KeyboardLayout
    • String ID:
    • API String ID: 194098044-0
    • Opcode ID: ba0b02a276916dbdd5c152d5463b2df572eca4c2c341af2344cd164962cde73e
    • Instruction ID: 737a5da957d1acb7e065ac84cb52e1c5cfec85c016efc306f8133949f664d230
    • Opcode Fuzzy Hash: ba0b02a276916dbdd5c152d5463b2df572eca4c2c341af2344cd164962cde73e
    • Instruction Fuzzy Hash: 0131E8706012409FD780EF2AD8C6B897BE4FB05319F44947AF908DF3A7D77A98498B58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040686F
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CreateWindow
    • String ID:
    • API String ID: 716092398-0
    • Opcode ID: 28153b03f0b743c6ac317ed098dba2bcb2724b2b2579fcfeeb562e3b3203a486
    • Instruction ID: 9fd04c6d1ea8a1780bd450825aeba36e2f4b0b62bb765e54a42d2b59d4750e2c
    • Opcode Fuzzy Hash: 28153b03f0b743c6ac317ed098dba2bcb2724b2b2579fcfeeb562e3b3203a486
    • Instruction Fuzzy Hash: 94F07FB2700118BF9B80DE9DDD85E9B77ECEB4D2A4B05412AFA18E3241D674ED108BA4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040686F
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CreateWindow
    • String ID:
    • API String ID: 716092398-0
    • Opcode ID: d374a84ff4e1095332f22a99f92893de7b78e9ea6f6785a7d78b78e664dcd412
    • Instruction ID: 24c2384f2444b5c54ef6e7bda58e69125ec0c6dd7685a054b927d8c168e1b2c3
    • Opcode Fuzzy Hash: d374a84ff4e1095332f22a99f92893de7b78e9ea6f6785a7d78b78e664dcd412
    • Instruction Fuzzy Hash: FEF07FB2700118AF8B80DE9DDD85E9B77ECEB4D2A4B05412AFA18E3241D674ED108BA4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CreateWindowExA.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 004068C5
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CreateWindow
    • String ID:
    • API String ID: 716092398-0
    • Opcode ID: 2c052e2bd1e4ce88e616795498bdfba176ef8adfd9fde8c5d18966ffe642fe8f
    • Instruction ID: f278d5f4e63813ecd907300d4262c72ee52343325b9a7d8943214d9be143a385
    • Opcode Fuzzy Hash: 2c052e2bd1e4ce88e616795498bdfba176ef8adfd9fde8c5d18966ffe642fe8f
    • Instruction Fuzzy Hash: B5F097B2704118BFDB80DE9DDD85E9B77ECEB4D264B014129BA1CE7241D574ED1087A4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00432ACB
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CallbackDispatcherUser
    • String ID:
    • API String ID: 2492992576-0
    • Opcode ID: 3e450580647ac04c52fe3c9217b9489fe8f4b0b89d3e34e1a1c747df32f352d3
    • Instruction ID: 2b489bd349fd00ef9accd65a6c2d7a08998cef0b38985eff922cf8e7109b24d4
    • Opcode Fuzzy Hash: 3e450580647ac04c52fe3c9217b9489fe8f4b0b89d3e34e1a1c747df32f352d3
    • Instruction Fuzzy Hash: CDF0D4362042019FC704DF5CC8C498ABBE5FF89255F0446A8FA89CB356DA32E814CB92
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 00404EEA
      • Part of subcall function 00405108: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 00405124
      • Part of subcall function 00405108: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405142
      • Part of subcall function 00405108: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405160
      • Part of subcall function 00405108: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 0040517E
      • Part of subcall function 00405108: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,0040520D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 004051C7
      • Part of subcall function 00405108: RegQueryValueExA.ADVAPI32(?,00405374,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,0040520D,?,80000001), ref: 004051E5
      • Part of subcall function 00405108: RegCloseKey.ADVAPI32(?,00405214,00000000,00000000,00000005,00000000,0040520D,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 00405207
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Open$FileModuleNameQueryValue$Close
    • String ID:
    • API String ID: 2796650324-0
    • Opcode ID: 2858df2f5e5b77bb82a75d1197f3d6663a494ab9f4d08f3414ad2a21b15d5c57
    • Instruction ID: dba90c1b99b310cad43317f1c0836f1190acbd56573604c4e15555bb5ae98e0e
    • Opcode Fuzzy Hash: 2858df2f5e5b77bb82a75d1197f3d6663a494ab9f4d08f3414ad2a21b15d5c57
    • Instruction Fuzzy Hash: 12E0EDB1A003159BCB10EE58C8C1A5737D8AB48758F0445A6FE58EF386D3B5ED608BD9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • CompareStringA.KERNEL32(00000400,00000001,00000000,00000000,00000000,00000000,?,?,00407C07,?,?,00407F91), ref: 00407BED
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CompareString
    • String ID:
    • API String ID: 1825529933-0
    • Opcode ID: dad0a5d31053c25a3cf0bd7ddc20ff34365a25b4b458eed28a27a79f89e83d58
    • Instruction ID: ccae3585221b49fd4c4947cfdd0b9e4901731bfddc0e91782e881af572125946
    • Opcode Fuzzy Hash: dad0a5d31053c25a3cf0bd7ddc20ff34365a25b4b458eed28a27a79f89e83d58
    • Instruction Fuzzy Hash: 93D09EE13006202AD254B6BE0D86F5B068C4B89659B00223AB708FA2C3D5BC8D4106A9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 0041A50E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AllocVirtual
    • String ID:
    • API String ID: 4275171209-0
    • Opcode ID: a574a89de168bff3fd1518c50328dde15f8b69414dd3669ae5aebb63fbe92bf8
    • Instruction ID: 812526bd8acb628dcf6a9e70366d764634fdf92a5a301b47736cea111e049d81
    • Opcode Fuzzy Hash: a574a89de168bff3fd1518c50328dde15f8b69414dd3669ae5aebb63fbe92bf8
    • Instruction Fuzzy Hash: 35115E342443059BD710EF19C880B86F7E5EF48390F10C53AE9599B386D3B8E954CBA9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • LoadLibraryA.KERNEL32(uxtheme.dll,00000000,00425DCF), ref: 00425A52
    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 00425A6A
    • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 00425A7C
    • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 00425A8E
    • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 00425AA0
    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 00425AB2
    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 00425AC4
    • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 00425AD6
    • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 00425AE8
    • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 00425AFA
    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 00425B0C
    • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 00425B1E
    • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 00425B30
    • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 00425B42
    • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 00425B54
    • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 00425B66
    • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 00425B78
    • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 00425B8A
    • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 00425B9C
    • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 00425BAE
    • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 00425BC0
    • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 00425BD2
    • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 00425BE4
    • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 00425BF6
    • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 00425C08
    • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 00425C1A
    • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 00425C2C
    • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 00425C3E
    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 00425C50
    • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 00425C62
    • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 00425C74
    • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 00425C86
    • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 00425C98
    • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 00425CAA
    • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 00425CBC
    • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 00425CCE
    • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 00425CE0
    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 00425CF2
    • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 00425D04
    • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 00425D16
    • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 00425D28
    • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 00425D3A
    • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 00425D4C
    • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 00425D5E
    • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 00425D70
    • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 00425D82
    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 00425D94
    • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 00425DA6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AddressProc$LibraryLoad
    • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
    • API String ID: 2238633743-2910565190
    • Opcode ID: 22f4c76e0803b4d923048600b928fa4cd91449509120d1191a2d7553c661315c
    • Instruction ID: bd5090f81b60532549820495f2fa86bf30e49feafedaef8f993c8a2ddfcf9ebf
    • Opcode Fuzzy Hash: 22f4c76e0803b4d923048600b928fa4cd91449509120d1191a2d7553c661315c
    • Instruction Fuzzy Hash: DDA101B0615B21AFDB00EB65FC86E2A3BA8EB06745395157AF500EF296D67CD8008F1D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SendMessageA.USER32(?,00000223,00000000,00000000), ref: 0044E925
      • Part of subcall function 004059A8: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004059D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: LoadMessageSendString
    • String ID: 8}D
    • API String ID: 1946433856-1041886984
    • Opcode ID: ff3644b480524692cee3e5686968b9ee7a25bc1eb3f7c7b6973aa6c2aad53d3c
    • Instruction ID: 6bccd7b398b97fb16638bdf0b6ad2e10a9cdb7fcab2b6cb6b4f2bdd645e9c0fc
    • Opcode Fuzzy Hash: ff3644b480524692cee3e5686968b9ee7a25bc1eb3f7c7b6973aa6c2aad53d3c
    • Instruction Fuzzy Hash: 06F13F35A04244EFEB00DBAAD985F9D77F5BB08304F6541B6E500AB3A2D779EE01DB48
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00404F6D
    • GetProcAddress.KERNEL32(00000000,GetLongPathNameA), ref: 00404F7E
    • lstrcpyn.KERNEL32(?,?,?), ref: 00404FAE
    • lstrcpyn.KERNEL32(?,?,?,kernel32.dll), ref: 00405012
    • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll), ref: 00405047
    • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 0040505A
    • FindClose.KERNEL32(00000000,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 00405067
    • lstrlen.KERNEL32(?,00000000,?,?,?,?,00000001,?,?,?,kernel32.dll), ref: 00405073
    • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 004050A7
    • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 004050B3
    • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 004050D5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
    • String ID: GetLongPathNameA$\
    • API String ID: 3245196872-4249726303
    • Opcode ID: 59f0c618696c4269c427f5e7a8cc709a4342357792f0c769baedbcdeb0766d29
    • Instruction ID: 92747c62fd01fc1dee8a3665c625e053df72a10481a45a63a7d15ceb378c8f26
    • Opcode Fuzzy Hash: 59f0c618696c4269c427f5e7a8cc709a4342357792f0c769baedbcdeb0766d29
    • Instruction Fuzzy Hash: FC418772A00559ABDB10EAE8CD85ADFB7ECDF44304F1401FBA548F7291D638DE458B98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • IsIconic.USER32(?), ref: 004396FF
    • GetWindowPlacement.USER32(?,0000002C), ref: 0043971C
    • GetWindowRect.USER32(?), ref: 00439735
    • GetWindowLongA.USER32(?,000000F0), ref: 00439743
    • GetWindowLongA.USER32(?,000000F8), ref: 00439758
    • ScreenToClient.USER32(00000000), ref: 00439765
    • ScreenToClient.USER32(00000000,?), ref: 00439770
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$ClientLongScreen$IconicPlacementRect
    • String ID: ,
    • API String ID: 2266315723-3772416878
    • Opcode ID: a79e1b92fdb795bea0bf22f2d23b1397af8b13a7ac990aec67006bd1b8867246
    • Instruction ID: 86cb3c204941eeb861939deb0675454b10eb0414b3297a3d6a62749057409133
    • Opcode Fuzzy Hash: a79e1b92fdb795bea0bf22f2d23b1397af8b13a7ac990aec67006bd1b8867246
    • Instruction Fuzzy Hash: 4C117C71500210AFCB01EF6DC885A9B77E8AF4D314F144A3EFD58DB286E779E9008B66
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: RestoreSave$NtdllProc_Window
    • String ID: {E
    • API String ID: 2725519021-776765886
    • Opcode ID: 68c8f161b04f0de4c7fe0c095ca5562bff61f9fee91437f879a0e0ad49bf257c
    • Instruction ID: e466d979a7d1fa6bfd9315b7080516fee60c29f69038ac50f7fedb3c40e818d4
    • Opcode Fuzzy Hash: 68c8f161b04f0de4c7fe0c095ca5562bff61f9fee91437f879a0e0ad49bf257c
    • Instruction Fuzzy Hash: BDE18F74B006099FEB10DF69C58199EF7F5FF4A304B26866AE401A7326C738ED41CB5A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • IsIconic.USER32(?), ref: 00451D54
    • SetActiveWindow.USER32(?,?,?,?,00451775,00000000,00451C36), ref: 00451D65
    • IsWindowEnabled.USER32(00000000), ref: 00451D88
    • NtdllDefWindowProc_A.NTDLL(?,00000112,0000F120,00000000,00000000,?,?,?,?,00451775,00000000,00451C36), ref: 00451DA1
    • SetWindowPos.USER32(?,00000000,00000000,?,?,00451775,00000000,00451C36), ref: 00451DE7
    • SetFocus.USER32(00000000,?,00000000,00000000,?,?,00451775,00000000,00451C36), ref: 00451E2C
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$ActiveEnabledFocusIconicNtdllProc_
    • String ID:
    • API String ID: 3996302123-0
    • Opcode ID: b9db25fbcfe5300affea559f64e2e6d7d849f0539d2258f8b0f69e812f03ed1d
    • Instruction ID: 3c75bb5076b89d6e308809c7ad46d997d52c73d04d09560fb9662a92cf67a0d9
    • Opcode Fuzzy Hash: b9db25fbcfe5300affea559f64e2e6d7d849f0539d2258f8b0f69e812f03ed1d
    • Instruction Fuzzy Hash: EA31FF717102009BEB11EB69CD86F6637A86F04706F0804AABD00DF2E7D67DEC588718
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • OpenClipboard.USER32(00000000), ref: 00426AF0
    • GlobalAlloc.KERNEL32(00002002,00000001,00000000,00426BC6,?,00000000,00426BFA), ref: 00426B1A
    • GlobalFix.KERNEL32(?), ref: 00426B34
    • EmptyClipboard.USER32 ref: 00426B63
    • SetClipboardData.USER32(00000001,?), ref: 00426B6E
    • GlobalUnWire.KERNEL32(?), ref: 00426B84
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ClipboardGlobal$AllocDataEmptyOpenWire
    • String ID:
    • API String ID: 461592451-0
    • Opcode ID: 56eb834722fa277e390ee1ae3830b0ef071fa61167701e9cee93adb7d6202445
    • Instruction ID: 6a28fab9fe25a4926a6e2012038929a8959de73aca813dd87fca4eaaf7de0d6a
    • Opcode Fuzzy Hash: 56eb834722fa277e390ee1ae3830b0ef071fa61167701e9cee93adb7d6202445
    • Instruction Fuzzy Hash: D921B770300614BFD711EFA5DC52D5DBBACEB49704BA2047AF804E36D1DA79AD10D928
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • IsIconic.USER32(?), ref: 00438E0B
    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00438E29
    • GetWindowPlacement.USER32(?,0000002C), ref: 00438E5F
    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00438E83
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$Placement$Iconic
    • String ID: ,
    • API String ID: 568898626-3772416878
    • Opcode ID: da6a912853dbb6eea017058d9f386d69dbb688778675e16be8ecb0c20593248d
    • Instruction ID: c299f115a983d2a627696a77f13b88b722c7d81b64ca34f3b33357dbd7a9beb9
    • Opcode Fuzzy Hash: da6a912853dbb6eea017058d9f386d69dbb688778675e16be8ecb0c20593248d
    • Instruction Fuzzy Hash: 30213231A00208ABCF14DEADC88199EB7A9AF0D314F04546BFD14EF346DA79DD058B64
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AddressProc
    • String ID: MonitorFromWindow$d=B
    • API String ID: 190572456-863645062
    • Opcode ID: dd4f021b0dd2ed2846414bb0fa4cb8b98f43f6541947596d7003f92a5887b4de
    • Instruction ID: e045f92e4d54634dea15c85c2fb73423f12b0f174c6375320a7d667797c6d762
    • Opcode Fuzzy Hash: dd4f021b0dd2ed2846414bb0fa4cb8b98f43f6541947596d7003f92a5887b4de
    • Instruction Fuzzy Hash: 69014F627282286A9700EE55BC45AEF737CAE05316F844437F911A7242D73CEB0187AD
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: RestoreSave$Focus
    • String ID:
    • API String ID: 1675357626-0
    • Opcode ID: 130285ac1c2c9da531094fb71f965a37a395f50d3dca739c0bd7ff73dd710d24
    • Instruction ID: 28dde32ecda87b18c9c131661b1d687da8cafead35aecd91ace7fb2b432a567a
    • Opcode Fuzzy Hash: 130285ac1c2c9da531094fb71f965a37a395f50d3dca739c0bd7ff73dd710d24
    • Instruction Fuzzy Hash: 82B19535A00504EFDB14DF69C986AAEB7F5EB49304F6540A6F400AB761C738EE41CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • IsIconic.USER32(?), ref: 00451CA4
    • SetActiveWindow.USER32(?,?,?,?,00451768,00000000,00451C36), ref: 00451CBC
    • IsWindowEnabled.USER32(00000000), ref: 00451CDF
    • SetWindowPos.USER32(?,00000000,?,?,?,00000000,00000040,00000000,?,?,?,?,00451768,00000000,00451C36), ref: 00451D08
    • NtdllDefWindowProc_A.NTDLL(?,00000112,0000F020,00000000,?,00000000,?,?,?,00000000,00000040,00000000,?,?,?,?), ref: 00451D1D
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$ActiveEnabledIconicNtdllProc_
    • String ID:
    • API String ID: 1720852555-0
    • Opcode ID: 6f7088e5e4b187c2aeb4670173d2ee360a9bc5c07015ffe667a4e43799c635b3
    • Instruction ID: d88d7f204a03cefd04b539be1aa1a9598ab832427648ac9e4d8c0313e5e399c9
    • Opcode Fuzzy Hash: 6f7088e5e4b187c2aeb4670173d2ee360a9bc5c07015ffe667a4e43799c635b3
    • Instruction Fuzzy Hash: 76111271600204ABDB54EF6AC9C6F9A37ECAF08305F0404AABE05DF297D679EC48C718
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0042D16C: WinHelpA.USER32(00000000,0042D184,00000002,00000000), ref: 0042D17B
    • GetTickCount.KERNEL32 ref: 0042D72A
    • Sleep.KERNEL32(00000000,00000000,0042D789,?,?,00000000,00000000,?,0042D702), ref: 0042D733
    • GetTickCount.KERNEL32 ref: 0042D738
    • WinHelpA.USER32(00000000,?,?,00000000), ref: 0042D76E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CountHelpTick$Sleep
    • String ID:
    • API String ID: 2438605093-0
    • Opcode ID: 3b37bb46d71cad630b3a2424da26e5f252bc33779961b1e9248b4b7629c2e77e
    • Instruction ID: d9ee8ac0399ff3a52a28c59ee35b7e8a24d770c9992848953fe4256612c820dd
    • Opcode Fuzzy Hash: 3b37bb46d71cad630b3a2424da26e5f252bc33779961b1e9248b4b7629c2e77e
    • Instruction Fuzzy Hash: E101A230B10614AFE311EBA6DC52B5EB7ACDB88B08FA14577F400E31C1DA7C9E008569
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetClipboardData.USER32(0000000E), ref: 00420571
    • CopyEnhMetaFileA.GDI32(00000000,00000000), ref: 00420593
    • GetEnhMetaFileHeader.GDI32(?,00000064,?,00000000,00000000), ref: 004205A5
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: FileMeta$ClipboardCopyDataHeader
    • String ID:
    • API String ID: 1752724394-0
    • Opcode ID: 38bc527a9afa950ba7342874b894af69953dddefd4bd7d1afe6ddc248af366bb
    • Instruction ID: 97ff353573cbd70a5e31d6c3412dfaeaeed32466db538e646bc829a6cc00a440
    • Opcode Fuzzy Hash: 38bc527a9afa950ba7342874b894af69953dddefd4bd7d1afe6ddc248af366bb
    • Instruction Fuzzy Hash: BE117C716003058FC710DF6AD881A9ABBF8AF05310F11467AE909DB252DA74EC45CB94
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00450AF8
    • GetCursorPos.USER32(?), ref: 00450B15
    • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 00450B35
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CurrentCursorObjectSingleThreadWait
    • String ID:
    • API String ID: 1359611202-0
    • Opcode ID: 8c371bf6a7f93da941bc330bb5314dd272f77a13d417afbdff54108d71461653
    • Instruction ID: 4704e93e10c23aef9cd25801f58607d5338663f957a23ea090da395bb144b516
    • Opcode Fuzzy Hash: 8c371bf6a7f93da941bc330bb5314dd272f77a13d417afbdff54108d71461653
    • Instruction Fuzzy Hash: 37F054755083099BDB10E795E8C6B5A33E8AB0431AF400077E9109A2E7D779F844CA5D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CaptureIconic
    • String ID:
    • API String ID: 2277910766-0
    • Opcode ID: f8b3c68e170c2c5d9bda2f58435973382db4f3b102135243bde18463dfbdfb54
    • Instruction ID: 6ea9a3f3c9a7b6ba64e32fcc5f3db20d284757a2c46f4d3fdd111917239fcea8
    • Opcode Fuzzy Hash: f8b3c68e170c2c5d9bda2f58435973382db4f3b102135243bde18463dfbdfb54
    • Instruction Fuzzy Hash: 65115B32600315ABDB20DB59C98596AB3E8AF0C314F25947AF904DB352DA3CED009758
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetLastError.KERNEL32(00000000,0041DA88), ref: 0041DA0C
    • FormatMessageA.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,0041DA88), ref: 0041DA32
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ErrorFormatLastMessage
    • String ID:
    • API String ID: 3479602957-0
    • Opcode ID: 0e7ddfbd2e774316c660b2e5fae89f7748a898ca603d5bb878d391fc30fcd8f3
    • Instruction ID: e2a572dc6e5f3737ebf86aa1512cf6dbfa50fa412a15462da1caf4fa50521bb7
    • Opcode Fuzzy Hash: 0e7ddfbd2e774316c660b2e5fae89f7748a898ca603d5bb878d391fc30fcd8f3
    • Instruction Fuzzy Hash: 1501FCB16482049FD711EB61CC92BE6739CDB18744F9000BABF44A21C1DAF85EC0895D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,0040C28C), ref: 0040C24E
    • GetACP.KERNEL32(?,?,00001004,?,00000007,00000000,0040C28C), ref: 0040C267
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: b130faf204895f6577c542847f2b823a459e5ce6c8f6d67680ac47c8238b8038
    • Instruction ID: baea47419d8d6b2b6ec4e726650ddd6d998e4fb2af1a913181e5ba9b87afc6d3
    • Opcode Fuzzy Hash: b130faf204895f6577c542847f2b823a459e5ce6c8f6d67680ac47c8238b8038
    • Instruction Fuzzy Hash: 29F0FC31E08604BBD700DFF2C84195E73AED7C8714F50C57AB110B35C1DA7C66004798
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 0040830D
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: DiskFreeSpace
    • String ID:
    • API String ID: 1705453755-0
    • Opcode ID: 4907c8d48cac47c9d1f08667f175fda6f9e26b4eb06ac176dee4e5eb58c487ac
    • Instruction ID: ae347befabab82848eeea2d61a5ae71d134ef5356aed14867f9b96b20c4be1cd
    • Opcode Fuzzy Hash: 4907c8d48cac47c9d1f08667f175fda6f9e26b4eb06ac176dee4e5eb58c487ac
    • Instruction Fuzzy Hash: 3711D2B5E01209AFDB04CF99C981DAFF7F9EFC8304F14C569A505E7255E6319E018BA4
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • NtdllDefWindowProc_A.NTDLL(?,?,?,?), ref: 00428491
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: NtdllProc_Window
    • String ID:
    • API String ID: 4255912815-0
    • Opcode ID: 8d264edcb8ab9c59ad88502bd1c06888897a1e58a92bce3253fbc1ff7fe1719c
    • Instruction ID: 0fc1e9391b849d956db2c6971a767104bf7e63e70a7d6d12a16cba2453373a6a
    • Opcode Fuzzy Hash: 8d264edcb8ab9c59ad88502bd1c06888897a1e58a92bce3253fbc1ff7fe1719c
    • Instruction Fuzzy Hash: E0F0F676705214AFD700DF9EE881C5ABBECEB0932035140BBF904D7641E634AD009B74
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00405A66), ref: 00405A26
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 4e7894aac9dd5075328a3359a2912b60d4a0cbd47ecb3bbd0d6b48176307be24
    • Instruction ID: 59e4a080a0b4ccf7934c9565367c65c5731ee18c76f22e35014114b7af20c7a9
    • Opcode Fuzzy Hash: 4e7894aac9dd5075328a3359a2912b60d4a0cbd47ecb3bbd0d6b48176307be24
    • Instruction Fuzzy Hash: E0F0A930A04609AFE714EEA1CC81AAEB375F784714F50857AB110B35C0E6782A048A88
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00405A66), ref: 00405A26
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 170b9b7a9b272e120eaeb09cf774b40d1547a56a0bb31e8cd8cba46e533cf7bc
    • Instruction ID: 07f00156ddb7686dcf6c8f79403a71c33cf36be57d5827d29dfe16b025e2361e
    • Opcode Fuzzy Hash: 170b9b7a9b272e120eaeb09cf774b40d1547a56a0bb31e8cd8cba46e533cf7bc
    • Instruction Fuzzy Hash: 38F06830A04609AFE715EEA1CC86AEFB37AF7C4714F50857AA110775D0E7B82744CA99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSystemInfo.KERNEL32(?), ref: 0041DF8C
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: InfoSystem
    • String ID:
    • API String ID: 31276548-0
    • Opcode ID: 6b8e052c6bede3cb08bcb3cf97360bd64ed1316616d990e2155c5adb0822f991
    • Instruction ID: 3ec2cba4a878046c1c9776304eb5b71f2b40e26c4ae6c7f8e98e8c3f4b196121
    • Opcode Fuzzy Hash: 6b8e052c6bede3cb08bcb3cf97360bd64ed1316616d990e2155c5adb0822f991
    • Instruction Fuzzy Hash: F6F096B1D051099FCB10DF98C488CDDFBB4FB56305751429AD409D7382EB38A696CB85
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040ABDE
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: fdc320ea28f9f75c62efff8e2d9cd8f713ef10177de8fcbeeb0c5faebbe2dcda
    • Instruction ID: 8a38aaf31e287f4e02cc8341b73ec8b44d73ebb2d4739023af4de17ed3051a6e
    • Opcode Fuzzy Hash: fdc320ea28f9f75c62efff8e2d9cd8f713ef10177de8fcbeeb0c5faebbe2dcda
    • Instruction Fuzzy Hash: 08E0927170421417D710AA599C86AE7725D9758310F40427FBA45E73C2EEB8AE9046EE
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040C53A,00000000,0040C753,?,?,00000000,00000000), ref: 0040AC1F
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 656a2a71fe8a9a347b97d171e82230d5793d39cb43fb22f67fa0352798af2eea
    • Instruction ID: b581d9f878e9bef064658ced9945c2b6e005c2316ac77ad6fa721ce3983ac154
    • Opcode Fuzzy Hash: 656a2a71fe8a9a347b97d171e82230d5793d39cb43fb22f67fa0352798af2eea
    • Instruction Fuzzy Hash: EED05E7630D2502AF210615A6D85DBB4AACCAC97A4F11443EB689D6242E2248C16A3B6
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: LocalTime
    • String ID:
    • API String ID: 481472006-0
    • Opcode ID: 0a00292afb7379954fea3f68ccac95558c17b35c2e697fc130e1df29d578561f
    • Instruction ID: 809a77b0509ff9e97abdbe3471728ccd2ed67c682f4af258cc35362fa1d29df0
    • Opcode Fuzzy Hash: 0a00292afb7379954fea3f68ccac95558c17b35c2e697fc130e1df29d578561f
    • Instruction Fuzzy Hash: 6FE0A568408602A1C200FF55C4414AFF7A5EE99B40F408C5DF8E452392EA358999C76B
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetErrorMode.KERNEL32(00008000), ref: 0043DD71
    • GetModuleHandleA.KERNEL32(USER32,00000000,0043DEBE,?,00008000), ref: 0043DD95
    • GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 0043DDA2
    • LoadLibraryA.KERNEL32(imm32.dll,00000000,0043DEBE,?,00008000), ref: 0043DDBE
    • GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 0043DDE0
    • GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 0043DDF5
    • GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 0043DE0A
    • GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 0043DE1F
    • GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 0043DE34
    • GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 0043DE49
    • GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 0043DE5E
    • GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 0043DE73
    • GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 0043DE88
    • GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 0043DE9D
    • SetErrorMode.KERNEL32(?,0043DEC5,00008000), ref: 0043DEB8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AddressProc$ErrorMode$HandleLibraryLoadModule
    • String ID: @wE$ImmGetCompositionStringA$ImmGetContext$ImmGetConversionStatus$ImmIsIME$ImmNotifyIME$ImmReleaseContext$ImmSetCompositionFontA$ImmSetCompositionWindow$ImmSetConversionStatus$ImmSetOpenStatus$USER32$WINNLSEnableIME$imm32.dll
    • API String ID: 3397921170-890834701
    • Opcode ID: ead52cc09ac20e8a380d26f92b28419de46a6bff040be02b2cf283c5b78764df
    • Instruction ID: 3c0394bd07d305ea2d188a8f5ebb8bb4e7f9742114a58d902b58ba48a7cd74b5
    • Opcode Fuzzy Hash: ead52cc09ac20e8a380d26f92b28419de46a6bff040be02b2cf283c5b78764df
    • Instruction Fuzzy Hash: 8731E2B1954B01AFD700EBB5BC5AA2B3AA8E709759F54643BF504AB1D3D67CE8008F1C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 0040D971
      • Part of subcall function 0040D93C: GetProcAddress.KERNEL32(00000000), ref: 0040D955
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
    • API String ID: 1646373207-1918263038
    • Opcode ID: b82e32c28f640bf2d64024a4eaf3dc84201cb1ebf4e1472b3d107dd72980b475
    • Instruction ID: c51dace41a67f0ce80140b97d9f650fa39da1d801abef46ec8eb81cf9ce0b25d
    • Opcode Fuzzy Hash: b82e32c28f640bf2d64024a4eaf3dc84201cb1ebf4e1472b3d107dd72980b475
    • Instruction Fuzzy Hash: 84414DA5D087056BD3046BEAB8014277AD9D6487193A1D03BB404BB7E6DB3CF849CA2D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 004269D0: SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 00426A0D
      • Part of subcall function 004269D0: CreateFontIndirectA.GDI32(?), ref: 00426A1A
      • Part of subcall function 00426804: GetTextExtentPointA.GDI32(00000000,00000034,00000034,?), ref: 0042683F
    • MulDiv.KERNEL32(00000008,?,00000004), ref: 00426F55
    • MulDiv.KERNEL32(00000008,?,00000008), ref: 00426F65
    • MulDiv.KERNEL32(0000000A,?,00000004), ref: 00426F72
    • MulDiv.KERNEL32(0000000A,?,00000008), ref: 00426F7F
    • MulDiv.KERNEL32(00000032,?,00000004), ref: 00426F8C
    • DrawTextA.USER32(00000000,00000000,000000FF,?,00000000), ref: 00426FFF
    • MulDiv.KERNEL32(0000000E,?,00000008), ref: 00427032
    • MulDiv.KERNEL32(00000004,?,00000004), ref: 00427042
    • SetRect.USER32(?,00000000,00000000,00000000,00000000), ref: 00427068
    • DrawTextA.USER32(00000000,00000000,00000001,?,00000000), ref: 004270A0
    • LoadIconA.USER32(00000000), ref: 004271FC
      • Part of subcall function 00451E88: GetWindowTextA.USER32(?,?,00000100), ref: 00451EAB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Text$Draw$CreateExtentFontIconIndirectInfoLoadParametersPointRectSystemWindow
    • String ID: $Image$Message$PWE${E
    • API String ID: 4220236395-4227156669
    • Opcode ID: 16386283bd2f1e2f92c484253766b58a99c2f8515468f076a7cdb2bb22c4234c
    • Instruction ID: 4bad27db37094b2377632972f8109ebf4dee37b00dda34076c131864de6f10ef
    • Opcode Fuzzy Hash: 16386283bd2f1e2f92c484253766b58a99c2f8515468f076a7cdb2bb22c4234c
    • Instruction Fuzzy Hash: 44023D74E002189FDB00EFA9D885A9EB7F5FF49308F54816AE904EB352C778AD45CB58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindowsDirectoryA.KERNEL32(00457C00,000000FF,00000000,00454161,?,?,00000000,00000000), ref: 004540BF
    • ShellExecuteA.SHELL32(00000000,open,bin/reset/cl_ev_log.vbs,00000000,00000000,00000001), ref: 004540DC
    • WinExec.KERNEL32(wevtutil clear-log Application,00000000), ref: 004540E8
    • WinExec.KERNEL32(wevtutil clear-log Security,00000000), ref: 004540F4
    • WinExec.KERNEL32(wevtutil clear-log Setup,00000000), ref: 00454100
    • WinExec.KERNEL32(wevtutil clear-log System,00000000), ref: 0045410C
      • Part of subcall function 004524EC: GetActiveWindow.USER32 ref: 004524FF
      • Part of subcall function 004524EC: GetWindowRect.USER32(?,?), ref: 00452559
      • Part of subcall function 004524EC: SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 00452591
      • Part of subcall function 004524EC: MessageBoxA.USER32(?,?,?,?), ref: 004525D2
    Strings
    • RDP Admin Restore, xrefs: 00454113, 0045412D
    • bin/reset/cl_ev_log.vbs, xrefs: 004540CA
    • wevtutil clear-log Security, xrefs: 004540EF
    • open, xrefs: 004540CF
    • wevtutil clear-log System, xrefs: 00454107
    • Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com, xrefs: 00454132
    • wevtutil clear-log Setup, xrefs: 004540FB
    • wevtutil clear-log Application, xrefs: 004540E3
    • Event logs cleared!, xrefs: 00454118
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Exec$Window$ActiveDirectoryExecuteMessageRectShellWindows
    • String ID: Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com$Event logs cleared!$RDP Admin Restore$bin/reset/cl_ev_log.vbs$open$wevtutil clear-log Application$wevtutil clear-log Security$wevtutil clear-log Setup$wevtutil clear-log System
    • API String ID: 2810476808-3379520493
    • Opcode ID: 4e3d62e041db6ef29d5643350b7e0520f0f582ca870a864ee9c014b17f5b8c63
    • Instruction ID: e643672b57c938a69b7163dc0899881a26ec3fee7f1cbd1c04083b942c6722f0
    • Opcode Fuzzy Hash: 4e3d62e041db6ef29d5643350b7e0520f0f582ca870a864ee9c014b17f5b8c63
    • Instruction Fuzzy Hash: EB21843438470076D710E7A1DC47F5D3694DB99B0AF618477B900BF6C3CABCA988851C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SelectObject.GDI32(?,?), ref: 0041DC90
    • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,0041DD0B,?,?), ref: 0041DCDF
    • SelectObject.GDI32(?,?), ref: 0041DCF9
    • DeleteObject.GDI32(?), ref: 0041DD05
    • SelectObject.GDI32(?,?), ref: 0041DD4F
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 0041DDCE
    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 0041DDF0
    • SetTextColor.GDI32(?,00000000), ref: 0041DDF8
    • SetBkColor.GDI32(?,00FFFFFF), ref: 0041DE06
    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 0041DE32
    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 0041DE57
    • SetTextColor.GDI32(?,?), ref: 0041DE61
    • SetBkColor.GDI32(?,?), ref: 0041DE6B
    • SelectObject.GDI32(?,00000000), ref: 0041DE7E
    • DeleteObject.GDI32(?), ref: 0041DE87
    • DeleteDC.GDI32(?), ref: 0041DEB2
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Object$ColorSelectStretch$Delete$Text$Mask
    • String ID:
    • API String ID: 326492243-0
    • Opcode ID: 80bfbcc1b7410ce4b15a6938d5177bd53c135f4a2953d7d383517b1cd2c5af8c
    • Instruction ID: 6ecaa9e48ec0e5a52f4bd97a0b46cd54fc0edc45eba9e57bcd0a50f4264b02c5
    • Opcode Fuzzy Hash: 80bfbcc1b7410ce4b15a6938d5177bd53c135f4a2953d7d383517b1cd2c5af8c
    • Instruction Fuzzy Hash: BB8194B1A00209AFDB50EEA9CC81FAF77ECAB0D714F110569F618E7281C679ED508B65
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindWindowA.USER32(MouseZ,Magellan MSWHEEL), ref: 004068F8
    • RegisterClipboardFormatA.USER32(MSWHEEL_ROLLMSG), ref: 00406904
    • RegisterClipboardFormatA.USER32(MSH_WHEELSUPPORT_MSG), ref: 00406913
    • RegisterClipboardFormatA.USER32(MSH_SCROLL_LINES_MSG), ref: 0040691F
    • SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00406937
    • SendMessageA.USER32(00000000,?,00000000,00000000), ref: 0040695B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ClipboardFormatRegister$MessageSend$FindWindow
    • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
    • API String ID: 1416857345-3736581797
    • Opcode ID: f316442aa48e1397d0e7d3288d8daaa475903184c982927fc3bf3143f7dbc2d2
    • Instruction ID: 0cb6d9865656eb2df6f1f7c997331099a50e3287529ef4739601f8d4298a2375
    • Opcode Fuzzy Hash: f316442aa48e1397d0e7d3288d8daaa475903184c982927fc3bf3143f7dbc2d2
    • Instruction Fuzzy Hash: 47115EB0200301AFE7109F69C841F6BB7A8EF44714F22443AB842AB6C0D6B95D618BA8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • WinExec.KERNEL32(vssadmin delete shadows /for=c: /all,00000000), ref: 004544D9
    • WinExec.KERNEL32(vssadmin delete shadows /for=d: /all,00000000), ref: 004544E5
    • WinExec.KERNEL32(vssadmin delete shadows /for=e: /all,00000000), ref: 004544F1
    • WinExec.KERNEL32(vssadmin delete shadows /for=f: /all,00000000), ref: 004544FD
      • Part of subcall function 004524EC: GetActiveWindow.USER32 ref: 004524FF
      • Part of subcall function 004524EC: GetWindowRect.USER32(?,?), ref: 00452559
      • Part of subcall function 004524EC: SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 00452591
      • Part of subcall function 004524EC: MessageBoxA.USER32(?,?,?,?), ref: 004525D2
    Strings
    • RDP Admin Restore, xrefs: 00454504, 0045451E
    • Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com, xrefs: 00454523
    • vssadmin delete shadows /for=d: /all, xrefs: 004544E0
    • vssadmin delete shadows /for=f: /all, xrefs: 004544F8
    • vssadmin delete shadows /for=e: /all, xrefs: 004544EC
    • vssadmin delete shadows /for=c: /all, xrefs: 004544D4
    • System Restore Points cleared!, xrefs: 00454509
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Exec$Window$ActiveMessageRect
    • String ID: Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com$RDP Admin Restore$System Restore Points cleared!$vssadmin delete shadows /for=c: /all$vssadmin delete shadows /for=d: /all$vssadmin delete shadows /for=e: /all$vssadmin delete shadows /for=f: /all
    • API String ID: 2349831513-943649847
    • Opcode ID: c40f8cb566c54b36797eb2a3c41f3be0dfece1beb89f9ba2562258e1bc85b312
    • Instruction ID: 76b89012cad719edd9d44c9814af8d10bfacbb30f3102c8f75673a0c72d5e72a
    • Opcode Fuzzy Hash: c40f8cb566c54b36797eb2a3c41f3be0dfece1beb89f9ba2562258e1bc85b312
    • Instruction Fuzzy Hash: 91118634380304BBD710EB55DC52F5977A4DB85B0AF618077BA016F2D3DA7CAA4D864D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • EnumDisplayMonitors.USER32(?,?,?,?), ref: 00424149
    • GetSystemMetrics.USER32(00000000), ref: 0042416E
    • GetSystemMetrics.USER32(00000001), ref: 00424179
    • GetClipBox.GDI32(?,?), ref: 0042418B
    • GetDCOrgEx.GDI32(?,?), ref: 00424198
    • OffsetRect.USER32(?,?,?), ref: 004241B1
    • IntersectRect.USER32(?,?,?), ref: 004241C2
    • IntersectRect.USER32(?,?,?), ref: 004241D8
      • Part of subcall function 00423B64: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 00423BE4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Rect$IntersectMetricsSystem$AddressClipDisplayEnumMonitorsOffsetProc
    • String ID: EnumDisplayMonitors
    • API String ID: 362875416-2491903729
    • Opcode ID: e148aa5210d83d308e65a9c77509402ce6ba8f886d161cb7430358443943099d
    • Instruction ID: f134eb326fd37c1a8e3e34a301d86646f323bf33116a2f2cf18adc8f1ef52cee
    • Opcode Fuzzy Hash: e148aa5210d83d308e65a9c77509402ce6ba8f886d161cb7430358443943099d
    • Instruction Fuzzy Hash: 27315EB1A00219AADB00DFE5EC44AFF77BCEB49341F41417AF915E3241E638DA508BB9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • WinExec.KERNEL32(wbadmin delete systemstatebackup -keepVersions:0,00000000), ref: 004548FC
      • Part of subcall function 00453BCC: SHGetSpecialFolderLocation.SHELL32(00000000,?,?,00000000,00453C80,?,00000000,00453CA2,?,?,?,00000000,00000000,00000000), ref: 00453C0A
      • Part of subcall function 00453BCC: SHGetPathFromIDList.SHELL32(?,00000000), ref: 00453C2B
    • GetWindowsDirectoryA.KERNEL32(?,00000104,wbadmin delete systemstatebackup -keepVersions:0,00000000,00000000,00454A23), ref: 0045491A
    • CopyFileA.KERNEL32(00000000,00000000,00000000), ref: 0045499E
      • Part of subcall function 004524EC: GetActiveWindow.USER32 ref: 004524FF
      • Part of subcall function 004524EC: GetWindowRect.USER32(?,?), ref: 00452559
      • Part of subcall function 004524EC: SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 00452591
      • Part of subcall function 004524EC: MessageBoxA.USER32(?,?,?,?), ref: 004525D2
      • Part of subcall function 004524EC: SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,00452648), ref: 00452622
      • Part of subcall function 004524EC: SetActiveWindow.USER32(?,00452648), ref: 00452633
    Strings
    • [Windows Server 2008] System Restore Points cleared!, xrefs: 004549AA
    • Clear Restore Points.bat, xrefs: 00454966
    • RDP Admin Restore, xrefs: 004549A5, 004549BD, 004549D7
    • [Windows Vista / Windows 7] Execute "Clear Restore Points.bat" from your Desktop!, xrefs: 004549C2
    • wbadmin delete systemstatebackup -keepVersions:0, xrefs: 004548F7
    • Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com, xrefs: 004549DC
    • bin\reset\del_sys_rest.bat, xrefs: 00454985
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$Active$CopyDirectoryExecFileFolderFromListLocationMessagePathRectSpecialWindows
    • String ID: Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com$Clear Restore Points.bat$RDP Admin Restore$[Windows Server 2008] System Restore Points cleared!$[Windows Vista / Windows 7] Execute "Clear Restore Points.bat" from your Desktop!$bin\reset\del_sys_rest.bat$wbadmin delete systemstatebackup -keepVersions:0
    • API String ID: 4229488978-2116179880
    • Opcode ID: 9e27526e67c77316096611c689706fb9831d7d21e65b58ecda99516510624667
    • Instruction ID: c1560f67667fcca884b710c43bd2f25be0a7f16ccbd5394f72e811811d3d109d
    • Opcode Fuzzy Hash: 9e27526e67c77316096611c689706fb9831d7d21e65b58ecda99516510624667
    • Instruction Fuzzy Hash: F5419670A402089BD754EB55DC42BCE73B5EB88305F0041FBB904AB382CA789F858F4C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetClientRect.USER32(00000000,?), ref: 0043A22B
    • GetWindowRect.USER32(00000000,?), ref: 0043A23D
    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0043A253
    • OffsetRect.USER32(?,?,?), ref: 0043A268
    • ExcludeClipRect.GDI32(?,?,?,?,?,?,?,?,00000000,00000000,?,00000002,00000000,?,00000000,0043A43A), ref: 0043A281
    • InflateRect.USER32(?,00000000,00000000), ref: 0043A29F
    • GetWindowLongA.USER32(00000000,000000F0), ref: 0043A2F5
    • DrawEdge.USER32(?,?,00000000,00000008), ref: 0043A3C1
    • IntersectClipRect.GDI32(?,?,?,?,?), ref: 0043A3DA
    • OffsetRect.USER32(?,?,?), ref: 0043A3F9
    • FillRect.USER32(?,?,00000000), ref: 0043A415
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Rect$Window$ClipOffset$ClientDrawEdgeExcludeFillInflateIntersectLongPoints
    • String ID:
    • API String ID: 1573515177-0
    • Opcode ID: 54826c443f72ea8bbef09743bc7b90c906e0d2177bdbb5413b56371ebf561e3e
    • Instruction ID: e200f8c1b69cfc0785ba44f4f9ef66d306ebaf7aec32b4c247beff20b7ce5f8d
    • Opcode Fuzzy Hash: 54826c443f72ea8bbef09743bc7b90c906e0d2177bdbb5413b56371ebf561e3e
    • Instruction Fuzzy Hash: 8A91FA71E04648AFDB01DBA9C885FEEB7F9AF09304F1540A5F954E7292C779AE10CB24
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetObjectA.GDI32(?,00000054,?), ref: 00421293
    • SelectObject.GDI32(?,00000000), ref: 00421307
    • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 00421329
    • SelectObject.GDI32(?), ref: 0042137F
    • SetBkColor.GDI32(?), ref: 004213BA
    • SetBkColor.GDI32(?,00000000), ref: 004213E8
    • SelectObject.GDI32(?,00000000), ref: 004213FB
    • DeleteObject.GDI32 ref: 00421407
    • DeleteDC.GDI32(?), ref: 0042141D
    • SelectObject.GDI32(?,00000000), ref: 00421438
    • DeleteDC.GDI32(00000000), ref: 00421454
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Object$Select$Delete$Color
    • String ID:
    • API String ID: 1817384775-0
    • Opcode ID: 6e4ad2ed427ff5c7ecdb7de93b688aa7a573b109bb5ac3d9bcf0e4092acecdb9
    • Instruction ID: fd1de590d11a8c113539ad9edf9763831ff515767437cd21f901c75386431d27
    • Opcode Fuzzy Hash: 6e4ad2ed427ff5c7ecdb7de93b688aa7a573b109bb5ac3d9bcf0e4092acecdb9
    • Instruction Fuzzy Hash: 1C514D71F00214ABDB10EBE9DC45FAFB7BCAB08704F51446AF605FB292D6789950CB68
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindowsDirectoryA.KERNEL32(00457C00,000000FF,00000000,00454782,?,?,00000000,00000000), ref: 004546F3
    • ShellExecuteA.SHELL32(00000000,open,bin/reset/del_sys_rest.vbs,00000000,00000000,00000001), ref: 00454710
    • ShellExecuteA.SHELL32(00000000,open,bin/reset/del_sys_rest2.vbs,00000000,00000000,00000001), ref: 0045472D
      • Part of subcall function 004524EC: GetActiveWindow.USER32 ref: 004524FF
      • Part of subcall function 004524EC: GetWindowRect.USER32(?,?), ref: 00452559
      • Part of subcall function 004524EC: SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 00452591
      • Part of subcall function 004524EC: MessageBoxA.USER32(?,?,?,?), ref: 004525D2
    Strings
    • Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com, xrefs: 00454753
    • open, xrefs: 00454703, 00454720
    • System Restore Points cleared!, xrefs: 00454739
    • RDP Admin Restore, xrefs: 00454734, 0045474E
    • bin/reset/del_sys_rest2.vbs, xrefs: 0045471B
    • bin/reset/del_sys_rest.vbs, xrefs: 004546FE
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$ExecuteShell$ActiveDirectoryMessageRectWindows
    • String ID: Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com$RDP Admin Restore$System Restore Points cleared!$bin/reset/del_sys_rest.vbs$bin/reset/del_sys_rest2.vbs$open
    • API String ID: 3947522788-3178753808
    • Opcode ID: a3a817e5f308bcf0b0c5dda2d7190bafecf6ac3fa2098a2f0214a1ebdd0f661a
    • Instruction ID: bfd5c4811938aeca417bb9740aec2fa9140fc7553a3349661bb309c8614c61b7
    • Opcode Fuzzy Hash: a3a817e5f308bcf0b0c5dda2d7190bafecf6ac3fa2098a2f0214a1ebdd0f661a
    • Instruction Fuzzy Hash: 98219034780300BBD710EB61DC83F5972A8978AB0AF614177B900AF2C3CBBCA948861C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0040B12C: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040B149
      • Part of subcall function 0040B12C: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040B16D
      • Part of subcall function 0040B12C: GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040B188
      • Part of subcall function 0040B12C: LoadStringA.USER32(00000000,0000FFEA,?,00000100), ref: 0040B21E
    • CharToOemA.USER32(?,?), ref: 0040B2EB
    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 0040B308
    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0040B30E
    • GetStdHandle.KERNEL32(000000F4,0040B378,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0040B323
    • WriteFile.KERNEL32(00000000,000000F4,0040B378,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0040B329
    • LoadStringA.USER32(00000000,0000FFEB,?,00000040), ref: 0040B34B
    • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0040B361
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
    • String ID: k@$HpE
    • API String ID: 185507032-272722378
    • Opcode ID: 6b4e80015a87073a770a1d94cc6ddb8ecc2dde4a4c8a9caf8b3638b51126786e
    • Instruction ID: bb2448d251cef649c289dc31d0f63b9f3d52a60cf7425af0d3ff7c61de9185c2
    • Opcode Fuzzy Hash: 6b4e80015a87073a770a1d94cc6ddb8ecc2dde4a4c8a9caf8b3638b51126786e
    • Instruction Fuzzy Hash: E8119EB21183007ED200E7A5CC86F9B77ACAB40704F80053AB745E60E2DA78E904876E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RectVisible.GDI32(?,?), ref: 004372A5
    • SaveDC.GDI32(?), ref: 004372BB
    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 004372DE
    • RestoreDC.GDI32(?,?), ref: 004372F9
    • CreateSolidBrush.GDI32(00000000), ref: 0043737A
    • FrameRect.USER32(?,?,?), ref: 004373AD
    • DeleteObject.GDI32(?), ref: 004373B7
    • CreateSolidBrush.GDI32(00000000), ref: 004373C7
    • FrameRect.USER32(?,?,00000000), ref: 004373FA
    • DeleteObject.GDI32(00000000), ref: 00437404
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
    • String ID:
    • API String ID: 375863564-0
    • Opcode ID: 188ec844819f1839dca67db3c63056a8a11a2de2247bd05f7a852052a94c2e91
    • Instruction ID: f1b7c919c40b3a2f1d2d9fe28c57e24a1ecde5085e168e389b4f09467b312a64
    • Opcode Fuzzy Hash: 188ec844819f1839dca67db3c63056a8a11a2de2247bd05f7a852052a94c2e91
    • Instruction Fuzzy Hash: 3E5170B12082059BDB24EF69C8C4B5B7BD8AF49304F04549EFD89CB387D639E844C758
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindowLongA.USER32(00000000,000000EC), ref: 004296B7
    • GetWindowRect.USER32(00000000,?), ref: 004296D2
    • OffsetRect.USER32(?,?,?), ref: 004296E7
    • GetWindowLongA.USER32(00000000,000000F0), ref: 00429726
    • GetSystemMetrics.USER32(00000002), ref: 0042973B
    • GetSystemMetrics.USER32(00000003), ref: 00429744
    • InflateRect.USER32(?,000000FE,000000FE), ref: 00429753
    • GetSysColorBrush.USER32(0000000F), ref: 00429780
    • FillRect.USER32(?,?,00000000), ref: 0042978E
    • ExcludeClipRect.GDI32(?,?,?,?,?,00000000,004297F7,?,00000000,?,?,?,00000000,?,00000000,000000EC), ref: 004297B3
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Rect$Window$LongMetricsSystem$BrushClipColorExcludeFillInflateOffset
    • String ID:
    • API String ID: 239630386-0
    • Opcode ID: dd572b06ce6a9f1711ab6a73a3964b784ffdebf45be05d8fe4be52217e9dbe02
    • Instruction ID: 3162c11f20d75f6f6db625e5813a0a8015ffed40dc51e8e9557ea00dbddcd5de
    • Opcode Fuzzy Hash: dd572b06ce6a9f1711ab6a73a3964b784ffdebf45be05d8fe4be52217e9dbe02
    • Instruction Fuzzy Hash: A0414271A00119ABDB00EFA9DD82EDFB7BDEF49314F500566F905F7281DA78AE018768
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSystemMenu.USER32(00000000,00000000), ref: 0044DBB3
    • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 0044DBD1
    • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0044DBDE
    • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0044DBEB
    • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0044DBF8
    • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 0044DC05
    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 0044DC12
    • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0044DC1F
    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0044DC3D
    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 0044DC59
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Menu$Delete$EnableItem$System
    • String ID:
    • API String ID: 3985193851-0
    • Opcode ID: 857ede4785eb586bb4da2094b121b9ce82dfb63515eda980b3039d4b124bb0cd
    • Instruction ID: 318aefb341a55fe53f3c3406a87999ac208ab219f0a119b387e4ee8a82761a1e
    • Opcode Fuzzy Hash: 857ede4785eb586bb4da2094b121b9ce82dfb63515eda980b3039d4b124bb0cd
    • Instruction Fuzzy Hash: E5214F70780305BAE320AB24CDCEF59BBD95B04B19F0540B9B6097F2D3C6FDA990965C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetWindowPos.USER32(00000000,000000FF,?,?,?,?,00000010,00000000,0043ABCD), ref: 0043AAD9
    • GetTickCount.KERNEL32 ref: 0043AADE
    • SystemParametersInfoA.USER32(00001016,00000000,?,00000000), ref: 0043AB19
    • SystemParametersInfoA.USER32(00001018,00000000,00000000,00000000), ref: 0043AB31
    • AnimateWindow.USER32(00000000,00000064,00000001), ref: 0043AB77
    • ShowWindow.USER32(00000000,00000004,00000000,000000FF,?,?,?,?,00000010,00000000,0043ABCD), ref: 0043AB9A
      • Part of subcall function 0043DC48: GetCursorPos.USER32(?), ref: 0043DC4C
    • GetTickCount.KERNEL32 ref: 0043ABB4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$CountInfoParametersSystemTick$AnimateCursorShow
    • String ID: {E
    • API String ID: 3024527889-776765886
    • Opcode ID: 4fe03de71e497a7c8ca6216ab142ad7a6d114a98204c32252e005005192b0a78
    • Instruction ID: dbb8ebc3a79dc56fd023673be05ef07d8d74f8cfda69ca1242e829bef8b525b9
    • Opcode Fuzzy Hash: 4fe03de71e497a7c8ca6216ab142ad7a6d114a98204c32252e005005192b0a78
    • Instruction Fuzzy Hash: 26513D34A00209DFEB10DF99C986E9EB3F5AF08304F605566F640E7296D779AE40CB99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • MulDiv.KERNEL32(?,?,?), ref: 00432859
    • MulDiv.KERNEL32(?,?,?), ref: 00432873
    • MulDiv.KERNEL32(?,?,?), ref: 004328A1
    • MulDiv.KERNEL32(?,?,?), ref: 004328B7
    • MulDiv.KERNEL32(?,?,?), ref: 004328EF
    • MulDiv.KERNEL32(?,?,?), ref: 00432907
    • MulDiv.KERNEL32(?,?,0000001F), ref: 00432951
    • MulDiv.KERNEL32(?,?,0000001F), ref: 0043297A
    • MulDiv.KERNEL32(00000000,?,0000001F), ref: 004329A0
      • Part of subcall function 0041CA9C: MulDiv.KERNEL32(00000000,?,00000048), ref: 0041CAA9
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4c5e69e532f2e07cb6d886cd83b8ef4f40cac6cbecc40e4ccdd7a65bec582168
    • Instruction ID: f0fd280cefe1609448eaaefd454efffafb907274aa9c324a4bd8e59a5c194d0e
    • Opcode Fuzzy Hash: 4c5e69e532f2e07cb6d886cd83b8ef4f40cac6cbecc40e4ccdd7a65bec582168
    • Instruction Fuzzy Hash: 8E5150B0604751AFC320EB69CA45B6BBBFCAF49304F045C2EB9D5C7352C679E8458B29
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SelectObject.GDI32(?,00000000), ref: 0042227A
    • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,00422333,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 004222E8
    • SelectObject.GDI32(?,?), ref: 00422327
    • DeleteObject.GDI32(00000000), ref: 0042232D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Object$Select$DeleteErrorLast
    • String ID: ($BM
    • API String ID: 1836871137-2980357723
    • Opcode ID: 04ebc68d6699112633888544662c9a462209f96f807f1260892732bd397b10f7
    • Instruction ID: db2386229a475589866876d62050c28099ec3528d6e503763828d2fe6fa40b0d
    • Opcode Fuzzy Hash: 04ebc68d6699112633888544662c9a462209f96f807f1260892732bd397b10f7
    • Instruction Fuzzy Hash: 67D16170A00218AFDF04DFA9D985BAEBBB5FF49304F40446AF904EB395D7789840CB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetThreadLocale.KERNEL32(00000000,0040C753,?,?,00000000,00000000), ref: 0040C4BE
      • Part of subcall function 0040ABC0: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040ABDE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Locale$InfoThread
    • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
    • API String ID: 4232894706-2493093252
    • Opcode ID: 2a22105aa6e2776fa71f81704e31afcd89186a1d81a0e4baf2d25428db8d3324
    • Instruction ID: 4b79ce0a30f2bc440bb24c65e156b4dc74505418b3a4bd76f24e32f1ce4d3ef0
    • Opcode Fuzzy Hash: 2a22105aa6e2776fa71f81704e31afcd89186a1d81a0e4baf2d25428db8d3324
    • Instruction Fuzzy Hash: 30614F347142099BD700FBA9D891A9E77AA9B88304F50953BB100BB3C6CB3DED059B59
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0040EB81
    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0040EB9D
    • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 0040EBD6
    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0040EC53
    • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 0040EC6C
    • VariantCopy.OLEAUT32(?), ref: 0040ECA1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ArraySafe$BoundIndex$CopyCreateVariant
    • String ID:
    • API String ID: 351091851-3916222277
    • Opcode ID: e097b3cb944edf1d61b756a614b49b7133427e9fd4d59051032893853cdbf4c2
    • Instruction ID: eb195dc6667f6abb3566a693631532629aaf4efcc67e1a21f18182354eb04d37
    • Opcode Fuzzy Hash: e097b3cb944edf1d61b756a614b49b7133427e9fd4d59051032893853cdbf4c2
    • Instruction Fuzzy Hash: 42512D759006199BCB22DB5AC881BD9B3BCAF4C304F0045EAF509F7242D639AF948F69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetActiveWindow.USER32 ref: 004524FF
    • GetWindowRect.USER32(?,?), ref: 00452559
    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 00452591
    • MessageBoxA.USER32(?,?,?,?), ref: 004525D2
    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,00452648), ref: 00452622
    • SetActiveWindow.USER32(?,00452648), ref: 00452633
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$Active$MessageRect
    • String ID: (
    • API String ID: 3147912190-3887548279
    • Opcode ID: 47d486c30f2b8ff16540ad982366f7e6148b7a0c01582ca0c5af630856615258
    • Instruction ID: c78b8b9a0a1657b64d5cad885165de1530d4f2b9d7957e0d2a555d423ca10d53
    • Opcode Fuzzy Hash: 47d486c30f2b8ff16540ad982366f7e6148b7a0c01582ca0c5af630856615258
    • Instruction Fuzzy Hash: AC413C75E00208AFDB04DBA9CD96FAEB7F9EB49305F14446AF901E7392D674AD008B54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • MulDiv.KERNEL32(?,000009EC,00000000), ref: 0041FF0A
    • MulDiv.KERNEL32(?,000009EC,00000000), ref: 0041FF27
    • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 0041FF53
    • GetEnhMetaFileHeader.GDI32(00000016,00000064,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC,00000000), ref: 0041FF73
    • DeleteEnhMetaFile.GDI32(00000016), ref: 0041FF94
    • SetWinMetaFileBits.GDI32(00000016,?,00000000,00000008,00000016,00000064,?,00000016,?,00000000,00000008,?,000009EC,00000000,?,000009EC), ref: 0041FFA7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: FileMeta$Bits$DeleteHeader
    • String ID: `
    • API String ID: 1990453761-2679148245
    • Opcode ID: a2a3d0aaf4859e9b17caa47c6a3bf4fdb9641faef6f86bafd949e8266d41b928
    • Instruction ID: 5fd62f6ef73f8f00fe9145718f3398c2ff119db9b1dd46570dfaa351c284069e
    • Opcode Fuzzy Hash: a2a3d0aaf4859e9b17caa47c6a3bf4fdb9641faef6f86bafd949e8266d41b928
    • Instruction Fuzzy Hash: 1B410EB5D00208AFDB00DFA5C485AEEB7F9EF48710F10846AF904E7241D7799D45CB68
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCurrentThreadId.KERNEL32 ref: 004192CB
    • GetCurrentThreadId.KERNEL32 ref: 004192DA
      • Part of subcall function 00419298: ResetEvent.KERNEL32(000001C8,00419315), ref: 0041929E
    • RtlEnterCriticalSection.NTDLL(00457868), ref: 0041931F
    • InterlockedExchange.KERNEL32(004553E8,?), ref: 0041933B
    • RtlLeaveCriticalSection.NTDLL(00457868), ref: 00419394
    • RtlEnterCriticalSection.NTDLL(00457868), ref: 004193F3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CriticalSection$CurrentEnterThread$EventExchangeInterlockedLeaveReset
    • String ID: 0pE
    • API String ID: 2189153385-4070830187
    • Opcode ID: 24f99b26aed5fb6cda52047c8d281c2c45e257d240362127c655606001ec30e0
    • Instruction ID: f47ebbe8574f06b454dd58c2a075ee2126a28584cda1feb7fc91c45abda870a0
    • Opcode Fuzzy Hash: 24f99b26aed5fb6cda52047c8d281c2c45e257d240362127c655606001ec30e0
    • Instruction Fuzzy Hash: 0631F930A04708AFD701DF65D862AAEB7F8EB49704F6584B7F810D3692D73C9D41CA69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00424094
    • GetSystemMetrics.USER32(00000000), ref: 004240A9
    • GetSystemMetrics.USER32(00000001), ref: 004240B4
    • lstrcpy.KERNEL32(?,DISPLAY), ref: 004240DE
      • Part of subcall function 00423B64: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 00423BE4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: System$Metrics$AddressInfoParametersProclstrcpy
    • String ID: <@B$DISPLAY$GetMonitorInfoW
    • API String ID: 2545840971-4104206284
    • Opcode ID: 3f895af619b30e13130e0cdc8f0a2a2bc577794c23255151521575782870c592
    • Instruction ID: 85b6e27fae4a6a28760b1a05f16f2310ab3ec7201f05fdc20dd3408ffdff8636
    • Opcode Fuzzy Hash: 3f895af619b30e13130e0cdc8f0a2a2bc577794c23255151521575782870c592
    • Instruction Fuzzy Hash: 281136717053205FD720CF64AC047ABB7E8EB45311F40893FEE1597281D7B5AA90C7A8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetMonitorInfoA.USER32(?,?), ref: 00423EC5
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00423EEC
    • GetSystemMetrics.USER32(00000000), ref: 00423F01
    • GetSystemMetrics.USER32(00000001), ref: 00423F0C
    • lstrcpy.KERNEL32(?,DISPLAY), ref: 00423F36
      • Part of subcall function 00423B64: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 00423BE4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: System$InfoMetrics$AddressMonitorParametersProclstrcpy
    • String ID: DISPLAY$GetMonitorInfo
    • API String ID: 1539801207-1633989206
    • Opcode ID: fe1a97b85135e1dc889cde56dfdffca43858571e180c0134b544ea247fbf4660
    • Instruction ID: 3d4906fac2e28319e77036b7699f1fe43c6c878890191fbc21946bcf31dbf4d4
    • Opcode Fuzzy Hash: fe1a97b85135e1dc889cde56dfdffca43858571e180c0134b544ea247fbf4660
    • Instruction Fuzzy Hash: 1A112172B113649FE3209F24BC44BA7B7F8EB05712F41443FF85597281C378A9408BA8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00423FC0
    • GetSystemMetrics.USER32(00000000), ref: 00423FD5
    • GetSystemMetrics.USER32(00000001), ref: 00423FE0
    • lstrcpy.KERNEL32(?,DISPLAY), ref: 0042400A
      • Part of subcall function 00423B64: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 00423BE4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: System$Metrics$AddressInfoParametersProclstrcpy
    • String ID: DISPLAY$GetMonitorInfoA$h?B
    • API String ID: 2545840971-960080885
    • Opcode ID: 2e60abdc80bcbeb838f7c912902b5d9f7c71767d6da0460b0bd41ba0bc634e03
    • Instruction ID: 82b1db52922ee95fca7250ba542f93181c3cec3f8cdd39d6bc826861ec7d018a
    • Opcode Fuzzy Hash: 2e60abdc80bcbeb838f7c912902b5d9f7c71767d6da0460b0bd41ba0bc634e03
    • Instruction Fuzzy Hash: E211E4717013249FD720DF25AC44BA7B7E8EB49311F40443FEE099B281D674A880CBA8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RtlEnterCriticalSection.NTDLL(004575C8), ref: 00401AED
    • LocalFree.KERNEL32(00544FF0,00000000,00401B96), ref: 00401AFF
    • VirtualFree.KERNEL32(?,00000000,00008000,00544FF0,00000000,00401B96), ref: 00401B1E
    • LocalFree.KERNEL32(00545FF0,?,00000000,00008000,00544FF0,00000000,00401B96), ref: 00401B5D
    • RtlLeaveCriticalSection.NTDLL(004575C8), ref: 00401B86
    • RtlDeleteCriticalSection.NTDLL(004575C8), ref: 00401B90
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
    • String ID: $fT
    • API String ID: 3782394904-2678353634
    • Opcode ID: d687a1042bb5589a19c8275a1315c79636e40e1ff3b915422276dff362cd546d
    • Instruction ID: a2b8fae74a7601290724da3be73f4de4e5c79cc36bdac2d19bb199357ab56970
    • Opcode Fuzzy Hash: d687a1042bb5589a19c8275a1315c79636e40e1ff3b915422276dff362cd546d
    • Instruction Fuzzy Hash: 22118E706087486AE715AB69BC45B1A3BE8A745715F9040BBF804A6AF3F77CE844871C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,00403D9E,?,?,?,?,?,?,?,00403E3E,004027CB), ref: 00403D09
    • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,00403D9E,?,?,?,?,?,?,?,00403E3E), ref: 00403D0F
    • GetStdHandle.KERNEL32(000000F5,00403D58,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,00403D9E), ref: 00403D24
    • WriteFile.KERNEL32(00000000,000000F5,00403D58,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,00403D9E), ref: 00403D2A
    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D48
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: FileHandleWrite$Message
    • String ID: Error$Runtime error at 00000000
    • API String ID: 1570097196-2970929446
    • Opcode ID: 8cddfe5b814e4c6bfe7b809da2effd6c90d921feeab10e1aef6de1231959619c
    • Instruction ID: 3c0037c8f9f06badeb06386af506387736f5f72454abbfe5cc63cecaca823efe
    • Opcode Fuzzy Hash: 8cddfe5b814e4c6bfe7b809da2effd6c90d921feeab10e1aef6de1231959619c
    • Instruction Fuzzy Hash: EEF096616C938078EA20B7946C17F6E264C5744F27F244ABFB614B80E387BC89C4D66D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00421D04: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,0042093B,00000000,004209C7), ref: 00421D9D
    • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 00421819
    • SetStretchBltMode.GDI32(?,00000004), ref: 00421827
    • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 0042183F
    • SetStretchBltMode.GDI32(00000000,00000003), ref: 0042185C
    • SelectObject.GDI32(?,?), ref: 004218D1
    • SelectObject.GDI32(?,00000000), ref: 00421930
    • DeleteDC.GDI32(00000000), ref: 0042193F
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: BrushModeObjectSelectStretch$CreateDeleteHalftonePalette
    • String ID:
    • API String ID: 2197772979-0
    • Opcode ID: b310130bea0fc90bd593b8538faf18fd4db419661ce05483e878f22b327837d5
    • Instruction ID: ff95ec8975555167c15d770c9bb0aa272268bd28cc4777121a81b5f7a5d60943
    • Opcode Fuzzy Hash: b310130bea0fc90bd593b8538faf18fd4db419661ce05483e878f22b327837d5
    • Instruction Fuzzy Hash: 38715DB5B00205AFDB50EFA9C985F9AB7F8AF08304F51456AF508E7392D638ED40CB54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCapture.USER32 ref: 0044EEFD
    • GetCapture.USER32 ref: 0044EF0C
    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 0044EF12
    • ReleaseCapture.USER32 ref: 0044EF17
    • GetActiveWindow.USER32 ref: 0044EF3E
    • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 0044EFD4
    • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 0044F041
    • GetActiveWindow.USER32 ref: 0044F050
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CaptureMessageSend$ActiveWindow$Release
    • String ID:
    • API String ID: 862346643-0
    • Opcode ID: 7349f2ee1fde79b81b89f41f8dc902fd5878b36bae0c06892f1a879cc491673c
    • Instruction ID: b6ca87acf413b6ad07b14532af5c2bdb4d8811002945c753866550132c649da0
    • Opcode Fuzzy Hash: 7349f2ee1fde79b81b89f41f8dc902fd5878b36bae0c06892f1a879cc491673c
    • Instruction Fuzzy Hash: 26512D74A04244EFE710EF66D946B5A77F5EB48704F6540BAF804AB3A2D779AD00CB18
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetObjectA.GDI32(?,00000018,?), ref: 0041DAE5
    • SelectObject.GDI32(?,?), ref: 0041DB76
    • SelectObject.GDI32(?,00000000), ref: 0041DB85
    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 0041DBB1
    • SelectObject.GDI32(?,00000000), ref: 0041DBBF
    • SelectObject.GDI32(?,00000000), ref: 0041DBCD
    • DeleteDC.GDI32(?), ref: 0041DBE3
    • DeleteDC.GDI32(?), ref: 0041DBEC
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Object$Select$Delete$Stretch
    • String ID:
    • API String ID: 3399755780-0
    • Opcode ID: 88fccc4a4e4401c4ebd0333dcfee4e3e0c2dee9169e125c52cb9cad83764bd9f
    • Instruction ID: 42e2982d0c07ac33cc1702a0dd27c7263410dd2fa205875626944bac87ef29c3
    • Opcode Fuzzy Hash: 88fccc4a4e4401c4ebd0333dcfee4e3e0c2dee9169e125c52cb9cad83764bd9f
    • Instruction Fuzzy Hash: 924101B1E44209AFDB10DBE9CC42FAFB7BCEB08704F124426F606F7281D679A9508764
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SaveDC.GDI32 ref: 00437432
      • Part of subcall function 00431540: GetWindowOrgEx.GDI32(?), ref: 0043154E
      • Part of subcall function 00431540: SetWindowOrgEx.GDI32(?,?,?,00000000), ref: 00431564
    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00437453
    • GetWindowLongA.USER32(00000000,000000EC), ref: 00437469
    • GetWindowLongA.USER32(00000000,000000F0), ref: 0043748B
    • SetRect.USER32(?,00000000,00000000,?,?), ref: 004374B7
    • DrawEdge.USER32(?,?,?,00000000), ref: 004374C6
    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 004374EB
    • RestoreDC.GDI32(?,?), ref: 0043755C
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$Rect$ClipIntersectLong$DrawEdgeRestoreSave
    • String ID:
    • API String ID: 2976466617-0
    • Opcode ID: f32056339b0e1c640e7c5039370f2d44db3778bc1e8333b48252d8c381be545f
    • Instruction ID: 713033029dacc1d78700b31d9ee16028be0ebefc679cb614dc46180a946b9f15
    • Opcode Fuzzy Hash: f32056339b0e1c640e7c5039370f2d44db3778bc1e8333b48252d8c381be545f
    • Instruction Fuzzy Hash: 07416471B041146BDB10EF99CC81FAF77A9AF48314F10516AFA05EB392D678DD018798
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • InsertMenuItemA.USER32(?,000000FF,000000FF,0000002C), ref: 004428EC
    • GetVersion.KERNEL32(00000000,0044299B), ref: 004427DC
      • Part of subcall function 00442C50: CreatePopupMenu.USER32 ref: 00442C6B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Menu$CreateInsertItemPopupVersion
    • String ID: ,$?
    • API String ID: 133695497-2308483597
    • Opcode ID: 0714b415deceada31faf78fc51aaf16f8d3627f386dbe3a6e41ea405b20bf1cd
    • Instruction ID: 1b7fdc2b096c9fb67c38d85349ea91abe738cd6c9633c7d2a7b0fd753e4872e7
    • Opcode Fuzzy Hash: 0714b415deceada31faf78fc51aaf16f8d3627f386dbe3a6e41ea405b20bf1cd
    • Instruction Fuzzy Hash: 80612030A003449BEB11EF6ACD816AE7BE5BF49300F8445BAF840E7396E778D845CB58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetKeyboardLayoutList.USER32(00000040,?,00000000,00450257,?,020F12E8,?,004502B9,00000000,?,004351AF), ref: 00450102
    • RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,?,00000040,?,00000000,00450257,?,020F12E8,?,004502B9,00000000,?,004351AF), ref: 0045016A
    • RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,?,00000000,00450213,?,80000002,00000000,00000000,00020019,?,00000040,?), ref: 004501A4
    • RegCloseKey.ADVAPI32(?,0045021A,00000000,?,?,00000000,00450213,?,80000002,00000000,00000000,00020019,?,00000040,?,00000000), ref: 0045020D
    Strings
    • System\CurrentControlSet\Control\Keyboard Layouts\%.8x, xrefs: 00450154
    • layout text, xrefs: 0045019B
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CloseKeyboardLayoutListOpenQueryValue
    • String ID: System\CurrentControlSet\Control\Keyboard Layouts\%.8x$layout text
    • API String ID: 1703357764-2652665750
    • Opcode ID: 28b526f8ab4202f5437280ef027efee10a78b3975ee8f338ec9cea4e33ee96bb
    • Instruction ID: 69fca651711efc1f59fa06064c3af1e9cc0b741d16560d07d2c151e71b18603d
    • Opcode Fuzzy Hash: 28b526f8ab4202f5437280ef027efee10a78b3975ee8f338ec9cea4e33ee96bb
    • Instruction Fuzzy Hash: BC416978A046099FDB10DF95C985B9EB7F8EB48305F5040E6E904E7392D778AE04CB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetDesktopWindow.USER32 ref: 004336EB
    • SelectObject.GDI32(?,00000000), ref: 00433721
    • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 00433747
    • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 00433769
    • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 00433788
    • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 004337A2
    • SelectObject.GDI32(?,?), ref: 004337AF
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ObjectSelect$DesktopWindow
    • String ID:
    • API String ID: 2666862715-0
    • Opcode ID: f786a857da8f479830cb9f5fe9ea4d51fa701163b64f14dc77fbbb6e96b5aacb
    • Instruction ID: c18c82f711aa2c11210e670bea90b027893c0057e945c1f42dd73251a943b1c6
    • Opcode Fuzzy Hash: f786a857da8f479830cb9f5fe9ea4d51fa701163b64f14dc77fbbb6e96b5aacb
    • Instruction Fuzzy Hash: AB312DB6A00219BFDB40DEEDCC85DAFBBBCEF09704B414569B504F7281C679AD048B64
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00451E88: GetWindowTextA.USER32(?,?,00000100), ref: 00451EAB
    • GetTickCount.KERNEL32 ref: 004542CC
      • Part of subcall function 0040965C: GetLocalTime.KERNEL32(?), ref: 00409664
      • Part of subcall function 00451ED4: SetWindowTextA.USER32(?,00000000), ref: 00451F21
    Strings
    • RDP Admin Restore, xrefs: 00454302
    • "Windows started on "dddd, d mmmm, yyyy, "at" hh:nn:ss AM/PM, xrefs: 00454315
    • Uptime: , xrefs: 00454327
    • days,, xrefs: 00454341
    • h "hours," n "minutes," s "seconds", xrefs: 0045434F
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: TextWindow$CountLocalTickTime
    • String ID: days,$ h "hours," n "minutes," s "seconds"$"Windows started on "dddd, d mmmm, yyyy, "at" hh:nn:ss AM/PM$RDP Admin Restore$Uptime:
    • API String ID: 1223478798-4145212424
    • Opcode ID: 3e2bcd335c642750c67e70741a147f9949c60f6ee505a5f3ccb5b14e3d95b04b
    • Instruction ID: 248153d36d15b584174674eca7047f2696d25306f2b452e597def70220bcab9e
    • Opcode Fuzzy Hash: 3e2bcd335c642750c67e70741a147f9949c60f6ee505a5f3ccb5b14e3d95b04b
    • Instruction Fuzzy Hash: 6221BD30A00309AFCF00EF91D8429DEBBB5FF88709F50446AF800B62A2C7395964DB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCursorPos.USER32 ref: 00450377
    • WindowFromPoint.USER32(?,?), ref: 00450384
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00450392
    • GetCurrentThreadId.KERNEL32 ref: 00450399
    • SendMessageA.USER32(00000000,00000084,00000000,00000000), ref: 004503B2
    • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 004503C9
    • SetCursor.USER32(00000000), ref: 004503DB
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
    • String ID:
    • API String ID: 1770779139-0
    • Opcode ID: 3619f4bbe49fd4f845677722e6f93317df3ee6c307d023c7f5abb0abf3bd53be
    • Instruction ID: 51f00424ca2c0897c08ea7d86530c20efe3c9efc25d5adc6e5c55696d2a05744
    • Opcode Fuzzy Hash: 3619f4bbe49fd4f845677722e6f93317df3ee6c307d023c7f5abb0abf3bd53be
    • Instruction Fuzzy Hash: 9801DF262013003BD6203A361C86F7F2568CB81B5AF51053FBD06BB2C3EA7E9C1592BD
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FillRect.USER32(?,?), ref: 0044BF29
    • GetClientRect.USER32(00000000,?), ref: 0044BF54
    • FillRect.USER32(?,?,00000000), ref: 0044BF73
      • Part of subcall function 0044BE24: CallWindowProcA.USER32(?,?,?,?,?), ref: 0044BE5E
    • BeginPaint.USER32(?,?), ref: 0044BFEB
    • GetWindowRect.USER32(?,?), ref: 0044C018
    • EndPaint.USER32(?,?,0044C08C), ref: 0044C078
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Rect$FillPaintWindow$BeginCallClientProc
    • String ID:
    • API String ID: 901200654-0
    • Opcode ID: 6d6fd959c51a2c6519b49bc8cb121a686568313aac4915b393d99989b15f6060
    • Instruction ID: a77825f4bebf325d8837fe48c0a9f01247ada9d930b319b46d7a0813df43a50a
    • Opcode Fuzzy Hash: 6d6fd959c51a2c6519b49bc8cb121a686568313aac4915b393d99989b15f6060
    • Instruction Fuzzy Hash: 4951F930900108EFDB50DBE9C989A9EB7F8EB49314F1581A6E508EB352C738EE45CF58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SelectObject.GDI32(00000000,?), ref: 00437601
    • BeginPaint.USER32(00000000,?,00000000,004376C2,?,00000000,?,00000000,00000000,00000000,00000000,?), ref: 00437623
    • EndPaint.USER32(00000000,?,00000000,00000000,00000000,?,?,00000000,?,00000000,00000000,00000000,00000000,?), ref: 00437690
    • SelectObject.GDI32(00000000,?), ref: 004376AA
    • DeleteDC.GDI32(00000000), ref: 004376B3
    • DeleteObject.GDI32(?), ref: 004376BC
      • Part of subcall function 00437094: BeginPaint.USER32(00000000,?), ref: 004370BA
      • Part of subcall function 00437094: EndPaint.USER32(00000000,?,004371BB), ref: 004371AE
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Paint$Object$BeginDeleteSelect
    • String ID:
    • API String ID: 1227948915-0
    • Opcode ID: 5153a285081d699170f1bed451637ec3ae07b5a207a543d86c83ce1c7f6d680b
    • Instruction ID: 5ee0010d2563e0273e015c08181a35bfdcaaf2fa8081ab52920779d5e56e3496
    • Opcode Fuzzy Hash: 5153a285081d699170f1bed451637ec3ae07b5a207a543d86c83ce1c7f6d680b
    • Instruction Fuzzy Hash: F9414F71B04204AFC710EBA9CC86F9EB7F8AB4C304F10447AF906EB291DA79DD058B54
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetWindowLongA.USER32(?,000000FC,?), ref: 0042FA20
    • GetWindowLongA.USER32(?,000000F0), ref: 0042FA2B
    • GetWindowLongA.USER32(?,000000F4), ref: 0042FA3D
    • SetWindowLongA.USER32(?,000000F4,?), ref: 0042FA50
    • SetPropA.USER32(?,00000000,00000000), ref: 0042FA67
    • SetPropA.USER32(?,00000000,00000000), ref: 0042FA7E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: LongWindow$Prop
    • String ID:
    • API String ID: 3887896539-0
    • Opcode ID: a941c5b60c362f6c4be1762bfcc6f3123e8300ce076865673a55bd8d90d4aac1
    • Instruction ID: 11647139e794d98a95748cfd39ddfe1def9ddcb375a1d7fb6c6698d14ed6be96
    • Opcode Fuzzy Hash: a941c5b60c362f6c4be1762bfcc6f3123e8300ce076865673a55bd8d90d4aac1
    • Instruction Fuzzy Hash: 34110D75504208BFCB00DF99DC84EAA37A8BB08365F144635F919DB2A2D735EA50DB68
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0041CFFC: CreateBrushIndirect.GDI32(?), ref: 0041D0A6
    • UnrealizeObject.GDI32(00000000), ref: 0041D874
    • SelectObject.GDI32(?,00000000), ref: 0041D886
    • SetBkColor.GDI32(?,00000000), ref: 0041D8A9
    • SetBkMode.GDI32(?,00000002), ref: 0041D8B4
    • SetBkColor.GDI32(?,00000000), ref: 0041D8CF
    • SetBkMode.GDI32(?,00000001), ref: 0041D8DA
      • Part of subcall function 0041C33C: GetSysColor.USER32(?), ref: 0041C346
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
    • String ID:
    • API String ID: 3527656728-0
    • Opcode ID: e8f072ecde125f76ea8caef5a2bc52dc88cdb36245a126bcec2d07e1d9e5ddca
    • Instruction ID: d22a2bb22f29350ec6586fe9e90c27ba5bc9873044935b3c4b7315c373256def
    • Opcode Fuzzy Hash: e8f072ecde125f76ea8caef5a2bc52dc88cdb36245a126bcec2d07e1d9e5ddca
    • Instruction Fuzzy Hash: 93F0CDB16401009BDA00FFAADDC6E4B3B9C9F0830970040AAB905EF287CA7CE8615739
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00402F44: GetKeyboardType.USER32(00000000), ref: 00402F49
      • Part of subcall function 00402F44: GetKeyboardType.USER32(00000001), ref: 00402F55
    • GetCommandLineA.KERNEL32 ref: 00405B2F
    • GetVersion.KERNEL32 ref: 00405B43
    • GetVersion.KERNEL32 ref: 00405B54
    • GetCurrentThreadId.KERNEL32 ref: 00405B90
      • Part of subcall function 00402F74: RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402F96
      • Part of subcall function 00402F74: RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00402FE5,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402FC9
      • Part of subcall function 00402F74: RegCloseKey.ADVAPI32(?,00402FEC,00000000,?,00000004,00000000,00402FE5,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402FDF
    • GetThreadLocale.KERNEL32 ref: 00405B70
      • Part of subcall function 00405A00: GetLocaleInfoA.KERNEL32(?,00001004,?,00000007,00000000,00405A66), ref: 00405A26
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: KeyboardLocaleThreadTypeVersion$CloseCommandCurrentInfoLineOpenQueryValue
    • String ID:
    • API String ID: 3734044017-0
    • Opcode ID: 182c47c6635438d3bd51823ec064eda802c9569e1df5ffcbb88f0d824f82f8cc
    • Instruction ID: 1cd44a7518bbc24a9db302624f405e445d8d6538355202b659b039828fecc3eb
    • Opcode Fuzzy Hash: 182c47c6635438d3bd51823ec064eda802c9569e1df5ffcbb88f0d824f82f8cc
    • Instruction Fuzzy Hash: 2401C0A440874599E710BFB2BC0A35A3AB0AB0134AF5040BFE400B62F3E73C91449FAE
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCursorPos.USER32(?), ref: 0043D9D8
    • SetCursor.USER32(00000000,?,00000000,0043DB70), ref: 0043DA6A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Cursor
    • String ID: 8}D${E
    • API String ID: 3268636600-2158138060
    • Opcode ID: e4233da1c8f60a74aca8865c079ebf9c3c5ebc7db4ee7924cdab32f126f3f54b
    • Instruction ID: c8850904b4a6a0e48fa97016291804e536ef60362ca76e45bbf6604309cf21be
    • Opcode Fuzzy Hash: e4233da1c8f60a74aca8865c079ebf9c3c5ebc7db4ee7924cdab32f126f3f54b
    • Instruction Fuzzy Hash: 80C12831E00609CBCB10DFA9D98599EF7F1BF48304F2595AAE811AB255DB38FE41CB48
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetDesktopWindow.USER32 ref: 00430B88
    • GetDesktopWindow.USER32 ref: 00430CAD
    • SetCursor.USER32(00000000), ref: 00430D02
      • Part of subcall function 0043AFB8: ShowCursor.USER32(000000FF,00000000,?,00430CDD), ref: 0043AFEF
    • SetCursor.USER32(00000000), ref: 00430CED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Cursor$DesktopWindow$Show
    • String ID: {E
    • API String ID: 110329033-776765886
    • Opcode ID: 5036b034ddc76329156a08097d90d14b5bceeb956c790d2b9da71b21a4d1a403
    • Instruction ID: 2ed0da0086b02ed93d2aeadec3a4c765b71e8b23af19b84055746b9266284bd1
    • Opcode Fuzzy Hash: 5036b034ddc76329156a08097d90d14b5bceeb956c790d2b9da71b21a4d1a403
    • Instruction Fuzzy Hash: 3A916D346093418FD704DF69E894A56B7E6BB48309F14D67AE8448B3A3D738FC45CB49
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetKeyState.USER32(00000011), ref: 0043077B
    • IsWindowVisible.USER32(00000000), ref: 004307F9
      • Part of subcall function 00430710: IsChild.USER32(00000000,00000000), ref: 00430740
    • PtInRect.USER32(?,?,?), ref: 00430854
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ChildRectStateVisibleWindow
    • String ID: *C$*C
    • API String ID: 2086824273-1205451692
    • Opcode ID: c1487effff5de6ef65eed8443085cc5e446a1a83fef5c574e46c4b0ad7e871ff
    • Instruction ID: 423fa200bf08109c8dbdcd22230082c6c8e9eee69892bd83a2a93c0e14f11c31
    • Opcode Fuzzy Hash: c1487effff5de6ef65eed8443085cc5e446a1a83fef5c574e46c4b0ad7e871ff
    • Instruction Fuzzy Hash: 5F419F30A0020A9FDB04EF99D891AEFB7B5EF08315F155676E500A7392C738AD41CBD9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C,00000000,0040B94B), ref: 0040B7FB
    • GetModuleFileNameA.KERNEL32(?,?,00000105,?,?,0000001C,00000000,0040B94B), ref: 0040B81D
      • Part of subcall function 004059A8: LoadStringA.USER32(00000000,00010000,?,00000400), ref: 004059D9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: FileLoadModuleNameQueryStringVirtual
    • String ID: @k@$Hk@$k@
    • API String ID: 902310565-2583435964
    • Opcode ID: 9e3c44bb3c3c4172c56d9baf35feaf8e9538a1f18f64abf41aadebd31a16759a
    • Instruction ID: 1750e83cb31a5f49cd91596b3b5ed3704ac0f94e9066e0d42fbe53bd43043e20
    • Opcode Fuzzy Hash: 9e3c44bb3c3c4172c56d9baf35feaf8e9538a1f18f64abf41aadebd31a16759a
    • Instruction Fuzzy Hash: 8441E770900658DFDB61DF64CC81BDAB7B8EB49305F5040EAE508AB391D778AE84CF99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • MulDiv.KERNEL32(?,?,000009EC), ref: 0042046E
    • MulDiv.KERNEL32(?,?,000009EC), ref: 00420485
    • GetWinMetaFileBits.GDI32(?,00000000,00000000,00000008,?,00000000,00420557,?,00000000,?,?,000009EC,?,?,000009EC), ref: 004204C0
    • GetWinMetaFileBits.GDI32(?,?,?,00000008,?,00000000,00420537,?,?,00000000,00000000,00000008,?,00000000,00420557), ref: 004204F3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: BitsFileMeta
    • String ID: `
    • API String ID: 858000408-2679148245
    • Opcode ID: eb31e49c0132f188e72fce5420c31cf0d650a354ca3d8765f98a47176691f4e1
    • Instruction ID: d1f1dc225d96761a7e07da76bb0f3940da6c33bf51489f83b789e6018a568944
    • Opcode Fuzzy Hash: eb31e49c0132f188e72fce5420c31cf0d650a354ca3d8765f98a47176691f4e1
    • Instruction Fuzzy Hash: 0C315875A00208ABDB00DFD5D881AFEB7F8EF08714F514466F904FB282D6789E40DBA9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(comctl32.dll), ref: 00440BD8
    • GetProcAddress.KERNEL32(00000000,ImageList_WriteEx), ref: 00440BE9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: ImageList_WriteEx$comctl32.dll$comctl32.dll
    • API String ID: 1646373207-3125200627
    • Opcode ID: 09678f9343b06abf08508fee3447bff0a95a45bc3f91c1fbb6427fd460f65397
    • Instruction ID: 87988ad361dc96410b918e49b58f97fa8ec7d9d8a0905b6934ff17ed4f64c80a
    • Opcode Fuzzy Hash: 09678f9343b06abf08508fee3447bff0a95a45bc3f91c1fbb6427fd460f65397
    • Instruction Fuzzy Hash: 17219031604701DBE714AF35AD95B2A3AACEB45749B50417AFA04E72A2DA7CED10872C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCurrentThreadId.KERNEL32 ref: 004192CB
    • GetCurrentThreadId.KERNEL32 ref: 004192DA
    • RtlEnterCriticalSection.NTDLL(00457868), ref: 0041931F
    • InterlockedExchange.KERNEL32(004553E8,?), ref: 0041933B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CurrentThread$CriticalEnterExchangeInterlockedSection
    • String ID: 0pE
    • API String ID: 2380408948-4070830187
    • Opcode ID: 20a45da9d323f001b65ec0d886a15f586ac5a8f1d4d900f55b23bf1306a076b7
    • Instruction ID: 6c3067d1ff0e785511c39e3c35fa28d3dbe6915327d64716a6bf89d7d94444fc
    • Opcode Fuzzy Hash: 20a45da9d323f001b65ec0d886a15f586ac5a8f1d4d900f55b23bf1306a076b7
    • Instruction Fuzzy Hash: C8219530A04708AFD700DB65C866BAFB7F8EB09704F558476F810A32A2D77C9E85CB59
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 00445F7E
    • SetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 00445FD0
    • DrawMenuBar.USER32(00000000), ref: 00445FDD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Menu$InfoItem$Draw
    • String ID: @wE$P
    • API String ID: 3227129158-2230044680
    • Opcode ID: cd408e7d32d1b55614ca48af7e913c6d73e7eccd917e963b9385095b68ac7024
    • Instruction ID: 56c2b4eb451c91bf0dc9e66df738c6e09bccd7601095876377227ae6f906b0e3
    • Opcode Fuzzy Hash: cd408e7d32d1b55614ca48af7e913c6d73e7eccd917e963b9385095b68ac7024
    • Instruction Fuzzy Hash: 77119D302056006BE7109F28CC81B4E7AD8AB85314F24866AF494CB3D6D679C888C78A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ShellExecuteA.SHELL32(00000000,open,cmd.exe,00000000,00000000,00000001), ref: 00453D11
    Strings
    • Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com, xrefs: 00453D1F
    • cmd.exe, xrefs: 00453CFF
    • open, xrefs: 00453D04
    • RDP Admin Restore, xrefs: 00453D1A
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ExecuteShell
    • String ID: Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com$RDP Admin Restore$cmd.exe$open
    • API String ID: 587946157-933121242
    • Opcode ID: 98ea000fdd276799e0274148750296b20fcd98a6c107847516bd1f26e1df8566
    • Instruction ID: 4db17eff587d3421142c3f81c85f98a03ffe13709aeb4c4fc4ac0424dada730b
    • Opcode Fuzzy Hash: 98ea000fdd276799e0274148750296b20fcd98a6c107847516bd1f26e1df8566
    • Instruction Fuzzy Hash: 7D015B30740304BBD710EE65DC52F9A77B8DB48B46F614577B901A7292CABCEE08865C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ShellExecuteA.SHELL32(00000000,open,taskmgr.exe,00000000,00000000,00000001), ref: 00453E4D
    Strings
    • RDP Admin Restore, xrefs: 00453E56
    • Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com, xrefs: 00453E5B
    • open, xrefs: 00453E40
    • taskmgr.exe, xrefs: 00453E3B
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ExecuteShell
    • String ID: Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com$RDP Admin Restore$open$taskmgr.exe
    • API String ID: 587946157-2043593862
    • Opcode ID: d4f5cda00bce105efb1beb87bc7dc81ccd1130b8fe901381ac0e43abeae6f254
    • Instruction ID: 6e42046e11c2595e5ae1113d5c3678ec9e52c4cc2be42100e83ab1bdc43e5fc7
    • Opcode Fuzzy Hash: d4f5cda00bce105efb1beb87bc7dc81ccd1130b8fe901381ac0e43abeae6f254
    • Instruction Fuzzy Hash: 76015E31740304ABD710EE61DC53F5A77E8D748B47F614576B900A7292CAB8EE08864C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • ShellExecuteA.SHELL32(00000000,open,lusrmgr.msc,00000000,00000000,00000001), ref: 00453F8D
    Strings
    • lusrmgr.msc, xrefs: 00453F7B
    • open, xrefs: 00453F80
    • Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com, xrefs: 00453F9B
    • RDP Admin Restore, xrefs: 00453F96
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ExecuteShell
    • String ID: Bad Password! If you want to buy "RPD Admin Restore" write to official developer! E-mail: sllrdp@yahoo.com$RDP Admin Restore$lusrmgr.msc$open
    • API String ID: 587946157-2325833819
    • Opcode ID: 6ee5fd389fd7803c3736113ecbed8e4349dda0d017ef510150492d32b55778f5
    • Instruction ID: 12ebc486f294e42bb6c50b0e9269d527caf9eb6e3cc0e33b05ab867baf255090
    • Opcode Fuzzy Hash: 6ee5fd389fd7803c3736113ecbed8e4349dda0d017ef510150492d32b55778f5
    • Instruction Fuzzy Hash: 7D015E32B44304BBD710EE61DC52F5A77A8E748B4AF614577F900A72D2DABCEA04865C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402F96
    • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,00402FE5,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402FC9
    • RegCloseKey.ADVAPI32(?,00402FEC,00000000,?,00000004,00000000,00402FE5,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 00402FDF
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CloseOpenQueryValue
    • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
    • API String ID: 3677997916-4173385793
    • Opcode ID: 20564dede97b4254f3f2801c7953b15dfdb44dc3439c9a0b6e15dd72165f089b
    • Instruction ID: 08033cc5f34645b339690b0924f746be98f0c3d12c8297cdba6718cf65266f08
    • Opcode Fuzzy Hash: 20564dede97b4254f3f2801c7953b15dfdb44dc3439c9a0b6e15dd72165f089b
    • Instruction Fuzzy Hash: E6019279A00309BADB11DB90DC52FBE77BCEB08B01F5001B6B900F65D1E6789A10D75C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • DrawEdge.USER32(00000000,?,00000006,00000002), ref: 00442DAF
    • OffsetRect.USER32(?,00000001,00000001), ref: 00442E00
    • DrawTextA.USER32(00000000,00000000,00000000,?,?), ref: 00442E35
    • OffsetRect.USER32(?,000000FF,000000FF), ref: 00442E42
    • DrawTextA.USER32(00000000,00000000,00000000,?,?), ref: 00442EA9
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Draw$OffsetRectText$Edge
    • String ID:
    • API String ID: 3610532707-0
    • Opcode ID: cc20478ed3c651e2fab5e437044963fdcc09f3383fc53349638dbcb130a17623
    • Instruction ID: e909588104d126fefd4cfcc0db25118ba83d24f84fa8747c0b9b48ddaa4bfe02
    • Opcode Fuzzy Hash: cc20478ed3c651e2fab5e437044963fdcc09f3383fc53349638dbcb130a17623
    • Instruction Fuzzy Hash: 1A51A2B0E00604AFEB10EBA9C981B9F77A5AF45314F648167F910A7396C7BCDD40875C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • OffsetRect.USER32(?,00000001,00000001), ref: 0042B5EE
    • DrawTextA.USER32(00000000,00000000,00000000,?,00000000), ref: 0042B626
    • OffsetRect.USER32(?,000000FF,000000FF), ref: 0042B630
    • DrawTextA.USER32(00000000,00000000,00000000,?,00000000), ref: 0042B668
    • DrawTextA.USER32(00000000,00000000,00000000,?,00000000), ref: 0042B68F
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: DrawText$OffsetRect
    • String ID:
    • API String ID: 1886049697-0
    • Opcode ID: 62ea00ac947afae7d4b5afa9c771e1063f09dd33cfbb504f1fccafdef2a04ffd
    • Instruction ID: f5f004cfdde6f6e0baa86955137b68a9834e10f28b0423c79b533fcd1dedbf93
    • Opcode Fuzzy Hash: 62ea00ac947afae7d4b5afa9c771e1063f09dd33cfbb504f1fccafdef2a04ffd
    • Instruction Fuzzy Hash: 43318270600114AFDB15FB69CC85B8B7BA9EF49314F5501BAB808EB296CB799D4087A8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • BeginPaint.USER32(00000000,?), ref: 004370BA
    • SaveDC.GDI32(?), ref: 004370EE
    • ExcludeClipRect.GDI32(?,?,?,?,?,?), ref: 00437150
    • RestoreDC.GDI32(?,?), ref: 0043717A
    • EndPaint.USER32(00000000,?,004371BB), ref: 004371AE
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Paint$BeginClipExcludeRectRestoreSave
    • String ID:
    • API String ID: 3808407030-0
    • Opcode ID: 0416a2f0bf98edf925749da828e1b04f8f963ff3682d75bca4bd3a59bf172f9a
    • Instruction ID: a1a8aaae436b6a845ac31da97be01534733138528a9352a2b7d8427b56bd8c0d
    • Opcode Fuzzy Hash: 0416a2f0bf98edf925749da828e1b04f8f963ff3682d75bca4bd3a59bf172f9a
    • Instruction Fuzzy Hash: 4C4182B1A042049FCB24DF99C885F9EB7F9EF4C304F1590AAE9449B362D7399D44CB18
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 69c778ba4f1800a2a6a12381bf609e66e495d784d739c13becbe2ff6d526c13b
    • Instruction ID: 369c368e7f73a5f5abfd835cae3ea3aaad058148dd59f4bd10f4966f2147a881
    • Opcode Fuzzy Hash: 69c778ba4f1800a2a6a12381bf609e66e495d784d739c13becbe2ff6d526c13b
    • Instruction Fuzzy Hash: 391175616057995AFA50AE7B8F06B5B2788DF41748F84042FBD41EB343CABCEC46825C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCapture.USER32 ref: 00451FFB
    • SendMessageA.USER32(00000000,-0000BBEE,020F16DC,?), ref: 0045204F
    • GetWindowLongA.USER32(00000000,000000FA), ref: 0045205F
    • SendMessageA.USER32(00000000,-0000BBEE,020F16DC,?), ref: 0045207E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: MessageSend$CaptureLongWindow
    • String ID:
    • API String ID: 1158686931-0
    • Opcode ID: 2630f96726cb244c48aa72069459a317769050622a64d6ca18e1417105932ed6
    • Instruction ID: 1ba5f68cb27503eb419cdf83ad837b6ca15a3af0790e434d1e732bcc968c8227
    • Opcode Fuzzy Hash: 2630f96726cb244c48aa72069459a317769050622a64d6ca18e1417105932ed6
    • Instruction Fuzzy Hash: 0811667120520A5FD630B659CA80E6773DC9B16755B11043FFE5AD3383D6A9EC04C36C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetThreadLocale.KERNEL32(?,00000000,0040AEDF,?,?,00000000), ref: 0040AE60
      • Part of subcall function 0040ABC0: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040ABDE
    • GetThreadLocale.KERNEL32(00000000,00000004,00000000,0040AEDF,?,?,00000000), ref: 0040AE90
    • EnumCalendarInfoA.KERNEL32(Function_0000AD94,00000000,00000000,00000004), ref: 0040AE9B
    • GetThreadLocale.KERNEL32(00000000,00000003,00000000,0040AEDF,?,?,00000000), ref: 0040AEB9
    • EnumCalendarInfoA.KERNEL32(Function_0000ADD0,00000000,00000000,00000003), ref: 0040AEC4
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Locale$InfoThread$CalendarEnum
    • String ID:
    • API String ID: 4102113445-0
    • Opcode ID: 5b08fbe3fcfe4489b245582bd9dd472a98239f52eb3caad738fe6c76193d088e
    • Instruction ID: 82b5099d8f30e70ed2ccec9d0cd361a0d2ee61b8163339243b91a3854cdcb59c
    • Opcode Fuzzy Hash: 5b08fbe3fcfe4489b245582bd9dd472a98239f52eb3caad738fe6c76193d088e
    • Instruction Fuzzy Hash: 1B01F271248B087AE701A765DC12F5F325CDB5AB28F600576F400B6AC1D67CAE1086EE
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • UnhookWindowsHookEx.USER32(00000000), ref: 00450C0F
    • SetEvent.KERNEL32(00000000,0045300E), ref: 00450C2A
    • GetCurrentThreadId.KERNEL32 ref: 00450C2F
    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0045300E), ref: 00450C44
    • CloseHandle.KERNEL32(00000000,00000000,0045300E), ref: 00450C4F
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CloseCurrentEventHandleHookObjectSingleThreadUnhookWaitWindows
    • String ID:
    • API String ID: 2429646606-0
    • Opcode ID: 256b04b3201bdd8e82b2542074506909d7baf6534546d015680858a648e91365
    • Instruction ID: 54ecc7cab79b3cf8be8b58b6ce8b5fc495c5604d89e00f53f89fb7f74f7ff2bd
    • Opcode Fuzzy Hash: 256b04b3201bdd8e82b2542074506909d7baf6534546d015680858a648e91365
    • Instruction Fuzzy Hash: 42F015759083129AC718EBB9FC89A0632A8A70470FB11057AF425D72E3C638F480CB1D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetThreadLocale.KERNEL32(?,00000000,0040B0C2,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0040AF27
      • Part of subcall function 0040ABC0: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0040ABDE
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Locale$InfoThread
    • String ID: eeee$ggg$yyyy
    • API String ID: 4232894706-1253427255
    • Opcode ID: be119ef64c390b22c9107aa0d4a3611acc39163741e9c14b2ce3be6acbf228cb
    • Instruction ID: 3b1c1903871a270816e107e0e5b1780e5a0e97539e3e96dd8992b316af2ac79a
    • Opcode Fuzzy Hash: be119ef64c390b22c9107aa0d4a3611acc39163741e9c14b2ce3be6acbf228cb
    • Instruction Fuzzy Hash: 6F4128703002024BC711AB7588826BFB796DB95308B50453BE661FB3D2E73D9D0286AE
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00452A20: GetCursorPos.USER32 ref: 00452A29
    • GetCurrentThreadId.KERNEL32 ref: 00452B64
    • WaitMessage.USER32(00000000,00452BA8,?,?,?,020F16DC), ref: 00452B88
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CurrentCursorMessageThreadWait
    • String ID: 0pE$!E
    • API String ID: 535285469-1180474223
    • Opcode ID: 01ce03b05b8d2b55314e7241e12ab7e0a5e4398c9032d6dd741d0bf7a1be9d97
    • Instruction ID: 7badf717a46e212a760f9e7bdc20b82b0d8576be2bce572cf04e8f812481cd70
    • Opcode Fuzzy Hash: 01ce03b05b8d2b55314e7241e12ab7e0a5e4398c9032d6dd741d0bf7a1be9d97
    • Instruction Fuzzy Hash: F631D330A04244AFDB11DF64C986A9EB7F1EB06305F5144BBEC0097393D7B86E48DB58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • DeleteObject.GDI32(3C080DD9), ref: 00423618
    • RtlDeleteCriticalSection.NTDLL(004578A8), ref: 00423622
    • RtlDeleteCriticalSection.NTDLL(004578C0), ref: 0042362C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Delete$CriticalSection$Object
    • String ID: D&A
    • API String ID: 378701848-1255607852
    • Opcode ID: 2024b5616315cb791f91c85a44a629acf57050446162219a5cddd4dd77d2db91
    • Instruction ID: 542ef08e023030a3228a7b52d047d3429b967515c7b6dff4f6e0ba75dff701e5
    • Opcode Fuzzy Hash: 2024b5616315cb791f91c85a44a629acf57050446162219a5cddd4dd77d2db91
    • Instruction Fuzzy Hash: F201F7702096849FD205FF2AFC57A1937A8E74134A790843AB500AB6B7CA3DED01EB5C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • RtlInitializeCriticalSection.NTDLL(00457824), ref: 004106DA
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CriticalInitializeSection
    • String ID: T@$|@$|@
    • API String ID: 32694325-2678655271
    • Opcode ID: 8e537de69d9d1ff10ccd7f2c823bf28e783eed1af36ccb29ae709522def74557
    • Instruction ID: 8e7094830db6b5242115e9049d1c9e89a3479ff221c11d58e4d885613a453ad3
    • Opcode Fuzzy Hash: 8e537de69d9d1ff10ccd7f2c823bf28e783eed1af36ccb29ae709522def74557
    • Instruction Fuzzy Hash: A2011A742047018FC341EF2AE8115157BE4E78A701361C876E808EB7A2E378D895CB9D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GlobalDeleteAtom.KERNEL32(1258C0CD), ref: 0043E118
    • GlobalDeleteAtom.KERNEL32(C0CDC0CC), ref: 0043E12E
    • FreeLibrary.KERNEL32(00000000,C0CDC0CC,1258C0CD,0043E348,00000000,0043E37F), ref: 0043E14C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AtomDeleteGlobal$FreeLibrary
    • String ID: {E
    • API String ID: 4091199252-776765886
    • Opcode ID: a2eeb70a10809560e8fe23cc07a8f4f1f0364087d6ca81b7854c4b1bbf424a23
    • Instruction ID: 0e73d0c928255c837511febe78bcd6b2d0bfbb208347ad481361667f6a3e7989
    • Opcode Fuzzy Hash: a2eeb70a10809560e8fe23cc07a8f4f1f0364087d6ca81b7854c4b1bbf424a23
    • Instruction Fuzzy Hash: F201B6746057008FD740EFAAEC4651977E9AF4870A7918176B504DB2F7DA38E9408F5C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0040D48D,00000000,0040D4A0), ref: 0040CA2A
    • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 0040CA3B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: GetDiskFreeSpaceExA$kernel32.dll
    • API String ID: 1646373207-3712701948
    • Opcode ID: a36407c4afa467878f9837d803831bd6a3747f673a8249b1ec100b4b5cf80e4e
    • Instruction ID: ba856fa049a497c22240c92f9962b2f2e1d752346def3688dfda96e8c96e168e
    • Opcode Fuzzy Hash: a36407c4afa467878f9837d803831bd6a3747f673a8249b1ec100b4b5cf80e4e
    • Instruction Fuzzy Hash: 64D09E70B50F09DADB00EBB558E57272998A704719F95623BB541752D2DB7C98004F5C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SetTextColor.GDI32(00000000,00FFFFFF), ref: 0043FF5D
    • SetBkColor.GDI32(00000000,00000000), ref: 0043FF65
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Color$Text
    • String ID:
    • API String ID: 657580467-0
    • Opcode ID: b0d9bd7e349f2b0b52ae903cfd8e9dfeb0805c3b06272b2b0bd7b1ac161d45b3
    • Instruction ID: 94fb5f61ba5f7d7ef73cf1728f9c317b546c68bfd5eb6cba61cb843274d0a934
    • Opcode Fuzzy Hash: b0d9bd7e349f2b0b52ae903cfd8e9dfeb0805c3b06272b2b0bd7b1ac161d45b3
    • Instruction Fuzzy Hash: CE5116B1740214AFCB44FF69DD82F9E37ACAF08314F50106AF904EB296CA78EC458769
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 004309C8: WindowFromPoint.USER32(004307A2,00457B80,00000000,00430592,?,-0000000C,?), ref: 004309CE
      • Part of subcall function 004309C8: GetParent.USER32(00000000), ref: 004309E5
    • GetWindow.USER32(00000000,00000004), ref: 0043059A
    • GetCurrentThreadId.KERNEL32 ref: 0043066E
    • GetWindowRect.USER32(00000000,?), ref: 0043068B
    • IntersectRect.USER32(?,?,?), ref: 004306F9
      • Part of subcall function 0042FAE4: GetWindowThreadProcessId.USER32(?), ref: 0042FAF1
      • Part of subcall function 0042FAE4: GetCurrentProcessId.KERNEL32(?,?,?,00000000,00000000,004305B4,?,-0000000C,?), ref: 0042FAFA
      • Part of subcall function 0042FAE4: GlobalFindAtomA.KERNEL32(00000000), ref: 0042FB0F
      • Part of subcall function 0042FAE4: GetPropA.USER32(?,00000000), ref: 0042FB26
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$CurrentProcessRectThread$AtomFindFromGlobalIntersectParentPointProp
    • String ID:
    • API String ID: 2049660638-0
    • Opcode ID: 6737b9fcaafe852281c441256b5b228c8030723bc4ddee748f1c6d86925a5437
    • Instruction ID: cfcd19ab2531f9446a8c0dbc09ec040cd6b42b1155571b65bc0e2e42532f87db
    • Opcode Fuzzy Hash: 6737b9fcaafe852281c441256b5b228c8030723bc4ddee748f1c6d86925a5437
    • Instruction Fuzzy Hash: 35515E71A00205AFCB10DFA9C891B9FB7E4AF08354F54526AF815EB391D738ED01CB99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0040E8F7
    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0040E913
    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0040E98A
    • VariantClear.OLEAUT32(?), ref: 0040E9B3
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ArraySafe$Bound$ClearIndexVariant
    • String ID:
    • API String ID: 920484758-0
    • Opcode ID: 222dfd55f4586741cf6c642e18797c671bdcc356e7018be82b80e885789c82a2
    • Instruction ID: 880a77d076ff2559a85a570a5d041e0afd299646354701697571ec35871a1da1
    • Opcode Fuzzy Hash: 222dfd55f4586741cf6c642e18797c671bdcc356e7018be82b80e885789c82a2
    • Instruction Fuzzy Hash: F94150B5A012198FCB61DB5ACC80BD9B3BCAF48304F0045EAE548F7352D638AF948F64
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040B149
    • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040B16D
    • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040B188
    • LoadStringA.USER32(00000000,0000FFEA,?,00000100), ref: 0040B21E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: FileModuleName$LoadQueryStringVirtual
    • String ID:
    • API String ID: 3990497365-0
    • Opcode ID: d7f6da49ea1d3231d6e89fa0807acdd67146fa2f2165762611005d3cc3a6622d
    • Instruction ID: 30c9221d8446111a9a9825c18773efa2fa6e26a43059d9a116e71a77dbb3d2b0
    • Opcode Fuzzy Hash: d7f6da49ea1d3231d6e89fa0807acdd67146fa2f2165762611005d3cc3a6622d
    • Instruction Fuzzy Hash: CC412171A006589BDB21DB69CD85BDEB7BCAB48344F0040FAA548F7292D7789F84CF58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0040B149
    • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0040B16D
    • GetModuleFileNameA.KERNEL32(00400000,?,00000105), ref: 0040B188
    • LoadStringA.USER32(00000000,0000FFEA,?,00000100), ref: 0040B21E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: FileModuleName$LoadQueryStringVirtual
    • String ID:
    • API String ID: 3990497365-0
    • Opcode ID: 9e3d1a47619e2ec7cb4295f0929dc9289b3b1a04dfe5a1409d5b3de425416d03
    • Instruction ID: 0c14c5ec99d75990a6b7b24754675218d58f26a8142b32abc838881af5cd044c
    • Opcode Fuzzy Hash: 9e3d1a47619e2ec7cb4295f0929dc9289b3b1a04dfe5a1409d5b3de425416d03
    • Instruction Fuzzy Hash: FC413271A006589BDB21DB69CD85B9AB7BC9B48344F0040FAA548F7292D7789F84CF58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetStringTypeA.KERNEL32(00000C00,00000002,?,00000080,?), ref: 0040C408
    • GetThreadLocale.KERNEL32 ref: 0040C33E
      • Part of subcall function 0040C29C: GetCPInfo.KERNEL32(00000000,?), ref: 0040C2B5
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: InfoLocaleStringThreadType
    • String ID:
    • API String ID: 1505017576-0
    • Opcode ID: 676da243ebb743117c385c04bab188b8470d7683f746a1d6a1965e6baa2cd61e
    • Instruction ID: 0cc87e9551880bd0ecaf8a327d9d3b20b1b9b383c6bf3dcd0e603f559dc037ac
    • Opcode Fuzzy Hash: 676da243ebb743117c385c04bab188b8470d7683f746a1d6a1965e6baa2cd61e
    • Instruction Fuzzy Hash: 39316920588364CAE3209765BC9137B3796F745306F4481BBEA84AB3D3D73C9849C76E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetMenuState.USER32(?,?,?), ref: 004465AB
    • GetSubMenu.USER32(?,?), ref: 004465B6
    • GetMenuItemID.USER32(?,?), ref: 004465CF
    • GetMenuStringA.USER32(?,?,?,?,?), ref: 00446622
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Menu$ItemStateString
    • String ID:
    • API String ID: 306270399-0
    • Opcode ID: 836dfd5875b5573cfc87d58e5bb473d48d47bba99fcbeeefc0c20d6a50ffb795
    • Instruction ID: 753bc62a6ad3079b19147cd124159895c4ed650a91c4d1c50795149b12c45449
    • Opcode Fuzzy Hash: 836dfd5875b5573cfc87d58e5bb473d48d47bba99fcbeeefc0c20d6a50ffb795
    • Instruction Fuzzy Hash: CC114271601214AFDB00EF6DDC85DAF77E8AF4A354B11442AF805D7382D638DD1197A9
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0041E228: GetObjectA.GDI32(?,00000004), ref: 0041E23F
    • SelectObject.GDI32(?), ref: 00420AF7
    • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,00420B4F,?,?,?,?,00000000), ref: 00420B1B
    • SelectObject.GDI32(?,?), ref: 00420B35
    • DeleteDC.GDI32(?), ref: 00420B3E
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Object$Select$ColorDeleteTable
    • String ID:
    • API String ID: 3648526112-0
    • Opcode ID: ad0e0ae128628bdbe5014755591f98cb6bdaa2ed0cad7916b83a514bd13457e1
    • Instruction ID: 73907e891476ba9e825d5c8bbccffa07fab05bc264061c4f2b787f57b6362eaa
    • Opcode Fuzzy Hash: ad0e0ae128628bdbe5014755591f98cb6bdaa2ed0cad7916b83a514bd13457e1
    • Instruction Fuzzy Hash: 48117571E002196BDB10EBE99C51AAFB7ECEB08304F4144AAF904E7282D679DD508758
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindowLongA.USER32(00000000,000000EC), ref: 0044F604
    • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 0044F636
    • SetLayeredWindowAttributes.USER32(00000000,?,?,00000000,00000000,000000EC,?,?,0044D1C4), ref: 0044F670
    • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 0044F689
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$Long$AttributesLayered
    • String ID:
    • API String ID: 2169480361-0
    • Opcode ID: 52e3854140e2837061844a6ce7dc2d16fc477158ccc1f5fcebdd3a6b05c047de
    • Instruction ID: e9ce1ccac30035fe773f9f8851220d7c4d3452886b8f295b7af576382be4f076
    • Opcode Fuzzy Hash: 52e3854140e2837061844a6ce7dc2d16fc477158ccc1f5fcebdd3a6b05c047de
    • Instruction Fuzzy Hash: DC11EB61E0438026DB10AF798CC9B9B29480F09355F15197ABC45EB2E3C9BCCC59C75C
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetClassInfoA.USER32(00400000,0041A59C,?), ref: 0041A5CD
    • UnregisterClassA.USER32(0041A59C,00400000), ref: 0041A5F6
    • RegisterClassA.USER32(004553F0), ref: 0041A600
    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041A64B
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Class$InfoLongRegisterUnregisterWindow
    • String ID:
    • API String ID: 4025006896-0
    • Opcode ID: 7f0ff4a924000919642125befcd8f469bbfbb684d3de711ef14fb37e57240d88
    • Instruction ID: bb8a1fc929a91507ee41707495bd5fcf2ad37253950fc3ac8bec49f0593c0c4a
    • Opcode Fuzzy Hash: 7f0ff4a924000919642125befcd8f469bbfbb684d3de711ef14fb37e57240d88
    • Instruction Fuzzy Hash: A301A171204600ABC700EB6CDD81FAA339CA719316F108136F905EB3D3D639E9A0C7AD
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • EnumWindows.USER32(Function_0005120C), ref: 004512B1
    • GetWindow.USER32(?,00000003), ref: 004512C9
    • GetWindowLongA.USER32(00000000,000000EC), ref: 004512D6
    • SetWindowPos.USER32(00000000,000000EC,00000000,00000000,00000000,00000000,00000213,00000000,000000EC,?,00000003,Function_0005120C), ref: 00451315
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Window$EnumLongWindows
    • String ID:
    • API String ID: 4191631535-0
    • Opcode ID: 22d8c666ead98a0d51e55fb1dc76b308a3fde8fcfb4ee5a61e6550ef28d4e66b
    • Instruction ID: d6b79fe083d60ad9125728ad65d40da08eb81705d09a9ede4042ecbea9e01393
    • Opcode Fuzzy Hash: 22d8c666ead98a0d51e55fb1dc76b308a3fde8fcfb4ee5a61e6550ef28d4e66b
    • Instruction Fuzzy Hash: EF115E30604210AFE710AA28CC85F9A73D4AB05769F5502BAFD69AB2E3C3789C45C799
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • SelectObject.GDI32(00000000,00000000), ref: 0041E1A6
    • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,00000000,?,?,00421D4F,?,?,?,?,0042093B), ref: 0041E1BA
    • SelectObject.GDI32(00000000,00000000), ref: 0041E1C6
    • DeleteDC.GDI32(00000000), ref: 0041E1CC
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ObjectSelect$ColorDeleteTable
    • String ID:
    • API String ID: 3862836420-0
    • Opcode ID: 4605046732850572e91ee3d3202d429c5bfb52793a290e3981da7e5d20f1214f
    • Instruction ID: 97a1f943ff323abb1912245a52e08ff68d8efb37055bad91de39ab70e77c2a5d
    • Opcode Fuzzy Hash: 4605046732850572e91ee3d3202d429c5bfb52793a290e3981da7e5d20f1214f
    • Instruction Fuzzy Hash: ED01847520431062E610A76B8C47B9B71AC9FC0758F05C92FF985AB2C2E67DC994836A
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FindResourceA.KERNEL32(?,?,?), ref: 0041606F
    • LoadResource.KERNEL32(?,004160FC,?,?,?,00411F2C,?,00000001,00000000,?,00415FC8,?), ref: 00416089
    • SizeofResource.KERNEL32(?,004160FC,?,004160FC,?,?,?,00411F2C,?,00000001,00000000,?,00415FC8,?), ref: 004160A3
    • LockResource.KERNEL32(00415DC0,00000000,?,004160FC,?,004160FC,?,?,?,00411F2C,?,00000001,00000000,?,00415FC8,?), ref: 004160AD
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Resource$FindLoadLockSizeof
    • String ID:
    • API String ID: 3473537107-0
    • Opcode ID: c965b22852f6ec80c96105a9b843c4a68cb3de35a57f497f17dba6acfaef6299
    • Instruction ID: 2e58c947a1d9cea2e1134bd376d0f1acf0f1bd1b22b0b35eb6180cb75cf8f231
    • Opcode Fuzzy Hash: c965b22852f6ec80c96105a9b843c4a68cb3de35a57f497f17dba6acfaef6299
    • Instruction Fuzzy Hash: 29F06DB2605604AF9704EE6DA881EAB77DCDE88264311012FF90CD7346DA38DD5147B8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VirtualAlloc.KERNEL32(?,00100000,00002000,00000004,004575F8,?,?,?,004018E4), ref: 00401596
    • VirtualAlloc.KERNEL32(?,?,00002000,00000004,?,00100000,00002000,00000004,004575F8,?,?,?,004018E4), ref: 004015BB
    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,00100000,00002000,00000004,004575F8,?,?,?,004018E4), ref: 004015E1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Virtual$Alloc$Free
    • String ID: $fT
    • API String ID: 3668210933-2678353634
    • Opcode ID: d8bbf83d9e84a155370780825e2536c196101ce0e12870bd00f10d62a760bd39
    • Instruction ID: 9f01dd48c3aec626b257d7619b36ba77bbef45783528102b9bb09263bc853b7d
    • Opcode Fuzzy Hash: d8bbf83d9e84a155370780825e2536c196101ce0e12870bd00f10d62a760bd39
    • Instruction Fuzzy Hash: 12F068B17403206BE7315AA94C85F533AD4DB85755F1440B5BE09FF3DAD679A80087AC
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindowThreadProcessId.USER32(00000000), ref: 00430975
    • GetCurrentProcessId.KERNEL32(?,-0000000C,00000000,004309E0,004307A2,00457B80,00000000,00430592,?,-0000000C,?), ref: 0043097E
    • GlobalFindAtomA.KERNEL32(00000000), ref: 00430993
    • GetPropA.USER32(00000000,00000000), ref: 004309AA
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
    • String ID:
    • API String ID: 2582817389-0
    • Opcode ID: 262fe56b8b3d1ec7547b8fda1a8aeaf1283fa0c05e10842a2b4da085fdd54173
    • Instruction ID: 18ab0d8e6a811196effcf3cdeeb79c0cd703e253cfa669e1bd7b8aabc6945012
    • Opcode Fuzzy Hash: 262fe56b8b3d1ec7547b8fda1a8aeaf1283fa0c05e10842a2b4da085fdd54173
    • Instruction Fuzzy Hash: 7CF0A7E170772257A610F7766C5166F518D9D04759B40523BFE40D5293D62CDC4141BD
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetWindowThreadProcessId.USER32(?), ref: 0042FAF1
    • GetCurrentProcessId.KERNEL32(?,?,?,00000000,00000000,004305B4,?,-0000000C,?), ref: 0042FAFA
    • GlobalFindAtomA.KERNEL32(00000000), ref: 0042FB0F
    • GetPropA.USER32(?,00000000), ref: 0042FB26
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
    • String ID:
    • API String ID: 2582817389-0
    • Opcode ID: 2bfc4d6cc9e8e01adc0abaf716b4368d66cec178448b7a893f586e462c687dcd
    • Instruction ID: d4e42c3b55b898ce814979c817f9e6793363eb62aa755c5b76658f8e790d3406
    • Opcode Fuzzy Hash: 2bfc4d6cc9e8e01adc0abaf716b4368d66cec178448b7a893f586e462c687dcd
    • Instruction Fuzzy Hash: B3F0A79334433166C92077B6FC91C2B56AC8A007A93C0153BF901E7242D53CEC0643BD
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetCurrentThreadId.KERNEL32 ref: 00450BA4
    • SetWindowsHookExA.USER32(00000003,00450B48,00000000,00000000), ref: 00450BB4
    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00450BCF
    • CreateThread.KERNEL32(00000000,000003E8,00450AEC,00000000,00000000), ref: 00450BF3
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CreateThread$CurrentEventHookWindows
    • String ID:
    • API String ID: 1195359707-0
    • Opcode ID: 8bf0b65abc09d898258917fcd214628db6abe2c8427761cf14d2130e4a5058dc
    • Instruction ID: 35dcb6909e74e7012915a396645faa56145bc40d45f97d41ce2dac9538df18a5
    • Opcode Fuzzy Hash: 8bf0b65abc09d898258917fcd214628db6abe2c8427761cf14d2130e4a5058dc
    • Instruction Fuzzy Hash: A1F0DA74A88705BEF710ABA1EC46F1736959310F1FF10007AF6146A1E3C7B8F5848A9D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GlobalHandle.KERNEL32 ref: 004067BB
    • GlobalUnWire.KERNEL32(00000000), ref: 004067C2
    • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 004067C7
    • GlobalFix.KERNEL32(00000000), ref: 004067CD
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Global$AllocHandleWire
    • String ID:
    • API String ID: 2210401237-0
    • Opcode ID: 1d5ada0bccfe12d83d0a306ece47396a9e73e475e1776d9b20b1924602c76c9a
    • Instruction ID: 614874d605ef86ce66d558347c88263ca636e111e7e5bb6d955f38a734330a37
    • Opcode Fuzzy Hash: 1d5ada0bccfe12d83d0a306ece47396a9e73e475e1776d9b20b1924602c76c9a
    • Instruction Fuzzy Hash: 88B009D8A58E063CEC1433B24C0FD3F001CD8A078D3C04A6EB840B20CADC7CA844087E
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 0041BB54: RtlEnterCriticalSection.NTDLL(?), ref: 0041BB58
    • CreateFontIndirectA.GDI32(?), ref: 0041C94E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: CreateCriticalEnterFontIndirectSection
    • String ID: MS Sans Serif$Default
    • API String ID: 2931345757-2137701257
    • Opcode ID: e0a637e225fab96e3e5d2d20a69948054123e0f3fcd0a9e337b8de41854cf3a6
    • Instruction ID: b366d8d1a10450c429f3dc26a0e3bd8e8be57d460975a9dd1f8dad64175bfe2a
    • Opcode Fuzzy Hash: e0a637e225fab96e3e5d2d20a69948054123e0f3fcd0a9e337b8de41854cf3a6
    • Instruction Fuzzy Hash: 82515C70A54248DFDB01DFA8C981BCDBBF6EF49304F6580AAD804A7352D7389E45CB69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetKeyState.USER32(00000010), ref: 00445E30
    • GetKeyState.USER32(00000011), ref: 00445E42
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: State
    • String ID:
    • API String ID: 1649606143-3916222277
    • Opcode ID: cb28de85b167ef5ed10375796280a4da1b9bccd9f64bdf296107dec95f9c52c2
    • Instruction ID: 71bd300f61262a01d1485a46d4b8b4a299210da14eb67372017ec5ed0c33d7f0
    • Opcode Fuzzy Hash: cb28de85b167ef5ed10375796280a4da1b9bccd9f64bdf296107dec95f9c52c2
    • Instruction Fuzzy Hash: B931EA75A08708AFEF01DF95E85179DB7F5EB45304FA180BAE80067293E77C5B00C619
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • WinHelpA.USER32(00000000), ref: 0042D0F0
    Strings
    • IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")"), xrefs: 0042D088
    • dvE, xrefs: 0042D049
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Help
    • String ID: IE(AL("%s",4),"AL(\"%0:s\",3)","JK(\"%1:s\",\"%0:s\")")$dvE
    • API String ID: 2830496658-932126354
    • Opcode ID: 23a5b1772225cbd62cc986f2442db9ae00aeab48bca356d6327fef6111aa4b21
    • Instruction ID: 5fe52377de73e2b7975fdf016599325295d930a8f9eded402df8d4cbc1259920
    • Opcode Fuzzy Hash: 23a5b1772225cbd62cc986f2442db9ae00aeab48bca356d6327fef6111aa4b21
    • Instruction Fuzzy Hash: B4312370F002149BDB14EF65E89269EBBB5AF48308F90457AA804A7392DB789E058799
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,00409A5A), ref: 00409A02
    • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,00409A5A), ref: 00409A08
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: DateFormatLocaleThread
    • String ID: yyyy
    • API String ID: 3303714858-3145165042
    • Opcode ID: 24c1c31382e0670fdba265928a592db7cc6005e0e2be0905db63e57e58e6e803
    • Instruction ID: 970415b2cf946be1311ddc9c9adf97f9c57793b96109e9c4a0289375bf74726f
    • Opcode Fuzzy Hash: 24c1c31382e0670fdba265928a592db7cc6005e0e2be0905db63e57e58e6e803
    • Instruction Fuzzy Hash: C0213075704248ABDB01EBA5C942AAEB7E8EF48700F50407BF905F77D2D6789E00CA69
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FreeLibrary.KERNEL32(00400000,?,?,?,?,?,?,?,00403E3E,004027CB,004039E8), ref: 00403DE1
    • ExitProcess.KERNEL32(00000000,?,?,?,?,?,?,?,00403E3E,004027CB,004039E8), ref: 00403E16
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ExitFreeLibraryProcess
    • String ID: |y@
    • API String ID: 1404682716-713804553
    • Opcode ID: 2ef35c5b2530d2187c16c2a7955a711ac557cd635653e8c4dce7ad89e6481c83
    • Instruction ID: a271b0d60cc5806993aa8b97552a5722b7aed7bc15c44349e6ec802f861d87b4
    • Opcode Fuzzy Hash: 2ef35c5b2530d2187c16c2a7955a711ac557cd635653e8c4dce7ad89e6481c83
    • Instruction Fuzzy Hash: 99218D709046418FEB20AF65C4843967FD9AF0A316F2444BBE844AB2D6D77CDD80CB99
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • FreeLibrary.KERNEL32(00400000,?,?,?,?,?,?,?,00403E3E,004027CB,004039E8), ref: 00403DE1
    • ExitProcess.KERNEL32(00000000,?,?,?,?,?,?,?,00403E3E,004027CB,004039E8), ref: 00403E16
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ExitFreeLibraryProcess
    • String ID: |y@
    • API String ID: 1404682716-713804553
    • Opcode ID: b3f4ea2471de539f29a0b8bfc9a3e252a6ccb5160bceb1c01eaefefbea0df077
    • Instruction ID: a528c5556b1788d0ea9e93cc2f5b507bfb7013af1529314a162c342046c4b315
    • Opcode Fuzzy Hash: b3f4ea2471de539f29a0b8bfc9a3e252a6ccb5160bceb1c01eaefefbea0df077
    • Instruction Fuzzy Hash: B9218C709046418BEB20AF25C484797BED9AF09316F2441BBE844AB2D6D77CDEC0CB9D
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00407BC0: CompareStringA.KERNEL32(00000400,00000001,00000000,00000000,00000000,00000000,?,?,00407C07,?,?,00407F91), ref: 00407BED
      • Part of subcall function 004500AC: GetKeyboardLayoutList.USER32(00000040,?,00000000,00450257,?,020F12E8,?,004502B9,00000000,?,004351AF), ref: 00450102
      • Part of subcall function 004500AC: RegOpenKeyExA.ADVAPI32(80000002,00000000,00000000,00020019,?,00000040,?,00000000,00450257,?,020F12E8,?,004502B9,00000000,?,004351AF), ref: 0045016A
      • Part of subcall function 004500AC: RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,?,00000000,00450213,?,80000002,00000000,00000000,00020019,?,00000040,?), ref: 004501A4
    • ActivateKeyboardLayout.USER32(?,00000001), ref: 00437C16
      • Part of subcall function 004500AC: RegCloseKey.ADVAPI32(?,0045021A,00000000,?,?,00000000,00450213,?,80000002,00000000,00000000,00020019,?,00000040,?,00000000), ref: 0045020D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: KeyboardLayout$ActivateCloseCompareListOpenQueryStringValue
    • String ID: @wE${E
    • API String ID: 3260357897-4235125885
    • Opcode ID: a2232453bd3e3d23d669929634f8a2e493a8d4db20d5645663605b18ecf4cccd
    • Instruction ID: d0b0ab8b2520c768015089189bc8c05371e5149aa85b4d40907e6ff9d880cb3a
    • Opcode Fuzzy Hash: a2232453bd3e3d23d669929634f8a2e493a8d4db20d5645663605b18ecf4cccd
    • Instruction Fuzzy Hash: 16217A342046009FD721EF25C881A9537E5AF49705F6550B5F8008F3A3CF78ED44CB98
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • VariantCopy.OLEAUT32(?), ref: 0040ECDD
      • Part of subcall function 0040E9C4: VariantClear.OLEAUT32(?), ref: 0040E9D3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Variant$ClearCopy
    • String ID: |@
    • API String ID: 274517740-2645132277
    • Opcode ID: ee0b3bbfee92b5c78544bd5c09e0c3681fe08e6ced7c72197cb8bc8b71ae11a7
    • Instruction ID: 577eaa6948231cbe1d02c0c8bc319235ffba4feb49b9c92a9690ab99a0772217
    • Opcode Fuzzy Hash: ee0b3bbfee92b5c78544bd5c09e0c3681fe08e6ced7c72197cb8bc8b71ae11a7
    • Instruction Fuzzy Hash: 0A11A02070420186DB24AF2BD8C56672795EF857507148C7BF44AAB3E6DA3DDC51C2AA
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: Rect$EqualIntersect
    • String ID: @
    • API String ID: 3291753422-2766056989
    • Opcode ID: 729288b463f4e3b769507f09916038e772bac31ee99353aaf19d800dd7503a86
    • Instruction ID: 606af6fbf3886211de614473dd293fb17bcf842164c53f0bf48e15f15d337e58
    • Opcode Fuzzy Hash: 729288b463f4e3b769507f09916038e772bac31ee99353aaf19d800dd7503a86
    • Instruction Fuzzy Hash: A6119E316042886BC701DE6DC885BDF7BE89F49368F040296FD44EB382D779EE058794
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
      • Part of subcall function 00407BC0: CompareStringA.KERNEL32(00000400,00000001,00000000,00000000,00000000,00000000,?,?,00407C07,?,?,00407F91), ref: 00407BED
    • ActivateKeyboardLayout.USER32(?,00000001), ref: 00437CA8
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ActivateCompareKeyboardLayoutString
    • String ID: @wE${E
    • API String ID: 1445940216-4235125885
    • Opcode ID: dd124f88dd014514b8e250a40a62fc3e1a48ebf6576625a0884fab2d1d55d154
    • Instruction ID: 6e10fe0cbf54b71ff632e0b7573bdc4083a1265331ffff9a6275874b74f49192
    • Opcode Fuzzy Hash: dd124f88dd014514b8e250a40a62fc3e1a48ebf6576625a0884fab2d1d55d154
    • Instruction Fuzzy Hash: 1301B570608300AFD721EB25C981B9537E4EB0D304F91A4B6F8009B393CB78ED04DB58
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: ClearVariant
    • String ID: |@
    • API String ID: 1473721057-2645132277
    • Opcode ID: 56c5534a345511e4538614bbc9232e06ae6dd49f82dc3da54e984e641605cc4f
    • Instruction ID: fb6e44f11d6894204172b89b1d28fbb751f34b4bbf1e0df4e7a861869115469e
    • Opcode Fuzzy Hash: 56c5534a345511e4538614bbc9232e06ae6dd49f82dc3da54e984e641605cc4f
    • Instruction Fuzzy Hash: A1F0AF60704220CBC6207B7BD9851A52294AF497087205C7BF086BB2C6CA3D8C668A6F
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSystemMetrics.USER32(00000000), ref: 00423E4A
    • GetSystemMetrics.USER32(00000001), ref: 00423E5C
      • Part of subcall function 00423B64: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 00423BE4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: MetricsSystem$AddressProc
    • String ID: MonitorFromPoint
    • API String ID: 1792783759-1072306578
    • Opcode ID: 398fb8932d80f66837e628e84cff3840c3b125091bf99529c4f9f122ca02df83
    • Instruction ID: 070afe3cae5d64cb81b129369353c8cfd45e4d63a2aa5a3c671e3106731092a9
    • Opcode Fuzzy Hash: 398fb8932d80f66837e628e84cff3840c3b125091bf99529c4f9f122ca02df83
    • Instruction Fuzzy Hash: 56018F71305328ABEB105F59FC44B5ABBA5E740756F81403AE9148B262C27CEE458BA8
    Uniqueness

    Uniqueness Score: -1.00%

    APIs
    • GetSystemMetrics.USER32(00000000), ref: 00423D25
    • GetSystemMetrics.USER32(00000001), ref: 00423D31
      • Part of subcall function 00423B64: GetProcAddress.KERNEL32(75BD0000,00000000), ref: 00423BE4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2925737417.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.2925725130.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.0000000000464000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925737417.000000000046C000.00000040.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2925801325.0000000000477000.00000004.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_uddisrw.jbxd
    Similarity
    • API ID: MetricsSystem$AddressProc
    • String ID: MonitorFromRect
    • API String ID: 1792783759-4033241945
    • Opcode ID: 8a9e22db04685f91e7ea5fd45224c15a2140518ec10800d3dedb195b0ccf388d
    • Instruction ID: 303870b88fc3daf28c0398546fce0e97ce6cb8c6e718b8a48d7cf4ffa0f48675
    • Opcode Fuzzy Hash: 8a9e22db04685f91e7ea5fd45224c15a2140518ec10800d3dedb195b0ccf388d
    • Instruction Fuzzy Hash: 2A017C313142249BDB109F48F885B16BB74E740753F848062EA049B203C27CED818BB8
    Uniqueness

    Uniqueness Score: -1.00%