Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
aMail_Ver1.exe

Overview

General Information

Sample name:aMail_Ver1.exe
Analysis ID:1430794
MD5:06b0347315d3ab5385a0479134ec22cc
SHA1:784d20632b7aa1c4d4c6a8f1c9597037ac94ab12
SHA256:c9de15f068399626b8296c218150f31f1f9c0065442f0580cf1e3a9acad70464
Infos:

Detection

Score:29
Range:0 - 100
Whitelisted:false
Confidence:60%

Compliance

Score:49
Range:0 - 100

Signatures

Installs new ROOT certificates
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Stores large binary data to the registry
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample drops PE files which have not been started, submit dropped PE samples for a secondary analysis to Joe Sandbox
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
  • System is w7x64
  • aMail_Ver1.exe (PID: 1520 cmdline: "C:\Users\user\Desktop\aMail_Ver1.exe" MD5: 06B0347315D3AB5385A0479134EC22CC)
  • cleanup
No configs have been found
No yara matches
Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\aMail_Ver1.exe, ProcessId: 1520, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

Compliance

barindex
Source: aMail_Ver1.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\aMail_Ver1.exeWindow detected: &Don't AcceptFor the following components:Microsoft Visual Studio 2010 Tools for Office Runtime (x86 and x64)Please read the following license agreement. Press the page down key to see the rest of the agreement.MICROSOFT SOFTWARE LICENSE TERMSMICROSOFT VISUAL STUDIO TOOLS FOR OFFICE RUNTIME AND LANGUAGE PACK These license terms are an agreement between Microsoft Corporation (or based on where you live one of its affiliates) and you. Please read them. They apply to the software named above which includes the media on which you received it if any. The terms also apply to any MicrosoftupdatessupplementsInternet-based services andsupport servicesfor this software unless other terms accompany those items. If so those terms apply.BY USING THE SOFTWARE YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM DO NOT USE THE SOFTWARE.IF YOU COMPLY WITH THESE LICENSE TERMS YOU HAVE THE PERPETUAL RIGHTS BELOW.1.INSTALLATION AND USE RIGHTS. You may install and use any number of copies of the software on your devices.2.SCOPE OF LICENSE. The software is licensed not sold. This agreement only gives you some rights to use the software. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation you may use the software only as expressly permitted in this agreement. In doing so you must comply with any technical limitations in the software that only allow you to use it in certain ways. You may notdisclose the results of any benchmark tests of the software to any third party without Microsofts prior written approval;work around any technical limitations in the software;reverse engineer decompile or disassemble the software except and only to the extent that applicable law expressly permits despite this limitation;make more copies of the software than specified in this agreement or allowed by applicable law despite this limitation;publish the software for others to copy;rent lease or lend the software;transfer the software or this agreement to any third party; oruse the software for commercial software hosting services.3.BACKUP COPY. You may make one backup copy of the software. You may use it only to reinstall the software.4.DOCUMENTATION. Any person that has valid access to your computer or internal network may copy and use the documentation for your internal reference purposes.5.TRANSFER TO ANOTHER DEVICE. You may uninstall the software and install it on another device for your use. You may not do so to share this license between devices.6.EXPORT RESTRICTIONS. The software is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the software. These laws include restrictions on destinations end users and end use. For additional information see www.microsoft.com/exporting.7.SUPPORT SERVICES. Because this software is as is we may not provide support services for it.8.ENTIRE AGREEMENT. This agreement a
Source: C:\Users\user\Desktop\aMail_Ver1.exeWindow detected: &Don't AcceptFor the following components:Microsoft Visual Studio 2010 Tools for Office Runtime (x86 and x64)Please read the following license agreement. Press the page down key to see the rest of the agreement.MICROSOFT SOFTWARE LICENSE TERMSMICROSOFT VISUAL STUDIO TOOLS FOR OFFICE RUNTIME AND LANGUAGE PACK These license terms are an agreement between Microsoft Corporation (or based on where you live one of its affiliates) and you. Please read them. They apply to the software named above which includes the media on which you received it if any. The terms also apply to any MicrosoftupdatessupplementsInternet-based services andsupport servicesfor this software unless other terms accompany those items. If so those terms apply.BY USING THE SOFTWARE YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM DO NOT USE THE SOFTWARE.IF YOU COMPLY WITH THESE LICENSE TERMS YOU HAVE THE PERPETUAL RIGHTS BELOW.1.INSTALLATION AND USE RIGHTS. You may install and use any number of copies of the software on your devices.2.SCOPE OF LICENSE. The software is licensed not sold. This agreement only gives you some rights to use the software. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation you may use the software only as expressly permitted in this agreement. In doing so you must comply with any technical limitations in the software that only allow you to use it in certain ways. You may notdisclose the results of any benchmark tests of the software to any third party without Microsofts prior written approval;work around any technical limitations in the software;reverse engineer decompile or disassemble the software except and only to the extent that applicable law expressly permits despite this limitation;make more copies of the software than specified in this agreement or allowed by applicable law despite this limitation;publish the software for others to copy;rent lease or lend the software;transfer the software or this agreement to any third party; oruse the software for commercial software hosting services.3.BACKUP COPY. You may make one backup copy of the software. You may use it only to reinstall the software.4.DOCUMENTATION. Any person that has valid access to your computer or internal network may copy and use the documentation for your internal reference purposes.5.TRANSFER TO ANOTHER DEVICE. You may uninstall the software and install it on another device for your use. You may not do so to share this license between devices.6.EXPORT RESTRICTIONS. The software is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the software. These laws include restrictions on destinations end users and end use. For additional information see www.microsoft.com/exporting.7.SUPPORT SERVICES. Because this software is as is we may not provide support services for it.8.ENTIRE AGREEMENT. This agreement a
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile created: C:\Users\user\AppData\Local\Temp\VSD1758.tmp\install.logJump to behavior
Source: aMail_Ver1.exeStatic PE information: certificate valid
Source: aMail_Ver1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: Binary string: D:\dbs\sh\ddvsm\0706_100817_0\cmd\e\out\binaries\x86ret\bin\i386\Bootstrapper\Engine\setup.pdb source: aMail_Ver1.exe, aMail_Ver1.exe.0.dr
Source: Binary string: sfxcab.pdb source: vstor_redist[1].exe.0.dr, vstor_redist.exe.0.dr
Source: Binary string: D:\dbs\sh\ddvsm\0706_100817_0\cmd\e\out\binaries\x86ret\bin\i386\Bootstrapper\Engine\setup.pdb? source: aMail_Ver1.exe, aMail_Ver1.exe.0.dr
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_00318593 __EH_prolog3_GS,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00318593
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0034BCB5 FindFirstFileExW,0_2_0034BCB5
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_003254E2 URLDownloadToFileW,EnterCriticalSection,LeaveCriticalSection,CoInitialize,CoUninitialize,0_2_003254E2
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vstor_redist[1].exeJump to behavior
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: aMail_Ver1.exe, 00000000.00000002.366350837.000000000227A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comod
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: aMail_Ver1.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
Source: aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
Source: aMail_Ver1.exe, aMail_Ver1.exe.0.drString found in binary or memory: https://system.asite.com/aMail_Installer/TruePABegin
Source: aMail_Ver1.exe, 00000000.00000002.366084781.0000000000754000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://system.asite.com/aMail_Installer/aMail.vstoullX64Bootstrapper
Source: C:\Users\user\Desktop\aMail_Ver1.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0034223E0_2_0034223E
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0034B3120_2_0034B312
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_003503400_2_00350340
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0034246D0_2_0034246D
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_003585F90_2_003585F9
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_003507EE0_2_003507EE
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0030BA590_2_0030BA59
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: String function: 0033A29B appears 62 times
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: String function: 0033A268 appears 37 times
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: String function: 00314375 appears 33 times
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: String function: 0033A960 appears 43 times
Source: aMail_Ver1.exe, 00000000.00000000.338200638.0000000000368000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesetup.exe vs aMail_Ver1.exe
Source: aMail_Ver1.exeBinary or memory string: OriginalFilenamesetup.exe vs aMail_Ver1.exe
Source: aMail_Ver1.exe.0.drBinary or memory string: OriginalFilenamesetup.exe vs aMail_Ver1.exe
Source: aMail_Ver1.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: sus29.winEXE@1/5@0/0
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033404B __EH_prolog3_GS,SystemParametersInfoW,FindResourceW,LoadResource,LockResource,SizeofResource,CreateDialogIndirectParamW,CreateDialogParamW,MoveWindow,SetForegroundWindow,0_2_0033404B
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile created: C:\Users\user\AppData\Local\Temp\VSD1758.tmpJump to behavior
Source: aMail_Ver1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile read: C:\Windows\win.iniJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile read: C:\Users\user\Desktop\aMail_Ver1.exeJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: wow64win.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: wow64cpu.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: msi.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: rpcrtremote.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: credssp.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: bcrypt.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeSection loaded: ext-ms-win-kernel32-package-current-l1-1-0.dllJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeWindow detected: &Don't AcceptFor the following components:Microsoft Visual Studio 2010 Tools for Office Runtime (x86 and x64)Please read the following license agreement. Press the page down key to see the rest of the agreement.MICROSOFT SOFTWARE LICENSE TERMSMICROSOFT VISUAL STUDIO TOOLS FOR OFFICE RUNTIME AND LANGUAGE PACK These license terms are an agreement between Microsoft Corporation (or based on where you live one of its affiliates) and you. Please read them. They apply to the software named above which includes the media on which you received it if any. The terms also apply to any MicrosoftupdatessupplementsInternet-based services andsupport servicesfor this software unless other terms accompany those items. If so those terms apply.BY USING THE SOFTWARE YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM DO NOT USE THE SOFTWARE.IF YOU COMPLY WITH THESE LICENSE TERMS YOU HAVE THE PERPETUAL RIGHTS BELOW.1.INSTALLATION AND USE RIGHTS. You may install and use any number of copies of the software on your devices.2.SCOPE OF LICENSE. The software is licensed not sold. This agreement only gives you some rights to use the software. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation you may use the software only as expressly permitted in this agreement. In doing so you must comply with any technical limitations in the software that only allow you to use it in certain ways. You may notdisclose the results of any benchmark tests of the software to any third party without Microsofts prior written approval;work around any technical limitations in the software;reverse engineer decompile or disassemble the software except and only to the extent that applicable law expressly permits despite this limitation;make more copies of the software than specified in this agreement or allowed by applicable law despite this limitation;publish the software for others to copy;rent lease or lend the software;transfer the software or this agreement to any third party; oruse the software for commercial software hosting services.3.BACKUP COPY. You may make one backup copy of the software. You may use it only to reinstall the software.4.DOCUMENTATION. Any person that has valid access to your computer or internal network may copy and use the documentation for your internal reference purposes.5.TRANSFER TO ANOTHER DEVICE. You may uninstall the software and install it on another device for your use. You may not do so to share this license between devices.6.EXPORT RESTRICTIONS. The software is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the software. These laws include restrictions on destinations end users and end use. For additional information see www.microsoft.com/exporting.7.SUPPORT SERVICES. Because this software is as is we may not provide support services for it.8.ENTIRE AGREEMENT. This agreement a
Source: C:\Users\user\Desktop\aMail_Ver1.exeWindow detected: &Don't AcceptFor the following components:Microsoft Visual Studio 2010 Tools for Office Runtime (x86 and x64)Please read the following license agreement. Press the page down key to see the rest of the agreement.MICROSOFT SOFTWARE LICENSE TERMSMICROSOFT VISUAL STUDIO TOOLS FOR OFFICE RUNTIME AND LANGUAGE PACK These license terms are an agreement between Microsoft Corporation (or based on where you live one of its affiliates) and you. Please read them. They apply to the software named above which includes the media on which you received it if any. The terms also apply to any MicrosoftupdatessupplementsInternet-based services andsupport servicesfor this software unless other terms accompany those items. If so those terms apply.BY USING THE SOFTWARE YOU ACCEPT THESE TERMS. IF YOU DO NOT ACCEPT THEM DO NOT USE THE SOFTWARE.IF YOU COMPLY WITH THESE LICENSE TERMS YOU HAVE THE PERPETUAL RIGHTS BELOW.1.INSTALLATION AND USE RIGHTS. You may install and use any number of copies of the software on your devices.2.SCOPE OF LICENSE. The software is licensed not sold. This agreement only gives you some rights to use the software. Microsoft reserves all other rights. Unless applicable law gives you more rights despite this limitation you may use the software only as expressly permitted in this agreement. In doing so you must comply with any technical limitations in the software that only allow you to use it in certain ways. You may notdisclose the results of any benchmark tests of the software to any third party without Microsofts prior written approval;work around any technical limitations in the software;reverse engineer decompile or disassemble the software except and only to the extent that applicable law expressly permits despite this limitation;make more copies of the software than specified in this agreement or allowed by applicable law despite this limitation;publish the software for others to copy;rent lease or lend the software;transfer the software or this agreement to any third party; oruse the software for commercial software hosting services.3.BACKUP COPY. You may make one backup copy of the software. You may use it only to reinstall the software.4.DOCUMENTATION. Any person that has valid access to your computer or internal network may copy and use the documentation for your internal reference purposes.5.TRANSFER TO ANOTHER DEVICE. You may uninstall the software and install it on another device for your use. You may not do so to share this license between devices.6.EXPORT RESTRICTIONS. The software is subject to United States export laws and regulations. You must comply with all domestic and international export laws and regulations that apply to the software. These laws include restrictions on destinations end users and end use. For additional information see www.microsoft.com/exporting.7.SUPPORT SERVICES. Because this software is as is we may not provide support services for it.8.ENTIRE AGREEMENT. This agreement a
Source: aMail_Ver1.exeStatic PE information: certificate valid
Source: aMail_Ver1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: aMail_Ver1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: aMail_Ver1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: aMail_Ver1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: aMail_Ver1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: aMail_Ver1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: aMail_Ver1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
Source: aMail_Ver1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\dbs\sh\ddvsm\0706_100817_0\cmd\e\out\binaries\x86ret\bin\i386\Bootstrapper\Engine\setup.pdb source: aMail_Ver1.exe, aMail_Ver1.exe.0.dr
Source: Binary string: sfxcab.pdb source: vstor_redist[1].exe.0.dr, vstor_redist.exe.0.dr
Source: Binary string: D:\dbs\sh\ddvsm\0706_100817_0\cmd\e\out\binaries\x86ret\bin\i386\Bootstrapper\Engine\setup.pdb? source: aMail_Ver1.exe, aMail_Ver1.exe.0.dr
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_003247BB LoadLibraryW,GetProcAddress,GetProcAddress,0_2_003247BB
Source: aMail_Ver1.exeStatic PE information: section name: .didat
Source: aMail_Ver1.exe.0.drStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033A236 push ecx; ret 0_2_0033A249
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033A9B0 push ecx; ret 0_2_0033A9C3
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0030BA28 push esp; retn 0030h0_2_0030BA51
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0030BA59 push esp; retn 0030h0_2_0030BA51

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\aMail_Ver1.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile created: C:\Users\user\AppData\Local\Temp\VSD1758.tmp\VSTOR40\vstor_redist.exeJump to dropped file
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile created: C:\Users\user\AppData\Local\Temp\VSD1758.tmp\aMail_Ver1.exeJump to dropped file
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vstor_redist[1].exeJump to dropped file
Source: C:\Users\user\Desktop\aMail_Ver1.exeFile created: C:\Users\user\AppData\Local\Temp\VSD1758.tmp\install.logJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\VSD1758.tmp\VSTOR40\vstor_redist.exeJump to dropped file
Source: C:\Users\user\Desktop\aMail_Ver1.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\vstor_redist[1].exeJump to dropped file
Source: C:\Users\user\Desktop\aMail_Ver1.exe TID: 2976Thread sleep time: -120000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_00318593 __EH_prolog3_GS,FindFirstFileW,FindNextFileW,FindClose,FindClose,0_2_00318593
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0034BCB5 FindFirstFileExW,0_2_0034BCB5
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_00336EA3 GetProcAddress,GetNativeSystemInfo,GetProcAddress,GetCurrentProcess,FreeLibrary,GetSystemInfo,0_2_00336EA3
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033A701 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0033A701
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_003247BB LoadLibraryW,GetProcAddress,GetProcAddress,0_2_003247BB
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0034477A mov eax, dword ptr fs:[00000030h]0_2_0034477A
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033A701 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0033A701
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033E854 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0033E854
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033A9F9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0033A9F9
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0031513C ShellExecuteExW,GetLastError,WaitForSingleObject,CloseHandle,0_2_0031513C
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033ABF6 cpuid 0_2_0033ABF6
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: GetLocaleInfoW,0_2_0034F0C0
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0034F18D
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: EnumSystemLocalesW,0_2_003477C6
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: IsValidCodePage,GetLocaleInfoW,0_2_0034E842
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: EnumSystemLocalesW,0_2_0034EAC9
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: EnumSystemLocalesW,0_2_0034EB14
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: GetLocaleInfoW,0_2_00347B6B
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: EnumSystemLocalesW,0_2_0034EBAF
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_0034EC40
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: GetLocaleInfoW,0_2_0034EE90
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0034EFB9
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_0033A5FB GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0033A5FB
Source: C:\Users\user\Desktop\aMail_Ver1.exeCode function: 0_2_00355503 GetVersion,GetEnvironmentVariableA,0_2_00355503
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Modify Registry
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media2
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Install Root Certificate
LSA Secrets1
Remote System Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials2
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync24
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
windowsupdatebg.s.llnwi.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://ocsp.entrust.net0D0%URL Reputationsafe
http://ocsp.entrust.net030%URL Reputationsafe
http://crl.comod0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
windowsupdatebg.s.llnwi.net
68.142.107.4
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.pkioverheid.nl/DomOvLatestCRL.crl0aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.diginotar.nl/cps/pkioverheid0aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://crl.entrust.net/server1.crl0aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://ocsp.entrust.net0DaMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://ocsp.entrust.net03aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://secure.comodo.com/CPS0aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://system.asite.com/aMail_Installer/aMail.vstoullX64BootstrapperaMail_Ver1.exe, 00000000.00000002.366084781.0000000000754000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        http://crl.entrust.net/2048ca.crl0aMail_Ver1.exe, 00000000.00000002.366084781.00000000007EA000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          https://system.asite.com/aMail_Installer/TruePABeginaMail_Ver1.exe, aMail_Ver1.exe.0.drfalse
            high
            http://crl.comodaMail_Ver1.exe, 00000000.00000002.366350837.000000000227A000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            No contacted IP infos
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1430794
            Start date and time:2024-04-24 07:25:16 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 5m 21s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
            Number of analysed new started processes analysed:6
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:aMail_Ver1.exe
            Detection:SUS
            Classification:sus29.winEXE@1/5@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 61%
            • Number of executed functions: 73
            • Number of non-executed functions: 107
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, svchost.exe
            • Excluded IPs from analysis (whitelisted): 184.28.121.225, 184.28.122.21, 23.1.234.40, 23.1.234.9, 23.1.234.26, 23.1.234.73, 23.1.234.56, 23.1.234.80, 23.1.234.59, 23.1.234.11, 23.1.234.16
            • Excluded domains from analysis (whitelisted): e11290.dspg.akamaiedge.net, go.microsoft.com, dlc-shim.trafficmanager.net, e12671.dscd.akamaiedge.net, download.microsoft.com.edgekey.net, main.dl.ms.akadns.net, go.microsoft.com.edgekey.net, ctldl.windowsupdate.com, download.microsoft.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            TimeTypeDescription
            07:26:01API Interceptor270x Sleep call for process: aMail_Ver1.exe modified
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            windowsupdatebg.s.llnwi.netNew DHL Shipment Document Arrival Notice.pdf.exeGet hashmaliciousAgentTeslaBrowse
            • 68.142.107.4
            GHY7L7VaOL.exeGet hashmaliciousUnknownBrowse
            • 68.142.107.4
            https://auhsdbfjabsdfjs.z13.web.core.windows.net/Er0Win8helpline76/index.htmlGet hashmaliciousTechSupportScamBrowse
            • 68.142.107.4
            4BfhCycV4B.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, zgRATBrowse
            • 69.164.42.0
            https://caringhearts.foundation/wp-includes/widgets/ogk25/ogk/index.php&c=E,1,PBioTuoqxXxVmzOkxu8MYhWQ9ZbRNVLGpsstSuC0GQ2jNcQlIpYbU0K6d3lwsaeoT17vAF7VpKXs0qg9O-hGnfKxM3skSa-Jn2VJH7kX1A,,&typo=1Get hashmaliciousUnknownBrowse
            • 68.142.107.4
            https://caringhearts.foundation/wp-includes/widgets/ogk25/ogk/index.php&c=E,1,PBioTuoqxXxVmzOkxu8MYhWQ9ZbRNVLGpsstSuC0GQ2jNcQlIpYbU0K6d3lwsaeoT17vAF7VpKXs0qg9O-hGnfKxM3skSa-Jn2VJH7kX1A,,&typo=1Get hashmaliciousUnknownBrowse
            • 69.164.46.128
            CR-FEDEX_TN-775537409198_Doc.vbsGet hashmaliciousUnknownBrowse
            • 69.164.46.0
            copy_76499Kxls.vbsGet hashmaliciousRemcos, GuLoaderBrowse
            • 69.164.46.0
            Purchase Inquiry.vbsGet hashmaliciousAgentTeslaBrowse
            • 69.164.46.128
            szamla_sorszam_8472.xlsmGet hashmaliciousUnknownBrowse
            • 69.164.42.0
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\aMail_Ver1.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):30573854
            Entropy (8bit):7.999820447996267
            Encrypted:true
            SSDEEP:786432:O/LmoRkCrQ8jONK+AUpJJMqpGjyw/hzFiT:oH07AU+qpGjhzK
            MD5:A185854995666F7AC6D9ED740A4A50AF
            SHA1:FE4F04D869018A44C4A3212DEF2D9A54233DF6FD
            SHA-256:5A2AB3209B30501CDD1ACFB711F1A2A35A5C10DFCCF6269A1FF6B40AE3BD8FF2
            SHA-512:C1420359112FE235C851975707B91AF03947EB3532A3DE5FE467F363D9B2FCA06FC4A43C4B8921B54D90D28856F8D414ED864635EBBEBB2D5CE265DB50B03F88
            Malicious:false
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#pA.B...B...B..gM...B...B...B..gMC..B..gMA..B..gM@..B..gMD..B..Rich.B..........................PE..L....jkG.............................c... ........... ................................~.......... ....................................................~.H(.......... "...............................&..@............ ...............................text........ ...................... ..`.data...............................@....rsrc.............}.................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\aMail_Ver1.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:modified
            Size (bytes):29155799
            Entropy (8bit):7.999813167806156
            Encrypted:true
            SSDEEP:393216:5DsmKfei43MnDSPdcnRkjqNb/k1VHE35q8Jyi1HONiD8oMAUpJJ/0JClpGHdNY9s:O/LmoRkCrQ8jONK+AUpJJMqpGjyw/ht
            MD5:CE0AADEC275A860B9A019212BEED8AE1
            SHA1:42C8FA5D8602FB3DE1DCCF67F0D0E15EC096EA88
            SHA-256:1114C429F3DF2F7A337FF22EDAA7292A10201E71817EB4786A0662F9F08EEC8C
            SHA-512:924EA9C1D8BDB840D6AFCFF164BBB2FA16E886CE607EBD0185F356E694294CB79B4AE74FE615BD9CA36E8BB512E89F431A0E20942AA2994FF54103AB25BDC4B3
            Malicious:false
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........#pA.B...B...B..gM...B...B...B..gMC..B..gMA..B..gM@..B..gMD..B..Rich.B..........................PE..L....jkG.............................c... ........... ................................~.......... ....................................................~.H(.......... "...............................&..@............ ...............................text........ ...................... ..`.data...............................@....rsrc.............}.................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\aMail_Ver1.exe
            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
            Category:dropped
            Size (bytes):908040
            Entropy (8bit):5.658326719275916
            Encrypted:false
            SSDEEP:12288:XLNJYdaqX8PzxRU0EZ6CDQrwaVGua8eMb01JQntLOC9p9wNw:7xqsPzxWDQZem9pl
            MD5:06B0347315D3AB5385A0479134EC22CC
            SHA1:784D20632B7AA1C4D4C6A8F1C9597037AC94AB12
            SHA-256:C9DE15F068399626B8296C218150F31F1F9C0065442F0580CF1E3A9ACAD70464
            SHA-512:7DEAAEF9344541DB361FC0D3EA074BEC35C5C8EFA1E2CD0AF64C2331F338023D35BA504A1BB1CDAEB703E06929C2576FF9AA9EA30959C324CAF31BE50F76B05B
            Malicious:false
            Reputation:low
            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-.W.L...L...L..u.n..L..u.l._L..u.m..L...0...L...0...L...0...L....T..L...L...M...0...L...0...L...0...L...0`..L...0...L..Rich.L..................PE..L......d.........."....".................... ....@.......................................@...... ..................p...x...@S..........\D...............)......L8...+..T...........................`n..@............P..8...<........................text............................... ..`.data...,%... ......................@....idata..p....P......................@..@.didat..p....p.......0..............@....rsrc...\D.......F...2..............@..@.reloc..L8.......:...x..............@..B................................................................................................................................................................................................................................................
            Process:C:\Users\user\Desktop\aMail_Ver1.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):26
            Entropy (8bit):3.95006375643621
            Encrypted:false
            SSDEEP:3:ggPYV:rPYV
            MD5:187F488E27DB4AF347237FE461A079AD
            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
            Malicious:false
            Reputation:high, very likely benign file
            Preview:[ZoneTransfer]....ZoneId=0
            Process:C:\Users\user\Desktop\aMail_Ver1.exe
            File Type:data
            Category:dropped
            Size (bytes):6398
            Entropy (8bit):3.659819337920586
            Encrypted:false
            SSDEEP:96:s85uiOysPOg8AU6Bj7rBF7gBEO18Aj7PcERAnEi7bl72Z3ZyZMjh:V5RFRupg2guDb52Z3Z3jh
            MD5:79613F1DEB3343D4288067678F7FCBEA
            SHA1:8CDF685480AAA490F9090F59449B3D78866AE91C
            SHA-256:72AD884FF3F02B6934C41CBC020D8EBD87406A1474FD733C358B4BD4CCF79B39
            SHA-512:8AD66798DC4F3290D6902A839971E75B81BC1927C42EEF9542A979F79E1EFE7331931CBB36BC61CC20D571131C41C649DFF38582E65231208E184425849496B3
            Malicious:false
            Reputation:low
            Preview:T.h.e. .f.o.l.l.o.w.i.n.g. .p.r.o.p.e.r.t.i.e.s. .h.a.v.e. .b.e.e.n. .s.e.t.:.....P.r.o.p.e.r.t.y.:. .[.A.d.m.i.n.U.s.e.r.]. .=. .t.r.u.e. .{.b.o.o.l.e.a.n.}.....P.r.o.p.e.r.t.y.:. .[.I.n.s.t.a.l.l.M.o.d.e.]. .=. .H.o.m.e.S.i.t.e. .{.s.t.r.i.n.g.}.....P.r.o.p.e.r.t.y.:. .[.N.T.P.r.o.d.u.c.t.T.y.p.e.]. .=. .1. .{.i.n.t.}.....P.r.o.p.e.r.t.y.:. .[.P.r.o.c.e.s.s.o.r.A.r.c.h.i.t.e.c.t.u.r.e.]. .=. .A.M.D.6.4. .{.s.t.r.i.n.g.}.....P.r.o.p.e.r.t.y.:. .[.V.e.r.s.i.o.n.N.T.]. .=. .6...1...1. .{.v.e.r.s.i.o.n.}.....R.u.n.n.i.n.g. .c.h.e.c.k.s. .f.o.r. .p.a.c.k.a.g.e. .'.M.i.c.r.o.s.o.f.t. ...N.E.T. .F.r.a.m.e.w.o.r.k. .4...8. .(.x.8.6. .a.n.d. .x.6.4.).'.,. .p.h.a.s.e. .B.u.i.l.d.L.i.s.t.....R.e.a.d.i.n.g. .v.a.l.u.e. .'.R.e.l.e.a.s.e.'. .o.f. .r.e.g.i.s.t.r.y. .k.e.y. .'.H.K.L.M.\.S.o.f.t.w.a.r.e.\.M.i.c.r.o.s.o.f.t.\.N.E.T. .F.r.a.m.e.w.o.r.k. .S.e.t.u.p.\.N.D.P.\.v.4.\.F.u.l.l.'.....R.e.a.d. .i.n.t.e.g.e.r. .v.a.l.u.e. .5.2.8.0.4.9.....S.e.t.t.i.n.g. .v.a.l.u.e. .'.5.2.8.0.4.9. .{.i.n.t.}.'.
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):5.658326719275916
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:aMail_Ver1.exe
            File size:908'040 bytes
            MD5:06b0347315d3ab5385a0479134ec22cc
            SHA1:784d20632b7aa1c4d4c6a8f1c9597037ac94ab12
            SHA256:c9de15f068399626b8296c218150f31f1f9c0065442f0580cf1e3a9acad70464
            SHA512:7deaaef9344541db361fc0d3ea074bec35c5c8efa1e2cd0af64c2331f338023d35ba504a1bb1cdaeb703e06929c2576ff9aa9ea30959c324caf31be50f76b05b
            SSDEEP:12288:XLNJYdaqX8PzxRU0EZ6CDQrwaVGua8eMb01JQntLOC9p9wNw:7xqsPzxWDQZem9pl
            TLSH:021541265AD8B569E3F79B307FF242D3AB69BC623934CC4E12D1030D0965A41FDA076E
            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........-.W.L...L...L..u.n..L..u.l._L..u.m..L...0...L...0...L...0...L....T..L...L...M...0...L...0...L...0...L...0`..L...0...L..Rich.L.
            Icon Hash:0e0f396929630f0e
            Entrypoint:0x43a1e0
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Time Stamp:0x64A6FEE0 [Thu Jul 6 17:50:24 2023 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:5
            OS Version Minor:1
            File Version Major:5
            File Version Minor:1
            Subsystem Version Major:5
            Subsystem Version Minor:1
            Import Hash:2e4063684e52e96403e6efd64e422891
            Signature Valid:true
            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
            Signature Validation Error:The operation completed successfully
            Error Number:0
            Not Before, Not After
            • 4/25/2022 5:00:00 PM 6/19/2024 4:59:59 PM
            Subject Chain
            • CN=Asite Solutions Limited, O=Asite Solutions Limited, L=London, C=GB
            Version:3
            Thumbprint MD5:86EA3382B09890E3D2C31FC46C92B4B2
            Thumbprint SHA-1:EA51B1554C793D9EC73B4406F4B76BE860B36F7C
            Thumbprint SHA-256:C9C5AB2780E1885EC4FA6260BCD703F6240CF682A735A3ABF71CBE2FC6CFD104
            Serial:074002E0E1228CA7CE34E1C3685BF8BF
            Instruction
            call 00007FADF1A755A8h
            jmp 00007FADF1A74FBDh
            push ebp
            mov ebp, esp
            jmp 00007FADF1A7514Fh
            push dword ptr [ebp+08h]
            call 00007FADF1A80B51h
            pop ecx
            test eax, eax
            je 00007FADF1A75151h
            push dword ptr [ebp+08h]
            call 00007FADF1A80BDAh
            pop ecx
            test eax, eax
            je 00007FADF1A75128h
            pop ebp
            ret
            cmp dword ptr [ebp+08h], FFFFFFFFh
            je 00007FADF1A50566h
            jmp 00007FADF1A75907h
            push ebp
            mov ebp, esp
            push dword ptr [ebp+08h]
            call 00007FADF1A75283h
            pop ecx
            pop ebp
            ret
            cmp ecx, dword ptr [0046205Ch]
            jne 00007FADF1A75143h
            ret
            jmp 00007FADF1A75930h
            mov ecx, dword ptr [ebp-0Ch]
            mov dword ptr fs:[00000000h], ecx
            pop ecx
            pop edi
            pop edi
            pop esi
            pop ebx
            mov esp, ebp
            pop ebp
            push ecx
            ret
            mov ecx, dword ptr [ebp-10h]
            xor ecx, ebp
            call 00007FADF1A75119h
            jmp 00007FADF1A75122h
            mov ecx, dword ptr [ebp-14h]
            xor ecx, ebp
            call 00007FADF1A7510Ah
            jmp 00007FADF1A75113h
            push eax
            push dword ptr fs:[00000000h]
            lea eax, dword ptr [esp+0Ch]
            sub esp, dword ptr [esp+0Ch]
            push ebx
            push esi
            push edi
            mov dword ptr [eax], ebp
            mov ebp, eax
            mov eax, dword ptr [0046205Ch]
            xor eax, ebp
            push eax
            push dword ptr [ebp-04h]
            mov dword ptr [ebp-04h], FFFFFFFFh
            lea eax, dword ptr [ebp-0Ch]
            mov dword ptr fs:[00000000h], eax
            ret
            push eax
            push dword ptr fs:[00000000h]
            lea eax, dword ptr [esp+0Ch]
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x610700x78.text
            IMAGE_DIRECTORY_ENTRY_IMPORT0x653400xc8.idata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x680000x7445c.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0xdb2000x2908
            IMAGE_DIRECTORY_ENTRY_BASERELOC0xdd0000x384c.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x12b800x54.text
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x6e600x40.text
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x650000x338.idata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x60d3c0x80.text
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000x600e80x602000d2e544ab6aab672ed6c6576f2015fe9False0.5105428112808843data6.450164375603211IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .data0x620000x252c0x1400f41d72eb2c226a3a1a0907190befa736False0.266796875DOS executable (block device driver)3.3161911498156IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .idata0x650000x15700x1600de93a4c825fc59143b8094bac90af12cFalse0.42631392045454547data5.421901541324144IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .didat0x670000x700x20027eaca3c248e8b18c15c2a0a0bf4df22False0.162109375data1.1460240260218542IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x680000x7445c0x74600e6513936fd06999b428973bca2753ab9False0.13159573039742212data4.219840040807034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0xdd0000x384c0x3a00f7059413bd1f0b66ae84c624fdf523f2False0.7380118534482759data6.589152632057299IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_ICON0x69c8c0x1e16PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9881848870423267
            RT_ICON0x6baa40xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.18363539445628999
            RT_ICON0x6c94c0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.23736462093862815
            RT_ICON0x6d1f40x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.1856936416184971
            RT_ICON0x6d75c0x1e8cPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9874680306905371
            RT_ICON0x6f5e80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.08260510155880964
            RT_ICON0x738100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.10518672199170125
            RT_ICON0x75db80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.16135084427767354
            RT_ICON0x76e600x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.2801418439716312
            RT_ICON0x772c80x75dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8058355437665783
            RT_ICON0x77a280xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.06716417910447761
            RT_ICON0x788d00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.08167870036101083
            RT_ICON0x791780x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.08164739884393063
            RT_ICON0x796e00x830PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8664122137404581
            RT_ICON0x79f100x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.025330656589513462
            RT_ICON0x7e1380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.03464730290456432
            RT_ICON0x806e00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.054643527204502815
            RT_ICON0x817880x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.10460992907801418
            RT_DIALOG0x81bf00x90dataEnglishUnited States0.7083333333333334
            RT_DIALOG0x81c800x1b4dataEnglishUnited States0.4724770642201835
            RT_DIALOG0x81e340x1a4dataEnglishUnited States0.5095238095238095
            RT_GROUP_ICON0x81fd80x84dataEnglishUnited States0.6515151515151515
            RT_GROUP_ICON0x8205c0x84dataEnglishUnited States0.6590909090909091
            RT_VERSION0x820e00x2dcdataEnglishUnited States0.49043715846994534
            RT_MANIFEST0x823bc0x562XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.4528301886792453
            None0x829200x54data0.8333333333333334
            None0x829740xadata1.8
            None0x829800x46c4data0.1445131375579598
            None0x870440x10data1.5
            None0x870540x14data1.3
            None0x870680xedata1.5714285714285714
            None0x870780x18data1.25
            None0x870900x18data1.25
            None0x870a80x8data2.0
            None0x870b00x6data2.3333333333333335
            None0x870b80x7adata0.680327868852459
            None0x871340x8adata0.644927536231884
            None0x871c00x34data0.9423076923076923
            None0x871f40x3cdata0.9
            None0x872300x12data1.4444444444444444
            None0x872440x22data1.0294117647058822
            None0x872680x122data0.5103448275862069
            None0x8738c0x1a6data0.43364928909952605
            None0x875340x410data0.32211538461538464
            None0x879440x36data0.9444444444444444
            None0x8797c0xedata1.4285714285714286
            None0x8798c0x62data0.7755102040816326
            None0x879f00xadata1.8
            None0x879fc0x48data0.8888888888888888
            None0x87a440x9adata0.6753246753246753
            None0x87ae00x7adata0.6885245901639344
            None0x87b5c0x84data0.6590909090909091
            None0x87be00x17edata0.4319371727748691
            None0x87d600x46data0.8285714285714286
            None0x87da80xc4data0.5969387755102041
            None0x87e6c0x4adata0.8513513513513513
            None0x87eb80x66data0.7843137254901961
            None0x87f200x100data0.578125
            None0x880200xcdata1.6666666666666667
            None0x8802c0x48data0.8194444444444444
            None0x880740x20data1.15625
            None0x880940x42data0.8939393939393939
            None0x880d80x74data0.7155172413793104
            None0x8814c0x6cdata0.7592592592592593
            None0x881b80x9edata0.6518987341772152
            None0x882580x5adata0.8222222222222222
            None0x882b40x68data0.75
            None0x8831c0x58data0.8068181818181818
            None0x883740x2data5.0
            None0x883780x16data1.2272727272727273
            None0x883900x58data0.7954545454545454
            None0x883e80xa6data0.6265060240963856
            None0x884900xedata1.5714285714285714
            None0x884a00x30data1.0208333333333333
            None0x884d00x12data1.4444444444444444
            None0x884e40xb8data0.6304347826086957
            None0x8859c0x10data1.5
            None0x885ac0x14cdata0.5271084337349398
            None0x886f80x78data0.7666666666666667
            None0x887700x3cdata0.9333333333333333
            None0x887ac0xcedata0.5194174757281553
            None0x8887c0x2edata1.0
            None0x888ac0x74data0.7155172413793104
            None0x889200xb6data0.6043956043956044
            None0x889d80x10data1.375
            None0x889e80x1cdata1.1785714285714286
            None0x88a040x78data0.725
            None0x88a7c0x6cdata0.7407407407407407
            None0x88ae80x52data0.8292682926829268
            None0x88b3c0x4edata0.8717948717948718
            None0x88b8c0x12data1.3333333333333333
            None0x88ba00x10data1.5
            None0x88bb00x12data1.4444444444444444
            None0x88bc40x130data0.5131578947368421
            None0x88cf40x56data0.7906976744186046
            None0x88d4c0x4adata0.9594594594594594
            None0x88d980x6cdata0.7777777777777778
            None0x88e040x76data0.6864406779661016
            None0x88e7c0x44data0.8676470588235294
            None0x88ec00x44data0.8676470588235294
            None0x88f040x5adata0.7777777777777778
            None0x88f600xdadata0.573394495412844
            None0x8903c0x84data0.7045454545454546
            None0x890c00xd2data0.5428571428571428
            None0x891940x5edata0.7872340425531915
            None0x891f40x8cdata0.7142857142857143
            None0x892800xc8data0.595
            None0x893480xd2data0.5857142857142857
            None0x8941c0x50data0.8125
            None0x8946c0x88data0.7573529411764706
            None0x894f40x78data0.6916666666666667
            None0x8956c0x4edata0.8974358974358975
            None0x895bc0x8edata0.6690140845070423
            None0x8964c0xa8data0.6130952380952381
            None0x896f40x6cdata0.7314814814814815
            None0x897600x82data0.7153846153846154
            None0x897e40xe4data0.5789473684210527
            None0x898c80x7adata0.7377049180327869
            None0x899440xeedata0.5714285714285714
            None0x89a340x6data2.3333333333333335
            None0x89a3c0x4data3.0
            None0x89a400x26ccdata0.2400322190898107
            None0x8c10c0x5013edata0.08128403221970866
            None0xdc24c0xadata1.6
            None0xdc2580x202data0.29377431906614787
            DLLImport
            KERNEL32.dllGetNativeSystemInfo, EndUpdateResourceW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetEvent, CreateEventW, LoadResource, LockResource, SizeofResource, FindResourceW, GetEnvironmentVariableW, ExpandEnvironmentStringsW, CreateDirectoryW, DeleteFileW, GetFileAttributesW, GetTempFileNameW, GetCurrentProcessId, GetTempPathW, GetCurrentProcess, GetSystemInfo, GetSystemDirectoryW, GetWindowsDirectoryW, GetVersionExW, GetModuleFileNameW, GlobalAlloc, GlobalFree, LocalFree, FormatMessageW, CopyFileW, GetDateFormatW, GetTimeFormatW, CompareStringW, WideCharToMultiByte, InitializeCriticalSectionAndSpinCount, Sleep, HeapSetInformation, SetFilePointer, GetDiskFreeSpaceExW, CreateFileW, DeleteCriticalSection, CreateThread, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, lstrlenW, OpenProcess, MulDiv, GetTickCount, GetExitCodeProcess, LoadLibraryW, ReadFile, SwitchToThread, FindNextFileW, BeginUpdateResourceA, FindResourceA, lstrlenA, DeleteFileA, CreateFileA, UpdateResourceW, BeginUpdateResourceW, GetVersion, GetEnvironmentVariableA, LCMapStringEx, InitializeCriticalSectionEx, HeapReAlloc, HeapSize, WriteConsoleW, GetProcessHeap, SetStdHandle, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetCPInfo, GetOEMCP, IsValidCodePage, FindFirstFileExW, OutputDebugStringW, SetEndOfFile, SetFilePointerEx, ReadConsoleW, GetConsoleMode, GetConsoleCP, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, FindFirstFileW, FindClose, GetProcAddress, FreeLibrary, WaitForSingleObject, GetLastError, CloseHandle, UpdateResourceA, WriteFile, LCMapStringW, HeapFree, HeapAlloc, GetFileType, GetStringTypeW, GetACP, GetModuleHandleExW, RaiseException, VirtualProtect, VirtualQuery, GetModuleHandleW, LoadLibraryExA, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, TerminateProcess, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, GetStdHandle, MultiByteToWideChar, ExitProcess
            GDI32.dllGetStockObject, EnumFontFamiliesExW, DeleteObject, CreateFontIndirectW, GetObjectW, GetTextMetricsW, SelectObject, GetTextExtentPoint32W, GetDeviceCaps, DeleteDC, CreateCompatibleDC
            ole32.dllCoUninitialize, CoInitialize
            Secur32.dllGetComputerObjectNameW
            SHELL32.dllShellExecuteExW, SHGetMalloc, SHGetPathFromIDListW, SHGetSpecialFolderLocation, ShellExecuteW, ShellExecuteA
            USER32.dllSystemParametersInfoW, IsDialogMessageW, LoadImageW, LoadIconW, LoadCursorW, SetClassLongW, ScreenToClient, GetWindowRect, GetClientRect, SetWindowTextW, ShowScrollBar, SetForegroundWindow, EnableWindow, MsgWaitForMultipleObjects, SetFocus, SendDlgItemMessageW, SetDlgItemTextW, GetDlgItem, CreateDialogIndirectParamW, CreateDialogParamW, MoveWindow, ShowWindow, DestroyWindow, SendMessageW, SendMessageA, PeekMessageW, DispatchMessageW, TranslateMessage, ExitWindowsEx, MessageBoxW, ReleaseDC, GetDC, DrawTextW, GetSystemMetrics, GetDialogBaseUnits, MessageBoxA, SetCursor, GetFocus
            CRYPT32.dllCertGetCertificateChain, CertFreeCertificateChain, CertVerifyCertificateChainPolicy
            WININET.dllInternetCrackUrlW, InternetCombineUrlW
            msi.dll
            NameOrdinalAddress
            _DecodePointerInternal@410x424800
            _EncodePointerInternal@420x424830
            Language of compilation systemCountry where language is spokenMap
            EnglishUnited States
            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
            Apr 24, 2024 07:26:19.714799881 CEST8.8.8.8192.168.2.220xd78cNo error (0)windowsupdatebg.s.llnwi.net68.142.107.4A (IP address)IN (0x0001)false

            Click to jump to process

            Click to jump to process

            Click to dive into process behavior distribution

            Target ID:0
            Start time:07:26:01
            Start date:24/04/2024
            Path:C:\Users\user\Desktop\aMail_Ver1.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\aMail_Ver1.exe"
            Imagebase:0x300000
            File size:908'040 bytes
            MD5 hash:06B0347315D3AB5385A0479134EC22CC
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:8.2%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:3.9%
              Total number of Nodes:1358
              Total number of Limit Nodes:118
              execution_graph 25214 348e3c 31 API calls 4 library calls 25217 314421 33 API calls 3 library calls 25220 346c21 40 API calls 4 library calls 25221 355620 SetLastError _AnonymousOriginator ctype 25222 317e29 36 API calls 25223 34402e 27 API calls 2 library calls 24483 32b02c 24484 337e17 32 API calls 24483->24484 24485 32b03a 24484->24485 24486 32b041 24485->24486 24489 31779f 55 API calls 2 library calls 24485->24489 25225 325613 30 API calls 24492 347a10 24493 34788c __Getctype 5 API calls 24492->24493 24494 347a37 24493->24494 24495 347a4f TlsAlloc 24494->24495 24496 347a40 24494->24496 24495->24496 24497 33a228 _ValidateLocalCookies 5 API calls 24496->24497 24498 347a60 24497->24498 25228 33a417 4 API calls 2 library calls 25229 31d019 48 API calls 25230 355e1d 51 API calls _AnonymousOriginator 25232 33481c LoadImageW LoadIconW GetDlgItem SendMessageW 25233 33a81c GetStartupInfoW _abort 24673 324800 24678 3247bb 24673->24678 24676 324822 24677 32481e RtlDecodePointer 24677->24676 24679 3247c4 LoadLibraryW GetProcAddress GetProcAddress 24678->24679 24680 3247fb 24678->24680 24679->24680 24680->24676 24680->24677 25236 325e00 28 API calls 2 library calls 25237 356600 55 API calls _ValidateLocalCookies 25238 353e00 4 API calls 2 library calls 24891 334c08 24892 334c38 24891->24892 24893 334c14 24891->24893 24893->24892 24894 334c2e SetDlgItemTextW 24893->24894 24894->24892 25241 317070 77 API calls 23617 33487a 23618 334883 SetDlgItemTextW 23617->23618 23619 334891 23617->23619 23618->23619 23647 325e7d 23648 325eab 23647->23648 23649 325e87 23647->23649 23649->23648 23651 325416 23649->23651 23652 325425 __EH_prolog3_GS 23651->23652 23658 325434 23652->23658 23661 325781 23652->23661 23656 3254c4 23722 315652 23656->23722 23726 33a24a 23658->23726 23662 325790 __EH_prolog3_GS 23661->23662 23729 314011 23662->23729 23667 3257d3 RegOpenKeyExW 23668 32598f RegCloseKey 23667->23668 23670 3257f5 RegQueryValueExW 23667->23670 23669 33a24a 5 API calls 23668->23669 23671 325448 23669->23671 23670->23668 23672 325834 23670->23672 23671->23656 23710 314375 23671->23710 23672->23668 23673 314011 28 API calls 23672->23673 23674 325853 23673->23674 23675 314011 28 API calls 23674->23675 23676 325862 23675->23676 23756 336e0e 29 API calls 2 library calls 23676->23756 23678 325879 23757 33688f 29 API calls 2 library calls 23678->23757 23680 325892 23758 3259a5 28 API calls 23680->23758 23682 3258a7 23759 335da9 29 API calls 2 library calls 23682->23759 23684 3258d5 23760 3163fb 26 API calls _SyncOriginator 23684->23760 23686 3258e0 23687 315652 _SyncOriginator 26 API calls 23686->23687 23688 3258eb 23687->23688 23689 315652 _SyncOriginator 26 API calls 23688->23689 23690 3258f6 23689->23690 23691 315652 _SyncOriginator 26 API calls 23690->23691 23692 325901 23691->23692 23693 315652 _SyncOriginator 26 API calls 23692->23693 23694 325910 23693->23694 23761 336e0e 29 API calls 2 library calls 23694->23761 23696 325923 23762 324fe5 28 API calls 23696->23762 23698 325935 23763 3163fb 26 API calls _SyncOriginator 23698->23763 23700 325940 23701 315652 _SyncOriginator 26 API calls 23700->23701 23702 32594b 23701->23702 23703 315652 _SyncOriginator 26 API calls 23702->23703 23704 32595a 23703->23704 23705 314375 55 API calls 23704->23705 23706 325976 23705->23706 23707 315652 _SyncOriginator 26 API calls 23706->23707 23708 325984 23707->23708 23709 315652 _SyncOriginator 26 API calls 23708->23709 23709->23668 23711 314381 __EH_prolog3_GS 23710->23711 23892 33642e 23711->23892 23716 31556b 6 API calls 23717 3143de 23716->23717 23721 31440a ctype 23717->23721 23911 3155e1 26 API calls __Getctype 23717->23911 23718 33a24a 5 API calls 23720 314420 23718->23720 23720->23656 23721->23718 23723 31565d 23722->23723 23724 31566c 23722->23724 23943 313f09 26 API calls 3 library calls 23723->23943 23724->23658 23727 33a228 _ValidateLocalCookies 5 API calls 23726->23727 23728 3254df 23727->23728 23728->23648 23730 31402e 23729->23730 23730->23730 23764 313e14 23730->23764 23732 314048 23733 337c8d 23732->23733 23842 33a29b 23733->23842 23735 337c9c GetComputerObjectNameW 23736 337cc5 23735->23736 23737 337d79 23735->23737 23738 314011 28 API calls 23736->23738 23739 33a24a 5 API calls 23737->23739 23741 337cd7 23738->23741 23740 3257cb 23739->23740 23740->23667 23740->23668 23742 337d3e 23741->23742 23843 315991 23741->23843 23889 338a85 43 API calls 2 library calls 23742->23889 23746 337d4a 23750 337d61 23746->23750 23751 337d7d 23746->23751 23748 337d33 23749 315652 _SyncOriginator 26 API calls 23748->23749 23749->23742 23890 338095 8 API calls _ValidateLocalCookies 23750->23890 23752 315652 _SyncOriginator 26 API calls 23751->23752 23752->23737 23754 337d66 23755 315652 _SyncOriginator 26 API calls 23754->23755 23755->23737 23756->23678 23757->23680 23758->23682 23759->23684 23760->23686 23761->23696 23762->23698 23763->23700 23765 313e90 23764->23765 23768 313e27 23764->23768 23778 315680 28 API calls std::_Xinvalid_argument 23765->23778 23767 313e35 _Yarn 23767->23732 23768->23767 23771 31568b 23768->23771 23772 3156a5 23771->23772 23773 315698 23771->23773 23786 315635 27 API calls 3 library calls 23772->23786 23779 313dc0 23773->23779 23776 3156a0 23776->23767 23777 3156aa 23780 313dd6 23779->23780 23781 313dcd 23779->23781 23783 313de2 23780->23783 23802 33a1ea 23780->23802 23787 313de6 23781->23787 23783->23776 23784 313dd3 23784->23776 23786->23777 23788 315635 Concurrency::cancel_current_task 23787->23788 23789 313df7 23787->23789 23816 33af08 23788->23816 23790 33a1ea std::ios_base::_Init 28 API calls 23789->23790 23791 313dfd 23790->23791 23791->23788 23792 313e04 23791->23792 23794 33ea2e 23791->23794 23792->23784 23820 33e9a3 26 API calls 3 library calls 23794->23820 23795 315651 23798 31566c 23795->23798 23819 313f09 26 API calls 3 library calls 23795->23819 23797 33ea3d 23821 33ea4b IsProcessorFeaturePresent 23797->23821 23798->23784 23801 33ea4a 23805 33a1ef 23802->23805 23804 33a209 23804->23784 23805->23804 23807 33a20b 23805->23807 23831 345c99 23805->23831 23839 345c03 7 API calls 2 library calls 23805->23839 23808 315635 Concurrency::cancel_current_task 23807->23808 23809 33a215 Concurrency::cancel_current_task 23807->23809 23810 33af08 CallUnexpected RaiseException 23808->23810 23811 33af08 CallUnexpected RaiseException 23809->23811 23812 315651 23810->23812 23813 33a9f8 23811->23813 23814 31566c 23812->23814 23838 313f09 26 API calls 3 library calls 23812->23838 23814->23784 23817 33af4f RaiseException 23816->23817 23818 33af22 23816->23818 23817->23795 23818->23817 23819->23798 23820->23797 23822 33ea56 23821->23822 23825 33e854 23822->23825 23826 33e870 _abort 23825->23826 23827 33e89c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 23826->23827 23830 33e96d _abort 23827->23830 23828 33a228 _ValidateLocalCookies 5 API calls 23829 33e98b GetCurrentProcess TerminateProcess 23828->23829 23829->23801 23830->23828 23836 349f5d std::_Locinfo::_Locinfo_dtor 23831->23836 23832 349f9b 23841 346923 20 API calls _free 23832->23841 23834 349f86 RtlAllocateHeap 23835 349f99 23834->23835 23834->23836 23835->23805 23836->23832 23836->23834 23840 345c03 7 API calls 2 library calls 23836->23840 23838->23814 23839->23805 23840->23836 23841->23835 23842->23735 23844 3159b5 23843->23844 23845 3159db 23843->23845 23848 313e14 28 API calls 23844->23848 23891 318d93 28 API calls 23845->23891 23849 3159d3 23848->23849 23888 3163fb 26 API calls _SyncOriginator 23849->23888 23888->23748 23889->23746 23890->23754 23893 33643a __EH_prolog3_GS 23892->23893 23912 315759 23893->23912 23895 33646f 23898 3364ac 23895->23898 23918 32ae69 23895->23918 23925 33893a 23895->23925 23899 3364bb 23898->23899 23929 3156ab 28 API calls 23898->23929 23900 3364ce 23899->23900 23930 313f09 26 API calls 3 library calls 23899->23930 23903 33a24a 5 API calls 23900->23903 23904 3143b8 23903->23904 23905 31556b 23904->23905 23906 3155b3 23905->23906 23907 315585 WriteFile 23905->23907 23908 33a228 _ValidateLocalCookies 5 API calls 23906->23908 23907->23906 23910 3143d2 23908->23910 23910->23716 23911->23721 23913 315765 23912->23913 23917 31577b 23912->23917 23931 318ca7 23913->23931 23917->23895 23919 32ae85 23918->23919 23924 32ae80 23918->23924 23920 32ae92 23919->23920 23921 32ae9f 23919->23921 23919->23924 23940 32aeba 28 API calls _Yarn 23920->23940 23941 315930 5 API calls 2 library calls 23921->23941 23924->23895 23926 33895c 23925->23926 23927 338944 23925->23927 23926->23895 23927->23926 23942 3389ff 52 API calls __vsnwprintf_l 23927->23942 23929->23899 23930->23900 23932 318cd0 23931->23932 23933 318cb9 23931->23933 23939 318d88 28 API calls std::_Xinvalid_argument 23932->23939 23935 31568b 28 API calls 23933->23935 23937 31576d 23935->23937 23938 315930 5 API calls 2 library calls 23937->23938 23938->23917 23940->23924 23941->23924 23942->23926 23943->23724 25250 347a66 11 API calls 2 library calls 25252 334c69 SetDlgItemTextW 25253 31506c 61 API calls 25254 335c6c 40 API calls _ValidateLocalCookies 25256 358457 91 API calls __wsopen_s 25259 333850 28 API calls ctype 24520 335254 24521 33527e 24520->24521 24522 335260 24520->24522 24523 335274 SetDlgItemTextW 24522->24523 24523->24521 25261 354845 DeleteCriticalSection 25264 355a47 RaiseException 25266 34ec40 45 API calls 3 library calls 25268 355240 GetVersion GetEnvironmentVariableA 24708 333a44 24709 333a61 13 API calls 24708->24709 24710 333b8b 24708->24710 24721 3346ab GetDlgItem 24709->24721 24712 33a228 _ValidateLocalCookies 5 API calls 24710->24712 24713 333b96 24712->24713 24715 3346ab 9 API calls 24716 333b45 24715->24716 24717 3346ab 9 API calls 24716->24717 24718 333b54 24717->24718 24719 3346ab 9 API calls 24718->24719 24720 333b63 MoveWindow 24719->24720 24720->24710 24722 3346d3 GetWindowRect 24721->24722 24723 33472d 24721->24723 24722->24723 24724 3346f0 ScreenToClient MoveWindow 24722->24724 24725 33a228 _ValidateLocalCookies 5 API calls 24723->24725 24724->24723 24726 333b36 24725->24726 24726->24715 24727 33544b GetDlgItem ShowWindow GetDlgItem ShowWindow 25271 3164b0 26 API calls 2 library calls 25272 31c2b3 28 API calls 25273 3212b0 21 API calls ctype 25282 333cbc GetDlgItem EnableWindow 24044 336ea3 24058 337e17 24044->24058 24047 336f62 GetSystemInfo 24049 336f6c 24047->24049 24048 336ed9 GetProcAddress 24050 336f57 FreeLibrary 24048->24050 24051 336eeb GetNativeSystemInfo 24048->24051 24052 33a228 _ValidateLocalCookies 5 API calls 24049->24052 24050->24047 24050->24049 24051->24050 24055 336f04 GetProcAddress 24051->24055 24053 336f7d 24052->24053 24055->24050 24056 336f16 GetCurrentProcess 24055->24056 24057 336f37 24056->24057 24057->24050 24072 33b8b0 24058->24072 24061 337e62 24074 337ec6 24061->24074 24063 337e6f _abort 24064 337e84 GetWindowsDirectoryW 24063->24064 24065 337eb7 24063->24065 24066 337eb0 LoadLibraryW 24064->24066 24067 337e9d 24064->24067 24069 33a228 _ValidateLocalCookies 5 API calls 24065->24069 24066->24065 24068 337ec6 29 API calls 24067->24068 24070 337eaa 24068->24070 24071 336ece 24069->24071 24070->24065 24070->24066 24071->24047 24071->24048 24073 337e44 GetSystemDirectoryW 24072->24073 24073->24061 24073->24063 24075 337ed2 __EH_prolog3_GS 24074->24075 24084 33800d 24075->24084 24078 337f1f 24083 337f4b ctype 24078->24083 24090 3155e1 26 API calls __Getctype 24078->24090 24079 337f16 LoadLibraryW 24079->24078 24080 33a24a 5 API calls 24081 337f63 24080->24081 24081->24063 24083->24080 24085 338051 _abort 24084->24085 24086 338087 24085->24086 24091 3156ab 28 API calls 24085->24091 24088 33a228 _ValidateLocalCookies 5 API calls 24086->24088 24089 337f03 24088->24089 24089->24078 24089->24079 24090->24083 24091->24086 25283 33a8a0 49 API calls _unexpected 25284 3182a5 10 API calls 25285 3448ac 39 API calls 4 library calls 25287 31caab 83 API calls 25288 34c8aa 21 API calls _free 25289 3472aa 64 API calls 4 library calls 25293 34ee90 43 API calls 3 library calls 25297 316480 27 API calls ctype 25299 325680 EnterCriticalSection LeaveCriticalSection 24895 33448f 24896 33404b 77 API calls 24895->24896 24899 3344a9 24896->24899 24897 33450e 24898 3344be SetWindowTextW 24900 3344d3 SetDlgItemTextW SetForegroundWindow ShowWindow LoadCursorW SetCursor 24898->24900 24901 3344d1 24898->24901 24899->24897 24899->24898 24900->24897 24901->24900 25307 34e2f0 42 API calls 3 library calls 23613 3352f6 23614 335302 23613->23614 23615 33532d 23613->23615 23614->23615 23616 33531c GetDlgItem ShowWindow 23614->23616 23616->23615 23944 3448e4 23947 344661 23944->23947 23948 34466d _unexpected 23947->23948 23949 344674 23948->23949 23950 344686 23948->23950 23986 3447bb GetModuleHandleW 23949->23986 23971 348391 EnterCriticalSection 23950->23971 23953 344679 23953->23950 23987 3447ff GetModuleHandleExW 23953->23987 23954 34472b 23975 34476b 23954->23975 23958 344702 23962 34471a 23958->23962 23995 3445ad 5 API calls _ValidateLocalCookies 23958->23995 23960 344774 23997 3572c0 5 API calls _ValidateLocalCookies 23960->23997 23961 344748 23978 34477a 23961->23978 23996 3445ad 5 API calls _ValidateLocalCookies 23962->23996 23968 34468d 23968->23954 23968->23958 23972 34600d 23968->23972 23971->23968 23998 345d46 23972->23998 24023 3483e1 LeaveCriticalSection 23975->24023 23977 344744 23977->23960 23977->23961 24024 347e86 23978->24024 23981 3447a8 23984 3447ff _abort 8 API calls 23981->23984 23982 344788 GetPEB 23982->23981 23983 344798 GetCurrentProcess TerminateProcess 23982->23983 23983->23981 23985 3447b0 ExitProcess 23984->23985 23986->23953 23988 34484c 23987->23988 23989 344829 GetProcAddress 23987->23989 23991 344852 FreeLibrary 23988->23991 23992 34485b 23988->23992 23990 34483e 23989->23990 23990->23988 23991->23992 23993 33a228 _ValidateLocalCookies 5 API calls 23992->23993 23994 344685 23993->23994 23994->23950 23995->23962 23996->23954 24001 345cf5 23998->24001 24000 345d6a 24000->23958 24002 345d01 __FrameHandler3::FrameUnwindToState 24001->24002 24009 348391 EnterCriticalSection 24002->24009 24004 345d0f 24010 345d96 24004->24010 24008 345d2d __Getctype 24008->24000 24009->24004 24014 345dbe 24010->24014 24015 345db6 24010->24015 24011 33a228 _ValidateLocalCookies 5 API calls 24012 345d1c 24011->24012 24018 345d3a LeaveCriticalSection std::_Lockit::~_Lockit 24012->24018 24013 345e66 24013->24015 24016 347740 _free 20 API calls 24013->24016 24014->24013 24014->24015 24019 354884 24014->24019 24015->24011 24016->24015 24018->24008 24020 3548c4 24019->24020 24021 3548a9 _DecodePointerInternal 24020->24021 24022 3548d9 24020->24022 24021->24020 24022->24014 24023->23977 24025 347eab 24024->24025 24029 347ea1 24024->24029 24030 34788c 24025->24030 24027 33a228 _ValidateLocalCookies 5 API calls 24028 344784 24027->24028 24028->23981 24028->23982 24029->24027 24031 3478b8 24030->24031 24032 3478bc 24030->24032 24031->24032 24033 3478dc 24031->24033 24037 347928 24031->24037 24032->24029 24033->24032 24035 3478e8 GetProcAddress 24033->24035 24036 3478f8 __Getctype 24035->24036 24036->24032 24038 347949 LoadLibraryExW 24037->24038 24043 34793e 24037->24043 24039 347966 GetLastError 24038->24039 24042 34797e 24038->24042 24041 347971 LoadLibraryExW 24039->24041 24039->24042 24040 347995 FreeLibrary 24040->24043 24041->24042 24042->24040 24042->24043 24043->24031 25309 3140e0 28 API calls 25312 34cce0 51 API calls 5 library calls 24092 32a6e7 24093 32a6f6 __EH_prolog3_GS 24092->24093 24149 319393 24093->24149 24098 31556b 6 API calls 24099 32a737 24098->24099 24163 32ae0f 24099->24163 24104 32a7ae 24109 32a79e 24104->24109 24145 32a7d9 24104->24145 24105 32a91b 24108 32a9ad 24105->24108 24114 314375 55 API calls 24105->24114 24106 32a77f 24106->24109 24233 3156d2 28 API calls _Yarn 24106->24233 24110 32a9f0 24108->24110 24111 32aa11 24108->24111 24112 314375 55 API calls 24109->24112 24209 32ab17 24110->24209 24239 32abfa 66 API calls 2 library calls 24111->24239 24115 32a7d1 24112->24115 24131 32a943 24114->24131 24118 315652 _SyncOriginator 26 API calls 24115->24118 24120 32ab0f 24118->24120 24119 32aa0a 24123 319393 55 API calls 24119->24123 24121 33a24a 5 API calls 24120->24121 24124 32ab14 24121->24124 24122 319393 55 API calls 24122->24131 24125 32aa90 24123->24125 24225 32a2e6 24125->24225 24126 328e89 55 API calls 24126->24131 24128 31556b 6 API calls 24128->24145 24129 31556b 6 API calls 24129->24131 24131->24108 24131->24122 24131->24126 24131->24129 24132 31556b 6 API calls 24134 32aaab 24132->24134 24240 32ad8d 5 API calls _ValidateLocalCookies 24134->24240 24136 32aab9 24138 32aafc 24136->24138 24241 3156d2 28 API calls _Yarn 24136->24241 24137 314375 55 API calls 24137->24145 24140 315652 _SyncOriginator 26 API calls 24138->24140 24140->24115 24142 315652 26 API calls _SyncOriginator 24142->24145 24145->24105 24145->24128 24145->24137 24145->24142 24181 314231 24145->24181 24185 317340 24145->24185 24189 328e89 24145->24189 24234 313fda 28 API calls 24145->24234 24235 327634 28 API calls 2 library calls 24145->24235 24236 3273b2 28 API calls 24145->24236 24237 327874 26 API calls 2 library calls 24145->24237 24238 318d62 26 API calls std::ios_base::_Init 24145->24238 24150 31939f __EH_prolog3_GS 24149->24150 24151 33642e 54 API calls 24150->24151 24152 3193d6 24151->24152 24153 31556b 6 API calls 24152->24153 24154 3193f0 24153->24154 24158 31941c ctype 24154->24158 24242 3155e1 26 API calls __Getctype 24154->24242 24155 33a24a 5 API calls 24157 319432 24155->24157 24159 32a298 24157->24159 24158->24155 24160 32a2a3 24159->24160 24161 31556b 6 API calls 24160->24161 24162 32a2e4 24160->24162 24161->24162 24162->24098 24243 327219 24163->24243 24166 32acc5 24169 32acd1 __EH_prolog3_GS 24166->24169 24168 314231 28 API calls 24170 32ad7d 24168->24170 24172 32ad51 24169->24172 24176 315652 _SyncOriginator 26 API calls 24169->24176 24180 32ad4f 24169->24180 24249 31a15b 66 API calls 2 library calls 24169->24249 24171 315652 _SyncOriginator 26 API calls 24170->24171 24173 32ad85 24171->24173 24174 314231 28 API calls 24172->24174 24175 33a24a 5 API calls 24173->24175 24177 32ad60 24174->24177 24178 32a779 24175->24178 24176->24169 24179 315652 _SyncOriginator 26 API calls 24177->24179 24178->24104 24178->24106 24179->24180 24180->24168 24182 314253 24181->24182 24183 31423e 24181->24183 24182->24145 24250 3156d2 28 API calls _Yarn 24183->24250 24186 31734a 24185->24186 24251 318a4d 24186->24251 24192 328e95 __EH_prolog3_GS 24189->24192 24190 328faf 24325 3156ab 28 API calls 24190->24325 24192->24190 24194 328ee0 24192->24194 24197 328f6f 24192->24197 24193 328f5c ctype 24196 31556b 6 API calls 24193->24196 24194->24190 24198 328ee9 24194->24198 24203 328fcf 24196->24203 24324 33640f 54 API calls 24197->24324 24321 328cf7 54 API calls 24198->24321 24200 328ffa ctype 24202 33a24a 5 API calls 24200->24202 24201 328f10 24322 33640f 54 API calls 24201->24322 24205 329010 24202->24205 24203->24200 24326 3155e1 26 API calls __Getctype 24203->24326 24205->24145 24207 328f2a 24207->24193 24323 3155e1 26 API calls __Getctype 24207->24323 24210 32ab23 __EH_prolog3_GS 24209->24210 24211 32abc4 24210->24211 24215 32abe2 24210->24215 24223 315652 _SyncOriginator 26 API calls 24210->24223 24327 31a25f 24210->24327 24349 315786 28 API calls 24210->24349 24213 314231 28 API calls 24211->24213 24224 32abd2 24213->24224 24214 315652 _SyncOriginator 26 API calls 24216 32abda 24214->24216 24217 314231 28 API calls 24215->24217 24218 33a24a 5 API calls 24216->24218 24219 32abf0 24217->24219 24221 32abdf 24218->24221 24222 315652 _SyncOriginator 26 API calls 24219->24222 24221->24119 24222->24224 24223->24210 24224->24214 24226 32a33c 24225->24226 24230 32a2f4 24225->24230 24227 31556b 6 API calls 24226->24227 24229 32a352 24226->24229 24227->24229 24228 32a368 24228->24132 24229->24228 24231 31556b 6 API calls 24229->24231 24232 31556b 6 API calls 24230->24232 24231->24228 24232->24226 24233->24109 24234->24145 24235->24145 24236->24145 24238->24145 24239->24119 24240->24136 24241->24138 24242->24158 24244 327229 24243->24244 24245 327245 24244->24245 24246 327219 26 API calls 24244->24246 24248 32727f 26 API calls std::ios_base::_Init 24244->24248 24245->24166 24246->24244 24248->24244 24249->24169 24250->24182 24252 318a5b 24251->24252 24253 318a64 24252->24253 24254 318a79 24252->24254 24255 314375 55 API calls 24253->24255 24256 314375 55 API calls 24254->24256 24257 318a74 24255->24257 24256->24257 24267 338277 24257->24267 24260 318ada 24261 31556b 6 API calls 24260->24261 24263 318aec 24261->24263 24262 31736a 24262->24145 24265 31556b 6 API calls 24263->24265 24264 318aa5 24264->24262 24266 314375 55 API calls 24264->24266 24265->24262 24266->24262 24268 338286 __EH_prolog3_catch_GS 24267->24268 24269 314011 28 API calls 24268->24269 24270 3382a8 24269->24270 24271 315991 55 API calls 24270->24271 24313 3382d0 24270->24313 24273 3382f1 24271->24273 24272 315652 _SyncOriginator 26 API calls 24298 3382d8 24272->24298 24274 315991 55 API calls 24273->24274 24308 338313 24274->24308 24276 318a9c 24276->24260 24276->24264 24278 338495 24280 315652 _SyncOriginator 26 API calls 24278->24280 24279 338405 RegQueryValueExW 24281 338489 RegCloseKey 24279->24281 24282 33842f 24279->24282 24283 33849d 24280->24283 24281->24278 24282->24281 24285 3384ca 24282->24285 24289 33844a 24282->24289 24284 315652 _SyncOriginator 26 API calls 24283->24284 24288 3384a5 24284->24288 24287 32ae69 28 API calls 24285->24287 24286 3383bc RegOpenKeyExW 24286->24278 24286->24279 24290 3384dd RegQueryValueExW 24287->24290 24291 3384b8 24288->24291 24317 313f09 26 API calls 3 library calls 24288->24317 24289->24281 24295 338455 RegQueryValueExW 24289->24295 24290->24281 24292 338500 24290->24292 24294 315652 _SyncOriginator 26 API calls 24291->24294 24296 338516 ExpandEnvironmentStringsW 24292->24296 24297 338506 24292->24297 24294->24298 24295->24281 24307 33847b 24295->24307 24296->24281 24300 338529 24296->24300 24318 3156ab 28 API calls 24297->24318 24314 33a259 24298->24314 24301 315759 28 API calls 24300->24301 24302 338545 ExpandEnvironmentStringsW 24301->24302 24303 33856e 24302->24303 24304 338559 24302->24304 24303->24281 24320 313f09 26 API calls 3 library calls 24303->24320 24319 3156ab 28 API calls 24304->24319 24307->24281 24308->24286 24309 3383a7 24308->24309 24310 315652 _SyncOriginator 26 API calls 24309->24310 24311 3383af 24310->24311 24312 315652 _SyncOriginator 26 API calls 24311->24312 24312->24313 24313->24272 24315 33a228 _ValidateLocalCookies 5 API calls 24314->24315 24316 33a263 24315->24316 24316->24316 24317->24291 24318->24307 24319->24303 24320->24307 24321->24201 24322->24207 24323->24193 24324->24193 24325->24193 24326->24200 24328 31a26b __EH_prolog3_GS 24327->24328 24329 314375 55 API calls 24328->24329 24333 31a2b2 24329->24333 24330 31a323 24332 314375 55 API calls 24330->24332 24334 31a33c 24332->24334 24333->24330 24335 314231 28 API calls 24333->24335 24336 31a363 24333->24336 24338 315652 _SyncOriginator 26 API calls 24333->24338 24350 31bba8 24333->24350 24337 314231 28 API calls 24334->24337 24335->24333 24341 314375 55 API calls 24336->24341 24339 31a353 24337->24339 24338->24333 24340 315652 _SyncOriginator 26 API calls 24339->24340 24342 31a35b 24340->24342 24344 31a38c 24341->24344 24343 33a24a 5 API calls 24342->24343 24345 31a360 24343->24345 24346 314231 28 API calls 24344->24346 24345->24210 24347 31a3a3 24346->24347 24348 315652 _SyncOriginator 26 API calls 24347->24348 24348->24339 24349->24210 24353 31bbb4 __EH_prolog3_GS 24350->24353 24351 31bdf8 24352 33a24a 5 API calls 24351->24352 24354 31bdfd 24352->24354 24353->24351 24378 32a1ab 24353->24378 24354->24333 24357 31bc2e 24359 314231 28 API calls 24357->24359 24358 31bbfe 24362 314375 55 API calls 24358->24362 24360 31bc6e 24359->24360 24361 314231 28 API calls 24360->24361 24363 31bc7d 24361->24363 24364 31bc26 24362->24364 24368 31bca1 24363->24368 24369 31bcdc 24363->24369 24385 318d62 26 API calls std::ios_base::_Init 24364->24385 24366 31bdf0 24367 315652 _SyncOriginator 26 API calls 24366->24367 24367->24351 24370 314375 55 API calls 24368->24370 24371 314375 55 API calls 24369->24371 24372 31bcd7 24370->24372 24371->24372 24374 31bd4c ctype 24372->24374 24383 3155e1 26 API calls __Getctype 24372->24383 24376 31bd9d ctype 24374->24376 24384 3155e1 26 API calls __Getctype 24374->24384 24376->24364 24377 314231 28 API calls 24376->24377 24377->24364 24386 336f7f 24378->24386 24381 31bbf4 24381->24357 24381->24358 24383->24374 24384->24376 24385->24366 24387 314011 28 API calls 24386->24387 24388 336f92 24387->24388 24389 315652 _SyncOriginator 26 API calls 24388->24389 24390 336faa 24389->24390 24392 32a1c3 24390->24392 24394 31a7c8 28 API calls 24390->24394 24392->24381 24393 328a34 66 API calls 4 library calls 24392->24393 24393->24381 24394->24392 25313 31b0e9 55 API calls _ValidateLocalCookies 24402 3342ef 24403 314231 28 API calls 24402->24403 24404 334328 24403->24404 24405 314231 28 API calls 24404->24405 24406 334334 24405->24406 24422 33404b 24406->24422 24408 334363 SetWindowTextW LoadImageW 24412 334391 24408->24412 24413 334385 SetClassLongW 24408->24413 24410 33a228 _ValidateLocalCookies 5 API calls 24411 33448b 24410->24411 24447 3350a0 24412->24447 24413->24412 24416 3350a0 SendDlgItemMessageW 24417 3343fb 6 API calls 24416->24417 24418 3347be 9 API calls 24417->24418 24419 33446f 24418->24419 24451 334b49 GetDlgItem GetFocus SetFocus 24419->24451 24421 334478 24421->24410 24423 33405a __EH_prolog3_GS 24422->24423 24424 3340a7 SystemParametersInfoW 24423->24424 24437 33428a 24423->24437 24426 3340c7 24424->24426 24425 33a24a 5 API calls 24427 3342ec 24425->24427 24428 3341e5 FindResourceW 24426->24428 24471 3220b3 28 API calls 24426->24471 24427->24408 24427->24421 24430 3341fb LoadResource 24428->24430 24443 334261 24428->24443 24431 334209 LockResource SizeofResource 24430->24431 24430->24443 24452 324070 24431->24452 24432 3341d3 24475 318d62 26 API calls std::ios_base::_Init 24432->24475 24433 334270 CreateDialogParamW 24434 33428e 24433->24434 24433->24437 24476 333ed2 9 API calls _ValidateLocalCookies 24434->24476 24437->24425 24441 33423f CreateDialogIndirectParamW 24441->24443 24442 3342b2 MoveWindow SetForegroundWindow 24442->24437 24443->24433 24443->24434 24445 334105 ctype 24445->24432 24472 322067 28 API calls 24445->24472 24473 334eb3 45 API calls 4 library calls 24445->24473 24474 3155e1 26 API calls __Getctype 24445->24474 24448 3343db 24447->24448 24449 3350a9 24447->24449 24448->24416 24449->24448 24450 3350ba SendDlgItemMessageW 24449->24450 24450->24448 24450->24450 24451->24421 24453 3240a9 24452->24453 24461 3240b7 24452->24461 24453->24461 24477 323fcf GetDC 24453->24477 24454 33a228 _ValidateLocalCookies 5 API calls 24455 3247b9 24454->24455 24455->24441 24455->24443 24458 32410e SelectObject 24465 324127 _Yarn _abort 24458->24465 24459 324772 24460 32477c DeleteDC 24459->24460 24460->24461 24461->24454 24462 323f4a 27 API calls 24462->24465 24463 323f96 27 API calls 24463->24465 24464 3242fb GetDeviceCaps GetObjectW 24464->24465 24465->24459 24465->24460 24465->24462 24465->24463 24465->24464 24466 3245ec MulDiv 24465->24466 24468 324696 GetSystemMetrics 24465->24468 24469 3246be MulDiv 24465->24469 24466->24465 24467 324612 MulDiv DrawTextW 24466->24467 24467->24465 24468->24465 24470 3246a5 GetSystemMetrics 24468->24470 24469->24465 24470->24465 24471->24445 24472->24445 24473->24445 24474->24445 24475->24428 24476->24442 24478 324045 GetDialogBaseUnits 24477->24478 24479 323ffc SelectObject GetTextMetricsW GetTextExtentPoint32W SelectObject 24477->24479 24480 324058 ReleaseDC 24478->24480 24479->24480 24481 33a228 _ValidateLocalCookies 5 API calls 24480->24481 24482 32406e CreateCompatibleDC 24481->24482 24482->24458 24482->24461 25314 34bae8 27 API calls 4 library calls 25316 3210d0 22 API calls _ValidateLocalCookies 25317 3224d0 68 API calls 2 library calls 25318 3238d0 40 API calls 2 library calls 25319 31c2d3 44 API calls 25320 33d2d0 6 API calls 4 library calls 24491 3350d7 SetDlgItemTextW 25321 356ed0 LocalFree ctype collate 24524 3352da 24529 3352be ShowWindow 24524->24529 24526 3352e8 24530 334c87 GetDlgItem SendMessageW SendMessageW SendMessageW 24526->24530 24528 3352f1 24529->24526 24530->24528 25323 334cdd GetDlgItem SendMessageW SendMessageW SendMessageW SendMessageW 25326 3560c0 57 API calls _ValidateLocalCookies 25327 3262c9 29 API calls 25331 335332 GetDlgItem ShowWindow 25333 32bb3a 32 API calls 25334 314538 29 API calls 25335 31513c 60 API calls 2 library calls 25341 333d20 40 API calls 25346 31e510 69 API calls ctype 25349 32c516 29 API calls _ValidateLocalCookies 25351 347f10 FreeLibrary 24503 334515 24504 314231 28 API calls 24503->24504 24505 33454b 24504->24505 24506 314231 28 API calls 24505->24506 24507 334557 24506->24507 24508 33404b 77 API calls 24507->24508 24509 33456b 24508->24509 24510 33457d GetDlgItem GetWindowRect GetWindowRect 24509->24510 24519 33467b 24509->24519 24512 3350a0 SendDlgItemMessageW 24510->24512 24511 33a228 _ValidateLocalCookies 5 API calls 24513 33468e 24511->24513 24514 33460f SetWindowTextW 24512->24514 24516 334632 6 API calls 24514->24516 24517 334630 24514->24517 24518 3347be 9 API calls 24516->24518 24517->24516 24518->24519 24519->24511 25353 336519 54 API calls 24531 339d18 24557 339a76 24531->24557 24534 339d85 24535 339cb6 DloadReleaseSectionWriteAccess 8 API calls 24534->24535 24536 339d90 RaiseException 24535->24536 24553 339f7e 24536->24553 24537 339da9 24538 339e21 LoadLibraryExA 24537->24538 24539 339e82 24537->24539 24541 339f50 24537->24541 24544 339e94 24537->24544 24538->24539 24540 339e34 GetLastError 24538->24540 24539->24544 24545 339e8d FreeLibrary 24539->24545 24542 339e5d 24540->24542 24548 339e47 24540->24548 24563 339cb6 24541->24563 24546 339cb6 DloadReleaseSectionWriteAccess 8 API calls 24542->24546 24543 339ef2 GetProcAddress 24543->24541 24547 339f02 GetLastError 24543->24547 24544->24541 24544->24543 24545->24544 24549 339e68 RaiseException 24546->24549 24550 339f15 24547->24550 24548->24539 24548->24542 24549->24553 24550->24541 24552 339cb6 DloadReleaseSectionWriteAccess 8 API calls 24550->24552 24554 339f36 RaiseException 24552->24554 24555 339a76 ___delayLoadHelper2@8 7 API calls 24554->24555 24556 339f4d 24555->24556 24556->24541 24558 339a82 24557->24558 24559 339aa3 24557->24559 24571 339b1f 24558->24571 24559->24534 24559->24537 24561 339a87 24561->24559 24576 339c48 24561->24576 24564 339cea 24563->24564 24565 339cc8 24563->24565 24564->24553 24566 339b1f DloadReleaseSectionWriteAccess 4 API calls 24565->24566 24567 339ccd 24566->24567 24568 339ce5 24567->24568 24570 339c48 DloadProtectSection 3 API calls 24567->24570 24583 339cec GetModuleHandleW GetProcAddress GetProcAddress RtlReleaseSRWLockExclusive DloadReleaseSectionWriteAccess 24568->24583 24570->24568 24581 339aa9 GetModuleHandleW GetProcAddress GetProcAddress 24571->24581 24573 339b24 24574 339b40 24573->24574 24575 339b3c RtlAcquireSRWLockExclusive 24573->24575 24574->24561 24575->24561 24577 339c5d DloadProtectSection 24576->24577 24578 339c98 VirtualProtect 24577->24578 24579 339c63 24577->24579 24582 339b5e VirtualQuery GetSystemInfo 24577->24582 24578->24579 24579->24559 24581->24573 24582->24578 24583->24564 25355 322100 79 API calls 25358 343306 27 API calls 4 library calls 25359 321b00 50 API calls ctype 23539 346f74 GetStartupInfoW 23540 347023 23539->23540 23541 346f91 23539->23541 23541->23540 23545 34c8df 23541->23545 23543 346fba 23543->23540 23544 346fe8 GetFileType 23543->23544 23544->23543 23546 34c8eb __FrameHandler3::FrameUnwindToState 23545->23546 23547 34c90f 23546->23547 23548 34c8f8 23546->23548 23558 348391 EnterCriticalSection 23547->23558 23566 346923 20 API calls _free 23548->23566 23551 34c8fd 23567 33ea1e 26 API calls __Getctype 23551->23567 23552 34c91b 23557 34c947 23552->23557 23559 34c830 23552->23559 23554 34c907 __Getctype 23554->23543 23568 34c96e LeaveCriticalSection std::_Lockit::~_Lockit 23557->23568 23558->23552 23569 3476e3 23559->23569 23561 34c84f 23577 347740 23561->23577 23562 34c842 23562->23561 23576 347c3c 11 API calls 2 library calls 23562->23576 23565 34c8a1 23565->23552 23566->23551 23567->23554 23568->23554 23574 3476f0 std::_Locinfo::_Locinfo_dtor 23569->23574 23570 347730 23584 346923 20 API calls _free 23570->23584 23571 34771b RtlAllocateHeap 23572 34772e 23571->23572 23571->23574 23572->23562 23574->23570 23574->23571 23583 345c03 7 API calls 2 library calls 23574->23583 23576->23562 23578 347774 _free 23577->23578 23579 34774b HeapFree 23577->23579 23578->23565 23579->23578 23580 347760 23579->23580 23585 346923 20 API calls _free 23580->23585 23582 347766 GetLastError 23582->23578 23583->23574 23584->23572 23585->23582 25364 314170 27 API calls std::exception::exception 25369 337777 36 API calls _ValidateLocalCookies 23620 337578 23621 3375a4 _abort 23620->23621 23622 3375b3 GetTempPathW 23621->23622 23623 3375cd 23622->23623 23636 337633 23622->23636 23624 3375d1 GetTempFileNameW 23623->23624 23623->23636 23626 3375f0 23624->23626 23624->23636 23625 33a228 _ValidateLocalCookies 5 API calls 23627 337646 23625->23627 23637 33793b 23626->23637 23630 337601 DeleteFileW 23631 33793b GetFileAttributesW 23630->23631 23633 33761a 23631->23633 23633->23636 23641 3156ab 28 API calls 23633->23641 23634 33762d 23642 335d98 28 API calls 23634->23642 23636->23625 23638 337946 23637->23638 23640 3375fc 23637->23640 23639 33794d GetFileAttributesW 23638->23639 23638->23640 23639->23640 23640->23630 23640->23633 23641->23634 23642->23636 25372 32897c 106 API calls 25374 321160 GetStringTypeW __Getwctypes 25376 322760 29 API calls 25379 336369 15 API calls 25381 32c96c 41 API calls std::_Locinfo::_Locinfo_dtor 25384 321b50 LCMapStringEx __Towlower 25385 336d57 8 API calls 2 library calls 25386 348350 12 API calls __Getctype 25387 355f50 57 API calls _ValidateLocalCookies 25389 322143 88 API calls std::ios_base::_Init 24681 334740 24682 33475d 24681->24682 24686 334750 24681->24686 24683 334770 24682->24683 24684 33477f 24682->24684 24698 335283 SetEvent 24683->24698 24684->24686 24688 334ae7 24684->24688 24689 334afa 24688->24689 24692 334b26 24688->24692 24690 334b02 24689->24690 24689->24692 24707 335283 SetEvent 24690->24707 24691 334b09 24694 334b20 24691->24694 24695 334b19 SetEvent 24691->24695 24692->24691 24696 334b34 24692->24696 24694->24686 24695->24694 24699 33535a 24696->24699 24698->24686 24700 335383 GetDlgItem GetWindowRect GetWindowRect 24699->24700 24701 335377 24699->24701 24703 3353ef SetDlgItemTextW MoveWindow 24700->24703 24701->24700 24702 33543b 24701->24702 24704 33a228 _ValidateLocalCookies 5 API calls 24702->24704 24703->24702 24706 335447 24704->24706 24706->24694 24707->24691 25394 33a54f 12 API calls ___scrt_uninitialize_crt 25396 3551b0 BeginUpdateResourceW GetVersion GetEnvironmentVariableA 25397 3365b4 30 API calls 2 library calls 25403 33dda1 51 API calls 3 library calls 25406 33a5a4 29 API calls 25412 334b97 6 API calls 24499 355390 24500 3554ef 2 API calls 24499->24500 24501 355399 RegOpenKeyExW 24500->24501 24584 32af9e 24587 325ca3 24584->24587 24586 32afaf 24588 325caf __EH_prolog3 24587->24588 24593 325b0c 24588->24593 24592 325ccf std::ios_base::_Init 24592->24586 24594 33a1ea std::ios_base::_Init 28 API calls 24593->24594 24595 325b13 24594->24595 24596 3250b0 24595->24596 24603 33a268 24596->24603 24598 3250bc InitializeCriticalSection 24599 337e17 32 API calls 24598->24599 24600 325149 24599->24600 24601 325151 GetProcAddress GetProcAddress 24600->24601 24602 325177 std::ios_base::_Init 24600->24602 24601->24602 24602->24592 24603->24598 25413 354798 69 API calls 25417 34d180 43 API calls 3 library calls 24902 32218c 24911 3202b8 24902->24911 24904 322197 24919 323853 24904->24919 24906 3221aa 24909 3221c4 24906->24909 24923 320dbd 24906->24923 24908 3221d0 24909->24908 24930 354658 4 API calls 2 library calls 24909->24930 24912 3202c4 __EH_prolog3 24911->24912 24913 320dbd std::ios_base::_Init 29 API calls 24912->24913 24914 3202f5 24913->24914 24915 33a1ea std::ios_base::_Init 28 API calls 24914->24915 24916 3202fc 24915->24916 24918 32030d std::ios_base::_Init 24916->24918 24931 353e54 24916->24931 24918->24904 24920 32385f __EH_prolog3 24919->24920 24990 31ce27 24920->24990 24922 323877 std::ios_base::_Ios_base_dtor std::ios_base::_Init 24922->24906 24924 320e17 24923->24924 24927 320dd4 std::ios_base::_Init 24923->24927 24924->24909 24925 320e0c 24926 33af08 CallUnexpected RaiseException 24925->24926 24928 320e25 24926->24928 24927->24925 25211 31d98b 29 API calls std::ios_base::failure::failure 24927->25211 24930->24908 24932 353e60 __EH_prolog3 24931->24932 24943 353c46 24932->24943 24937 353e7e 24955 353fde 24937->24955 24939 353edc std::ios_base::_Init 24939->24918 24942 353e9c 24963 348401 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 24942->24963 24944 353c55 24943->24944 24945 353c5c 24943->24945 24964 3483f8 EnterCriticalSection std::_Lockit::_Lockit 24944->24964 24948 353c5a 24945->24948 24965 354868 EnterCriticalSection 24945->24965 24948->24942 24949 353fb9 24948->24949 24950 33a1ea std::ios_base::_Init 28 API calls 24949->24950 24951 353fc4 24950->24951 24952 353fd8 24951->24952 24966 353ce7 21 API calls _Yarn 24951->24966 24952->24937 24954 353fd6 24954->24937 24956 353e86 24955->24956 24957 353fea 24955->24957 24959 353dab 24956->24959 24967 3548ec 24957->24967 24960 353db9 24959->24960 24962 353de4 _Yarn 24959->24962 24960->24960 24961 345c99 _Yarn 21 API calls 24960->24961 24960->24962 24961->24962 24962->24942 24963->24939 24964->24948 24965->24948 24966->24954 24968 3462c0 24967->24968 24969 3548fc 24967->24969 24987 34f5f6 EnterCriticalSection LeaveCriticalSection _abort 24968->24987 24982 324830 24969->24982 24972 3462c5 24976 3462d0 24972->24976 24988 34f651 39 API calls 6 library calls 24972->24988 24973 3462da IsProcessorFeaturePresent 24977 3462e5 24973->24977 24974 3462f8 24989 344896 29 API calls _abort 24974->24989 24976->24973 24976->24974 24979 33e854 _abort 8 API calls 24977->24979 24979->24974 24980 346302 24983 3247bb 3 API calls 24982->24983 24984 324839 24983->24984 24985 324852 24984->24985 24986 32484e RtlEncodePointer 24984->24986 24985->24956 24986->24985 24987->24972 24988->24976 24989->24980 24991 31ce33 __EH_prolog3_GS 24990->24991 24992 353c46 std::_Lockit::_Lockit 2 API calls 24991->24992 24993 31ce40 24992->24993 25024 31e240 24993->25024 24995 31ce57 25007 31ce69 24995->25007 25032 31fca9 24995->25032 24998 31ceae 24999 33a24a 5 API calls 24998->24999 25001 31ceb5 24999->25001 25000 31ce77 25002 31ceb6 25000->25002 25003 31ce7e 25000->25003 25001->24922 25044 320b6a RaiseException Concurrency::cancel_current_task CallUnexpected 25002->25044 25042 353e22 28 API calls std::ios_base::_Init 25003->25042 25043 348401 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 25007->25043 25025 31e257 25024->25025 25026 31e27d 25024->25026 25027 353c46 std::_Lockit::_Lockit 2 API calls 25025->25027 25028 33a228 _ValidateLocalCookies 5 API calls 25026->25028 25030 31e261 25027->25030 25029 31e28a 25028->25029 25029->24995 25045 348401 LeaveCriticalSection LeaveCriticalSection std::_Lockit::~_Lockit 25030->25045 25034 31fcb5 __EH_prolog3 25032->25034 25033 31fd10 std::ios_base::_Init 25033->25000 25034->25033 25035 33a1ea std::ios_base::_Init 28 API calls 25034->25035 25037 31fccc ctype 25035->25037 25036 31fcfd 25036->25033 25057 31df15 75 API calls 2 library calls 25036->25057 25037->25036 25046 31d7c5 25037->25046 25040 31fcea 25056 3201dd 43 API calls 2 library calls 25040->25056 25042->25007 25043->24998 25045->25026 25047 31d7d1 __EH_prolog3 25046->25047 25048 353c46 std::_Lockit::_Lockit 2 API calls 25047->25048 25049 31d7de 25048->25049 25050 31d812 25049->25050 25051 31d827 25049->25051 25058 353f54 25050->25058 25067 353bf9 29 API calls 3 library calls 25051->25067 25054 31d81b std::ios_base::_Init 25054->25040 25055 31d831 25056->25036 25057->25033 25068 35772d 25058->25068 25060 353f60 25061 353dab _Yarn 21 API calls 25060->25061 25062 353f78 25061->25062 25063 353f88 25062->25063 25064 35772d std::_Locinfo::_Locinfo_dtor 74 API calls 25062->25064 25065 353dab _Yarn 21 API calls 25063->25065 25064->25063 25066 353f9c 25065->25066 25066->25054 25067->25055 25069 357739 __FrameHandler3::FrameUnwindToState 25068->25069 25091 357690 25069->25091 25071 357745 25072 346755 __Getctype 39 API calls 25071->25072 25075 35774d __Getctype 25071->25075 25073 357759 25072->25073 25131 358146 44 API calls 3 library calls 25073->25131 25075->25060 25076 349f5d std::_Locinfo::_Locinfo_dtor 21 API calls 25080 35777e 25076->25080 25077 33ea4b __Getctype 11 API calls 25077->25080 25079 3577f1 25133 348391 EnterCriticalSection 25079->25133 25080->25075 25080->25076 25080->25077 25080->25079 25082 3577e1 25080->25082 25132 358146 44 API calls 3 library calls 25080->25132 25082->25079 25084 3577e5 25082->25084 25083 3577fb 25088 347740 _free 20 API calls 25083->25088 25089 35781e 25083->25089 25086 347740 _free 20 API calls 25084->25086 25085 357854 25134 357881 LeaveCriticalSection std::_Lockit::~_Lockit 25085->25134 25086->25075 25088->25089 25089->25085 25090 347740 _free 20 API calls 25089->25090 25090->25085 25092 35769c 25091->25092 25093 3576aa 25091->25093 25094 3452ea std::_Locinfo::_Locinfo_dtor 65 API calls 25092->25094 25135 357ea5 25093->25135 25096 3576a6 25094->25096 25096->25071 25098 357704 25100 33ea4b __Getctype 11 API calls 25098->25100 25099 3476e3 std::_Locinfo::_Locinfo_dtor 20 API calls 25101 3576dc 25099->25101 25106 35772c __FrameHandler3::FrameUnwindToState 25100->25106 25102 35770f 25101->25102 25104 357ea5 __cftoe 43 API calls 25101->25104 25103 347740 _free 20 API calls 25102->25103 25103->25096 25105 3576f3 25104->25105 25107 357706 25105->25107 25108 3576fa 25105->25108 25110 357690 std::_Locinfo::_Locinfo_dtor 74 API calls 25106->25110 25138 3452ea 25107->25138 25108->25098 25108->25102 25111 357745 25110->25111 25112 346755 __Getctype 39 API calls 25111->25112 25127 35774d __Getctype 25111->25127 25113 357759 25112->25113 25150 358146 44 API calls 3 library calls 25113->25150 25115 349f5d std::_Locinfo::_Locinfo_dtor 21 API calls 25118 35777e 25115->25118 25116 33ea4b __Getctype 11 API calls 25116->25118 25118->25115 25118->25116 25119 3577f1 25118->25119 25121 3577e1 25118->25121 25118->25127 25151 358146 44 API calls 3 library calls 25118->25151 25152 348391 EnterCriticalSection 25119->25152 25121->25119 25123 3577e5 25121->25123 25122 3577fb 25128 347740 _free 20 API calls 25122->25128 25129 35781e 25122->25129 25125 347740 _free 20 API calls 25123->25125 25124 357854 25153 357881 LeaveCriticalSection std::_Lockit::~_Lockit 25124->25153 25125->25127 25127->25071 25128->25129 25129->25124 25130 347740 _free 20 API calls 25129->25130 25130->25124 25131->25080 25132->25080 25133->25083 25134->25075 25154 357dc2 25135->25154 25139 345314 25138->25139 25140 345300 25138->25140 25142 346755 __Getctype 39 API calls 25139->25142 25198 346923 20 API calls _free 25140->25198 25144 345319 25142->25144 25143 345305 25199 33ea1e 26 API calls __Getctype 25143->25199 25182 34e06b 25144->25182 25147 345321 25194 344a34 25147->25194 25149 345310 25149->25102 25150->25118 25151->25118 25152->25122 25153->25127 25155 357dd9 25154->25155 25156 357ddd 25155->25156 25157 357df7 25155->25157 25175 346923 20 API calls _free 25156->25175 25160 33ea7e __cftoe 39 API calls 25157->25160 25159 357de8 25176 33ea1e 26 API calls __Getctype 25159->25176 25161 357e10 25160->25161 25163 357e21 25161->25163 25164 357e2a 25161->25164 25177 346923 20 API calls _free 25163->25177 25178 357c49 43 API calls 4 library calls 25164->25178 25167 357e26 25181 33ea1e 26 API calls __Getctype 25167->25181 25168 357e38 25169 357e40 25168->25169 25173 357e52 25168->25173 25179 346923 20 API calls _free 25169->25179 25171 3576c1 25171->25098 25171->25099 25173->25171 25180 346923 20 API calls _free 25173->25180 25175->25159 25176->25171 25177->25167 25178->25168 25179->25171 25180->25167 25181->25171 25183 34e077 __FrameHandler3::FrameUnwindToState 25182->25183 25184 346755 __Getctype 39 API calls 25183->25184 25185 34e080 25184->25185 25186 34e0ce __Getctype 25185->25186 25200 348391 EnterCriticalSection 25185->25200 25186->25147 25188 34e09e 25201 34e0e2 20 API calls __Getctype 25188->25201 25190 34e0b2 25202 34e0d1 LeaveCriticalSection std::_Lockit::~_Lockit 25190->25202 25192 34e0c5 25192->25186 25203 3462c0 39 API calls _abort 25192->25203 25195 344a40 __FrameHandler3::FrameUnwindToState 25194->25195 25204 344ada 25195->25204 25197 344a4c std::_Locinfo::_Locinfo_dtor __Getctype 25197->25149 25198->25143 25199->25149 25200->25188 25201->25190 25202->25192 25205 3476e3 std::_Locinfo::_Locinfo_dtor 20 API calls 25204->25205 25206 344af2 25205->25206 25207 347740 _free 20 API calls 25206->25207 25208 344aff 25207->25208 25209 344b2e 25208->25209 25210 344ab2 std::_Locinfo::_Locinfo_dtor 65 API calls 25208->25210 25209->25197 25210->25209 25211->24925 25422 3227f0 44 API calls _Ungetc 23586 333ff0 GetDlgItem SendMessageW SendMessageW 23589 3347be 23586->23589 23590 3347fb PeekMessageW 23589->23590 23591 3347d6 IsDialogMessageW 23590->23591 23592 33480e 23590->23592 23591->23590 23593 3347e7 TranslateMessage DispatchMessageW 23591->23593 23596 33a228 23592->23596 23593->23590 23595 334045 23597 33a231 IsProcessorFeaturePresent 23596->23597 23598 33a230 23596->23598 23600 33aa36 23597->23600 23598->23595 23603 33a9f9 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23600->23603 23602 33ab19 23602->23595 23603->23602 23604 3551f0 23608 3554ef 23604->23608 23609 3551f9 CreateFileW 23608->23609 23610 3554f8 23608->23610 23612 355503 GetVersion GetEnvironmentVariableA 23610->23612 23612->23609 25426 3555f0 GetLastError SetLastError ctype 25427 3533f0 21 API calls __startOneArgErrorHandling 25430 343dfa 20 API calls 2 library calls 25432 3213e0 89 API calls _ValidateLocalCookies 25434 33a1e0 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25435 31ede5 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 25436 34c7e0 23 API calls 3 library calls 25437 3585e0 21 API calls 25438 355fe0 57 API calls _ValidateLocalCookies 24395 32c5e4 24396 32c619 CreateFileW 24395->24396 24397 32c622 SetFilePointer 24396->24397 24398 32c62d 24396->24398 24397->24398 24401 3156ab 28 API calls 24398->24401 24400 32c638 24401->24400 24490 3255d0 68 API calls 24604 33a3de 24605 33a3e7 24604->24605 24615 33abf6 IsProcessorFeaturePresent 24605->24615 24607 33a3f3 24616 33d42e 24607->24616 24609 33a3f8 24610 33a3fc 24609->24610 24624 3461a7 24609->24624 24613 33a413 24615->24607 24628 33e517 24616->24628 24619 33d437 24619->24609 24621 33d43f 24622 33d44a 24621->24622 24642 33e553 DeleteCriticalSection 24621->24642 24622->24609 24669 34f43a 24624->24669 24627 33d44d 7 API calls 2 library calls 24627->24610 24629 33e520 24628->24629 24631 33e549 24629->24631 24632 33d433 24629->24632 24643 33e75c 24629->24643 24648 33e553 DeleteCriticalSection 24631->24648 24632->24619 24634 33d593 24632->24634 24662 33e66d 24634->24662 24638 33d5c3 24638->24621 24639 33d5b6 24639->24638 24668 33d5c6 6 API calls ___vcrt_FlsFree 24639->24668 24641 33d5a8 24641->24621 24642->24619 24649 33e582 24643->24649 24646 33e794 InitializeCriticalSectionAndSpinCount 24647 33e77f 24646->24647 24647->24629 24648->24632 24650 33e59f 24649->24650 24653 33e5a3 24649->24653 24650->24646 24650->24647 24651 33e60b GetProcAddress 24651->24650 24654 33e619 24651->24654 24653->24650 24653->24651 24655 33e5fc 24653->24655 24657 33e622 LoadLibraryExW 24653->24657 24654->24650 24655->24651 24656 33e604 FreeLibrary 24655->24656 24656->24651 24658 33e669 24657->24658 24659 33e639 GetLastError 24657->24659 24658->24653 24659->24658 24660 33e644 ___vcrt_FlsGetValue 24659->24660 24660->24658 24661 33e65a LoadLibraryExW 24660->24661 24661->24653 24663 33e582 ___vcrt_FlsGetValue 5 API calls 24662->24663 24664 33e687 24663->24664 24665 33e6a0 TlsAlloc 24664->24665 24666 33d59d 24664->24666 24666->24641 24667 33e71e 6 API calls ___vcrt_FlsGetValue 24666->24667 24667->24639 24668->24641 24672 34f453 24669->24672 24670 33a228 _ValidateLocalCookies 5 API calls 24671 33a405 24670->24671 24671->24613 24671->24627 24672->24670 25446 3223c0 66 API calls 2 library calls 25449 3335c0 DeleteObject DeleteObject 24728 34c3ce 24748 346755 GetLastError 24728->24748 24730 34c3db 24768 34c4ee 24730->24768 24732 34c3e3 24777 34c162 24732->24777 24735 34c3fa 24738 34c43d 24740 347740 _free 20 API calls 24738->24740 24740->24735 24742 34c438 24801 346923 20 API calls _free 24742->24801 24744 34c481 24744->24738 24802 34c038 26 API calls 24744->24802 24745 34c455 24745->24744 24746 347740 _free 20 API calls 24745->24746 24746->24744 24749 346771 24748->24749 24750 34676b 24748->24750 24752 3476e3 std::_Locinfo::_Locinfo_dtor 20 API calls 24749->24752 24755 3467c0 SetLastError 24749->24755 24803 347abc 11 API calls 2 library calls 24750->24803 24753 346783 24752->24753 24754 34678b 24753->24754 24804 347b12 11 API calls 2 library calls 24753->24804 24757 347740 _free 20 API calls 24754->24757 24755->24730 24759 346791 24757->24759 24758 3467a0 24758->24754 24760 3467a7 24758->24760 24761 3467cc SetLastError 24759->24761 24805 3465c6 20 API calls __Getctype 24760->24805 24806 3462c0 39 API calls _abort 24761->24806 24763 3467b2 24766 347740 _free 20 API calls 24763->24766 24767 3467b9 24766->24767 24767->24755 24767->24761 24769 34c4fa __FrameHandler3::FrameUnwindToState 24768->24769 24770 346755 __Getctype 39 API calls 24769->24770 24775 34c504 24770->24775 24772 34c588 __Getctype 24772->24732 24775->24772 24776 347740 _free 20 API calls 24775->24776 24807 3462c0 39 API calls _abort 24775->24807 24808 348391 EnterCriticalSection 24775->24808 24809 34c57f LeaveCriticalSection std::_Lockit::~_Lockit 24775->24809 24776->24775 24810 33ea7e 24777->24810 24780 34c195 24782 34c1ac 24780->24782 24783 34c19a GetACP 24780->24783 24781 34c183 GetOEMCP 24781->24782 24782->24735 24784 349f5d 24782->24784 24783->24782 24785 349f9b 24784->24785 24789 349f6b std::_Locinfo::_Locinfo_dtor 24784->24789 24821 346923 20 API calls _free 24785->24821 24787 349f86 RtlAllocateHeap 24788 349f99 24787->24788 24787->24789 24788->24738 24791 34c590 24788->24791 24789->24785 24789->24787 24820 345c03 7 API calls 2 library calls 24789->24820 24792 34c162 41 API calls 24791->24792 24793 34c5af 24792->24793 24796 34c600 IsValidCodePage 24793->24796 24798 34c5b6 24793->24798 24800 34c625 _abort 24793->24800 24794 33a228 _ValidateLocalCookies 5 API calls 24795 34c430 24794->24795 24795->24742 24795->24745 24797 34c612 GetCPInfo 24796->24797 24796->24798 24797->24798 24797->24800 24798->24794 24822 34c23a GetCPInfo 24800->24822 24801->24738 24802->24738 24803->24749 24804->24758 24805->24763 24808->24775 24809->24775 24811 33ea91 24810->24811 24812 33ea9b 24810->24812 24811->24780 24811->24781 24812->24811 24813 346755 __Getctype 39 API calls 24812->24813 24814 33eabc 24813->24814 24818 346936 39 API calls __Getctype 24814->24818 24816 33ead5 24819 346963 39 API calls __cftoe 24816->24819 24818->24816 24819->24811 24820->24789 24821->24788 24823 34c31e 24822->24823 24828 34c274 24822->24828 24825 33a228 _ValidateLocalCookies 5 API calls 24823->24825 24827 34c3ca 24825->24827 24827->24798 24832 34dc84 24828->24832 24831 350200 __vsnwprintf_l 44 API calls 24831->24823 24833 33ea7e __cftoe 39 API calls 24832->24833 24835 34dca4 MultiByteToWideChar 24833->24835 24836 34dce2 24835->24836 24837 34dd7a 24835->24837 24839 349f5d std::_Locinfo::_Locinfo_dtor 21 API calls 24836->24839 24842 34dd03 _abort ctype 24836->24842 24838 33a228 _ValidateLocalCookies 5 API calls 24837->24838 24840 34c2d5 24838->24840 24839->24842 24846 350200 24840->24846 24841 34dd74 24851 34397b 20 API calls _free 24841->24851 24842->24841 24844 34dd48 MultiByteToWideChar 24842->24844 24844->24841 24845 34dd64 GetStringTypeW 24844->24845 24845->24841 24847 33ea7e __cftoe 39 API calls 24846->24847 24848 350213 24847->24848 24852 34ffe3 24848->24852 24851->24837 24853 34fffe ctype 24852->24853 24854 350024 MultiByteToWideChar 24853->24854 24855 35004e 24854->24855 24856 3501d8 24854->24856 24859 349f5d std::_Locinfo::_Locinfo_dtor 21 API calls 24855->24859 24862 35006f ctype 24855->24862 24857 33a228 _ValidateLocalCookies 5 API calls 24856->24857 24858 34c2f6 24857->24858 24858->24831 24859->24862 24860 350124 24888 34397b 20 API calls _free 24860->24888 24861 3500b8 MultiByteToWideChar 24861->24860 24863 3500d1 24861->24863 24862->24860 24862->24861 24879 347d6b 24863->24879 24867 350133 24869 349f5d std::_Locinfo::_Locinfo_dtor 21 API calls 24867->24869 24872 350154 ctype 24867->24872 24868 3500fb 24868->24860 24870 347d6b __vsnwprintf_l 11 API calls 24868->24870 24869->24872 24870->24860 24871 3501c9 24887 34397b 20 API calls _free 24871->24887 24872->24871 24873 347d6b __vsnwprintf_l 11 API calls 24872->24873 24875 3501a8 24873->24875 24875->24871 24876 3501b7 WideCharToMultiByte 24875->24876 24876->24871 24877 3501f7 24876->24877 24889 34397b 20 API calls _free 24877->24889 24880 34788c __Getctype 5 API calls 24879->24880 24881 347d92 24880->24881 24884 347d9b 24881->24884 24890 347df3 10 API calls 3 library calls 24881->24890 24883 347ddb LCMapStringW 24883->24884 24885 33a228 _ValidateLocalCookies 5 API calls 24884->24885 24886 347ded 24885->24886 24886->24860 24886->24867 24886->24868 24887->24860 24888->24856 24889->24860 24890->24883 25450 32b1cd 70 API calls

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 199 33404b-334088 call 33a29b 203 3342e1-3342e5 199->203 204 33408e-33409a 199->204 206 3342e7-3342ec call 33a24a 203->206 205 33409f-3340a5 204->205 205->205 207 3340a7-3340c5 SystemParametersInfoW 205->207 209 3340d3-3340e1 call 322080 207->209 210 3340c7-3340cd 207->210 214 3340e7-33410b call 3220b3 209->214 215 3341e5-3341f9 FindResourceW 209->215 210->209 222 334111-334144 call 322067 214->222 223 3341d9-3341e0 call 318d62 214->223 217 334264 215->217 218 3341fb-334207 LoadResource 215->218 220 33426a-33426e 217->220 218->217 221 334209-33423d LockResource SizeofResource call 324070 218->221 224 334270-334288 CreateDialogParamW 220->224 225 33428e-3342db call 333ed2 MoveWindow SetForegroundWindow 220->225 221->220 232 33423f-33425c CreateDialogIndirectParamW call 33a5c2 221->232 236 334181-334187 222->236 237 334146-334155 call 31a502 222->237 223->215 224->225 228 33428a-33428c 224->228 225->203 228->206 240 334261-334262 232->240 238 3341c7-3341cd 236->238 239 334189-3341a1 236->239 248 334157-33415a 237->248 249 33415c-33416b call 31a502 237->249 238->222 245 3341d3 238->245 242 3341a3-3341b8 call 3155e1 239->242 243 3341be-3341c6 call 33a21a 239->243 240->220 242->243 243->238 245->223 252 334170-33417c call 334eb3 248->252 249->236 256 33416d 249->256 252->236 256->252
              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00334055
              • SystemParametersInfoW.USER32 ref: 003340BD
              • FindResourceW.KERNEL32(?,?,00000005), ref: 003341EF
              • LoadResource.KERNEL32(?,00000000,?,?), ref: 003341FF
              • LockResource.KERNEL32(00000000,?,?), ref: 0033420A
              • SizeofResource.KERNEL32(?,00000000,00000000,00000000), ref: 00334226
              • CreateDialogIndirectParamW.USER32(?,?,?,?,?), ref: 0033424D
              • CreateDialogParamW.USER32 ref: 0033427D
                • Part of subcall function 00333ED2: GetWindowRect.USER32(?,?), ref: 00333F0A
              • MoveWindow.USER32(00000000,?,?,?,?,00000001), ref: 003342D2
              • SetForegroundWindow.USER32(00000000), ref: 003342DB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Resource$Window$CreateDialogParam$FindForegroundH_prolog3_IndirectInfoLoadLockMoveParametersRectSizeofSystem
              • String ID: BaseFont$BoldFont$Font$Fonts$Name
              • API String ID: 2278804457-2070303938
              • Opcode ID: 0251460595bc2c5ae261fe0105231b721ad23956eacf97cdfaf0b40cdfe2b153
              • Instruction ID: bb46e993401002c71daf652ae93a6042bc2dccdcfc15ad99827bca2440def095
              • Opcode Fuzzy Hash: 0251460595bc2c5ae261fe0105231b721ad23956eacf97cdfaf0b40cdfe2b153
              • Instruction Fuzzy Hash: 9F814171901218AFDF169F50DD89AEEBBB9EF08310F0444A9F909AA251D775EE90CF60
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 577 336ea3-336ed3 call 337e17 580 336f62-336f66 GetSystemInfo 577->580 581 336ed9-336ee9 GetProcAddress 577->581 582 336f6c-336f7e call 33a228 580->582 583 336f57-336f60 FreeLibrary 581->583 584 336eeb-336f02 GetNativeSystemInfo 581->584 583->580 583->582 584->583 588 336f04-336f14 GetProcAddress 584->588 588->583 589 336f16-336f3b GetCurrentProcess 588->589 589->583 592 336f3d-336f43 589->592 592->583 593 336f45-336f4e 592->593 593->583 594 336f50-336f53 593->594 594->583
              APIs
                • Part of subcall function 00337E17: GetSystemDirectoryW.KERNEL32 ref: 00337E54
                • Part of subcall function 00337E17: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00337E8F
                • Part of subcall function 00337E17: LoadLibraryW.KERNEL32(00000001), ref: 00337EB1
              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00336EDF
              • GetNativeSystemInfo.KERNEL32 ref: 00336EF7
              • GetProcAddress.KERNEL32(00000000,IsWow64Process2), ref: 00336F0A
              • GetCurrentProcess.KERNEL32(?,?), ref: 00336F28
              • FreeLibrary.KERNEL32(00000000), ref: 00336F58
              • GetSystemInfo.KERNEL32(?), ref: 00336F66
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: System$AddressDirectoryInfoLibraryProc$CurrentFreeLoadNativeProcessWindows
              • String ID: GetNativeSystemInfo$IsWow64Process2$kernel32.dll
              • API String ID: 4217954525-2275168552
              • Opcode ID: d09430567fa51c80206d6ffa3f62a3de1a5eb5bae4ece4be668d7717c5a566ac
              • Instruction ID: f5e1343d0be88f2f1b03ddfe10d4046c2d3bf1c490ede58afdf6b27296d2cab2
              • Opcode Fuzzy Hash: d09430567fa51c80206d6ffa3f62a3de1a5eb5bae4ece4be668d7717c5a566ac
              • Instruction Fuzzy Hash: EE21B375A11608BFCB13ABB4EC6AEEEB7B8AF45B00F418425F905E7250EB708D01C751
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • URLDownloadToFileW.URLMON ref: 00325531
              • EnterCriticalSection.KERNEL32(?,?), ref: 0032557D
              • LeaveCriticalSection.KERNEL32(?), ref: 00325588
              • CoInitialize.OLE32(00000000), ref: 003255D5
              • CoUninitialize.OLE32 ref: 003255E3
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CriticalSection$DownloadEnterFileInitializeLeaveUninitialize
              • String ID:
              • API String ID: 907980118-0
              • Opcode ID: b6cfdf77d9018e0ba543ac1900f71a57524f86ccf743643dc3bf32dd3f019f7e
              • Instruction ID: 120d526d16c18131db5871ac8c758d334d04b61102786371692e2e35440e1f74
              • Opcode Fuzzy Hash: b6cfdf77d9018e0ba543ac1900f71a57524f86ccf743643dc3bf32dd3f019f7e
              • Instruction Fuzzy Hash: E431BF70601A24EFC709DB65EC48AAAB7BDBF49B01F508069E40687150DBB0EA55CBE0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetCurrentProcess.KERNEL32(00000000,?,00344750,00000000,00360648,0000000C,003448A7,00000000,00000002,00000000), ref: 0034479B
              • TerminateProcess.KERNEL32(00000000,?,00344750,00000000,00360648,0000000C,003448A7,00000000,00000002,00000000), ref: 003447A2
              • ExitProcess.KERNEL32 ref: 003447B4
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Process$CurrentExitTerminate
              • String ID:
              • API String ID: 1703294689-0
              • Opcode ID: 5545281727485b9d8b5be3bba6bf97cad30b1daa8ac78fb3aa38eb03b5472304
              • Instruction ID: 33f6fa06b87ac59b2a9aa81f74aaba61812715ed1b6ff50de01578db3691233a
              • Opcode Fuzzy Hash: 5545281727485b9d8b5be3bba6bf97cad30b1daa8ac78fb3aa38eb03b5472304
              • Instruction Fuzzy Hash: 8AE09231010A08AFCF126F54D949A493FA9EB51782F028834F915AE122CB7AED42CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 338277-3382ce call 33a307 call 314011 call 321e2e 7 3382d0-3382da call 315652 0->7 8 3382df-338326 call 315991 * 2 call 31a502 0->8 13 3384c4-3384c9 call 33a259 7->13 20 3383d1 8->20 21 33832c-33833b call 31a502 8->21 22 3383d6-3383e3 20->22 21->20 29 338341-338350 call 31a502 21->29 24 3383e5 22->24 25 3383e8-3383ff RegOpenKeyExW 22->25 24->25 27 338495-3384a7 call 315652 * 2 25->27 28 338405-33842d RegQueryValueExW 25->28 48 3384ba-3384c2 call 315652 27->48 49 3384a9-3384b9 call 313f09 27->49 31 338489-33848f RegCloseKey 28->31 32 33842f-338434 28->32 40 338352-338361 call 31a502 29->40 41 3383ca-3383cf 29->41 31->27 32->31 35 338436-33843a 32->35 38 338440-338444 35->38 39 3384ca-3384fe call 32ae69 RegQueryValueExW 35->39 38->39 44 33844a-33844e 38->44 39->31 52 338500-338504 39->52 40->41 51 338363-338372 call 31a502 40->51 41->22 44->31 50 338450-338453 44->50 48->13 49->48 50->31 55 338455-338479 RegQueryValueExW 50->55 66 3383c3-3383c8 51->66 67 338374-338383 call 31a502 51->67 58 338516-338523 ExpandEnvironmentStringsW 52->58 59 338506-338511 call 3156ab 52->59 55->31 56 33847b-338484 55->56 62 338487 56->62 58->31 65 338529-338557 call 315759 ExpandEnvironmentStringsW 58->65 59->62 62->31 73 338570-338572 65->73 74 338559-33856e call 3156ab 65->74 66->22 67->66 76 338385-338394 call 31a502 67->76 73->31 75 338578-338589 call 313f09 73->75 74->73 75->31 83 338396-3383a5 call 31a502 76->83 84 3383bc-3383c1 76->84 83->84 87 3383a7-3383b7 call 315652 * 2 83->87 84->22 87->7
              APIs
              • __EH_prolog3_catch_GS.LIBCMT ref: 00338281
              • RegOpenKeyExW.KERNEL32(80000002,?,00000000,00020019,?), ref: 003383F7
              • RegQueryValueExW.KERNEL32(?,?,00000000,?,00000000,00318A9C), ref: 00338425
              • RegQueryValueExW.KERNEL32(?,?,00000000,00000004,?,00318A9C), ref: 00338471
              • RegCloseKey.KERNEL32(?), ref: 0033848F
              • RegQueryValueExW.KERNEL32(?,?,00000000,00000001,?,00318A9C,00318A9C,?), ref: 003384F6
              • ExpandEnvironmentStringsW.KERNEL32(?,00000000,00000000), ref: 00338519
              • ExpandEnvironmentStringsW.KERNEL32(?,\e0,00000000,00000000,?), ref: 0033854F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: QueryValue$EnvironmentExpandStrings$CloseH_prolog3_catch_Open
              • String ID: HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU$\e0
              • API String ID: 342522750-4137772877
              • Opcode ID: c90d49ea9046d531a7560ab52b407ad4a07be2ec0c4c9c1986e29850efe2c4a8
              • Instruction ID: d0c4b2e4678b50b53bedf2148af6860185ec8c1425a1149710afaaaa237920a0
              • Opcode Fuzzy Hash: c90d49ea9046d531a7560ab52b407ad4a07be2ec0c4c9c1986e29850efe2c4a8
              • Instruction Fuzzy Hash: 8991387090461AEEDF16DFA5CC91AEEBBB8BF59354F104029F406A7290EF709E44CB60
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 92 337225-337283 call 33a29b call 33eb01 97 337292-3372a1 call 33eb01 92->97 98 337285-33728d 92->98 104 3372a3-3372a5 97->104 105 3372a7-3372b6 call 33eb01 97->105 99 337332-33733a call 3156ab 98->99 108 337365-33736a call 339470 99->108 106 337316-337317 104->106 111 3372c2-3372d1 call 33eb01 105->111 112 3372b8-3372c0 105->112 106->108 113 33736f-337373 108->113 125 3372d3-3372d5 111->125 126 3372d7-3372e6 call 33eb01 111->126 112->99 114 337375-337379 113->114 115 3373a4-3373a8 113->115 117 337468-337477 call 33eb01 114->117 118 33737f-337387 114->118 120 3374a1 115->120 121 3373ae-3373b4 115->121 117->120 140 337479-33747f 117->140 123 337389-33738c 118->123 124 33739c-33739f 118->124 129 3374a3-3374ad 120->129 127 3373b6 121->127 128 3373b9-3373c8 GetEnvironmentVariableW 121->128 131 337391-337397 call 3156d2 123->131 132 33738e 123->132 124->129 125->106 152 3372f2-337301 call 33eb01 126->152 153 3372e8-3372f0 126->153 127->128 128->120 134 3373ce-3373f4 call 315759 128->134 135 3374e1-3374f7 129->135 136 3374af-3374c1 129->136 131->124 132->131 156 3373f6 134->156 157 3373f9-337412 GetEnvironmentVariableW call 3156ab 134->157 141 33752b-337532 call 33a24a 135->141 142 3374f9-33750b 135->142 138 3374c3-3374d5 call 3155e1 136->138 139 3374d8-3374e0 call 33a21a 136->139 138->139 139->135 148 337481 140->148 149 337484-33749c call 338698 call 335d98 140->149 150 337522-33752a call 33a21a 142->150 151 33750d-33751f call 3155e1 142->151 148->149 149->124 150->141 151->150 152->108 171 337303-337312 call 33eb01 152->171 153->99 156->157 173 337414-33741c 157->173 174 33744f-337455 157->174 181 337314 171->181 182 337319-337328 call 33eb01 171->182 178 337431-337433 173->178 179 33741e-337421 173->179 174->117 176 337457-337467 call 313f09 174->176 176->117 178->124 185 337439-33744a call 313f09 178->185 183 337423 179->183 184 337426-33742c call 3156d2 179->184 181->106 192 33732a-33732d 182->192 193 33733c-33734b call 33eb01 182->193 183->184 184->178 185->124 192->99 193->120 196 337351-337361 call 3156ab 193->196 196->108
              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0033722C
              • GetEnvironmentVariableW.KERNEL32(?,00000000,00000000,0000004C,00318630,?,?,Looking up path for special folder '%s',?,000002C4,003170A5,?,?,?,?,?), ref: 003373BE
              • GetEnvironmentVariableW.KERNEL32(?,?,00000000,00000000,?), ref: 003373FF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: EnvironmentVariable$H_prolog3_
              • String ID: APPDATA$AppDataFolder$CommonAppDataFolder$CommonFilesFolder$CommonProgramFilesFolder$LocalAppDataFolder$ProgramFiles$ProgramFilesFolder$StartupFolder$SystemFolder$WindowsFolder$WindowsVolume$windir
              • API String ID: 3605364767-201842807
              • Opcode ID: f919d9b5e725933bb6e70d8ac0b209541ebd61e2c17b82153163e8b197379587
              • Instruction ID: 8bc2a952e137229ff102280c85f24aa908b4094f6be98b74f8c9026337c89a01
              • Opcode Fuzzy Hash: f919d9b5e725933bb6e70d8ac0b209541ebd61e2c17b82153163e8b197379587
              • Instruction Fuzzy Hash: 7E91C571D09719AEDB26DBA8D8C7EEEB7B89F08720F20441AF401FA1C1EB74A940C754
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 257 324070-3240a3 258 3247a7 257->258 259 3240a9-3240ad 257->259 260 3247ac-3247ba call 33a228 258->260 259->258 261 3240b3-3240b5 259->261 263 3240c1-3240eb call 323fcf 261->263 264 3240b7-3240bc 261->264 267 3240f0-324102 CreateCompatibleDC 263->267 264->260 268 324104-324109 267->268 269 32410e-324124 SelectObject 267->269 268->260 270 324127-32412a 269->270 271 324152-32416c 270->271 272 32412c-324138 call 33a5b9 270->272 274 324194-32419b 271->274 275 32416e-324177 271->275 279 324772 272->279 280 32413e-324150 call 33b8b0 272->280 278 32419d-3241e7 274->278 275->274 277 324179-324192 275->277 277->278 281 32428d-324290 278->281 282 3241ed-32428b 278->282 285 32477c-32478f DeleteDC 279->285 280->271 284 324291-3242d6 call 323f4a * 2 call 323f96 281->284 282->284 298 3242fb-324344 GetDeviceCaps GetObjectW 284->298 299 3242d8-3242e7 284->299 286 3247a3-3247a5 285->286 287 324791-324798 285->287 286->260 287->286 290 32479a-3247a2 call 33a5c2 287->290 290->286 302 324390 298->302 303 324346-32438e 298->303 300 3242e9-3242ec 299->300 301 3242ef-3242fa call 323f96 299->301 300->301 301->298 305 324393-3243b0 call 323f96 302->305 303->305 309 3243b2-3243bb 305->309 310 3243bd-3243c0 305->310 311 3243c3-3243d4 309->311 310->311 312 3243da-3243e2 311->312 313 32475e-32476b 311->313 314 3243e5-3243f8 312->314 313->285 315 32476d 313->315 316 324441-324488 314->316 317 3243fa-32443f 314->317 315->270 318 32448b-32449c 316->318 317->318 319 3244a2-32452a 318->319 320 32452c 318->320 321 32452f-324579 call 323f4a * 2 319->321 320->321 326 32457b-32457d 321->326 327 3245b9-3245bf 321->327 326->327 330 32457f 326->330 328 3245c5-3245cc 327->328 329 3246d9-3246e8 327->329 328->329 332 3245d2-3245da 328->332 333 3246ea-3246fb 329->333 334 3246fd-324700 329->334 331 324584-32458a 330->331 336 3245aa-3245af 331->336 337 32458c-32458f 331->337 338 3245e1-3245e6 332->338 339 3245dc 332->339 335 324703-324706 333->335 334->335 340 324708-32470d 335->340 341 32472e-324731 335->341 344 3245b1-3245b3 336->344 342 324591-324599 337->342 343 3245a6-3245a8 337->343 338->329 345 3245ec-32460c MulDiv 338->345 339->338 346 32472a 340->346 347 32470f-324728 call 33b330 340->347 350 324733-32473c 341->350 351 32473e-324741 341->351 342->336 348 32459b-3245a4 342->348 343->344 344->327 349 3246d6 344->349 345->349 352 324612-32465b MulDiv DrawTextW 345->352 354 32472c 346->354 347->354 348->331 348->343 349->329 355 324744-324758 350->355 351->355 356 3246b6 352->356 357 32465d-324668 352->357 354->341 355->313 355->314 359 3246b9-3246bc 356->359 357->356 360 32466a-324670 357->360 359->349 363 3246be-3246d3 MulDiv 359->363 361 324672-324675 360->361 362 324696-3246a3 GetSystemMetrics 360->362 361->362 364 324677-32467a 361->364 365 3246a5-3246ad GetSystemMetrics 362->365 366 3246af-3246b4 362->366 363->349 364->362 367 32467c-32467f 364->367 365->366 368 324691-324694 366->368 367->362 369 324681-324684 367->369 368->359 369->362 370 324686-324689 369->370 370->362 371 32468b-32468e 370->371 371->368
              APIs
              • CreateCompatibleDC.GDI32(00000000), ref: 003240F4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CompatibleCreate
              • String ID: @$msctls_trackbar32
              • API String ID: 3111197059-876234929
              • Opcode ID: b09a640bcbeeade8419c005237518b7cee872b17bc9f2442bce7198df73284ad
              • Instruction ID: 7ea5e4163c0740d85b30cb29b4b3c7295577362ffe126ded82ee0ac5b215a435
              • Opcode Fuzzy Hash: b09a640bcbeeade8419c005237518b7cee872b17bc9f2442bce7198df73284ad
              • Instruction Fuzzy Hash: 3632E575D04228CFDB25CF69D981BADB7B5BF09304F2581AAE549EB252E7309E80CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
                • Part of subcall function 0033404B: __EH_prolog3_GS.LIBCMT ref: 00334055
                • Part of subcall function 0033404B: SystemParametersInfoW.USER32 ref: 003340BD
              • GetDlgItem.USER32(00000000,0000040B), ref: 003345A4
              • GetWindowRect.USER32(00000000), ref: 003345AB
              • GetWindowRect.USER32(00000000,?), ref: 003345B8
                • Part of subcall function 003350A0: SendDlgItemMessageW.USER32 ref: 003350C6
              • SetWindowTextW.USER32 ref: 00334621
              • SetDlgItemTextW.USER32 ref: 0033463B
              • GetDlgItem.USER32(00000429,00000069), ref: 00334646
              • ShowWindow.USER32(00000000), ref: 0033464D
              • GetDlgItem.USER32(00000429,000003F0), ref: 0033465D
              • ShowWindow.USER32(00000000), ref: 00334664
              • ShowWindow.USER32(00000429,00000000), ref: 0033466E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Window$Item$Show$RectText$H_prolog3_InfoMessageParametersSendSystem
              • String ID: f$h
              • API String ID: 4019109293-26895948
              • Opcode ID: 6b521d311f58d16436026082a19f25e0fe30aef644460b533fe8666c0a1e0ae6
              • Instruction ID: 7cefe690e755a6d21ed9a8789a07e692f3869b4604551e9a6b5060feb0e28aed
              • Opcode Fuzzy Hash: 6b521d311f58d16436026082a19f25e0fe30aef644460b533fe8666c0a1e0ae6
              • Instruction Fuzzy Hash: 254117B1900208EFCF02DF95DD88A9EBBB9FF49305F048469F905AB261C7B19955CFA0
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • GetDlgItem.USER32(00000002,0000042F), ref: 00333A6F
              • ShowWindow.USER32(00000000), ref: 00333A76
              • GetDlgItem.USER32(00000002,00000430), ref: 00333A85
              • ShowWindow.USER32(00000000), ref: 00333A8C
              • GetDlgItem.USER32(00000002,0000042C), ref: 00333A9B
              • ShowWindow.USER32(00000000), ref: 00333AA2
              • GetDlgItem.USER32(00000002,00000431), ref: 00333AB1
              • ShowWindow.USER32(00000000), ref: 00333AB8
              • GetDlgItem.USER32(00000002,0000042F), ref: 00333AEA
              • GetWindowRect.USER32(00000000), ref: 00333AF1
              • GetDlgItem.USER32(00000002,00000432), ref: 00333B03
              • GetWindowRect.USER32(00000000), ref: 00333B0A
              • GetWindowRect.USER32(00000002,?), ref: 00333B17
                • Part of subcall function 003346AB: GetDlgItem.USER32(00000002,?), ref: 003346C7
                • Part of subcall function 003346AB: GetWindowRect.USER32(00000000,00000000), ref: 003346E6
                • Part of subcall function 003346AB: ScreenToClient.USER32(00000002,00333B36), ref: 00334703
                • Part of subcall function 003346AB: MoveWindow.USER32(00000000,?,?,00000000,?,00000000), ref: 00334727
              • MoveWindow.USER32(00000002,?,?,?,?,00000001), ref: 00333B83
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Window$Item$RectShow$Move$ClientScreen
              • String ID:
              • API String ID: 4252227071-0
              • Opcode ID: d4c815a0d7fc3e178df3c56dc17697af09184a747e94efb0c59acce92bae688b
              • Instruction ID: 627f5b8c7ae4e70b2ae523130ff09b087a8eb9fe10d4e0aad079217fae686ef4
              • Opcode Fuzzy Hash: d4c815a0d7fc3e178df3c56dc17697af09184a747e94efb0c59acce92bae688b
              • Instruction Fuzzy Hash: AA413FB1A01609AFCF019FA5DD99E9FFFBDEF85701F008469F605AA1A1C7B05901CBA4
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 406 32a6e7-32a707 call 33a29b 409 32a70b-32a77d call 319393 call 32a298 call 31556b call 32ae0f call 32acc5 406->409 410 32a709 406->410 421 32a7ae-32a7b2 409->421 422 32a77f-32a78a 409->422 410->409 423 32a7b4-32a7bc 421->423 424 32a7d9-32a7e3 421->424 425 32a79e-32a7a2 422->425 426 32a78c-32a790 422->426 429 32a7c0-32a7c1 423->429 430 32a7be 423->430 431 32a91b-32a927 424->431 432 32a7e9-32a838 call 316074 call 314231 call 317340 424->432 427 32a7a6-32a7ac 425->427 428 32a7a4 425->428 433 32a792 426->433 434 32a795-32a799 call 3156d2 426->434 438 32a7c6-32a7d4 call 314375 427->438 428->427 429->438 430->429 436 32a9b0-32a9ee 431->436 437 32a92d-32a933 431->437 475 32a8c9-32a8d0 432->475 476 32a83e-32a864 call 31556b call 328e89 432->476 433->434 434->425 442 32a9f0-32a9f5 436->442 443 32aa11-32aa25 call 32abfa 436->443 440 32a937-32a958 call 314375 437->440 441 32a935 437->441 455 32ab07-32ab14 call 315652 call 33a24a 438->455 440->436 458 32a95a-32a963 440->458 441->440 448 32a9f7 442->448 449 32a9fa-32aa05 call 32ab17 442->449 460 32aa26-32aa2b 443->460 448->449 459 32aa0a-32aa0f 449->459 463 32a967-32a993 call 319393 call 328e89 call 31556b 458->463 464 32a965 458->464 465 32aa2d-32aa7b 459->465 460->460 460->465 487 32a998-32a9ab call 324c5e 463->487 464->463 466 32aa7f-32aaa6 call 319393 call 32a2e6 call 31556b 465->466 467 32aa7d 465->467 492 32aaab-32aadf call 32ad8d 466->492 467->466 480 32a8d2 475->480 481 32a8d5-32a8e1 call 314375 475->481 497 32a866 476->497 498 32a869-32a875 call 314375 476->498 480->481 490 32a8e6 481->490 487->458 500 32a9ad 487->500 494 32a8e9-32a915 call 315652 call 318d62 call 315652 490->494 504 32aae1-32aae8 492->504 505 32aafc-32ab02 call 315652 492->505 494->431 494->432 497->498 506 32a87a-32a8c7 call 313fda call 327634 call 3273b2 call 327874 498->506 500->436 509 32aaf0-32aaf7 call 3156d2 504->509 510 32aaea 504->510 505->455 506->494 509->505 510->509
              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0032A6F1
                • Part of subcall function 0032ABFA: __EH_prolog3_GS.LIBCMT ref: 0032AC01
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID: ' for property '%s'$'%s' RunCheck result: $'%s' RunConditionsBeforeInstallChecks result: 'Bypass'$'%s' RunConditionsBeforeInstallChecks result: 'Fail'$@ 6$Not setting value for property '%s'$Property: [%s] = $Running checks for package '%s', phase $Setting value '$The following properties have been set for package '%s':
              • API String ID: 2427045233-411732193
              • Opcode ID: 0f8f2542998f656720086319bc7f7da5c29b53fc6c205914f85e992e84ddc45c
              • Instruction ID: eb4956233496166bc2b1b2c5c156d4f0e556ea8eab38c72b9c40cd4420336964
              • Opcode Fuzzy Hash: 0f8f2542998f656720086319bc7f7da5c29b53fc6c205914f85e992e84ddc45c
              • Instruction Fuzzy Hash: 34C17E71900629DFCF26DFA8D885BDDB7B5BF08304F118469E809AB292DB706E85CF51
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0031CE2E
              • std::_Lockit::_Lockit.LIBCPMT ref: 0031CE3B
                • Part of subcall function 0031E240: std::_Lockit::_Lockit.LIBCPMT ref: 0031E25C
                • Part of subcall function 0031E240: std::_Lockit::~_Lockit.LIBCPMT ref: 0031E278
              • ctype.LIBCPMT ref: 0031CE72
              • std::_Facet_Register.LIBCPMT ref: 0031CE89
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0031CEA9
              • Concurrency::cancel_current_task.LIBCPMT ref: 0031CEB6
              • __EH_prolog3_GS.LIBCMT ref: 0031CEC3
              • std::_Lockit::_Lockit.LIBCPMT ref: 0031CED0
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0031CF3E
                • Part of subcall function 0031FD19: __EH_prolog3.LIBCMT ref: 0031FD20
                • Part of subcall function 0031FD19: std::_Locinfo::~_Locinfo.LIBCPMT ref: 0031FD73
              • std::_Facet_Register.LIBCPMT ref: 0031CF1E
              • Concurrency::cancel_current_task.LIBCPMT ref: 0031CF4B
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Register$H_prolog3LocinfoLocinfo::~_ctype
              • String ID:
              • API String ID: 3036960765-0
              • Opcode ID: 6ad91a9b7b0b55d3a91e4afedaa43e7d4cd7e4b7d57cd7dd92b615ac988d6469
              • Instruction ID: 8994ef9425f715212ff9cdef0f0233fefff54c38083d27e8d625abeced685f1f
              • Opcode Fuzzy Hash: 6ad91a9b7b0b55d3a91e4afedaa43e7d4cd7e4b7d57cd7dd92b615ac988d6469
              • Instruction Fuzzy Hash: EE3169719005059FCB0BEB64D486BFDB775AF88711F250408F901AF392CF309E858B91
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 614 31bba8-31bbc9 call 33a29b 617 31bdf8-31bdfd call 33a24a 614->617 618 31bbcf-31bbe3 call 316074 614->618 623 31bbe5 618->623 624 31bbe7-31bbf8 call 32a1ab 618->624 623->624 627 31bbfa-31bbfc 624->627 628 31bc2e-31bc9f call 314231 * 2 624->628 627->628 629 31bbfe-31bc05 627->629 646 31bca1-31bca8 628->646 647 31bcdc-31bce3 628->647 631 31bc07 629->631 632 31bc0c-31bc10 629->632 631->632 634 31bc12 632->634 635 31bc14-31bc21 call 314375 632->635 634->635 639 31bc26-31bc29 635->639 640 31bde8-31bdf3 call 318d62 call 315652 639->640 640->617 648 31bcaa 646->648 649 31bcaf-31bcb5 646->649 650 31bce5 647->650 651 31bcea-31bcf3 647->651 648->649 652 31bcb7 649->652 653 31bcb9-31bcbf 649->653 650->651 654 31bcf5 651->654 655 31bcf8-31bcfb 651->655 652->653 656 31bcc1 653->656 657 31bcc4-31bcda call 314375 653->657 654->655 658 31bcfd 655->658 659 31bcff-31bd05 655->659 656->657 666 31bd21-31bd26 657->666 658->659 660 31bd07 659->660 661 31bd0a-31bd19 call 314375 659->661 660->661 665 31bd1e 661->665 665->666 667 31bd28-31bd3d 666->667 668 31bd5d-31bd77 666->668 669 31bd54-31bd5c call 33a21a 667->669 670 31bd3f-31bd51 call 3155e1 667->670 671 31bd79-31bd8e 668->671 672 31bdae-31bdb2 668->672 669->668 670->669 677 31bd90-31bda2 call 3155e1 671->677 678 31bda5-31bdad call 33a21a 671->678 673 31bdb4-31bdb7 672->673 674 31bdda-31bddd 672->674 673->640 680 31bdb9-31bdbc 673->680 674->640 683 31bddf-31bde2 674->683 677->678 678->672 680->640 687 31bdbe-31bdca 680->687 683->640 687->640 688 31bdcc-31bdd8 call 314231 687->688 688->640
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID: ByPassIf$FailIf$Result of running operator '%s' on property '%s' and value '%s': %s$Result of running operator '%s' on property '%s': %s$Skipping %s because Property '%s' was not defined$false$true
              • API String ID: 2427045233-871101263
              • Opcode ID: 45fcc25bbbe379a635b82599832777cd7f66026dfb99da4904e91891c2a33a8e
              • Instruction ID: 6258f205ac85cb8423e5121402fef616fc58e7f4d967f83706b15b362bf6bbc7
              • Opcode Fuzzy Hash: 45fcc25bbbe379a635b82599832777cd7f66026dfb99da4904e91891c2a33a8e
              • Instruction Fuzzy Hash: 88818D71910649DFDF1ADFA8D881AEEF7B9EF0C300F20442DE505AB291DB31AA85CB55
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0032578B
                • Part of subcall function 00337C8D: __EH_prolog3_GS.LIBCMT ref: 00337C97
                • Part of subcall function 00337C8D: GetComputerObjectNameW.SECUR32(00000007,?,?,00000248,003257CB), ref: 00337CB8
              • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\VisualStudio\Setup,00000000,00000001,?), ref: 003257E7
              • RegQueryValueExW.ADVAPI32(?,DownloadManager,00000000,?,?,?), ref: 00325826
                • Part of subcall function 00336E0E: __EH_prolog3_GS.LIBCMT ref: 00336E15
                • Part of subcall function 00336E0E: InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00336E82
                • Part of subcall function 0033688F: __EH_prolog3_GS.LIBCMT ref: 00336896
                • Part of subcall function 0033688F: InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00336903
                • Part of subcall function 00335DA9: InternetCombineUrlW.WININET(?,?,?,00000825,20000000), ref: 00335E3E
              • RegCloseKey.ADVAPI32(?), ref: 00325995
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_$Internet$Crack$CloseCombineComputerNameObjectOpenQueryValue
              • String ID: DownloadManager$Downloading "%s" instead of "%s"$Software\Microsoft\VisualStudio\Setup$http://
              • API String ID: 2360869629-1408139357
              • Opcode ID: 5fa2561d55a779a19614f0338be3e4c2df427001968279a72ed91f9ffd389794
              • Instruction ID: 64b81c1796ce1652c355944ccdc163865ea98e0728c3abb566d3f232a40cde55
              • Opcode Fuzzy Hash: 5fa2561d55a779a19614f0338be3e4c2df427001968279a72ed91f9ffd389794
              • Instruction Fuzzy Hash: E9511AB1901528EACB26EB50CC55BDEB7BCBF48740F4480E5F489A6141EF715B84CFA1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 746 328e89-328ebf call 33a29b 749 328ec5-328ec8 746->749 750 328faf-328fb7 call 3156ab 746->750 752 328f91-328f97 749->752 753 328ece-328ed1 749->753 756 328fbc-328fc2 750->756 754 328f9b-328f9c 752->754 755 328f99 752->755 757 328f87-328f8f 753->757 758 328ed7-328eda 753->758 759 328fa1-328fad call 33640f 754->759 755->754 760 328fc7-328fd4 call 31556b 756->760 761 328fc4 756->761 757->759 762 328ee0-328ee3 758->762 763 328f6f-328f78 758->763 759->756 772 328fd6-328feb 760->772 773 32900b-329010 call 33a24a 760->773 761->760 762->750 768 328ee9-328f16 call 328cf7 762->768 766 328f7a 763->766 767 328f7f-328f85 763->767 766->767 767->759 775 328f1b-328f32 call 33640f 768->775 776 328f18 768->776 778 329002-32900a call 33a21a 772->778 779 328fed-328fff call 3155e1 772->779 775->756 787 328f38-328f4d 775->787 776->775 778->773 779->778 788 328f64-328f6d call 33a21a 787->788 789 328f4f-328f61 call 3155e1 787->789 788->756 789->788
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID: %d {int}$%s {boolean}$%s {string}$%s {version}$false$true${empty}
              • API String ID: 2427045233-4233488036
              • Opcode ID: 77341fdc3578f3d83a3a9ba21e481452dd1968bf4352ace3e90593f37bbe4a52
              • Instruction ID: ad8e7a640166903b547142c48df292bb038b01376bc9332174c26f223176cef1
              • Opcode Fuzzy Hash: 77341fdc3578f3d83a3a9ba21e481452dd1968bf4352ace3e90593f37bbe4a52
              • Instruction Fuzzy Hash: E7416371D11619EFDB06DFA8E981ADEB7BAEF48300F20442AE101F7250DB31EA46CB55
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • GetDC.USER32(00000000), ref: 00323FF0
              • SelectObject.GDI32(00000000,?), ref: 00323FFE
              • GetTextMetricsW.GDI32(00000000,?), ref: 0032400B
              • GetTextExtentPoint32W.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,?), ref: 0032401F
              • SelectObject.GDI32(00000000,00000000), ref: 0032403D
              • GetDialogBaseUnits.USER32 ref: 00324045
              • ReleaseDC.USER32(00000000,00000000), ref: 0032405B
              Strings
              • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00324019
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ObjectSelectText$BaseDialogExtentMetricsPoint32ReleaseUnits
              • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
              • API String ID: 1972319055-222967699
              • Opcode ID: 4f8c78c51d64892c1fa068df1cbf21cce5cbf6e5608c5d43761c4d564d9110a5
              • Instruction ID: 48d500b9a593a4ee0eec659dcbcca2ca5534f3a63f034e743ebf262822c6411b
              • Opcode Fuzzy Hash: 4f8c78c51d64892c1fa068df1cbf21cce5cbf6e5608c5d43761c4d564d9110a5
              • Instruction Fuzzy Hash: DB114275A01218AFCB12DFA9EC58EAEBBFCEF49711F008469F905DB250DB709901CB65
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
                • Part of subcall function 0033404B: __EH_prolog3_GS.LIBCMT ref: 00334055
                • Part of subcall function 0033404B: SystemParametersInfoW.USER32 ref: 003340BD
              • SetWindowTextW.USER32 ref: 00334367
              • LoadImageW.USER32 ref: 0033437B
              • SetClassLongW.USER32(00000000,000000DE,00000000), ref: 0033438B
              • GetDlgItem.USER32(00000432,00000434), ref: 00334417
              • GetWindowRect.USER32(00000000), ref: 0033441E
              • LoadImageW.USER32 ref: 00334439
              • SendDlgItemMessageW.USER32 ref: 0033444F
              • GetDlgItem.USER32(00000432,00000434), ref: 0033445B
              • ShowWindow.USER32(00000000), ref: 00334462
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ItemWindow$ImageLoad$ClassH_prolog3_InfoLongMessageParametersRectSendShowSystemText
              • String ID:
              • API String ID: 2132083509-0
              • Opcode ID: f665aa6abbed932cac85a36c77ce6db5e3aac1db463b3225dab30d1684db9ee4
              • Instruction ID: 4b68b3da493e516e94d7f25bfc843dfeb28494858ebcc07d4713302dbc58da86
              • Opcode Fuzzy Hash: f665aa6abbed932cac85a36c77ce6db5e3aac1db463b3225dab30d1684db9ee4
              • Instruction Fuzzy Hash: 99414FB0A00609BFEB01DFA5DDC5FAEBBB9FB08304F408515F611A6290C7B46955CBA4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00349F5D: RtlAllocateHeap.NTDLL(00000000,00313FDD,00313FD9,?,0033AEB0,00313FDF,00313FD9,003371CA,?,?,0031D95A,?,00313FDD,00313FD9), ref: 00349F8F
              • _free.LIBCMT ref: 00345475
              • _free.LIBCMT ref: 0034548C
              • _free.LIBCMT ref: 003454AB
              • _free.LIBCMT ref: 003454C6
              • _free.LIBCMT ref: 003454DD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$AllocateHeap
              • String ID: .K4$h|0
              • API String ID: 3033488037-4279754225
              • Opcode ID: d1a0bb547207d527134718c553d48b56de6b6c6cd5a6c8b40fe16b92a127139c
              • Instruction ID: a4a5c4ffcb79f118aa99926d42f46489f58e6580249847fdf9fc32a0ea973a5f
              • Opcode Fuzzy Hash: d1a0bb547207d527134718c553d48b56de6b6c6cd5a6c8b40fe16b92a127139c
              • Instruction Fuzzy Hash: A651A032E00B04ABDB22DF6AC881A6A77F4EF45721B154569E849DF292E731FD41CB40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3.LIBCMT ref: 003250B7
              • InitializeCriticalSection.KERNEL32(?), ref: 0032512B
                • Part of subcall function 00337E17: GetSystemDirectoryW.KERNEL32 ref: 00337E54
                • Part of subcall function 00337E17: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00337E8F
                • Part of subcall function 00337E17: LoadLibraryW.KERNEL32(00000001), ref: 00337EB1
              • GetProcAddress.KERNEL32(00000000,URLDownloadToFileW), ref: 00325157
              • GetProcAddress.KERNEL32(?,URLDownloadToCacheFileW), ref: 0032516B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressDirectoryProc$CriticalH_prolog3InitializeLibraryLoadSectionSystemWindows
              • String ID: URLDownloadToCacheFileW$URLDownloadToFileW$urlmon.dll
              • API String ID: 4214704922-2432372630
              • Opcode ID: 1976753fce3c37a0060dbcf2b2e5255eb972a263ed1a2c6ced2270280efa3576
              • Instruction ID: b6cf70028a92ba5efcde68a2d66ca54fd17773eb5f64e6655e99329cb3e70457
              • Opcode Fuzzy Hash: 1976753fce3c37a0060dbcf2b2e5255eb972a263ed1a2c6ced2270280efa3576
              • Instruction Fuzzy Hash: 1F21C4B4911F40AFE362CF7AC444646FAF0BF49704F508D2ED68AD7A60E7B4A544CB52
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID: Bypass$Fail$Result of checks for command '%s' is '%s'$Result of checks for command '%s' is 'Install'$Running checks for command '%s'
              • API String ID: 2427045233-1246856847
              • Opcode ID: 2ad12da15eb50a1627be1ac730b6f1fdd2d64cd9c7fb3378ab76051ecc6a489f
              • Instruction ID: 796edfd17895bdb82e3bed6b655a9ace46f06781492bbfe41d6cc887f715bb31
              • Opcode Fuzzy Hash: 2ad12da15eb50a1627be1ac730b6f1fdd2d64cd9c7fb3378ab76051ecc6a489f
              • Instruction Fuzzy Hash: 3D418D34911508EFDB0ADFE8C891AEEB7B4AF0C315F104428E441FB261D730AE89CB62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00342A9F,00342A9F,?,?,?,00350234,00000001,00000001,21E85006), ref: 0035003D
              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00350234,00000001,00000001,21E85006,?,?,?), ref: 003500C3
              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,21E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 003501BD
              • __freea.LIBCMT ref: 003501CA
                • Part of subcall function 00349F5D: RtlAllocateHeap.NTDLL(00000000,00313FDD,00313FD9,?,0033AEB0,00313FDF,00313FD9,003371CA,?,?,0031D95A,?,00313FDD,00313FD9), ref: 00349F8F
              • __freea.LIBCMT ref: 003501D3
              • __freea.LIBCMT ref: 003501F8
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ByteCharMultiWide__freea$AllocateHeap
              • String ID:
              • API String ID: 1414292761-0
              • Opcode ID: 450fed41d6994576e66af3d5afb0c61321a65446a05a9d69bc85b1336ebdf9bf
              • Instruction ID: 25d6254522b92698a64c70bb92274e2da4e4d3b4af0b1a0a4d508d5066a955cf
              • Opcode Fuzzy Hash: 450fed41d6994576e66af3d5afb0c61321a65446a05a9d69bc85b1336ebdf9bf
              • Instruction Fuzzy Hash: 1C51F272600606AFDB2B8E60CC81FBF77A9EF40751F164629FC14EB1A0DB76DD488661
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: __cftoe
              • String ID:
              • API String ID: 4189289331-0
              • Opcode ID: cbd51633fcaeb0c0403300a2f4a491d96555d0321d1cc185c56a923d9c784d98
              • Instruction ID: 9210b139ce2b0aa0c2b16a99eec76ead23b3a12dcea43109a364c36761b02b16
              • Opcode Fuzzy Hash: cbd51633fcaeb0c0403300a2f4a491d96555d0321d1cc185c56a923d9c784d98
              • Instruction Fuzzy Hash: 57512C32908205ABDB275B69EC86EBE77E8EF4C362F164119FC14DA1A2DB30DD04C664
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0033404B: __EH_prolog3_GS.LIBCMT ref: 00334055
                • Part of subcall function 0033404B: SystemParametersInfoW.USER32 ref: 003340BD
              • SetWindowTextW.USER32 ref: 003344C2
              • SetDlgItemTextW.USER32 ref: 003344DC
              • SetForegroundWindow.USER32(00000000), ref: 003344E5
              • ShowWindow.USER32(00000000,00000005), ref: 003344F0
              • LoadCursorW.USER32 ref: 003344FD
              • SetCursor.USER32(00000000), ref: 00334504
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Window$CursorText$ForegroundH_prolog3_InfoItemLoadParametersShowSystem
              • String ID:
              • API String ID: 1228017994-0
              • Opcode ID: bccafa7e4670f1e6ecc9ba00cdf9b68ed07c5d6eeb724466a3153504e2152da5
              • Instruction ID: 63ce9551b52d5ce35ebde1978537576fd5328f6048fed5d6d03d2644bbca90d5
              • Opcode Fuzzy Hash: bccafa7e4670f1e6ecc9ba00cdf9b68ed07c5d6eeb724466a3153504e2152da5
              • Instruction Fuzzy Hash: 50011A31140605AFDB225F56EC8DE963BA9FB06702F008464F6569A6B1C7B1E861DBA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
                • Part of subcall function 0034C4EE: _abort.LIBCMT ref: 0034C520
                • Part of subcall function 0034C4EE: _free.LIBCMT ref: 0034C554
                • Part of subcall function 0034C162: GetOEMCP.KERNEL32(00000000), ref: 0034C18D
              • _free.LIBCMT ref: 0034C446
              • _free.LIBCMT ref: 0034C47C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$ErrorLast_abort
              • String ID: HGv$HGv$&6
              • API String ID: 2991157371-2277563591
              • Opcode ID: 00bebefb6592f5a4b4b84f01d0b932e9c1c46eda316fa0ed536f2e914a9114b0
              • Instruction ID: f1149c2258e90d81f7fca8eb5bacfdff3e8accfde8c77270600a3ab7aa31a0bb
              • Opcode Fuzzy Hash: 00bebefb6592f5a4b4b84f01d0b932e9c1c46eda316fa0ed536f2e914a9114b0
              • Instruction Fuzzy Hash: 9831C431905108AFDB93DF6AD551BBD7BE5EF41320F225099E5049F291DB71BD40CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetDlgItem.USER32(?,0000040B), ref: 003353AA
              • GetWindowRect.USER32(00000000), ref: 003353B1
              • GetWindowRect.USER32(?,?), ref: 003353BE
              • SetDlgItemTextW.USER32 ref: 00335419
              • MoveWindow.USER32(?,?,00000000,?,?,00000001), ref: 0033542E
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Window$ItemRect$MoveText
              • String ID:
              • API String ID: 739774251-0
              • Opcode ID: e4b9d50be209881bcbc6017f691ce6d45ee19e446a7b7e3c1ecb0614bfc2c0ec
              • Instruction ID: 133ed261b91483d93d9917ebef7b997d726c33756e105cc708ee8153f61f5a6a
              • Opcode Fuzzy Hash: e4b9d50be209881bcbc6017f691ce6d45ee19e446a7b7e3c1ecb0614bfc2c0ec
              • Instruction Fuzzy Hash: 86315C719016099FCB15CFB9C984AEEBBF9FF49300F14892AE14AE3260D770A945CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetTempPathW.KERNEL32 ref: 003375C3
              • GetTempFileNameW.KERNEL32(?,VSD,00000000,?), ref: 003375E6
                • Part of subcall function 0033793B: GetFileAttributesW.KERNEL32(0031876B,00000001,?,0031876B,?), ref: 0033794E
              • DeleteFileW.KERNEL32(?), ref: 00337608
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: File$Temp$AttributesDeleteNamePath
              • String ID: VSD
              • API String ID: 838033943-2002190350
              • Opcode ID: 0c0686e4411abcac09904dfc701739c1f105d81517bf1a93032b6cafbd4d1120
              • Instruction ID: aaf8cb4c4fc205ab5292d5adffe10ae4e329cf4f98af4fb85fe087c075c21fc9
              • Opcode Fuzzy Hash: 0c0686e4411abcac09904dfc701739c1f105d81517bf1a93032b6cafbd4d1120
              • Instruction Fuzzy Hash: B611D3F190560DAAEF22EB64DC9AFDA73BC9F44700F1044A5F504E7082DB30DA868AA4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3.LIBCMT ref: 0031D7CC
              • std::_Lockit::_Lockit.LIBCPMT ref: 0031D7D9
              • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0031D816
                • Part of subcall function 00353F54: _Yarn.LIBCPMT ref: 00353F73
                • Part of subcall function 00353F54: _Yarn.LIBCPMT ref: 00353F97
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Yarnstd::_$H_prolog3Locinfo::_Locinfo_ctorLockitLockit::_
              • String ID: bad locale name
              • API String ID: 482894088-1405518554
              • Opcode ID: c28a46b4e77fbb15eeb6bcb5ec97d5310c2f38985475ff33215263675352992d
              • Instruction ID: de1c447e30ddc3b10149abc688fc04f8e5186ef6a046f4490d0a6be8bb3277ec
              • Opcode Fuzzy Hash: c28a46b4e77fbb15eeb6bcb5ec97d5310c2f38985475ff33215263675352992d
              • Instruction Fuzzy Hash: 92016270805B408EC722DF6A848154BFEF0BF19701B508A2EE58ED7A51D7309608CB5A
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryExW.KERNEL32(00000011,00000000,00000800,?,0033E5D3,00000000,00000001,00363A8C,?,?,?,0033E776,00000004,InitializeCriticalSectionEx,00307A3C,InitializeCriticalSectionEx), ref: 0033E62F
              • GetLastError.KERNEL32(?,0033E5D3,00000000,00000001,00363A8C,?,?,?,0033E776,00000004,InitializeCriticalSectionEx,00307A3C,InitializeCriticalSectionEx,00000000,?,0033E52D), ref: 0033E639
              • LoadLibraryExW.KERNEL32(00000011,00000000,00000000,?,00000011,0033D433), ref: 0033E661
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID: api-ms-
              • API String ID: 3177248105-2084034818
              • Opcode ID: edca7fdaf069b74574bf71e5975ac765c8f5d2bab463820e2f3add70013fe6ab
              • Instruction ID: 9448eabef6ef63ff0078d3996c92b01bf5a9875cc725aa3b6075d59661500f2e
              • Opcode Fuzzy Hash: edca7fdaf069b74574bf71e5975ac765c8f5d2bab463820e2f3add70013fe6ab
              • Instruction Fuzzy Hash: B6E04F30690604B7EF121F60EC47F593F689B20B50F104430F90CEC0F0D7A1A8509A88
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,0000000A,00000000,00000000,?,003478CF,0000000A,00000000,00000000,00000000,?,00347B39,00000006,FlsSetValue), ref: 0034795A
              • GetLastError.KERNEL32(?,003478CF,0000000A,00000000,00000000,00000000,?,00347B39,00000006,FlsSetValue,003091E4,FlsSetValue,00000000,00000364,?,00346827), ref: 00347966
              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,003478CF,0000000A,00000000,00000000,00000000,?,00347B39,00000006,FlsSetValue,003091E4,FlsSetValue,00000000), ref: 00347974
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: LibraryLoad$ErrorLast
              • String ID:
              • API String ID: 3177248105-0
              • Opcode ID: bd31222548c2b0dc67f3417d57a165e644c073e7d9a77035a3ddc18c5d328e80
              • Instruction ID: 96988b16adf9ef5225173c2dae68d4023b9c9875280deba854881e960d960df4
              • Opcode Fuzzy Hash: bd31222548c2b0dc67f3417d57a165e644c073e7d9a77035a3ddc18c5d328e80
              • Instruction Fuzzy Hash: 3D01A73661A627ABC7234B789C44A5677ECAF05BA1F264624F905DB240D760E801C6E0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsDialogMessageW.USER32 ref: 003347DD
              • TranslateMessage.USER32(?), ref: 003347EB
              • DispatchMessageW.USER32(?), ref: 003347F5
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00334804
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Message$DialogDispatchPeekTranslate
              • String ID:
              • API String ID: 1266772231-0
              • Opcode ID: 785d1d8abb8860524f2c0a12fab2f730c6ce8d7dca877c2ba5ce7f0ccf82cdd8
              • Instruction ID: 92f371f4b8f326b01ddffb1c143849cb3562bb38ff89a5245a8c91c2165644a1
              • Opcode Fuzzy Hash: 785d1d8abb8860524f2c0a12fab2f730c6ce8d7dca877c2ba5ce7f0ccf82cdd8
              • Instruction Fuzzy Hash: C6F06D31A00609ABCF22DFA6DC88CEFB7BCFB49700F004629E411E2050EBB4E9018B60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetDlgItem.USER32(?,00000069), ref: 00335463
              • ShowWindow.USER32(00000000), ref: 0033546A
              • GetDlgItem.USER32(?,00000429), ref: 00335479
              • ShowWindow.USER32(00000000), ref: 00335480
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ItemShowWindow
              • String ID:
              • API String ID: 3351165006-0
              • Opcode ID: 7626e1bc95cc153b1af5afbd2e84ffcc732ec23d71034c387917e10f3eb8d86a
              • Instruction ID: d32e48e83375dc4114267d9582a335d2a844fd57cc88aab668ec3ed64b0a3ad7
              • Opcode Fuzzy Hash: 7626e1bc95cc153b1af5afbd2e84ffcc732ec23d71034c387917e10f3eb8d86a
              • Instruction Fuzzy Hash: 85E04F335016217BC61117A6EC1DC8B7F3DEB46763F018931F6499A4A0CAB2581087E0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00337C97
              • GetComputerObjectNameW.SECUR32(00000007,?,?,00000248,003257CB), ref: 00337CB8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ComputerH_prolog3_NameObject
              • String ID: microsoft.com
              • API String ID: 4158867444-499418652
              • Opcode ID: a8642a7292ccfbef855d8ad0be00afbce950b5fb68f6c33e594dee4949ed69b7
              • Instruction ID: 83b72325748c78d7754bb98517e48e37b9ef4fd6017a36746ffd34bd07a87a47
              • Opcode Fuzzy Hash: a8642a7292ccfbef855d8ad0be00afbce950b5fb68f6c33e594dee4949ed69b7
              • Instruction Fuzzy Hash: 6B216871841628AACB76FB50CC9AEDEB378AF19350F4006D5B519AA0A1EF345FC9CF50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 003462DC
              • _EncodePointerInternal@4.AMAIL_VER1(?,?,00353FFB,00354050,?,00353E86,00000000,00000000,00000000,00000004,0031D382,00000001,00000000,0031D028), ref: 003548FF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: EncodeFeatureInternal@4PointerPresentProcessor
              • String ID: 0H2
              • API String ID: 336596936-727558159
              • Opcode ID: 2ee640aad9c75f77ca24daa475a7a1708fdfc715a29973cf182d650b8ea56749
              • Instruction ID: fedaa9e6c0e13b022cd3aeb877919dd0682b34f42e26ecc1f86846e94c559a9f
              • Opcode Fuzzy Hash: 2ee640aad9c75f77ca24daa475a7a1708fdfc715a29973cf182d650b8ea56749
              • Instruction Fuzzy Hash: 3BF0E2701486097AFB172F60BC5BB6636DCBB46718F0A0039FA0DAD5E2DFE2A420C512
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00337D90: GetVersionExW.KERNEL32(0000011C,?,?,?), ref: 00337DD6
              • SHGetSpecialFolderLocation.SHELL32(00000000,?,?), ref: 003394E0
              • SHGetPathFromIDListW.SHELL32(?,?), ref: 003394FB
              • SHGetMalloc.SHELL32(?), ref: 00339516
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: FolderFromListLocationMallocPathSpecialVersion
              • String ID:
              • API String ID: 2333304065-0
              • Opcode ID: a82875cf8e8149042f8f99be98e5e88224c3241f1c01969ff6d6d9b030fd2757
              • Instruction ID: 2539db0581dffd0a37a7ea4e3c4b028afeb809348ceae1a98c6bb77a0e336450
              • Opcode Fuzzy Hash: a82875cf8e8149042f8f99be98e5e88224c3241f1c01969ff6d6d9b030fd2757
              • Instruction Fuzzy Hash: 2341ABB490021DDFDB26EF24CCC8BEAB77CEB55304F4445AAE91A96241D7B09E858F60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetSystemDirectoryW.KERNEL32 ref: 00337E54
              • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00337E8F
              • LoadLibraryW.KERNEL32(00000001), ref: 00337EB1
                • Part of subcall function 00337EC6: __EH_prolog3_GS.LIBCMT ref: 00337ECD
                • Part of subcall function 00337EC6: LoadLibraryW.KERNEL32(00339620), ref: 00337F17
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: DirectoryLibraryLoad$H_prolog3_SystemWindows
              • String ID:
              • API String ID: 240044452-0
              • Opcode ID: 06ba33ddaa831316f1f1f14c622aa8dc85c21b6b6c5afd0e1c8f0129646fc409
              • Instruction ID: f9c9a0ba641326bea598f726bc58a87894907ce0c34babeb34a1b56a4ecf8aaf
              • Opcode Fuzzy Hash: 06ba33ddaa831316f1f1f14c622aa8dc85c21b6b6c5afd0e1c8f0129646fc409
              • Instruction Fuzzy Hash: 2D1186F590961CAAEB21E760EC89F9F736CDB04314F1045A6F914D6182E674DE448664
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetDlgItem.USER32(?,00000069), ref: 0033400E
              • SendMessageW.USER32(00000000,00000406,00000000,?), ref: 00334024
              • SendMessageW.USER32(00000000,00000402,?,00000000), ref: 00334038
                • Part of subcall function 003347BE: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00334804
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Message$Send$ItemPeek
              • String ID:
              • API String ID: 634455558-0
              • Opcode ID: e116b70db54f0292c0f5beca654b5e7e98023f4119cbcc4adcd7d69220bdfb65
              • Instruction ID: b0ef3902e2b3b4133031b43bf261dafd18bcc062947668f4f0f888fdb87e0e45
              • Opcode Fuzzy Hash: e116b70db54f0292c0f5beca654b5e7e98023f4119cbcc4adcd7d69220bdfb65
              • Instruction Fuzzy Hash: 6AF082353017017BD7455B64DC45F99FBAAFB45710F008021FB1896291C7B164218795
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Info
              • String ID:
              • API String ID: 1807457897-3916222277
              • Opcode ID: 3748aa6ca73ae6f2bf7cbe66e77c6bea36d13cc46a8bf774cb90f34d61d085aa
              • Instruction ID: 745fb83733b2f34d191b7f279ee7cbfa03ee54f3b43ec5320570c285e6969ecb
              • Opcode Fuzzy Hash: 3748aa6ca73ae6f2bf7cbe66e77c6bea36d13cc46a8bf774cb90f34d61d085aa
              • Instruction Fuzzy Hash: D94138745053489BDF238F64CC84AFABBFDEB45308F1448EDE59A8A142D279BA45CF20
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: String
              • String ID: LCMapStringEx
              • API String ID: 2568140703-3893581201
              • Opcode ID: dfa29407dca8766d1a5fbad2460646d855532bc32437463407a2ecf608419eb8
              • Instruction ID: 80e75ff758bd25d69a9200dfdb3acc58cbde24c662c3e75f2d56623b5164aa01
              • Opcode Fuzzy Hash: dfa29407dca8766d1a5fbad2460646d855532bc32437463407a2ecf608419eb8
              • Instruction Fuzzy Hash: 0901C53254120DBBCF039F90DD06EEE7FAAEF09750F058555FA0869160C6729921EB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Alloc
              • String ID: FlsAlloc
              • API String ID: 2773662609-671089009
              • Opcode ID: 38a9a8e7be4fc587e3bf75032cb2b44de71f38ee99ba7f9b63cfe25bb0c9c896
              • Instruction ID: 94d5268ab20392a148350ee046b4075fe7f8b52f8d0c9cb04b017459edff6070
              • Opcode Fuzzy Hash: 38a9a8e7be4fc587e3bf75032cb2b44de71f38ee99ba7f9b63cfe25bb0c9c896
              • Instruction Fuzzy Hash: D9E0233074571867C707AB509C1696EBBD9CF04B10F014155FC056B3D1CEB15E0185D5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0034C162: GetOEMCP.KERNEL32(00000000), ref: 0034C18D
              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0034C430,?,00000000), ref: 0034C604
              • GetCPInfo.KERNEL32(00000000,0034C430,?,?,?,0034C430,?,00000000), ref: 0034C617
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CodeInfoPageValid
              • String ID:
              • API String ID: 546120528-0
              • Opcode ID: 37ff7eb9e41f7467f6e1d38b4c8f18826b1c36de59e7a020a61980c713e3cfbd
              • Instruction ID: 7a421e34126c78be9c6a949629456c140b3cf184672c752a0f3d809c69850195
              • Opcode Fuzzy Hash: 37ff7eb9e41f7467f6e1d38b4c8f18826b1c36de59e7a020a61980c713e3cfbd
              • Instruction Fuzzy Hash: AE514970A112059FDB63CF71C8906BBBBE8EF41300F1AA46ED0968F252D739B945CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FreeLibrary.KERNEL32(00000000,00000001,00363A8C,?,?,?,0033E776,00000004,InitializeCriticalSectionEx,00307A3C,InitializeCriticalSectionEx,00000000,?,0033E52D,00363A8C,00000FA0), ref: 0033E605
              • GetProcAddress.KERNEL32(00000000,?,00000001,00363A8C,?,?,?,0033E776,00000004,InitializeCriticalSectionEx,00307A3C,InitializeCriticalSectionEx,00000000,?,0033E52D,00363A8C), ref: 0033E60F
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressFreeLibraryProc
              • String ID:
              • API String ID: 3013587201-0
              • Opcode ID: 8f2be052c9407f51e0f0682da8419f37562300cbedf355b1fd1c415bb93cdecc
              • Instruction ID: d1ecbbb8cbc4ee114511c941614c9653c9dbd2f1840e0e312d557e225acf61a3
              • Opcode Fuzzy Hash: 8f2be052c9407f51e0f0682da8419f37562300cbedf355b1fd1c415bb93cdecc
              • Instruction Fuzzy Hash: AA114F31A05525DFAF23CF64D8C099A73A8FB46358F154269E94197290E770DE02DB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00337ECD
              • LoadLibraryW.KERNEL32(00339620), ref: 00337F17
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_LibraryLoad
              • String ID:
              • API String ID: 4225965883-0
              • Opcode ID: 3bdf48e271f6cc5b6099687aa7d1ce961692e3958f6e8885f041eb45b6e2e888
              • Instruction ID: ceb9f76e736ca7558d5ae268cf8c37dd592ffb477b3e96f0e0750b0d1a70fc46
              • Opcode Fuzzy Hash: 3bdf48e271f6cc5b6099687aa7d1ce961692e3958f6e8885f041eb45b6e2e888
              • Instruction Fuzzy Hash: CB115BB1D14119EBDF15DFA8D885ADEB7B9FB08310F10841AF905EB240D6349A44CBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateFileW.KERNEL32 ref: 0032C619
              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 0032C627
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: File$CreatePointer
              • String ID:
              • API String ID: 2024441833-0
              • Opcode ID: 3e11ade8556398229cfe49fcf1edf3700b25fe0f07616852efebdec4f89ac46f
              • Instruction ID: 8c4b9a5c184ab0910f0c11e5b191386af15653eb12c2aed612b66cb4d37eec46
              • Opcode Fuzzy Hash: 3e11ade8556398229cfe49fcf1edf3700b25fe0f07616852efebdec4f89ac46f
              • Instruction Fuzzy Hash: 9EF0AEB110051C7EF7015B58EC85F7F775CEB887A4F104122F550961A0C7F05D55C7A0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetDlgItem.USER32(000000FF,00000000), ref: 00335320
              • ShowWindow.USER32(00000000), ref: 00335327
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ItemShowWindow
              • String ID:
              • API String ID: 3351165006-0
              • Opcode ID: 219cc794a242b6cba67eee6d1e84a15ae4517ef9d3c7a42b99bdcbff93c6b342
              • Instruction ID: 2478388620dace581b79321922054828e337bc21efb8a4d2f59d316905c01914
              • Opcode Fuzzy Hash: 219cc794a242b6cba67eee6d1e84a15ae4517ef9d3c7a42b99bdcbff93c6b342
              • Instruction Fuzzy Hash: 6DE04F71010A65ABCB221B78DC49ABA7BAC9B01362F058A25F4A5C50A1E7B589558790
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0033D5B1
              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 0033D5BC
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Value___vcrt____vcrt_uninitialize_ptd
              • String ID:
              • API String ID: 1660781231-0
              • Opcode ID: 485b118643b5aa2ac4a7672fa6b37e80e5b6ca462036b40883725b1e4b755012
              • Instruction ID: 03fcb6ca2c33f6175719c4ef632f66804937626a066415a17ee39ab583086a31
              • Opcode Fuzzy Hash: 485b118643b5aa2ac4a7672fa6b37e80e5b6ca462036b40883725b1e4b755012
              • Instruction Fuzzy Hash: 52D0223892870108BD03B7B438C389923884B63B7CFB11346E0208F4C2EF2090452111
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CoInitialize.OLE32(00000000), ref: 003255D5
                • Part of subcall function 003254E2: URLDownloadToFileW.URLMON ref: 00325531
                • Part of subcall function 003254E2: EnterCriticalSection.KERNEL32(?,?), ref: 0032557D
                • Part of subcall function 003254E2: LeaveCriticalSection.KERNEL32(?), ref: 00325588
              • CoUninitialize.OLE32 ref: 003255E3
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CriticalSection$DownloadEnterFileInitializeLeaveUninitialize
              • String ID:
              • API String ID: 907980118-0
              • Opcode ID: eeda4f6bacce760206035c8feebd7e242f63a526018808b808dce1a09644545e
              • Instruction ID: 91b38b4a3cbcbbb3ced0b936f80905c8d690107964eac7d1bafe45df026b6f86
              • Opcode Fuzzy Hash: eeda4f6bacce760206035c8feebd7e242f63a526018808b808dce1a09644545e
              • Instruction Fuzzy Hash: EEC04C35198A086BD201BBB2EC09B19BB9CAB58B92F908035F90589251DAF1955085A5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: 932bdd5569acf7214ce94fd30f980efb739d8f77a56a723cbee9200ba0d7a0ec
              • Instruction ID: 08c2a6ad5db7395743dcfda5aed669df22fb8dbc5421ca8a04c00192610011ed
              • Opcode Fuzzy Hash: 932bdd5569acf7214ce94fd30f980efb739d8f77a56a723cbee9200ba0d7a0ec
              • Instruction Fuzzy Hash: 4C418272E10A148FCB19CF69D8809AEB7F5EF8D310B168199E515EF3A1C770AD41CB80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0032AB1E
                • Part of subcall function 0031A25F: __EH_prolog3_GS.LIBCMT ref: 0031A266
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID:
              • API String ID: 2427045233-0
              • Opcode ID: 491fa1305e873a704a837926e9d527890474263a52da8139e477e9d3c61cc78e
              • Instruction ID: 6d65accce8c7caa0e24c7254b72630a3ac90dac094a35c514e5c0fe756c1dcdb
              • Opcode Fuzzy Hash: 491fa1305e873a704a837926e9d527890474263a52da8139e477e9d3c61cc78e
              • Instruction Fuzzy Hash: D0318C31910609EFDF16DFA4C485ADEFBB1EF58314F148429E501BB261DB346E86CB62
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetProcAddress.KERNEL32(00000000,00000596,00000000,00000000,00000000,?,00347B39,00000006,FlsSetValue,003091E4,FlsSetValue,00000000,00000364,?,00346827,00000000), ref: 003478EC
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressProc
              • String ID:
              • API String ID: 190572456-0
              • Opcode ID: b0450a54698e3e89e3b1f91dde81052002e3e0e84ae4c817d7c20d47b500125c
              • Instruction ID: ac4c675ab842552104725e4f40a0fae70391d2fc49794711c77bc7696710a086
              • Opcode Fuzzy Hash: b0450a54698e3e89e3b1f91dde81052002e3e0e84ae4c817d7c20d47b500125c
              • Instruction Fuzzy Hash: 1511C233A085259F9F279E28EC4595B73E9AB81360B178621FC15EF294D730FC02C6E1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0031437C
                • Part of subcall function 0033642E: __EH_prolog3_GS.LIBCMT ref: 00336435
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID:
              • API String ID: 2427045233-0
              • Opcode ID: 0b7c807aa38794070f8da7ea9f7b5894de334e1cbbb0356de3eb153e6eb99eba
              • Instruction ID: f237efa1ff29027de640585a2f4ecbd9ca773ca4a9733aa3315a387154d8f6ee
              • Opcode Fuzzy Hash: 0b7c807aa38794070f8da7ea9f7b5894de334e1cbbb0356de3eb153e6eb99eba
              • Instruction Fuzzy Hash: F4110A71D11509EBDF06DFE8D8819DEB7BABF48300F10882AE501FB250DB35AA458B65
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00337F6B
                • Part of subcall function 00336FCD: FindResourceW.KERNEL32(?,?,00337F9F), ref: 00337004
                • Part of subcall function 00336FCD: LoadResource.KERNEL32(?,00000000,?,?,00337F9F,?,?,00000000,?), ref: 00337010
                • Part of subcall function 00336FCD: SizeofResource.KERNEL32(?,00000000,?,?,00337F9F,?,?,00000000,?), ref: 00337021
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Resource$FindH_prolog3_LoadSizeof
              • String ID:
              • API String ID: 3109335684-0
              • Opcode ID: 94e1af241d6647951a57dca37475dac2c7256a8915b6c26b6ebe8881e32e9ec6
              • Instruction ID: 015089464f87f8f3417c43c484b5da667b150efc7c82ff18def92dba102bdca6
              • Opcode Fuzzy Hash: 94e1af241d6647951a57dca37475dac2c7256a8915b6c26b6ebe8881e32e9ec6
              • Instruction Fuzzy Hash: 62112BB1D00619AF8F069F98C8919EFBBB9FF49304F514019F805AB251DB399A05DBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3.LIBCMT ref: 00325CAA
                • Part of subcall function 003250B0: __EH_prolog3.LIBCMT ref: 003250B7
                • Part of subcall function 003250B0: InitializeCriticalSection.KERNEL32(?), ref: 0032512B
                • Part of subcall function 003250B0: GetProcAddress.KERNEL32(00000000,URLDownloadToFileW), ref: 00325157
                • Part of subcall function 003250B0: GetProcAddress.KERNEL32(?,URLDownloadToCacheFileW), ref: 0032516B
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressH_prolog3Proc$CriticalInitializeSection
              • String ID:
              • API String ID: 3942641501-0
              • Opcode ID: 248c9e1cdabc325958096ec03a45938e77fe846cfa2d37f4202ed5927aa56a30
              • Instruction ID: cdad918f28299faad73e306b1c246f80da8870f3c7f5b0ea3c24cae54dc7209c
              • Opcode Fuzzy Hash: 248c9e1cdabc325958096ec03a45938e77fe846cfa2d37f4202ed5927aa56a30
              • Instruction Fuzzy Hash: 0311B475911B00AEE3598FB9C480796FBE0BF0D314F60897ED59ECB261DB71A905CB82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0031939A
                • Part of subcall function 0033642E: __EH_prolog3_GS.LIBCMT ref: 00336435
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID:
              • API String ID: 2427045233-0
              • Opcode ID: 82bbd58acb74749bfa6cce92b6d919b4b7c9ab2579b1cdf6a80c98a920ab712c
              • Instruction ID: 1f3d9826044ab5b52410b2170464dfde2fc79a62d6e6d727ec2b6e63d85cc5d9
              • Opcode Fuzzy Hash: 82bbd58acb74749bfa6cce92b6d919b4b7c9ab2579b1cdf6a80c98a920ab712c
              • Instruction Fuzzy Hash: F511D471D10609AFDF06DFA8E8819DEB7B9BF4C300F10842AE515FB250DB35AA458B65
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 003476E3: RtlAllocateHeap.NTDLL(00000008,00000596,00000000,?,0034680A,00000001,00000364,?,00343700,?,00000596,0000007F,0000000A,00000000,000007FF), ref: 00347724
              • _free.LIBCMT ref: 0034C89C
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AllocateHeap_free
              • String ID:
              • API String ID: 614378929-0
              • Opcode ID: 315d337b0b3b295f8495b4b645191244a8c2e2bded218d0073d832f2508a0379
              • Instruction ID: e91eb5513fb36a8f4abe92f2632a573623120e31f90b4cb7a14f00f72ac08954
              • Opcode Fuzzy Hash: 315d337b0b3b295f8495b4b645191244a8c2e2bded218d0073d832f2508a0379
              • Instruction Fuzzy Hash: 370149726043046BE3328F6AC881A6AFBDDEB89370F65052DE1849B2C0EB70B805C774
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WriteFile.KERNEL32(?,003143D2,003143D2,003143D2,00000000), ref: 003155AB
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: FileWrite
              • String ID:
              • API String ID: 3934441357-0
              • Opcode ID: 06d9a11bcd039993f66724319d461fe85da1bc95db13f258135f316a4bdc273e
              • Instruction ID: 5a92f1565ecc55cf743c7279a156e9df69cb8adf9fb41085aaa85ff39615abcf
              • Opcode Fuzzy Hash: 06d9a11bcd039993f66724319d461fe85da1bc95db13f258135f316a4bdc273e
              • Instruction Fuzzy Hash: 27F0FC71200104AF8B14DF5DDC81CEFB7AEDF4A314751426EE402D7140D7716902C660
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RtlAllocateHeap.NTDLL(00000008,00000596,00000000,?,0034680A,00000001,00000364,?,00343700,?,00000596,0000007F,0000000A,00000000,000007FF), ref: 00347724
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: 2285c0a63de0d231403b1e31480a509274e80b9ef91c7c35defca2a8c63d73d8
              • Instruction ID: b467e812d5ba336912ddc0d91045d892a9581e1724303228410039fabe98a34a
              • Opcode Fuzzy Hash: 2285c0a63de0d231403b1e31480a509274e80b9ef91c7c35defca2a8c63d73d8
              • Instruction Fuzzy Hash: 29F05E32A19A3467DB236B669C05B6A3FDEEB41760F5A8521E804DE191DBA0F800C6E1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 003476E3: RtlAllocateHeap.NTDLL(00000008,00000596,00000000,?,0034680A,00000001,00000364,?,00343700,?,00000596,0000007F,0000000A,00000000,000007FF), ref: 00347724
              • _free.LIBCMT ref: 00344AFA
                • Part of subcall function 00347740: HeapFree.KERNEL32(00000000,00000000), ref: 00347756
                • Part of subcall function 00347740: GetLastError.KERNEL32(00000596,?,0034D7FA,00000596,00000000,00000596,00000000,?,0034DA9E,00000596,00000007,00000596,?,0034DFB6,00000596,00000596), ref: 00347768
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Heap$AllocateErrorFreeLast_free
              • String ID:
              • API String ID: 314386986-0
              • Opcode ID: 2c70311869603143b045842da7ba2c71aec972283b9842a38735d47546a16570
              • Instruction ID: 666590fb3a369535c457f48d2e6b4000cf3a42146b5f569e55caa5b56aa13a79
              • Opcode Fuzzy Hash: 2c70311869603143b045842da7ba2c71aec972283b9842a38735d47546a16570
              • Instruction Fuzzy Hash: A3F03C76A04605AFC311EF69D442B5AFBF4EB48710F114166ED18DB341E771A910CBD1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RtlAllocateHeap.NTDLL(00000000,00313FDD,00313FD9,?,0033AEB0,00313FDF,00313FD9,003371CA,?,?,0031D95A,?,00313FDD,00313FD9), ref: 00349F8F
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: ea58842a285e4ab07a1b65c0eedc74639f661a44bfb88c91ec82d7b634d3bb39
              • Instruction ID: 21522dba139b5c876577eaffc90cbf8d695618a86d332e4459ceddd3f9dddfd3
              • Opcode Fuzzy Hash: ea58842a285e4ab07a1b65c0eedc74639f661a44bfb88c91ec82d7b634d3bb39
              • Instruction Fuzzy Hash: 62E06D355056206BDA2327A69C05B9B3ACCDB827B2F164662FC55DE491DBA0FC0485E1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::ios_base::_Init.LIBCPMT ref: 00322192
                • Part of subcall function 003202B8: __EH_prolog3.LIBCMT ref: 003202BF
                • Part of subcall function 003202B8: std::locale::_Init.LIBCPMT ref: 00320308
                • Part of subcall function 00323853: __EH_prolog3.LIBCMT ref: 0032385A
                • Part of subcall function 00320DBD: std::ios_base::failure::failure.LIBCPMT ref: 00320E07
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3Init$std::ios_base::_std::ios_base::failure::failurestd::locale::_
              • String ID:
              • API String ID: 642969389-0
              • Opcode ID: 32c32561204b7d7155c4d73f75d198bfc9c4bb708b7f188a8e93cd824a9b1c74
              • Instruction ID: 890ee5cfb1b3e36940a750aef6598d598a2e3cc91700fdaaa85cecc15a1135c4
              • Opcode Fuzzy Hash: 32c32561204b7d7155c4d73f75d198bfc9c4bb708b7f188a8e93cd824a9b1c74
              • Instruction Fuzzy Hash: 7EF0E53120076467DB35A6A1E84AB8B77D8AF01734F40480EF9864FA82D6B9F444CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3.LIBCMT ref: 0032385A
                • Part of subcall function 0031CE27: __EH_prolog3_GS.LIBCMT ref: 0031CE2E
                • Part of subcall function 0031CE27: std::_Lockit::_Lockit.LIBCPMT ref: 0031CE3B
                • Part of subcall function 0031CE27: std::_Lockit::~_Lockit.LIBCPMT ref: 0031CEA9
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Lockitstd::_$H_prolog3H_prolog3_Lockit::_Lockit::~_
              • String ID:
              • API String ID: 2728201062-0
              • Opcode ID: c1497d5456b4a9b7c4638bc51b4746e00e0e23fca5095df397df7794c4268a8d
              • Instruction ID: 86fe41f6df5f70660ef2e5b3713255b99816a877921a5c62e594c1e78aee0b73
              • Opcode Fuzzy Hash: c1497d5456b4a9b7c4638bc51b4746e00e0e23fca5095df397df7794c4268a8d
              • Instruction Fuzzy Hash: 0BF06D3AA112059BCF4AFBA0C481AAE7775FF58311F204018E801AF292CF765E46CB66
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 9948dfd1374a806e6b225e4a1d83ef71e511049b056478814c5d11a04b4da726
              • Instruction ID: 92bd43ca992b8b4b592bc835035b1d9c0813ad4a5401001ff3c56a282743aa67
              • Opcode Fuzzy Hash: 9948dfd1374a806e6b225e4a1d83ef71e511049b056478814c5d11a04b4da726
              • Instruction Fuzzy Hash: 56E0E53240052CAB8F035F80EC00C8E3F6AFB19791F018021FE0466130C772A875EB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFileAttributesW.KERNEL32(0031876B,00000001,?,0031876B,?), ref: 0033794E
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 495479bb41854db667e9f66ff7b733700f6c12a60aad659d8854253e9de3ee71
              • Instruction ID: ca5182c3de4be198f298d60ad9785dff9b6d7b7d58d080c7104fcfc1baaf2763
              • Opcode Fuzzy Hash: 495479bb41854db667e9f66ff7b733700f6c12a60aad659d8854253e9de3ee71
              • Instruction Fuzzy Hash: 05D095B204C305CF4F3209F858D46A6338E590B374F111310E428932C1D350DC415360
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFileAttributesW.KERNEL32(003186C4,00000001,?,003186C4,?), ref: 00337921
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AttributesFile
              • String ID:
              • API String ID: 3188754299-0
              • Opcode ID: 8ab20259076c889a7e8d35b9fd0e94bbd7ac6ebcafdc009ba0b34e83463a74f0
              • Instruction ID: 46059b9b12ae947fcfdb2646e586122ff16f992ec99ac016d7b76d9f74571a56
              • Opcode Fuzzy Hash: 8ab20259076c889a7e8d35b9fd0e94bbd7ac6ebcafdc009ba0b34e83463a74f0
              • Instruction Fuzzy Hash: 0FD097B248C3049F7F720AF86CE4BE7338C6A02368F610310E8648B0C0D320EC46A2F0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ItemText
              • String ID:
              • API String ID: 3367045223-0
              • Opcode ID: 3ec43a8e5bc0a2ee3139f491478103796a306d4c0f1dc8691b005935d612324f
              • Instruction ID: 28d3d3281e5b128dacd65e5df7f7544ac667cc073265ddaa83c0c3db688b2e91
              • Opcode Fuzzy Hash: 3ec43a8e5bc0a2ee3139f491478103796a306d4c0f1dc8691b005935d612324f
              • Instruction Fuzzy Hash: 55E08630001308BFCB269F18DC889967BACFB02321F458729F4558A071D770ED55C7A0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Open
              • String ID:
              • API String ID: 71445658-0
              • Opcode ID: 4362762543e76bc2593d86192f84d6bf672d445846623cdaab33df0b8c32e8bf
              • Instruction ID: 3524aafa2d16f118e89b423b220fe00bdaff9a0c3732c2258f4d505f3bd4f4a6
              • Opcode Fuzzy Hash: 4362762543e76bc2593d86192f84d6bf672d445846623cdaab33df0b8c32e8bf
              • Instruction Fuzzy Hash: CEE04F36400628AB8F035F80EC0088E7F29EB047A1F044021FE0457130C7725864EBE0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ItemText
              • String ID:
              • API String ID: 3367045223-0
              • Opcode ID: 9dd3ce138d7742759f7865fa3e9342a070ace99b548f9d5691a4ff9c933207d3
              • Instruction ID: b125b5c26d9ba3f349d0d91f5aac6657bb62d7b2dde6f83598abbad044e6634b
              • Opcode Fuzzy Hash: 9dd3ce138d7742759f7865fa3e9342a070ace99b548f9d5691a4ff9c933207d3
              • Instruction Fuzzy Hash: 00E0C230001A04AFC7129F98DC88E937BBCFB01310F448425F800CA031C3B0ED50CBA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ItemText
              • String ID:
              • API String ID: 3367045223-0
              • Opcode ID: 1fe514d87f47da5cee25a7e573f84533017f73c6b588e40a4274f34f636d6cf9
              • Instruction ID: 13c4a549f668d363b528c73f88bd83333cbfca745a09a4d58bb823d14c3b78ad
              • Opcode Fuzzy Hash: 1fe514d87f47da5cee25a7e573f84533017f73c6b588e40a4274f34f636d6cf9
              • Instruction Fuzzy Hash: 08D05E31001758BBCB232F68DC889D67F6CEB01374F08C626F8A8450B0C7B1A9A5D794
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 003247BB: LoadLibraryW.KERNEL32(kernel32.dll), ref: 003247C9
                • Part of subcall function 003247BB: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 003247DA
                • Part of subcall function 003247BB: GetProcAddress.KERNEL32(DecodePointer), ref: 003247F0
              • RtlEncodePointer.NTDLL ref: 0032484E
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressProc$EncodeLibraryLoadPointer
              • String ID:
              • API String ID: 3567909009-0
              • Opcode ID: c0480595a3f31744aa319c875b2d59edce9a8a113578f568859b3a85be070060
              • Instruction ID: 94d96667aeee257f8d560bf69e4d3a5359dad7f46edd95e8cf08c2396aed0087
              • Opcode Fuzzy Hash: c0480595a3f31744aa319c875b2d59edce9a8a113578f568859b3a85be070060
              • Instruction Fuzzy Hash: E6D0A739501538A747036F04F80089DBB5CAF01B60B018035FD155B710CB619D014BC5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 003247BB: LoadLibraryW.KERNEL32(kernel32.dll), ref: 003247C9
                • Part of subcall function 003247BB: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 003247DA
                • Part of subcall function 003247BB: GetProcAddress.KERNEL32(DecodePointer), ref: 003247F0
              • RtlDecodePointer.NTDLL ref: 0032481E
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressProc$DecodeLibraryLoadPointer
              • String ID:
              • API String ID: 600893357-0
              • Opcode ID: f14a269a2e41da9b1087def6ecef713324962e6581df0d5c5ae702168cf29535
              • Instruction ID: 17997fcca35c432a603e279858d183abf8a95d3be8fc10bebafaa1cc96d1340d
              • Opcode Fuzzy Hash: f14a269a2e41da9b1087def6ecef713324962e6581df0d5c5ae702168cf29535
              • Instruction Fuzzy Hash: 9FD0A739601578A74603AF04F80089DBB5CDF15B61B008021FD055B310CBA15D0147C5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Concurrency::cancel_current_task.LIBCPMT ref: 003156A5
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Concurrency::cancel_current_task
              • String ID:
              • API String ID: 118556049-0
              • Opcode ID: 083e806f40a7d5821ae2d9297cda37d9e164619911c66b8626790655889c0b29
              • Instruction ID: d6f2be3b7e2b80d098478af82b6e5b4646554ce076c7f8f6d2fa88ed2e7e5ffa
              • Opcode Fuzzy Hash: 083e806f40a7d5821ae2d9297cda37d9e164619911c66b8626790655889c0b29
              • Instruction Fuzzy Hash: 21C08C721042088A6609B3B4A80689E73CC85787747A01611B628CB5C2EA20ECC000AC
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00339B1F: RtlAcquireSRWLockExclusive.NTDLL ref: 00339B3C
              • DloadProtectSection.DELAYIMP ref: 00339A9E
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AcquireDloadExclusiveLockProtectSection
              • String ID:
              • API String ID: 3680172570-0
              • Opcode ID: 7a28bbc75c3b2d8eb7f5d98afcd20b8336991a72017a25cae65d7b378fc53ef2
              • Instruction ID: 415778a82788d7bf52bddacd68cab8e518aa716159febacc0244910045da1199
              • Opcode Fuzzy Hash: 7a28bbc75c3b2d8eb7f5d98afcd20b8336991a72017a25cae65d7b378fc53ef2
              • Instruction Fuzzy Hash: 71D01230641241EEC607EB18E9C7795629DB304344F50510BF1138A6A5CBF14690C601
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ShowWindow
              • String ID:
              • API String ID: 1268545403-0
              • Opcode ID: 81474cf52095aaa581ab91544a1b2e7a91acd70f33914dc1fa17480a36219a6e
              • Instruction ID: 8ab54b423f8f597dd56e96c26cedabf0844382ff2594a73b2d3777426c632924
              • Opcode Fuzzy Hash: 81474cf52095aaa581ab91544a1b2e7a91acd70f33914dc1fa17480a36219a6e
              • Instruction Fuzzy Hash: B7C02B320A420D5A87010B74DC06C767FECC711603B04C071F448C4092E22BD851D5A0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ItemText
              • String ID:
              • API String ID: 3367045223-0
              • Opcode ID: 677c7852e6fe62bd4ab5586c3c0458ab5693dc8941559f61ef41304b2ca61e96
              • Instruction ID: a4f4cc59e134a9fd6ab0f1c557237462a47ee70d03c629160a9fbecfda987455
              • Opcode Fuzzy Hash: 677c7852e6fe62bd4ab5586c3c0458ab5693dc8941559f61ef41304b2ca61e96
              • Instruction Fuzzy Hash: BFC08C31044B88ABEB030B40DC08B907F69BB10308F5880A4F20C0C4B2C7B3D8B2D780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ItemText
              • String ID:
              • API String ID: 3367045223-0
              • Opcode ID: 3669b7b7fcc66901d08370c548141c78446177c0d3b09fa4e1ad501dcc138285
              • Instruction ID: 4c73140782102e38cfcf23bb2bc8ee97118ad414aac967bc23615ef9ab0cc49b
              • Opcode Fuzzy Hash: 3669b7b7fcc66901d08370c548141c78446177c0d3b09fa4e1ad501dcc138285
              • Instruction Fuzzy Hash: 1EB0927614020CBBCB021B81EC05C85BF2DEB18754F84C021F70808061C7B39862EA98
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0031859D
                • Part of subcall function 0031556B: WriteFile.KERNEL32(?,003143D2,003143D2,003143D2,00000000), ref: 003155AB
              • FindFirstFileW.KERNEL32(?,?), ref: 003188A8
              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0031892A
              • FindClose.KERNEL32(00000000), ref: 00318935
              • FindClose.KERNEL32(00000000), ref: 00318A3A
              Strings
              • Looking up path for special folder '%s', xrefs: 00318616
              • Running check with folder '%s' and file '%s', xrefs: 003186A0
              • ., xrefs: 003188C4
              • %s\*.*, xrefs: 00318886
              • @ 6, xrefs: 00318637, 00318717, 003187E4
              • Unable to find directory '%s', xrefs: 003186D5
              • Error constructing path: The pathname principles exceed _MAX_PATH., xrefs: 0031871F
              • Unable to find special folder, xrefs: 0031863F
              • Attempting to find file '%s', xrefs: 00318747
              • Could not determine file version, xrefs: 003187EC
              • File version is '%s', xrefs: 003187C3
              • Could not find file '%s' in folder '%s', xrefs: 00318833
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Find$File$Close$FirstH_prolog3_NextWrite
              • String ID: %s\*.*$.$@ 6$Attempting to find file '%s'$Could not determine file version$Could not find file '%s' in folder '%s'$Error constructing path: The pathname principles exceed _MAX_PATH.$File version is '%s'$Looking up path for special folder '%s'$Running check with folder '%s' and file '%s'$Unable to find directory '%s'$Unable to find special folder
              • API String ID: 3800712701-4046004000
              • Opcode ID: 12ec384afd0ffbad8481fefa70e18bdc4970367f2dafc90f23c95e738ab63cb7
              • Instruction ID: c53078b3c8489998d88e3abb39e1f82711b0c55c9f6a532f294557aa405798ed
              • Opcode Fuzzy Hash: 12ec384afd0ffbad8481fefa70e18bdc4970367f2dafc90f23c95e738ab63cb7
              • Instruction Fuzzy Hash: 4CE15E71D01618EFDF1ADFA8D885AEEB7B9AF0C300F204469E505EB191DB30AA85CB55
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00337D90: GetVersionExW.KERNEL32(0000011C,?,?,?), ref: 00337DD6
              • ShellExecuteExW.SHELL32(?), ref: 00315200
              • GetLastError.KERNEL32 ref: 0031520A
              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00315234
              • CloseHandle.KERNEL32(?), ref: 0031523E
              Strings
              • runas, xrefs: 003151D1
              • ShellExecuteEx failed with error code %d, xrefs: 00315213
              • Will attempt to elevate process., xrefs: 003151B8
              • Running command '%s' with arguments '%s', xrefs: 003151E9
              • @ 6, xrefs: 003151B0
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CloseErrorExecuteHandleLastObjectShellSingleVersionWait
              • String ID: @ 6$Running command '%s' with arguments '%s'$ShellExecuteEx failed with error code %d$Will attempt to elevate process.$runas
              • API String ID: 2307727384-1390299409
              • Opcode ID: 65d8dc8017c85d7b4ad3f8eff4fcfdfaf1ed38e2442c408ec708705a45cb1c08
              • Instruction ID: 198689e3e5383101bfeaa40f2729f0c59469aee0289b6846a934d724a07c0050
              • Opcode Fuzzy Hash: 65d8dc8017c85d7b4ad3f8eff4fcfdfaf1ed38e2442c408ec708705a45cb1c08
              • Instruction Fuzzy Hash: 32318071A01608FBCF0ADF64DC88ADEBBB9EF49750F104429E405EB290D7B0A950CB60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryW.KERNEL32(kernel32.dll), ref: 003247C9
              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 003247DA
              • GetProcAddress.KERNEL32(DecodePointer), ref: 003247F0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressProc$LibraryLoad
              • String ID: DecodePointer$EncodePointer$kernel32.dll
              • API String ID: 2238633743-1525541703
              • Opcode ID: 73fc25dbc5c1cb22747a61412c3804f2a57d1a37337a908f196c7698f6ee3904
              • Instruction ID: f9cff3a4c9953d99816e1722e9d6f8245d0ab8dcf01c83c00bbc6867c5932056
              • Opcode Fuzzy Hash: 73fc25dbc5c1cb22747a61412c3804f2a57d1a37337a908f196c7698f6ee3904
              • Instruction Fuzzy Hash: 97E02DF9945700BFDB039FA5EC99A44BAACA716705F01D569F612922A0DBF482249F00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: __floor_pentium4
              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
              • API String ID: 4168288129-2761157908
              • Opcode ID: 8e576c7aecbf97da282d97e9579a554da1701adf3daf0dee8408471d6b5f7377
              • Instruction ID: 14063ef99a3e17fe231d62428572ea4b0eb61dd2ea0eba9950c8004f414738d6
              • Opcode Fuzzy Hash: 8e576c7aecbf97da282d97e9579a554da1701adf3daf0dee8408471d6b5f7377
              • Instruction Fuzzy Hash: DFC27271E046288FDB2ACF28DD40BE9B7B9EB44306F1541EAD84DE7250E775AE858F40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,0034F2D8,?,00000000), ref: 0034F052
              • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,0034F2D8,?,00000000), ref: 0034F07B
              • GetACP.KERNEL32(?,?,0034F2D8,?,00000000), ref: 0034F090
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: InfoLocale
              • String ID: ACP$OCP
              • API String ID: 2299586839-711371036
              • Opcode ID: 1e71a2cec3e2f8a19cdb11320a3b9ce3a7773a20b7874f08d9c4413e7747de5a
              • Instruction ID: 02b25ddb60ebe8a510158b796cbef3a4dbe780c91c021c385b0d2a02e6036430
              • Opcode Fuzzy Hash: 1e71a2cec3e2f8a19cdb11320a3b9ce3a7773a20b7874f08d9c4413e7747de5a
              • Instruction Fuzzy Hash: 9F219032A00104AEEB379F64D900B9772EAAB94B60F5B8474E909CF112E733ED41C750
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
                • Part of subcall function 00346755: _free.LIBCMT ref: 003467B4
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467C1
              • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 0034F299
              • IsValidCodePage.KERNEL32(00000000), ref: 0034F2F4
              • IsValidLocale.KERNEL32(?,00000001), ref: 0034F303
              • GetLocaleInfoW.KERNEL32(?,00001001,003450DB,00000040,?,003451FB,00000055,00000000,?,?,00000055,00000000), ref: 0034F34B
              • GetLocaleInfoW.KERNEL32(?,00001002,0034515B,00000040), ref: 0034F36A
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
              • String ID:
              • API String ID: 745075371-0
              • Opcode ID: e69883c85491a532c7e7ab7c0e5ce67fbac98cff2d1db00bbc4b07bcea438bca
              • Instruction ID: e49cfb35548a758435617a0c3b5169902ea18a742655304462ceab6594324b8e
              • Opcode Fuzzy Hash: e69883c85491a532c7e7ab7c0e5ce67fbac98cff2d1db00bbc4b07bcea438bca
              • Instruction Fuzzy Hash: F5516D79A00606AFEF12DFA4DC45ABA77F8FF05700F194939E901EF191E7B1A9008B61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0033A70D
              • IsDebuggerPresent.KERNEL32 ref: 0033A7D9
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0033A7F9
              • UnhandledExceptionFilter.KERNEL32(?), ref: 0033A803
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
              • String ID:
              • API String ID: 254469556-0
              • Opcode ID: f27e32fba08fc8a02ead8a8184209ffb1f7071a8e7e6aa7c62a33d8ad9aa58e2
              • Instruction ID: f4011547677ee420a2839e3d1bcafb4b58e7a388855f576990855e6e9be0e627
              • Opcode Fuzzy Hash: f27e32fba08fc8a02ead8a8184209ffb1f7071a8e7e6aa7c62a33d8ad9aa58e2
              • Instruction Fuzzy Hash: 70314A75D0531C9BDB21DFA4D9897CDBBB8BF08300F1041AAE50DAB250EB709A858F45
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0033A9FE
              • UnhandledExceptionFilter.KERNEL32(0033AB19), ref: 0033AA07
              • GetCurrentProcess.KERNEL32(C0000409,?,0033AB19,876), ref: 0033AA12
              • TerminateProcess.KERNEL32(00000000,?,0033AB19,876), ref: 0033AA19
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
              • String ID:
              • API String ID: 3231755760-0
              • Opcode ID: 04cf711419507666078420b57dc745cee41c310c682e9c79fb87688ec03c7ca6
              • Instruction ID: a0b6c896a67d256a847672236372b29cc024a7e82200308dd5326d904a1b307f
              • Opcode Fuzzy Hash: 04cf711419507666078420b57dc745cee41c310c682e9c79fb87688ec03c7ca6
              • Instruction Fuzzy Hash: DFD01272081A08EFCB022BE0EC1CA0E7F2CFB08B02F00C830F30AD6021CBB184118BA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
              • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,003450E2,?,?,?,?,?,?,00000004), ref: 0034E924
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,P4,00000000,?), ref: 0034EA74
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$CodeInfoLocalePageValid_abort_free
              • String ID: P4
              • API String ID: 1661935332-2134785405
              • Opcode ID: 5ed0dc443115d5a78b2e684da465faa993b5adca66621ab31b1660d8e65bf31e
              • Instruction ID: 88384aa976911d30b68cf45bc54830d7c720804e6ee2b85e14dde6812a421d85
              • Opcode Fuzzy Hash: 5ed0dc443115d5a78b2e684da465faa993b5adca66621ab31b1660d8e65bf31e
              • Instruction Fuzzy Hash: 42610132A00206AAEB26AF75CC86EA673ECFF05710F15452AF945DF581EB74F900C761
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetVersion.KERNEL32(?,003554FD,003551B9), ref: 00355504
              • GetEnvironmentVariableA.KERNEL32(VSD_FORCE_ANSI,00000000,00000000,?,003554FD,003551B9), ref: 00355517
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: EnvironmentVariableVersion
              • String ID: VSD_FORCE_ANSI
              • API String ID: 2186837676-2962394276
              • Opcode ID: 49f5404110f693b2fa342400608cd23dceabbaa675673a70e913b344e24b4bac
              • Instruction ID: 2d1bcd3ec5ef2157226a06896fda34b70b22a99e0529f9d0a216ff3428be0213
              • Opcode Fuzzy Hash: 49f5404110f693b2fa342400608cd23dceabbaa675673a70e913b344e24b4bac
              • Instruction Fuzzy Hash: 33D0A7603066405FE70347B33CE8F133B4C4722789F459834F402C5160F6D1D8085730
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
                • Part of subcall function 00346755: _free.LIBCMT ref: 003467B4
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467C1
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0034EC94
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0034ECE5
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0034EDA5
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorInfoLastLocale$_free$_abort
              • String ID:
              • API String ID: 2829624132-0
              • Opcode ID: 99e4e5f2deee6bc2454d7949fad5151f86ea4ba0da3f9466b04e6d3d8fc5d0ed
              • Instruction ID: 390b468aa540ae237412bb0be4a9c080583d4f93623984004bba7719a760ad88
              • Opcode Fuzzy Hash: 99e4e5f2deee6bc2454d7949fad5151f86ea4ba0da3f9466b04e6d3d8fc5d0ed
              • Instruction Fuzzy Hash: 006179719006079FEB2A9F24CC86BBAB7E8FF05300F1181B9E906CA595F775A981DB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0033E94C
              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0033E956
              • UnhandledExceptionFilter.KERNEL32(?), ref: 0033E963
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ExceptionFilterUnhandled$DebuggerPresent
              • String ID:
              • API String ID: 3906539128-0
              • Opcode ID: 18e311854158b65dca548dca4acb092f243317f48585978be0d6ee84006d17ea
              • Instruction ID: 5c45d051229fd9075e06e95263966270b5ce99438c960be6e2046bde14bc477e
              • Opcode Fuzzy Hash: 18e311854158b65dca548dca4acb092f243317f48585978be0d6ee84006d17ea
              • Instruction Fuzzy Hash: 0331C67590121C9BCB62DF64D88978DBBB8BF08310F5046EAE91CAB290E7749F818F45
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID: /
              • API String ID: 0-2043925204
              • Opcode ID: 2abddb6cea2d9ceba85bca4fcd1a7cb0c79334c6543ae37488a6d8e89df0aae4
              • Instruction ID: 7757cbb8a7650951ca73699baaf3dc5eb8eb038c36545046f36c0358632ffe04
              • Opcode Fuzzy Hash: 2abddb6cea2d9ceba85bca4fcd1a7cb0c79334c6543ae37488a6d8e89df0aae4
              • Instruction Fuzzy Hash: 1E410A76900219AECB219F79DC89EABB7BCEB85714F1046A8F505DF180E771ED81CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,?,?,00000004), ref: 00347BBE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: InfoLocale
              • String ID: GetLocaleInfoEx
              • API String ID: 2299586839-2904428671
              • Opcode ID: 5f57a5df334fb040191116e43e2f8287fe289f8668e7d5951f8facc59c963a18
              • Instruction ID: 73ff48ad367651836ac5f4c1092b71e346ab12d8efe36cd7a07cd7acc9774431
              • Opcode Fuzzy Hash: 5f57a5df334fb040191116e43e2f8287fe289f8668e7d5951f8facc59c963a18
              • Instruction Fuzzy Hash: 51F0963164520CBBCF03AF54DC06FAE7F59EF14B10F414455FC056A292CBB19A2096D1
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 5fe4a3cac6b74d8397d1e53268adbc6a63f7501bb2db78ef523d729117f8960b
              • Instruction ID: 2542529cc48b64f11ab36f820f69dc90ea63b718234d2a1976bd09b55e8a6caf
              • Opcode Fuzzy Hash: 5fe4a3cac6b74d8397d1e53268adbc6a63f7501bb2db78ef523d729117f8960b
              • Instruction Fuzzy Hash: B7023D71E002199FDF19CFA9C980AAEB7F1EF88315F258169D915EB350D731AA45CF80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0034B30D,?,?,00000008,?,?,003539D7,00000000), ref: 0034B53F
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: 88dd243504005fa93af11219b8894ff6c0162800eeb10ba92c57569743f16059
              • Instruction ID: 131478f43e78c6d201955c664d72dc1ccb959ed638198a1c85aa30ddbc7e5116
              • Opcode Fuzzy Hash: 88dd243504005fa93af11219b8894ff6c0162800eeb10ba92c57569743f16059
              • Instruction Fuzzy Hash: E5B15035510608DFD716CF29C48AB65BBE0FF45365F268698E8D9CF2A2C335E992CB40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0033AC0C
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: FeaturePresentProcessor
              • String ID:
              • API String ID: 2325560087-0
              • Opcode ID: 5f803dd3687d752144eeb5cfef78c62759b31e3b55779ca144452f2f57f60a70
              • Instruction ID: d4749eb89387acd37a958d54a71d73d8f58889a481bd412a8ef942e29c231261
              • Opcode Fuzzy Hash: 5f803dd3687d752144eeb5cfef78c62759b31e3b55779ca144452f2f57f60a70
              • Instruction Fuzzy Hash: BA51CEB1A01A058FDB16CF94D9D17AABBF8FB48310F25D42AC481EB650D3B89900CF51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
                • Part of subcall function 00346755: _free.LIBCMT ref: 003467B4
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467C1
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0034EEE4
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$_free$InfoLocale_abort
              • String ID:
              • API String ID: 1663032902-0
              • Opcode ID: 89994cafd732a7bff4a62bb092bf1e40fe641b37c59dde07ceaa72b24ecf232c
              • Instruction ID: 8660abeee2fc44dbf350035c91dca44e0c84b08bc5200011762a0d002f0cffa2
              • Opcode Fuzzy Hash: 89994cafd732a7bff4a62bb092bf1e40fe641b37c59dde07ceaa72b24ecf232c
              • Instruction Fuzzy Hash: 8D21C53251410AABEB2A9F24DC42BBA77ECFB05310F1540BAED01DE181EB75BD44C750
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
              • EnumSystemLocalesW.KERNEL32(0034EC40,00000001,00000000,?,003450DB,?,0034F26D,00000000,?,?,?), ref: 0034EB86
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem_abort_free
              • String ID:
              • API String ID: 1084509184-0
              • Opcode ID: 93f6812603449442dd6a82bf79ac9a2f5f95d30d52fd4919735a01ddff82ccc9
              • Instruction ID: 5ef4bf8ddb320ad993d22eb19714a77a0a7927f81838a7845459ea1774d2cbb7
              • Opcode Fuzzy Hash: 93f6812603449442dd6a82bf79ac9a2f5f95d30d52fd4919735a01ddff82ccc9
              • Instruction Fuzzy Hash: 1F11E93B2047055FDB199F39C8915BABBD1FF84368B19482CE5874BA40D7717942CB40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0034EE5E,00000000,00000000,?), ref: 0034F0EC
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$InfoLocale_abort_free
              • String ID:
              • API String ID: 2692324296-0
              • Opcode ID: c0c37c643084e9637c7ecf403e3d3116bc784525597113a2c0471cf6bf129078
              • Instruction ID: d183f2c1072ac1c5657a5c288e98909854ecf07f2a1f5164e888527e10a8e4d7
              • Opcode Fuzzy Hash: c0c37c643084e9637c7ecf403e3d3116bc784525597113a2c0471cf6bf129078
              • Instruction Fuzzy Hash: 16F0F936900116EFDB269A65CC06BBB7BD8EB40354F1A4479EC05AB540EB70FD41C690
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
              • EnumSystemLocalesW.KERNEL32(0034EE90,00000001,00000000,?,003450DB,?,0034F231,003450DB,?,?,?,?,?,003450DB,?,?), ref: 0034EBFB
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem_abort_free
              • String ID:
              • API String ID: 1084509184-0
              • Opcode ID: 45fe3d217213e92077064f1f39489f92c912c82310d8bca70a333c87f93f4f45
              • Instruction ID: ecaa36df6d6f69e2a3555beab396033dc34b93a09c02f848d767eb0cd1cea1da
              • Opcode Fuzzy Hash: 45fe3d217213e92077064f1f39489f92c912c82310d8bca70a333c87f93f4f45
              • Instruction Fuzzy Hash: 59F0C2362047055FEB165F799C82A6A7BD5FF81368F05482CF9468F640D6B1AC428A40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00348391: EnterCriticalSection.KERNEL32(?,?,00345C5E,00000000,003606D0,0000000C,00345C19,00000596,?,?,00347716,00000596,?,0034680A,00000001,00000364), ref: 003483A0
              • EnumSystemLocalesW.KERNEL32(00347780,00000001,003607F0,0000000C), ref: 003477FE
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CriticalEnterEnumLocalesSectionSystem
              • String ID:
              • API String ID: 1272433827-0
              • Opcode ID: fa0af8b596a49a20a0e347b18db2c9f367583b15e490a95e22f281c855895f0d
              • Instruction ID: 73596873393ba0dc267e23090ccafea59163c57a2f75ea70b630bbdaa4535bce
              • Opcode Fuzzy Hash: fa0af8b596a49a20a0e347b18db2c9f367583b15e490a95e22f281c855895f0d
              • Instruction Fuzzy Hash: 8DF04972A10604EFDB16EF68D986B9D77E0EB04720F128119F914EF2E1CBB49945CF51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
              • EnumSystemLocalesW.KERNEL32(0034EA20,00000001,00000000,?,?,0034F28F,003450DB,?,?,?,?,?,003450DB,?,?,?), ref: 0034EB00
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem_abort_free
              • String ID:
              • API String ID: 1084509184-0
              • Opcode ID: 21f32ae1e5d136a59deff35e5951630d74c5e28b710d6d426e9a79bbf5e487fc
              • Instruction ID: ba64afbb0f9f81dfabd4d13d71c95fcbcbf0294fd18de56e9764656e2dd99593
              • Opcode Fuzzy Hash: 21f32ae1e5d136a59deff35e5951630d74c5e28b710d6d426e9a79bbf5e487fc
              • Instruction Fuzzy Hash: A5F0E53A30020557DB069F35D855B6BBFD5FFC2764F074468EA0A8F650C671AC42C790
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID: 0
              • API String ID: 0-4108050209
              • Opcode ID: 7764a7755c296639e13db4d3e66b0e8850aa4acfb1436331d14c5fa2db2da257
              • Instruction ID: 1c71fb4c7516eb7cef252cf48288feb6e3f5dc353343845177d7fc90940b2c0c
              • Opcode Fuzzy Hash: 7764a7755c296639e13db4d3e66b0e8850aa4acfb1436331d14c5fa2db2da257
              • Instruction Fuzzy Hash: 0C519835700A455BDFBB8D6884457BF67E9AB12300FCA0D19F842FF682C688FE459751
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 68ac370eeeab77e1e9dda8e0cdcdfbd21d23e3c9baa68a7db03d26220921085f
              • Instruction ID: 26e3cfff14acb8a494257ddbc0ba1e876fdb9d535d48ed6be02973b9c564bee9
              • Opcode Fuzzy Hash: 68ac370eeeab77e1e9dda8e0cdcdfbd21d23e3c9baa68a7db03d26220921085f
              • Instruction Fuzzy Hash: 4532D126D2AF414DD7239634C832336A29CAFB73D5F15DB37E81AB5DA6EF2984874100
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 12df0760cef5137ca4129e23a68dfaae09503d0dfe9308320fbcaaaa103340f3
              • Instruction ID: ccb9026f30800cfa2b107b55e826e70799494a0385690c242cbd65303b259587
              • Opcode Fuzzy Hash: 12df0760cef5137ca4129e23a68dfaae09503d0dfe9308320fbcaaaa103340f3
              • Instruction Fuzzy Hash: E361597160060857DA3B5A298865BBFA3D8EF43300FD7089AF886FF681D655FD828725
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a260699a14cd6a9100b2afcf9afa1d2d2108013f65280e4475c7e1209e7a3b2c
              • Instruction ID: fc1a01abdee54a1feaa66b9ba7a71674a274191cc5b5b2e251bb729b1316d082
              • Opcode Fuzzy Hash: a260699a14cd6a9100b2afcf9afa1d2d2108013f65280e4475c7e1209e7a3b2c
              • Instruction Fuzzy Hash: 2F11346546F3C05EE3439B7898656827FB4AE572A4B0B85D7C4C1CF4B3C218495AD733
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00337E17: GetSystemDirectoryW.KERNEL32 ref: 00337E54
                • Part of subcall function 00337E17: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00337E8F
                • Part of subcall function 00337E17: LoadLibraryW.KERNEL32(00000001), ref: 00337EB1
              • GetProcAddress.KERNEL32(00000000,WinVerifyTrust,?,00000000,?), ref: 00337A2A
              • GetProcAddress.KERNEL32(00000000,WTHelperProvDataFromStateData), ref: 00337A39
              • GetProcAddress.KERNEL32(00000000,WTHelperGetProvSignerFromChain), ref: 00337A48
              • GetProcAddress.KERNEL32(00000000,WTHelperGetProvCertFromChain), ref: 00337A57
                • Part of subcall function 0031556B: WriteFile.KERNEL32(?,003143D2,003143D2,003143D2,00000000), ref: 003155AB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressProc$Directory$FileLibraryLoadSystemWindowsWrite
              • String ID: 0$@ 6$CertDuplicateCertificateContext$Could not get procedures out of Wintrust.$File not signed$File not trusted$File trusted$Subject form unknown$WTHelperGetProvCertFromChain$WTHelperGetProvSignerFromChain$WTHelperProvDataFromStateData$WinVerifyTrust$WinVerifyTrust returned %d$Wintrust not found on machine.$Wintrust not on machine$crypt32.dll$wintrust.dll
              • API String ID: 1334061755-2670583483
              • Opcode ID: 25070e83d127cf8671c100f328fea0c55eb74e45a43fa92e3c7b6d3002092afd
              • Instruction ID: 9f9a855e284579c3b947b5ea7e1ad221fcf9bb021e347dadcf8fddefd8f7fd42
              • Opcode Fuzzy Hash: 25070e83d127cf8671c100f328fea0c55eb74e45a43fa92e3c7b6d3002092afd
              • Instruction Fuzzy Hash: FB917BB5E056189FDF269FA9D899ADEBBB8FF08710F15412AF405A7290DBB08D40CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3
              • String ID: Arguments$Feature$FileName$Log$No FileName value specified for File Check '%s'.$No PackageFile specified for External Check '%s'.$PackageFile$Product$Property$Property not specified for Install Check.$SearchDepth$SearchPath$SpecialFolder
              • API String ID: 431132790-89009226
              • Opcode ID: 9ae36e98139c956b48c400fbb2898fec54c31a5d0e81aff01bec5f2213171b09
              • Instruction ID: 7136959ac3e1f7fb8b4599d91a7141e3a08bdc7c0f8e860586c650c34c017f06
              • Opcode Fuzzy Hash: 9ae36e98139c956b48c400fbb2898fec54c31a5d0e81aff01bec5f2213171b09
              • Instruction Fuzzy Hash: 4B71A071511B00FEF746EFA4C886B9BB7A4AF08705F004469FA44DE1A2D7B9EA05C792
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___free_lconv_mon.LIBCMT ref: 0034DE62
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D09B
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D0AD
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D0BF
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D0D1
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D0E3
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D0F5
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D107
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D119
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D12B
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D13D
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D14F
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D161
                • Part of subcall function 0034D07E: _free.LIBCMT ref: 0034D173
              • _free.LIBCMT ref: 0034DE57
                • Part of subcall function 00347740: HeapFree.KERNEL32(00000000,00000000), ref: 00347756
                • Part of subcall function 00347740: GetLastError.KERNEL32(00000596,?,0034D7FA,00000596,00000000,00000596,00000000,?,0034DA9E,00000596,00000007,00000596,?,0034DFB6,00000596,00000596), ref: 00347768
              • _free.LIBCMT ref: 0034DE79
              • _free.LIBCMT ref: 0034DE8E
              • _free.LIBCMT ref: 0034DE99
              • _free.LIBCMT ref: 0034DEBB
              • _free.LIBCMT ref: 0034DECE
              • _free.LIBCMT ref: 0034DEDC
              • _free.LIBCMT ref: 0034DEE7
              • _free.LIBCMT ref: 0034DF1F
              • _free.LIBCMT ref: 0034DF26
              • _free.LIBCMT ref: 0034DF43
              • _free.LIBCMT ref: 0034DF5B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
              • String ID: h!6
              • API String ID: 161543041-4204839920
              • Opcode ID: 7265aead060991cb13dfe63ad55e90e92a7db48a3bd1cae0daa09120b985017c
              • Instruction ID: d0a705cd8590fbcee4853845ce8de835eb22668f1b48bcae41176d8d50ee247b
              • Opcode Fuzzy Hash: 7265aead060991cb13dfe63ad55e90e92a7db48a3bd1cae0daa09120b985017c
              • Instruction Fuzzy Hash: D8314A316082019FEB32AA39D885B66B7E9EF11310F515869F489DF292DB31FC84CA54
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free
              • String ID: `!6
              • API String ID: 269201875-4105409096
              • Opcode ID: 623410c33240196dc44816c97a6959f9d4b745d345a52a9ba98c6b5478e65238
              • Instruction ID: 8f413e184f036e8808db61f2739ffbe9d1c8be1756cb313541d8c6af9e393247
              • Opcode Fuzzy Hash: 623410c33240196dc44816c97a6959f9d4b745d345a52a9ba98c6b5478e65238
              • Instruction Fuzzy Hash: 10C14376E40205AFDB21DBA8CC82FAF77F8AB09701F154555FE44EF382D670AA458B60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$Info
              • String ID:
              • API String ID: 2509303402-0
              • Opcode ID: 52811fd0cb2e5e87e9def17bb30ad4cc3537b2565454ee03fba7b5b7901c70da
              • Instruction ID: 18094838ee48fd34580ede3c499fdc984556ef3c823f25253ab27b03dc943d6a
              • Opcode Fuzzy Hash: 52811fd0cb2e5e87e9def17bb30ad4cc3537b2565454ee03fba7b5b7901c70da
              • Instruction Fuzzy Hash: 1EB1DF71911205AFDB22DF69C881BEEBBF6FF08300F144469F498AF252DB75A845CB20
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Version
              • String ID: AdjustTokenPrivileges$LookupPrivilegeValueW$OpenProcessToken$SeShutdownPrivilege$advapi32.dll
              • API String ID: 1889659487-3661999180
              • Opcode ID: c7f15c8b62b3114bae944216526c5d7e2e2ef79679e7d6d384803eef42d25812
              • Instruction ID: 7f7b318b680a2090d0151b4d5dc25bc3142cb7a7f6c30e0527579c355586eb0e
              • Opcode Fuzzy Hash: c7f15c8b62b3114bae944216526c5d7e2e2ef79679e7d6d384803eef42d25812
              • Instruction Fuzzy Hash: 5921B475601A09AFDF13AF64DC8DEBFBBBD9F86B04F014429F801D6255DBB088018660
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 003159EB
                • Part of subcall function 0031779F: __EH_prolog3_GS.LIBCMT ref: 003177A6
              Strings
              • Version, xrefs: 00315B30
              • No Name value specified for Assembly Check '%s', xrefs: 00315DD1
              • Name, xrefs: 00315A80
              • PublicKeyToken, xrefs: 00315ADA
              • ProcessorArchitecture, xrefs: 00315BEA
              • neutral, xrefs: 00315B9E
              • No Version value specified for Assembly Check '%s'., xrefs: 00315B4B
              • No PublicKeyToken value specified for Assembly Check '%s'., xrefs: 00315DC1
              • Culture, xrefs: 00315B8C
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID: Culture$Name$No Name value specified for Assembly Check '%s'$No PublicKeyToken value specified for Assembly Check '%s'.$No Version value specified for Assembly Check '%s'.$ProcessorArchitecture$PublicKeyToken$Version$neutral
              • API String ID: 2427045233-1850210091
              • Opcode ID: 5fe45548ef7554b6f3ef62beb3fb9ccc2dddedb33e57fa3a4a1556085e47ee9c
              • Instruction ID: 9ebf501e7bbee12a2736fd8afb3ea192d1cd7d853e1aff4d9f2c17910d295111
              • Opcode Fuzzy Hash: 5fe45548ef7554b6f3ef62beb3fb9ccc2dddedb33e57fa3a4a1556085e47ee9c
              • Instruction Fuzzy Hash: 4FD16E71910608EFEB1ADFA8D885BDEB7B9FF4C300F20442AE505E7251DB34AA85CB55
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
              • String ID: Xn0$csm$csm$csm
              • API String ID: 445410325-2128354375
              • Opcode ID: 6d55d8330a3053e610e41ecd1c71fa7a92ac866db2ed60f288a917ae2f60699e
              • Instruction ID: 20b746b33aeb662b269b812aee0092fc2cb559cf11ae2cbd9bd60e73f72537d9
              • Opcode Fuzzy Hash: 6d55d8330a3053e610e41ecd1c71fa7a92ac866db2ed60f288a917ae2f60699e
              • Instruction Fuzzy Hash: A0B18A71800209EFCF2ADFA4E9C1AAEBBB5FF14310F16415AF8156B212D735EA51CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID: 0-3907804496
              • Opcode ID: 256ae4f9cf9811b665622bcf0cdb379e173b4ec9749f7950ee00a24f34fe3b59
              • Instruction ID: 8480bdb89523793b14baec94bc6bc85af5ba67c8ca6df74f0cb1f8799c1029c3
              • Opcode Fuzzy Hash: 256ae4f9cf9811b665622bcf0cdb379e173b4ec9749f7950ee00a24f34fe3b59
              • Instruction Fuzzy Hash: A5C1A374A04245AFDF17DFA8D881BAE7BF8AF0A310F15419AE445AF392C770AD41CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00359450: CreateFileW.KERNEL32(00000000,00000000,?,003597BA,?,?,00000000), ref: 0035946D
              • GetLastError.KERNEL32 ref: 00359825
              • __dosmaperr.LIBCMT ref: 0035982C
              • GetFileType.KERNEL32(00000000), ref: 00359838
              • GetLastError.KERNEL32 ref: 00359842
              • __dosmaperr.LIBCMT ref: 0035984B
              • CloseHandle.KERNEL32(00000000), ref: 0035986B
              • CloseHandle.KERNEL32(?), ref: 003599B5
              • GetLastError.KERNEL32 ref: 003599E7
              • __dosmaperr.LIBCMT ref: 003599EE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
              • String ID: H
              • API String ID: 4237864984-2852464175
              • Opcode ID: 78a37cb223151da3bec01268b96065334e97ceabf9eb57439cd7a2da0769393d
              • Instruction ID: 899cd17b0e342b6688f852a2d035749fb90a452a7269a2623f814b1d13c80d60
              • Opcode Fuzzy Hash: 78a37cb223151da3bec01268b96065334e97ceabf9eb57439cd7a2da0769393d
              • Instruction Fuzzy Hash: 11A13432A141449FDF1ADF68D842BAE3BB4EB0A321F14015EEC15DF2A1CB709D1ACB52
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0033489C
              • CreateFileW.KERNEL32(?,?,?,00000002), ref: 0033491F
              • MessageBoxW.USER32 ref: 0033497C
              • WriteFile.KERNEL32(00000000,?,00000002,?,00000000), ref: 00334A09
              • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00334A4A
              • CloseHandle.KERNEL32(00000000), ref: 00334A51
              • SetEvent.KERNEL32(?,00000040,00333D5F,00000002), ref: 00334AD9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: File$Write$CloseCreateEventH_prolog3_HandleMessage
              • String ID: eula.rtf$open$pT5
              • API String ID: 3097060125-1495875868
              • Opcode ID: 8327b132575f541dcaa780a1f5558b22d3ca004d94b97efa88cdece9b803bca3
              • Instruction ID: 52ad5263d4f65158b9f317e2bb7fbb0ced48ca0a3d3c28d37f1662b40e70a658
              • Opcode Fuzzy Hash: 8327b132575f541dcaa780a1f5558b22d3ca004d94b97efa88cdece9b803bca3
              • Instruction Fuzzy Hash: 79715A71911218EFDB06CF94D885BEEBBB9EF09700F10442AF505EB290DB74A945CBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00338FC1
                • Part of subcall function 0033793B: GetFileAttributesW.KERNEL32(0031876B,00000001,?,0031876B,?), ref: 0033794E
                • Part of subcall function 00314375: __EH_prolog3_GS.LIBCMT ref: 0031437C
              • GetProcAddress.KERNEL32(00000000,CertFreeCertificateContext), ref: 00339174
              • FreeLibrary.KERNEL32(?), ref: 0033918E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_$AddressAttributesFileFreeLibraryProc
              • String ID: @ 6$CertFreeCertificateContext$No hash or public key info found.$Verifying file hash$Verifying file integrity of %s$crypt32.dll
              • API String ID: 1786674265-3549955070
              • Opcode ID: cb71e0b4dc11f8e292b16dcf2084037a2d41ed066dc8eea9d3c789e134d74dff
              • Instruction ID: ea961bbaf6d98839ebb12a266a5ce57f13f2b25daec862565c621690349bdfdd
              • Opcode Fuzzy Hash: cb71e0b4dc11f8e292b16dcf2084037a2d41ed066dc8eea9d3c789e134d74dff
              • Instruction Fuzzy Hash: FB61D375900615EBDF2BAB94CCD2BEEB738AF48B00F09441AF8027B281D7A15E85C650
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free
              • String ID: `!6$d!6
              • API String ID: 269201875-3621835713
              • Opcode ID: 24632c6e4f3f35d6ca543c745c982fdfb413a159f75c3a990a2ac44d2729766d
              • Instruction ID: cca165c0d666b23c7cb6965739addd926ea387fdbbf752f44af8fd13f82c4a6e
              • Opcode Fuzzy Hash: 24632c6e4f3f35d6ca543c745c982fdfb413a159f75c3a990a2ac44d2729766d
              • Instruction Fuzzy Hash: 3761D375D04205AFDB22DF68C841BAABBF5EF05310F1545AAED44EF282D770AD41CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 003350F9
              • GetDC.USER32(?), ref: 0033510B
              • ShowScrollBar.USER32 ref: 0033511D
              • GetClientRect.USER32 ref: 00335134
              • GetSystemMetrics.USER32 ref: 0033513C
                • Part of subcall function 00338796: __EH_prolog3_GS.LIBCMT ref: 0033879D
              • ReleaseDC.USER32(?,?), ref: 003351F0
              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 003351FD
              • GetStockObject.GDI32(0000000D), ref: 00335209
              • GetObjectW.GDI32(00000000,0000005C,?), ref: 0033521D
              • ShowScrollBar.USER32 ref: 00335240
                • Part of subcall function 00333BF2: GetTextExtentPoint32W.GDI32(00000008,?,?,00000000), ref: 00333C31
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_ObjectScrollShow$ClientExtentMessageMetricsPoint32RectReleaseSendStockSystemText
              • String ID:
              • API String ID: 1108648939-0
              • Opcode ID: a46be396c92acf922da816644139a4cb612f02db7048685586ff383b12a6e31b
              • Instruction ID: 5af2dfc80f0069536e73ddb468cc9c76ac035b01932cdb564fcd39469142e95e
              • Opcode Fuzzy Hash: a46be396c92acf922da816644139a4cb612f02db7048685586ff383b12a6e31b
              • Instruction Fuzzy Hash: 74412A71E406199FDF21DFB8CC95BEEBBB9BB48700F0484A9E508F6251D7745A818F60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 00346675
                • Part of subcall function 00347740: HeapFree.KERNEL32(00000000,00000000), ref: 00347756
                • Part of subcall function 00347740: GetLastError.KERNEL32(00000596,?,0034D7FA,00000596,00000000,00000596,00000000,?,0034DA9E,00000596,00000007,00000596,?,0034DFB6,00000596,00000596), ref: 00347768
              • _free.LIBCMT ref: 00346681
              • _free.LIBCMT ref: 0034668C
              • _free.LIBCMT ref: 00346697
              • _free.LIBCMT ref: 003466A2
              • _free.LIBCMT ref: 003466AD
              • _free.LIBCMT ref: 003466B8
              • _free.LIBCMT ref: 003466C3
              • _free.LIBCMT ref: 003466CE
              • _free.LIBCMT ref: 003466DC
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: d343500dabb48de9e51a2b6e93a953d017b5e40b92f503555b5917d36fd2c7d7
              • Instruction ID: 55175d581d37ff02daa9cd996cc2e9608409579da2731e7c1e6a2ed5160be319
              • Opcode Fuzzy Hash: d343500dabb48de9e51a2b6e93a953d017b5e40b92f503555b5917d36fd2c7d7
              • Instruction Fuzzy Hash: 8111897A514108BFCB02EF54C942CEA3FB6EF05350B5155A5B9484F122DB31EE50DB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00334EBD
              • GetDC.USER32(?), ref: 00334ED7
                • Part of subcall function 003381D2: __EH_prolog3_GS.LIBCMT ref: 003381D9
              • EnumFontFamiliesExW.GDI32(?,?,Function_00033D00,?,00000000), ref: 00334FD2
              • CreateFontIndirectW.GDI32(00000007), ref: 00335005
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: FontH_prolog3_$CreateEnumFamiliesIndirect
              • String ID: CharSet$FontName$Height$Weight
              • API String ID: 281542929-1759768386
              • Opcode ID: 18661470a930eb72dc29c3b54005efc5ce42283cdeea8b00b6257daea019c9d5
              • Instruction ID: a2fe5cc86f00d2faeee84cb4d4bf04577433e8a5320d6057509f3d9a5eec021b
              • Opcode Fuzzy Hash: 18661470a930eb72dc29c3b54005efc5ce42283cdeea8b00b6257daea019c9d5
              • Instruction Fuzzy Hash: 11515F71D00609AFDF16DFB4C8C1AEEBBB9AF09300F104469F509E7252DB35AA84CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _DecodePointerInternal@4.AMAIL_VER1(?,?,?,?,?,?,?,?,?,?,00352E1F), ref: 00353466
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: DecodeInternal@4Pointer
              • String ID: acos$asin$exp$log$log10$pow$sqrt
              • API String ID: 3958391079-3064271455
              • Opcode ID: 62413fdf16713f9a7b59e43ba378d2ae262d42e1a775417897c6e901d8cbfc34
              • Instruction ID: 70a28642e09ee758886b7c9fee3acee5ec9ce5512e330e0aa82e123a4761a08e
              • Opcode Fuzzy Hash: 62413fdf16713f9a7b59e43ba378d2ae262d42e1a775417897c6e901d8cbfc34
              • Instruction Fuzzy Hash: DA518FB4900509DBCF03CF58E5889ADBBB4FF0A346F214589D881A76B4D7758B28CB15
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID: Hash$HomeSite$Name$PublicKey$Size$TargetPath$UrlName
              • API String ID: 2427045233-2227013664
              • Opcode ID: 5e007da7640c7ce4752f088e5a41f6ce38629751b4095cdf36e5443c41db4b70
              • Instruction ID: 737ed90556ef701f662d0ac5a440a849547a3c0cea05b3f5869d443bc5817d70
              • Opcode Fuzzy Hash: 5e007da7640c7ce4752f088e5a41f6ce38629751b4095cdf36e5443c41db4b70
              • Instruction Fuzzy Hash: 54515E71810604FFEB42DFF8C9C1BEAB7B4AF49309F004465EA04EA156D779DA44CB92
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00337E17: GetSystemDirectoryW.KERNEL32 ref: 00337E54
                • Part of subcall function 00337E17: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00337E8F
                • Part of subcall function 00337E17: LoadLibraryW.KERNEL32(00000001), ref: 00337EB1
              • GetProcAddress.KERNEL32(00000000,IsUserAnAdmin), ref: 003377B5
              • GetProcAddress.KERNEL32(00000000,CheckTokenMembership), ref: 00337823
              • FreeLibrary.KERNEL32(00000000), ref: 0033784B
              • FreeLibrary.KERNEL32(00000000), ref: 00337862
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Library$AddressDirectoryFreeProc$LoadSystemWindows
              • String ID: CheckTokenMembership$IsUserAnAdmin$advapi32.dll$shell32.dll
              • API String ID: 3233287316-4205908389
              • Opcode ID: a01db48646f5700a990ad59daf0f37e53a2346e0137ee2fbd9a81949755d027d
              • Instruction ID: 979dc63d7306a338c6e77829abf9d5901b751cd72bdb30f8021ca5c1f2abeb56
              • Opcode Fuzzy Hash: a01db48646f5700a990ad59daf0f37e53a2346e0137ee2fbd9a81949755d027d
              • Instruction Fuzzy Hash: 3821B674605609ABDB239BA0DCCEBBE77BCEF45B05F114028E401AA280DBB09D05DB21
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00338C52
              • CreateFileW.KERNEL32 ref: 00338D8A
              • ReadFile.KERNEL32(000000FF,?,00004000,0033907B,00000000), ref: 00338DBF
              • ReadFile.KERNEL32(000000FF,?,00004000,0033907B,00000000), ref: 00338E2A
              • CloseHandle.KERNEL32(000000FF), ref: 00338F43
              Strings
              • Microsoft Enhanced RSA and AES Cryptographic Provider, xrefs: 00338D15
              • Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype), xrefs: 00338D32
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: File$Read$CloseCreateH_prolog3_Handle
              • String ID: Microsoft Enhanced RSA and AES Cryptographic Provider$Microsoft Enhanced RSA and AES Cryptographic Provider (Prototype)
              • API String ID: 3109496628-3432907261
              • Opcode ID: 680c3840fe8f7273d2ec7f7931ab876e4e22b822e5016d7dfe480533db03810e
              • Instruction ID: e6a114a280d2e635f1b1044dfb3ac4c5d5944b1a0ae5fa0ad8797672621ff3da
              • Opcode Fuzzy Hash: 680c3840fe8f7273d2ec7f7931ab876e4e22b822e5016d7dfe480533db03810e
              • Instruction Fuzzy Hash: 40B13971D00209AFDB16DFA8DC85AEEBBBDEF08310F25452AF911F7190EA709D458B64
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: __alldvrm$_strrchr
              • String ID: C%4$C%4$C%4
              • API String ID: 1036877536-1632645473
              • Opcode ID: 104e74f01146504a49e5e37293d18aef5f2464869ebe3142408da1fc5e239df6
              • Instruction ID: 065f1e82b85b4e633f82eeb4a23f2f4d014a39c7a88fcacb230b534939edf06c
              • Opcode Fuzzy Hash: 104e74f01146504a49e5e37293d18aef5f2464869ebe3142408da1fc5e239df6
              • Instruction Fuzzy Hash: BAA15A75984B8A9FEB23CF58C881BAEBFE4EF15310F16416DE4859F251C338A942C752
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00337D90: GetVersionExW.KERNEL32(0000011C,?,?,?), ref: 00337DD6
              • ShellExecuteExW.SHELL32(0000003C), ref: 00336336
                • Part of subcall function 0031556B: WriteFile.KERNEL32(?,003143D2,003143D2,003143D2,00000000), ref: 003155AB
              • CloseHandle.KERNEL32(?), ref: 00336352
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CloseExecuteFileHandleShellVersionWrite
              • String ID: <$@$@ 6$Will attempt to elevate process.$runas
              • API String ID: 644025995-1185998176
              • Opcode ID: 42f2c29fc6748e0aeecad5408ab2f84b1fdb18082b3a41f029e2328aa230a167
              • Instruction ID: 25ce3a29d85db95176f1236a4f9a38ef65b3ffab9b11e5684159b90ff61baf8d
              • Opcode Fuzzy Hash: 42f2c29fc6748e0aeecad5408ab2f84b1fdb18082b3a41f029e2328aa230a167
              • Instruction Fuzzy Hash: 76219DB5A01208EFDF02DFA4DC95AEEB7BCAF48314F144019E901FB250D7B0AA05CB64
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00337E17: GetSystemDirectoryW.KERNEL32 ref: 00337E54
                • Part of subcall function 00337E17: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00337E8F
                • Part of subcall function 00337E17: LoadLibraryW.KERNEL32(00000001), ref: 00337EB1
              • GetProcAddress.KERNEL32(00000000,SHGetFolderPathW,?,00000007,00000000,?,00339597,00000000,?,00000000,00000001,?,?,00000008,?), ref: 0033962E
              • FreeLibrary.KERNEL32(00000000,?,00339597,00000000,?,00000000,00000001,?,?,00000008,?), ref: 0033963B
              • GetProcAddress.KERNEL32(00000000,SHGetFolderPathW,?,00339597,00000000,?,00000000,00000001,?,?,00000008,?), ref: 00339658
              • FreeLibrary.KERNEL32(00000000,?,00339597,00000000,?,00000000,00000001,?,?,00000008,?), ref: 00339680
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Library$AddressDirectoryFreeProc$LoadSystemWindows
              • String ID: SHGetFolderPathW$shell32.dll$shfolder.dll
              • API String ID: 3233287316-240897930
              • Opcode ID: 141c458fe05776ce0004fb26d8c9174a2dd7152c3e36f31ec413b210a0bc39d9
              • Instruction ID: bfcd92dd58ee42dbddd3a5c6ded4f75cd42b63c33f5a6b5ddde2c83985127fc8
              • Opcode Fuzzy Hash: 141c458fe05776ce0004fb26d8c9174a2dd7152c3e36f31ec413b210a0bc39d9
              • Instruction Fuzzy Hash: E301D436102A15AB9B132F24DC46D9F7B69EF86B60F064125FC0097250DBB18C208795
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
              • _free.LIBCMT ref: 0034678C
              • _free.LIBCMT ref: 003467B4
              • SetLastError.KERNEL32(00000000,?,?,?), ref: 003467C1
              • SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
              • _abort.LIBCMT ref: 003467D3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$_free$_abort
              • String ID: !6
              • API String ID: 3160817290-2803111142
              • Opcode ID: 91cf6bd4176a729ce71a0fd707c66d053e86a9def878425adf660fbb07c0b35d
              • Instruction ID: 087285322c2de77590d37ba81e5625f3179b78e10f6e903ccf821a461699985f
              • Opcode Fuzzy Hash: 91cf6bd4176a729ce71a0fd707c66d053e86a9def878425adf660fbb07c0b35d
              • Instruction Fuzzy Hash: CDF0C836608A0166D6133B346C4BB6B2DED9BC3B69F220424F514DF192EF61B8054162
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0031CD99
              • std::_Lockit::_Lockit.LIBCPMT ref: 0031CDA6
                • Part of subcall function 0031E240: std::_Lockit::_Lockit.LIBCPMT ref: 0031E25C
                • Part of subcall function 0031E240: std::_Lockit::~_Lockit.LIBCPMT ref: 0031E278
              • ctype.LIBCPMT ref: 0031CDDD
              • std::_Facet_Register.LIBCPMT ref: 0031CDF4
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0031CE14
              • Concurrency::cancel_current_task.LIBCPMT ref: 0031CE21
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Registerctype
              • String ID: B6
              • API String ID: 3568167758-3921947778
              • Opcode ID: 5e31a6eaa3dc16423051a3ff068cae8592f8463acae5357d34395da4566b5f40
              • Instruction ID: 3827555ead0f649d178a6a97d5324194139605dd1fce838341d5f2ff7bb6a87e
              • Opcode Fuzzy Hash: 5e31a6eaa3dc16423051a3ff068cae8592f8463acae5357d34395da4566b5f40
              • Instruction Fuzzy Hash: 7601D6359005159FCB0BEBA4D896ABDB7749F8C721F250418F901AB391DF709E858791
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00339B24,00339CCD), ref: 00339AC0
              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive,?,?,00339B24,00339CCD), ref: 00339AD6
              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive,?,?,00339B24,00339CCD), ref: 00339AEB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressProc$HandleModule
              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive$66
              • API String ID: 667068680-1485218826
              • Opcode ID: fe6076a64d10b040f240c9018bb3c8aa77f0317d0faa0fee1f6e2b7b4756bdea
              • Instruction ID: bd9d9c7d63d8c67bf34d2245e93915141241edaf16f5aaed2441917929ad803e
              • Opcode Fuzzy Hash: fe6076a64d10b040f240c9018bb3c8aa77f0317d0faa0fee1f6e2b7b4756bdea
              • Instruction Fuzzy Hash: 2AF0C231706722EBAF239F65ECD27A7A2DC6A12745F1A413BE403D7240DAD1CC449690
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
              • _free.LIBCMT ref: 00345B03
              • _free.LIBCMT ref: 00345B1C
              • _free.LIBCMT ref: 00345B4E
              • _free.LIBCMT ref: 00345B57
              • _free.LIBCMT ref: 00345B63
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$ErrorLast$_abort
              • String ID: C
              • API String ID: 1702784200-1037565863
              • Opcode ID: 1b047391b366cd35184149f848aa597e113f01658cce1c95680985c2586d285a
              • Instruction ID: 7245126e707d9f485d7fb71f5e6fe099d5890f25a6509a385124b5abd81844e8
              • Opcode Fuzzy Hash: 1b047391b366cd35184149f848aa597e113f01658cce1c95680985c2586d285a
              • Instruction Fuzzy Hash: A8B13775E016199FDB26DF18C884AADB7F5FB08304F1185AAE849AB351E730BE80CF40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetConsoleCP.KERNEL32 ref: 0034857B
              • __fassign.LIBCMT ref: 003485F6
              • __fassign.LIBCMT ref: 00348611
              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,?,00000005,00000000,00000000), ref: 00348637
              • WriteFile.KERNEL32(?,?,00000000,00348CAE,00000000), ref: 00348656
              • WriteFile.KERNEL32(?,?,00000001,00348CAE,00000000), ref: 0034868F
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
              • String ID:
              • API String ID: 1324828854-0
              • Opcode ID: 3e58ab0b9342b0a4eccd996a4eae98ea297ef3004dbd0f7a5e46e1cf0c67aa5a
              • Instruction ID: 00b5316089f8aae5b84544843a709f057f2c2ad3d5df7e3bd91c7f0cadcb5f30
              • Opcode Fuzzy Hash: 3e58ab0b9342b0a4eccd996a4eae98ea297ef3004dbd0f7a5e46e1cf0c67aa5a
              • Instruction Fuzzy Hash: C551CA71D00209AFDB12CFA8DC45AEEBBF8EF09300F15415AE956FB251DB74A941CB60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _ValidateLocalCookies.LIBCMT ref: 0033D307
              • ___except_validate_context_record.LIBVCRUNTIME ref: 0033D30F
              • _ValidateLocalCookies.LIBCMT ref: 0033D398
              • __IsNonwritableInCurrentImage.LIBCMT ref: 0033D3C3
              • _ValidateLocalCookies.LIBCMT ref: 0033D418
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
              • String ID: csm
              • API String ID: 1170836740-1018135373
              • Opcode ID: 5c8df747cf139e63df034b02188d8a51cb9a6afd90f54821db66f42c75f8307f
              • Instruction ID: c23e4594025f1953a2622097e899dd16d49cf1b98d02db09ef21ec9ce7781fb4
              • Opcode Fuzzy Hash: 5c8df747cf139e63df034b02188d8a51cb9a6afd90f54821db66f42c75f8307f
              • Instruction Fuzzy Hash: DA41C238A00208DFCF12DF68D8C5A9EBBB4BF45324F148155E8159B396D731DE15CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _EncodePointerInternal@4.AMAIL_VER1(00000000,?), ref: 0033DC02
              • CatchIt.LIBVCRUNTIME ref: 0033DCE8
              • _abort.LIBCMT ref: 0033DD0D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CatchEncodeInternal@4Pointer_abort
              • String ID: 0H2$MOC$RCC
              • API String ID: 2271687597-1859609490
              • Opcode ID: 7284a00daf4499bb0a6169e80916c6f895aeefd97ca75645eefc610a5db8c60e
              • Instruction ID: cf510fd5007ee185d6dbb0da10c9f819924f1aa0106ed51ae24303809269a450
              • Opcode Fuzzy Hash: 7284a00daf4499bb0a6169e80916c6f895aeefd97ca75645eefc610a5db8c60e
              • Instruction Fuzzy Hash: AB419A71900209AFCF17DF98ED81AEEBBB5FF48300F198159F904AB261D375A990CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • #92.MSI(?,00000000,?), ref: 0031448A
              • #78.MSI(?,00000000,00000000,?,?,00000000,?), ref: 003144A2
              • #150.MSI(?,00000007,0000001E,00000000,00000000,?,00000040,?,00000000,00000000,?,?,00000000,?), ref: 003144CA
              • #8.MSI(00000000,?,00000000,?), ref: 003144FE
              • #8.MSI(00000000,?,00000000,?), ref: 00314512
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: #150
              • String ID: @
              • API String ID: 847422065-2766056989
              • Opcode ID: 0c3a420ea5e3b4291e0cf799c5ddee986f95092fbf104a4aa507196c5a55fb90
              • Instruction ID: 7c80425a5af28f2023532304b890a9b57a7b34a601697b7ffc51e2bd9ef7d96a
              • Opcode Fuzzy Hash: 0c3a420ea5e3b4291e0cf799c5ddee986f95092fbf104a4aa507196c5a55fb90
              • Instruction Fuzzy Hash: A3313071900118ABEF359B25DC45FEAB7BCBF85304F4180A9EA48E7151EE749E89CF60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0034D7CC: _free.LIBCMT ref: 0034D7F5
              • _free.LIBCMT ref: 0034DAD3
                • Part of subcall function 00347740: HeapFree.KERNEL32(00000000,00000000), ref: 00347756
                • Part of subcall function 00347740: GetLastError.KERNEL32(00000596,?,0034D7FA,00000596,00000000,00000596,00000000,?,0034DA9E,00000596,00000007,00000596,?,0034DFB6,00000596,00000596), ref: 00347768
              • _free.LIBCMT ref: 0034DADE
              • _free.LIBCMT ref: 0034DAE9
              • _free.LIBCMT ref: 0034DB3D
              • _free.LIBCMT ref: 0034DB48
              • _free.LIBCMT ref: 0034DB53
              • _free.LIBCMT ref: 0034DB5E
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 4d1b8025fce6acedd6cfebefbbde793e76daa062d0660ff0044225d31086b531
              • Instruction ID: 0074381b78cf6d1b50b6be02339ae65061d5913505a9016a54f84f01b5f1e2d1
              • Opcode Fuzzy Hash: 4d1b8025fce6acedd6cfebefbbde793e76daa062d0660ff0044225d31086b531
              • Instruction Fuzzy Hash: DF11EC71944B04AAD622BBB1DC47FDB7FDCAF04F00F804C15B299AF153DB65B5048690
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\VisualStudio\Setup,00000000,00000001,?,?,?,?,00337D66,microsoft.com,00000000), ref: 003380BC
              • RegQueryValueExW.ADVAPI32(?,IsInCorpnetHook,00000000,?,?,f}3,00000000,?,?,00337D66,microsoft.com,00000000), ref: 003380E8
              • RegCloseKey.ADVAPI32(?,?,?,00337D66,microsoft.com,00000000), ref: 00338107
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CloseOpenQueryValue
              • String ID: IsInCorpnetHook$Software\Microsoft\VisualStudio\Setup$f}3
              • API String ID: 3677997916-1532326437
              • Opcode ID: d6b2611edf295c2786bc945e3875bca439bd0154ee135015f12ba9b124059dab
              • Instruction ID: 8bfc84dc927ec5f0dc07af4608c981aeb7a79817d949184165b9328aec85d923
              • Opcode Fuzzy Hash: d6b2611edf295c2786bc945e3875bca439bd0154ee135015f12ba9b124059dab
              • Instruction Fuzzy Hash: A61109B0E0021DAFDF12DF919C85AEFBB7CFB40758F11406AF902A6140D6719E45CA61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32(?,?,?,00346928,00343685,?,?,00343700,?,00000596,0000007F,0000000A,00000000,000007FF,?,00337112), ref: 003467DE
              • _free.LIBCMT ref: 00346813
              • _free.LIBCMT ref: 0034683A
              • SetLastError.KERNEL32(00000000,00000596), ref: 00346847
              • SetLastError.KERNEL32(00000000,00000596), ref: 00346850
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$_free
              • String ID: !6
              • API String ID: 3170660625-2803111142
              • Opcode ID: bdd6e9e26e2615375037d16dedf3c4d00ecd26ed652071cca3ff7ac3c1c3dd91
              • Instruction ID: 50d783543d9f773c35c5e64abd0ac31cf2c8f64af297c1315e692bbe02d84a33
              • Opcode Fuzzy Hash: bdd6e9e26e2615375037d16dedf3c4d00ecd26ed652071cca3ff7ac3c1c3dd91
              • Instruction Fuzzy Hash: D801C836608A017782132F356D9BE6B27EEDBC7771F224438F515AE293EFA0BD054162
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetNativeSystemInfo.KERNEL32(?), ref: 0032C52E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: InfoNativeSystem
              • String ID: Arm$Arm64$Intel$Intel64$x64
              • API String ID: 1721193555-3325060975
              • Opcode ID: 3ed29601e15d2881c5c42b2b404583b3961c8d3255eb82feffde5ed11f190831
              • Instruction ID: 4476116a32e88645121a07b603d89ba97c7295f0a60321bd984ce6cbbc5103b5
              • Opcode Fuzzy Hash: 3ed29601e15d2881c5c42b2b404583b3961c8d3255eb82feffde5ed11f190831
              • Instruction Fuzzy Hash: 14F0A435A25128C6C7079AAF75595BC76A8D70F340F652112F402EB5A4C630EEC4D361
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00354964
              • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 003549CF
              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003549EC
              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00354A2B
              • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00354A8A
              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00354AAD
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ByteCharMultiStringWide
              • String ID:
              • API String ID: 2829165498-0
              • Opcode ID: c1ce48f19c9f357ce200ce91ec175293b167d88438122d2b8f23101577304af7
              • Instruction ID: d45c07284d9f77f31d0f95b046462e63907479a812b2d8dbf3f4757971f68e7f
              • Opcode Fuzzy Hash: c1ce48f19c9f357ce200ce91ec175293b167d88438122d2b8f23101577304af7
              • Instruction Fuzzy Hash: 4151E17250020AAFDF268FA5DC45FAF7BA9EF4074AF168525FD009A1A0D731DC988B94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32(?,?,0033D4C1,0033BBEC,0033A8E4), ref: 0033D4D8
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0033D4E6
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0033D4FF
              • SetLastError.KERNEL32(00000000,0033D4C1,0033BBEC,0033A8E4), ref: 0033D551
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: 59e470ca8776db51595d5fd9b5ad12ca479e7d6a4a71a3802f69c659b485ef48
              • Instruction ID: 7867f8a4e30b43ffce42fc1b51c49053db5eb88089fb31a0409ec218aab58c23
              • Opcode Fuzzy Hash: 59e470ca8776db51595d5fd9b5ad12ca479e7d6a4a71a3802f69c659b485ef48
              • Instruction Fuzzy Hash: CF01F73651DB115EF717277A7CC66572B9EEB02778F220239F5155A0E1EF915C00D144
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0031CC6F
              • std::_Lockit::_Lockit.LIBCPMT ref: 0031CC7C
                • Part of subcall function 0031E240: std::_Lockit::_Lockit.LIBCPMT ref: 0031E25C
                • Part of subcall function 0031E240: std::_Lockit::~_Lockit.LIBCPMT ref: 0031E278
              • codecvt.LIBCPMT ref: 0031CCB3
              • std::_Facet_Register.LIBCPMT ref: 0031CCCA
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0031CCEA
              • Concurrency::cancel_current_task.LIBCPMT ref: 0031CCF7
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Registercodecvt
              • String ID:
              • API String ID: 2765983240-0
              • Opcode ID: 192a28f89dc47c5cf3c20c47aeb4de83dbf816c73e5956480f1b4ed07b307cc6
              • Instruction ID: 8f9ebf4d2276f0e4494ee91b96307766c5a9d6d9caba9fd633bd21c5d6f06641
              • Opcode Fuzzy Hash: 192a28f89dc47c5cf3c20c47aeb4de83dbf816c73e5956480f1b4ed07b307cc6
              • Instruction Fuzzy Hash: BB0126319001059FCB0BEB64C486ABEB774AF88710F250018F801EF391CB709E868B81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0031CD04
              • std::_Lockit::_Lockit.LIBCPMT ref: 0031CD11
                • Part of subcall function 0031E240: std::_Lockit::_Lockit.LIBCPMT ref: 0031E25C
                • Part of subcall function 0031E240: std::_Lockit::~_Lockit.LIBCPMT ref: 0031E278
              • codecvt.LIBCPMT ref: 0031CD48
              • std::_Facet_Register.LIBCPMT ref: 0031CD5F
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0031CD7F
              • Concurrency::cancel_current_task.LIBCPMT ref: 0031CD8C
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Registercodecvt
              • String ID:
              • API String ID: 2765983240-0
              • Opcode ID: 64abfe823b8b1af82d4cdb7f7ffb18e23d9a8ea1db7ae5cfff2294a5065ec120
              • Instruction ID: f3c6956799dce296d4f380666f093f8b0db6793dc71337b889a79be1ebda7ac3
              • Opcode Fuzzy Hash: 64abfe823b8b1af82d4cdb7f7ffb18e23d9a8ea1db7ae5cfff2294a5065ec120
              • Instruction Fuzzy Hash: 9F01D6319046058FCB0BEB64D496BFDBB749F88710F250418F901AF391CF709E858B91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 0031CF58
              • std::_Lockit::_Lockit.LIBCPMT ref: 0031CF65
                • Part of subcall function 0031E240: std::_Lockit::_Lockit.LIBCPMT ref: 0031E25C
                • Part of subcall function 0031E240: std::_Lockit::~_Lockit.LIBCPMT ref: 0031E278
              • numpunct.LIBCPMT ref: 0031CF9C
              • std::_Facet_Register.LIBCPMT ref: 0031CFB3
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0031CFD3
              • Concurrency::cancel_current_task.LIBCPMT ref: 0031CFE0
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prolog3_Registernumpunct
              • String ID:
              • API String ID: 1047916130-0
              • Opcode ID: 8f4f31809f6e1c8d4330c47e39c605850370e40e366456ba4b7e461d080c2def
              • Instruction ID: b9cc1b1ad117d494e64091dcf75dec723a046dc9f945a9bc0c41371482d6f0b8
              • Opcode Fuzzy Hash: 8f4f31809f6e1c8d4330c47e39c605850370e40e366456ba4b7e461d080c2def
              • Instruction Fuzzy Hash: 8F01F9319006059FCB0BEB64D496EBEB7759F48711F250408F901AF3A1DF709E868791
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFocus.USER32 ref: 00334BAA
              • GetDlgItem.USER32(000000FF,00000066), ref: 00334BB7
              • GetDlgItem.USER32(000000FF,000003EF), ref: 00334BC9
              • GetDlgItem.USER32(000000FF,0000040A), ref: 00334BDB
              • GetDlgItem.USER32(000000FF,00000000), ref: 00334BF5
              • SetFocus.USER32 ref: 00334BFC
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Item$Focus
              • String ID:
              • API String ID: 2803794159-0
              • Opcode ID: 645e4fdbee92c9cf927d8030887786ce827be32ed4c6f9e2842ac319c01bc8e6
              • Instruction ID: 0dce4d3a14e11521188a9c92188da8279d2123c943a666b353697169e04686af
              • Opcode Fuzzy Hash: 645e4fdbee92c9cf927d8030887786ce827be32ed4c6f9e2842ac319c01bc8e6
              • Instruction Fuzzy Hash: 9DF04431100701BBDB231B65EC8DA597A6FEB40391F058935F296950B0DBB1AC919650
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00317E67
                • Part of subcall function 00317D8C: __EH_prolog3_GS.LIBCMT ref: 00317D93
                • Part of subcall function 00318146: LoadLibraryW.KERNEL32(mscoree.dll), ref: 0031815B
                • Part of subcall function 00318146: GetLastError.KERNEL32(?,?,0031665E,00000000), ref: 00318167
                • Part of subcall function 003182E0: GetProcAddress.KERNEL32(?,00318007,00000000,?,00318007,?,GetRequestedRuntimeInfo), ref: 003182EC
                • Part of subcall function 003182E0: GetLastError.KERNEL32(?,00318007,?,GetRequestedRuntimeInfo), ref: 003182F6
              • FreeLibrary.KERNEL32(?), ref: 003180CA
              • FreeLibrary.KERNEL32(?), ref: 00318112
                • Part of subcall function 00317CEF: __EH_prolog3_GS.LIBCMT ref: 00317CF6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_Library$ErrorFreeLast$AddressLoadProc
              • String ID: GetRequestedRuntimeInfo$v4.0.0
              • API String ID: 2221631392-1665928025
              • Opcode ID: 60edc01540d2a68064f9d20ba7321ad7e3973f21b1f598143199f5d58e73a76f
              • Instruction ID: 1b9a6dbc7327311877dbe5ab25398e94a3a47d0df23ef5c99cdf86b5545d649d
              • Opcode Fuzzy Hash: 60edc01540d2a68064f9d20ba7321ad7e3973f21b1f598143199f5d58e73a76f
              • Instruction Fuzzy Hash: 3D812E71901629AFDB368F24CC45BD9B7BAAF98710F0041E5E909E7250DB31AEE1CF54
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FindResourceW.KERNEL32(?,?,00337F9F), ref: 00337004
              • LoadResource.KERNEL32(?,00000000,?,?,00337F9F,?,?,00000000,?), ref: 00337010
              • SizeofResource.KERNEL32(?,00000000,?,?,00337F9F,?,?,00000000,?), ref: 00337021
              • LockResource.KERNEL32(?,?,?,00337F9F,?,?,00000000,?), ref: 00337039
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Resource$FindLoadLockSizeof
              • String ID: 2q3+
              • API String ID: 3473537107-1988260129
              • Opcode ID: 3f04bebbd29531c4d38f8c827772934bb7b54a4947277366e72fd1869662af90
              • Instruction ID: c8ed0bbb01d2255665ad1a5c17f7a0f4e7e0085789a3dc52e6ac83b6d4ae1f2a
              • Opcode Fuzzy Hash: 3f04bebbd29531c4d38f8c827772934bb7b54a4947277366e72fd1869662af90
              • Instruction Fuzzy Hash: 3A11C1B1608626FBDB361F24DC94AAF7BACEF14790F154035F906E6260D771DC109BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadLibraryW.KERNEL32(mscoree.dll), ref: 0031815B
              • GetLastError.KERNEL32(?,?,0031665E,00000000), ref: 00318167
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLastLibraryLoad
              • String ID: `26$mscoree.dll
              • API String ID: 3568775529-2038885189
              • Opcode ID: 978418a19d2abf3ade49c34f2581fc8273c2ca3d9d177b54fef123a8fae80c5c
              • Instruction ID: 31f513e0b6f3750006594d21c592a200c6fea0c2957e5ff406c3ec7e3a9600d7
              • Opcode Fuzzy Hash: 978418a19d2abf3ade49c34f2581fc8273c2ca3d9d177b54fef123a8fae80c5c
              • Instruction Fuzzy Hash: CFF06236348715ABE7078B6DDC40AA237EDBF59750F15C439E845C3310EAB0D8829794
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,003447B0,00000000,?,00344750,00000000,00360648,0000000C,003448A7,00000000,00000002), ref: 0034481F
              • GetProcAddress.KERNEL32(00000000,CorExitProcess,00000000,?,?,?,003447B0,00000000,?,00344750,00000000,00360648,0000000C,003448A7,00000000,00000002), ref: 00344832
              • FreeLibrary.KERNEL32(00000000,?,?,?,003447B0,00000000,?,00344750,00000000,00360648,0000000C,003448A7,00000000,00000002), ref: 00344855
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AddressFreeHandleLibraryModuleProc
              • String ID: CorExitProcess$mscoree.dll
              • API String ID: 4061214504-1276376045
              • Opcode ID: 4afa90b3d57aff34fa57842e43f4a55c7f3796d0ed474e330a5c89567c99a329
              • Instruction ID: d447459a6f128687283b7cd644a558b30aea131a7c40974345d05e02c1770b4b
              • Opcode Fuzzy Hash: 4afa90b3d57aff34fa57842e43f4a55c7f3796d0ed474e330a5c89567c99a329
              • Instruction Fuzzy Hash: 95F06830901608BBCB139F90EC19B9EBFB8EF45751F418175F805A61A0DBB15E41CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 1fb7d84b822ccb852fc09d48393e8b6217805fd3af1dcb0f0fedf37d52ea6e8f
              • Instruction ID: 5c40f4a82ccb6f1993d221f322ca06b065b64f0bbae40e38486e239da12b49e9
              • Opcode Fuzzy Hash: 1fb7d84b822ccb852fc09d48393e8b6217805fd3af1dcb0f0fedf37d52ea6e8f
              • Instruction Fuzzy Hash: 8771AE31900256ABCB22CF58C884EBFBBB9EF51352F154269EC517B1A1DF708D4AC7A1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: AdjustPointer$_abort
              • String ID:
              • API String ID: 2252061734-0
              • Opcode ID: 12563fb50efed3432d202020749fc82ae49c414a62cbeab34db3e2803ad60c7e
              • Instruction ID: 9e9ad17d21c1835a33669c9407c40d71a2e5047d66967b5217d9c5284a316cb1
              • Opcode Fuzzy Hash: 12563fb50efed3432d202020749fc82ae49c414a62cbeab34db3e2803ad60c7e
              • Instruction Fuzzy Hash: E95128B6A006069FDB279F10E8C2BBAB3B4FF44714F15412DE9565B5A1D731EC41CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 0034D554
                • Part of subcall function 00347740: HeapFree.KERNEL32(00000000,00000000), ref: 00347756
                • Part of subcall function 00347740: GetLastError.KERNEL32(00000596,?,0034D7FA,00000596,00000000,00000596,00000000,?,0034DA9E,00000596,00000007,00000596,?,0034DFB6,00000596,00000596), ref: 00347768
              • _free.LIBCMT ref: 0034D566
              • _free.LIBCMT ref: 0034D578
              • _free.LIBCMT ref: 0034D58A
              • _free.LIBCMT ref: 0034D59C
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 74683f9a04ac0567c1dfd43e57e14071c798fccb1dec5c052f505d0132d06000
              • Instruction ID: 5cdb607a0695189410ba9de19c78691b02443e3010b80ef587456d75e7f2709b
              • Opcode Fuzzy Hash: 74683f9a04ac0567c1dfd43e57e14071c798fccb1dec5c052f505d0132d06000
              • Instruction Fuzzy Hash: F6F036325086106B8623EB6AF5CAC2B77DDAA06714BA65C85F189DF551CF70FC80CA54
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00336707
                • Part of subcall function 0033793B: GetFileAttributesW.KERNEL32(0031876B,00000001,?,0031876B,?), ref: 0033794E
              • GlobalAlloc.KERNEL32(00000040,00000000,?,?), ref: 003367BC
              • GlobalFree.KERNEL32(00000000), ref: 00336857
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Global$AllocAttributesFileFreeH_prolog3_
              • String ID: %d.%d.%d.%d
              • API String ID: 965710651-3491811756
              • Opcode ID: d24c0885f44b4bb1d5cd503fe310e873f591944d0d5c0ded0045ecd1b37fc16b
              • Instruction ID: b5ad5f186d80d8a9914740ee0336f4fa7e1bf9dfaf6eebfd97eb23445eb2a35c
              • Opcode Fuzzy Hash: d24c0885f44b4bb1d5cd503fe310e873f591944d0d5c0ded0045ecd1b37fc16b
              • Instruction Fuzzy Hash: 2141B671900629BFCB229F549CD9AEAB7B8AF58310F4541D9F90CAB151DB309E818F64
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\aMail_Ver1.exe,00000104), ref: 00344069
              • _free.LIBCMT ref: 00344134
              • _free.LIBCMT ref: 0034413E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free$FileModuleName
              • String ID: C:\Users\user\Desktop\aMail_Ver1.exe
              • API String ID: 2506810119-3790761183
              • Opcode ID: f13ec69ecc7c9b842da91980f3d4e06e8fa0ecd1c0229ae3e9b7815f2a58bb15
              • Instruction ID: fc13757cc5443f99f0db49ca0f3e7b7a9776ba8a18213afbcc2e8c5db5908c7d
              • Opcode Fuzzy Hash: f13ec69ecc7c9b842da91980f3d4e06e8fa0ecd1c0229ae3e9b7815f2a58bb15
              • Instruction Fuzzy Hash: 3F316471A04218AFDB23DF99DC85A9EBBFCEB95310F118076E5049F211D7B06E80CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 003370AE
              • FormatMessageW.KERNEL32(00000500,?,00000000,00000000,?,00000000,?), ref: 0033719D
              • LocalFree.KERNEL32(?,?), ref: 003371B6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: FormatFreeH_prolog3_LocalMessage
              • String ID: \r\n
              • API String ID: 2435402305-1273924927
              • Opcode ID: 6eb560cbb31f1cf2cfeb0567deca56808d4e2cf95289c4ff5dd12d8a51358645
              • Instruction ID: a834043659303c8e95584016234019533dd12d813e2e19dc25d35f1545d279b3
              • Opcode Fuzzy Hash: 6eb560cbb31f1cf2cfeb0567deca56808d4e2cf95289c4ff5dd12d8a51358645
              • Instruction Fuzzy Hash: 9F318E71900218AADB26EB60CC86BEDB3F9BF48700F00C4E5E549A6190DE319F85CFD0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              • Result of checking conditions before installer checks for command '%s' is: , xrefs: 0031A210
              • Checking conditions before installer checks for command '%s', xrefs: 0031A1C6
              • @ 6, xrefs: 0031A228
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID: @ 6$Checking conditions before installer checks for command '%s'$Result of checking conditions before installer checks for command '%s' is:
              • API String ID: 2427045233-3845421497
              • Opcode ID: b37fe8ffda575e1a97b890ad2b835ac34d50a39df3f48a445178bec6d9844152
              • Instruction ID: 50cfe1c3120c6f325c786cf768f3d27cc7dc74c24f0d22cabdbd101279f12b54
              • Opcode Fuzzy Hash: b37fe8ffda575e1a97b890ad2b835ac34d50a39df3f48a445178bec6d9844152
              • Instruction Fuzzy Hash: 0C317371901504EBDF0ADFA8D891ADDB7B5BF4C300F058429E915FB291D7319D85CB22
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3.LIBCMT ref: 003181BB
                • Part of subcall function 00317E5D: __EH_prolog3_GS.LIBCMT ref: 00317E67
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3H_prolog3_
              • String ID: l26$p26$x66
              • API String ID: 3355343447-3321302052
              • Opcode ID: 672a6fbcb739517f80e709c4848f698808a9a8f38ac1c059add07dad0193058a
              • Instruction ID: 051f430d05503660d9155d78e17172c0ff987b3b5916f9db2b2c6ab194c86d85
              • Opcode Fuzzy Hash: 672a6fbcb739517f80e709c4848f698808a9a8f38ac1c059add07dad0193058a
              • Instruction Fuzzy Hash: E811E334945365DFCF03DFA4C856AEE7BB4BF19710F108928E8409B210CBB18A44CBE5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetVersionExW.KERNEL32(0000011C), ref: 00336D95
              • GetVersionExW.KERNEL32(0000011C), ref: 00336DBA
              • CompareStringW.KERNEL32(00000409,00000001,?,000000FF,Service Pack 6,000000FF), ref: 00336DED
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Version$CompareString
              • String ID: Service Pack 6
              • API String ID: 2665538635-3350390674
              • Opcode ID: b07bfd18ae41e7e7feb9fba78a858b57a09f620682a8a03a397207b5f42b5a9c
              • Instruction ID: 02a801a6140022118ddc8fa5e7c3934048b4ba5ae38768bc75d1438037da9be5
              • Opcode Fuzzy Hash: b07bfd18ae41e7e7feb9fba78a858b57a09f620682a8a03a397207b5f42b5a9c
              • Instruction Fuzzy Hash: 6811A370A0021CEFDF228F60DC56BD9B3BCAB09704F0082A5E554AA1C1E7B0DA44CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00336CBD
                • Part of subcall function 00338277: __EH_prolog3_catch_GS.LIBCMT ref: 00338281
              • GetSystemDirectoryW.KERNEL32 ref: 00336D19
              Strings
              • HKLM\Software\Microsoft\Windows\CurrentVersion\Installer, xrefs: 00336CE0
              • InstallerLocation, xrefs: 00336CDB
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: DirectoryH_prolog3_H_prolog3_catch_System
              • String ID: HKLM\Software\Microsoft\Windows\CurrentVersion\Installer$InstallerLocation
              • API String ID: 1341912231-3782479466
              • Opcode ID: 9f3a3243d2240c0004a50dda7a802b95052579c7d8da447e0c2c4eda4c12112c
              • Instruction ID: 7ceae556e23622902c02786e8b0116e52c993d0459a2c54babaf36c73b537e6e
              • Opcode Fuzzy Hash: 9f3a3243d2240c0004a50dda7a802b95052579c7d8da447e0c2c4eda4c12112c
              • Instruction Fuzzy Hash: AD01B570A00A18AECF26FBA0C8DBADE7338EB44300F5008A5B4499B191DE348EC9CE50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00346755: GetLastError.KERNEL32(?,?,0033EABC,?,?,?,0034138F,?,?,?,?), ref: 00346759
                • Part of subcall function 00346755: _free.LIBCMT ref: 0034678C
                • Part of subcall function 00346755: SetLastError.KERNEL32(00000000,?,?,?), ref: 003467CD
                • Part of subcall function 00346755: _abort.LIBCMT ref: 003467D3
              • _abort.LIBCMT ref: 0034C520
              • _free.LIBCMT ref: 0034C554
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast_abort_free
              • String ID: HGv$&6
              • API String ID: 289325740-2649336136
              • Opcode ID: e9b515a880945b0d551da03bfec78f34162de5276770608782630652c1baf7c7
              • Instruction ID: 81e964957ca5c199c003f303a839f5a6c7e61b420a269a6926ebbe3345b810e0
              • Opcode Fuzzy Hash: e9b515a880945b0d551da03bfec78f34162de5276770608782630652c1baf7c7
              • Instruction Fuzzy Hash: B301C031D13A299BC7A3AF6A840126EB3E0BF45B20F075289E454AF281CB707D418FC1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::ios_base::failure::failure.LIBCPMT ref: 00320E07
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: std::ios_base::failure::failure
              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
              • API String ID: 2264918676-1866435925
              • Opcode ID: 27b08b022147db407292bf676a16798e53d36455a0ed5889e2827b1d8ad685f5
              • Instruction ID: 164d45949c428fda9887b60246f0354135afc2a6a69f15ab091bd2221686c6f8
              • Opcode Fuzzy Hash: 27b08b022147db407292bf676a16798e53d36455a0ed5889e2827b1d8ad685f5
              • Instruction Fuzzy Hash: B2F04CB2C00228AFDB1AD684EC12FEAB3984B04710F158414EB006F0C7E668AE49C790
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00337E17: GetSystemDirectoryW.KERNEL32 ref: 00337E54
                • Part of subcall function 00337E17: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00337E8F
                • Part of subcall function 00337E17: LoadLibraryW.KERNEL32(00000001), ref: 00337EB1
              • GetProcAddress.KERNEL32(00000000,crypt32.dll,?,00000003,?,00339117,00000000), ref: 003364F5
              • FreeLibrary.KERNEL32(00000000,?,00339117,00000000), ref: 0033650F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: DirectoryLibrary$AddressFreeLoadProcSystemWindows
              • String ID: CertFreeCertificateContext$crypt32.dll
              • API String ID: 2033963604-2264772026
              • Opcode ID: e40e3f0ae57d8e4c012dc8842738225140bdc0a5a4125a367716df2d3877f261
              • Instruction ID: 1c9e621b6ec7eb60464618fd86527158947965d20ea854e08aab695c57d214c6
              • Opcode Fuzzy Hash: e40e3f0ae57d8e4c012dc8842738225140bdc0a5a4125a367716df2d3877f261
              • Instruction Fuzzy Hash: 03E08635142A58AFDB132B29DC4DBAE7EADDFC2752F158034F84882250DBB48D51C6A1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: 37e111643f5cb328f9fdde8f341732d831e6b3b40d05f66e7197d135da6c4617
              • Instruction ID: f96d252efd48d28d859d4c178f73071c03ae343ba61411db66e39138f67afa66
              • Opcode Fuzzy Hash: 37e111643f5cb328f9fdde8f341732d831e6b3b40d05f66e7197d135da6c4617
              • Instruction Fuzzy Hash: 4E413D31A04100EBEF236BB9AC46FAE3BE8DF41731F150657FC18DE1A1D7B4584492A2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • MultiByteToWideChar.KERNEL32(?,00000000,21E85006,00341A5E,00000000,00000000,00342A9F,?,00342A9F,?,00000001,00341A5E,21E85006,00000001,00342A9F,00342A9F), ref: 0034DCD1
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0034DD5A
              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0034DD6C
              • __freea.LIBCMT ref: 0034DD75
                • Part of subcall function 00349F5D: RtlAllocateHeap.NTDLL(00000000,00313FDD,00313FD9,?,0033AEB0,00313FDF,00313FD9,003371CA,?,?,0031D95A,?,00313FDD,00313FD9), ref: 00349F8F
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
              • String ID:
              • API String ID: 2652629310-0
              • Opcode ID: fb7b007dbdd02b2597ec0f725d036579c61009a7d5eab47ef663458931094ec0
              • Instruction ID: 7d8b594e2f66cb209f21af91c8a521fb750044b1c0c5e41477bfc16544e477f1
              • Opcode Fuzzy Hash: fb7b007dbdd02b2597ec0f725d036579c61009a7d5eab47ef663458931094ec0
              • Instruction Fuzzy Hash: 7A31AE72A0060AABDF26DF64DC85DAE7BA9EF01710F154268FC14DB190E735ED50CBA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: System$Metrics$InfoParametersRectWindow
              • String ID:
              • API String ID: 1941969595-0
              • Opcode ID: 72339d02a0dcbfc5e71b89923e285363b8dff3078ff4edcb56da071790a2fb18
              • Instruction ID: b100ccde43019ea8ef4bb6f404eced75c5bc6d65148ccedfa2f64080ebbe927d
              • Opcode Fuzzy Hash: 72339d02a0dcbfc5e71b89923e285363b8dff3078ff4edcb56da071790a2fb18
              • Instruction Fuzzy Hash: 5D31A2B5E0420A9FCB09CFA8D9959AEBBF8FB08300F50856DE515E7340D775AA018B64
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetDlgItem.USER32(00000002,?), ref: 003346C7
              • GetWindowRect.USER32(00000000,00000000), ref: 003346E6
              • ScreenToClient.USER32(00000002,00333B36), ref: 00334703
              • MoveWindow.USER32(00000000,?,?,00000000,?,00000000), ref: 00334727
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Window$ClientItemMoveRectScreen
              • String ID:
              • API String ID: 646222375-0
              • Opcode ID: a8e1caec5619763b02cb4de2ec06b810a245967b2118f16b98f865a0d6724dc4
              • Instruction ID: 63c54e7b056e397afbaa3abe5e9191c3618456d71cc5246f51ff570f21cf99ac
              • Opcode Fuzzy Hash: a8e1caec5619763b02cb4de2ec06b810a245967b2118f16b98f865a0d6724dc4
              • Instruction Fuzzy Hash: 6211D7B590060AAFCB01DFA9DD849AFBBFCFF08304F108529E515E3210D770AE018BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • MsgWaitForMultipleObjects.USER32 ref: 0033927B
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00339293
              • TranslateMessage.USER32(?), ref: 003392A1
              • DispatchMessageW.USER32(?), ref: 003392AB
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Message$DispatchMultipleObjectsPeekTranslateWait
              • String ID:
              • API String ID: 2231909638-0
              • Opcode ID: 30bc69f1f3d6323a37a323288cd1f90607f2a514d9e232789af97af975ecf440
              • Instruction ID: bfcaed407f8c7dbf6dcaf3bcb61f0dd441c92bd9fdfa2c2ce32d7c6c4003e95d
              • Opcode Fuzzy Hash: 30bc69f1f3d6323a37a323288cd1f90607f2a514d9e232789af97af975ecf440
              • Instruction Fuzzy Hash: 9A016D72A0151CFBCF11DBA5DD88EDFBBACAB09710F104926E501E6180DAB1DA0087A0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00333E1D: GetDlgItem.USER32(?,00000000), ref: 00333E34
              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00334CF8
              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00334D0F
              • SendMessageW.USER32(00000000,000000F4,00000000,00000001), ref: 00334D27
              • SendMessageW.USER32(00000000,000000F4,00000001,00000001), ref: 00334D41
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: MessageSend$Item
              • String ID:
              • API String ID: 3888421826-0
              • Opcode ID: 2ae2b05450568a185191e244de7e32ace6b1b11f47f0e6019b698bf0023fe72f
              • Instruction ID: 042f5c50acb2a8e9246488a6fa6dd8f35a4d57f7edbb512524a43833de34a7b1
              • Opcode Fuzzy Hash: 2ae2b05450568a185191e244de7e32ace6b1b11f47f0e6019b698bf0023fe72f
              • Instruction Fuzzy Hash: 0CF096B26403057BE72227A69C9DD3FB91DD7C2F64F408928F6159A192CDB54D118670
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3_GS.LIBCMT ref: 00333E55
              • GetDlgItem.USER32(?,0000040B), ref: 00333E65
              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00333E74
              • SendMessageW.USER32(00000000,0000000D,00000001,00000000), ref: 00333EA4
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: MessageSend$H_prolog3_Item
              • String ID:
              • API String ID: 4098331016-0
              • Opcode ID: 7b813ed82599fbb855830a3e633e4b321f618c776ca4341e05a6f50252c483c5
              • Instruction ID: 1e15228ef2bd3079101034040c03d3a12aa637423672e62aa28b1579d81fcbf5
              • Opcode Fuzzy Hash: 7b813ed82599fbb855830a3e633e4b321f618c776ca4341e05a6f50252c483c5
              • Instruction Fuzzy Hash: B0019232901629ABDB129FA0DD45AFFBB38EF09B10F108419F911BB191CB755A02CBE4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: Load$IconImageItemMessageSend
              • String ID:
              • API String ID: 1259760789-0
              • Opcode ID: 0ae3d6f7cef2bc59b409c1a6bf2165ccb30953445a6a01a7c2976c0f22ee76b8
              • Instruction ID: 55c20c00a806950ac528664fd116ec4b3322556b4a0502bc1d7f7094b53cde40
              • Opcode Fuzzy Hash: 0ae3d6f7cef2bc59b409c1a6bf2165ccb30953445a6a01a7c2976c0f22ee76b8
              • Instruction Fuzzy Hash: D1F08C30284B50BBE7220B34AC4EFB67A6CAB00B11F108924F665AD8E1C7E2B8408654
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,0034E8FC,?,00000050,?,?,?,?,?), ref: 0034E77C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID:
              • String ID: ACP$OCP
              • API String ID: 0-711371036
              • Opcode ID: d7078ee3f5675b8c08446a729b249d4b5f5825ecf3e8ad08142f63955e99d39d
              • Instruction ID: 577a72fd850e9a250a588126d923d7e4f38949604e8ad3ae96d663ce66bb112f
              • Opcode Fuzzy Hash: d7078ee3f5675b8c08446a729b249d4b5f5825ecf3e8ad08142f63955e99d39d
              • Instruction Fuzzy Hash: 0721C266A00100A6EB36CB588941BA776EAFF64B71F578564EA09DF200F732FE40C350
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3_
              • String ID: false$true
              • API String ID: 2427045233-2658103896
              • Opcode ID: 9fa7a4904ea06a6d7d0b5480ec11b8b5e7720fe8182bc0e9c51ec66b51e163a4
              • Instruction ID: 79bfc7d77b7c86d768843905c52debb6e6bd6964e76b2be193e421a8122a6349
              • Opcode Fuzzy Hash: 9fa7a4904ea06a6d7d0b5480ec11b8b5e7720fe8182bc0e9c51ec66b51e163a4
              • Instruction Fuzzy Hash: 17216031D14709AFDF06DFA8D8D29EEB3B9EF48300F118829F551FB150DA3499468B21
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 0034C106
                • Part of subcall function 00347740: HeapFree.KERNEL32(00000000,00000000), ref: 00347756
                • Part of subcall function 00347740: GetLastError.KERNEL32(00000596,?,0034D7FA,00000596,00000000,00000596,00000000,?,0034DA9E,00000596,00000007,00000596,?,0034DFB6,00000596,00000596), ref: 00347768
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorFreeHeapLast_free
              • String ID: HGv$&6
              • API String ID: 1353095263-2649336136
              • Opcode ID: d7359d6b12621be6a9d32b50011e0ff417e68a1e780a62deddeb8fe4ffdeefe5
              • Instruction ID: 47c0add27055344fb865fd5ba26ab9d11e0213109d54a05f7f44667b4254bf71
              • Opcode Fuzzy Hash: d7359d6b12621be6a9d32b50011e0ff417e68a1e780a62deddeb8fe4ffdeefe5
              • Instruction Fuzzy Hash: F621AD786006009FD316DF1DD881E9677E8EB5E314B128599F685CB3B2D7B1EC80CB94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetLastError.KERNEL32(00000000), ref: 00356057
              • CreateFileA.KERNEL32(?,?,?,?,?,?,?), ref: 00356082
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CreateErrorFileLast
              • String ID: _5
              • API String ID: 1214770103-2895911498
              • Opcode ID: 130b9209cea1b585b9eb77869db592e2f77686691eeea6a2e997b124ff64cc46
              • Instruction ID: 697674c5cea1703b6a62c3897145f1c13ade494b5ee3978e5b4573451baa59dc
              • Opcode Fuzzy Hash: 130b9209cea1b585b9eb77869db592e2f77686691eeea6a2e997b124ff64cc46
              • Instruction Fuzzy Hash: 2021EA7690122CDFCF22DF64DD55ADEB7B8BB09314F004599F909A7290D670AE94CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: H_prolog3
              • String ID: false$true
              • API String ID: 431132790-2658103896
              • Opcode ID: d08a7406b6fd0512b6628ce8eae5992b60d9c94a1e6ca649752076fe6bafcac8
              • Instruction ID: 4f2cad904a1dc8e605f4f164a0a7c4ade4fbdd9170f33851430817ddc72e4be8
              • Opcode Fuzzy Hash: d08a7406b6fd0512b6628ce8eae5992b60d9c94a1e6ca649752076fe6bafcac8
              • Instruction Fuzzy Hash: 8411C8B5D01744AFC716EFB4D48199BBBF8AF08300B00CC1AF5A5DB652E774AA488F61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CertVerifyCertificateChainPolicy.CRYPT32(00000007,00000000,0000000C,00000014), ref: 003378C9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: CertCertificateChainPolicyVerify
              • String ID: @ 6$Microsoft trusted cert
              • API String ID: 3930008701-3802765229
              • Opcode ID: 3ab4444217898ca264403c60dbae6398fb334ab5ae6fa309e6261cb064b48b76
              • Instruction ID: cf09f29c01cdbb3f46df4cb452150528557902892f0bf307094062918d1e0047
              • Opcode Fuzzy Hash: 3ab4444217898ca264403c60dbae6398fb334ab5ae6fa309e6261cb064b48b76
              • Instruction Fuzzy Hash: E801D671A0060CEFDF16CFA8C846BEEF7F8AF08704F008019D001A7180D7B89A44CB61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • VirtualQuery.KERNEL32(?,?,0000001C), ref: 00339B6F
              • GetSystemInfo.KERNEL32(?), ref: 00339B8A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: InfoQuerySystemVirtual
              • String ID: D
              • API String ID: 401686933-2746444292
              • Opcode ID: 8966f2e3609f1fdff8112dd245e9a130d4f8517a0febfe3a4ae4656f77c1125d
              • Instruction ID: ce587d9f02447fbb2a20555c17a122bcac326f2f95f2b7393916dae79b8a543e
              • Opcode Fuzzy Hash: 8966f2e3609f1fdff8112dd245e9a130d4f8517a0febfe3a4ae4656f77c1125d
              • Instruction Fuzzy Hash: 6B01F772600109ABDF14DE29DC45BDD7BAEAFC4328F0DC221ED19D7254D674D9018680
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetLastError.KERNEL32(00000000), ref: 00355FA1
              • BeginUpdateResourceA.KERNEL32(?,?), ref: 00355FB0
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: BeginErrorLastResourceUpdate
              • String ID: _5
              • API String ID: 2525094188-2895911498
              • Opcode ID: 53251fbc4f12d26fdb59fe19b79a79690f872876142d77b3edb4ce4be7ed9759
              • Instruction ID: cf300b34e2da6b50b0629424095664e6e837cae2a62e6795b86358cf589cf43f
              • Opcode Fuzzy Hash: 53251fbc4f12d26fdb59fe19b79a79690f872876142d77b3edb4ce4be7ed9759
              • Instruction Fuzzy Hash: E6018F7690211CEFCB12EF25DD55DDEB7BCAB89315F0144A8A806A7290DA70BF49CF60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetLastError.KERNEL32(00000000), ref: 0035610F
              • DeleteFileA.KERNEL32(?), ref: 0035611D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: DeleteErrorFileLast
              • String ID: _5
              • API String ID: 2018770650-2895911498
              • Opcode ID: 876494cf5b29e0cd718f9b0bbe165fd6b695fc8c81cc83d44493a9e992d06d9d
              • Instruction ID: 8aa4b20d89c3e83911251e0382260a88378a49e89fc8e442377cbad61b1ac470
              • Opcode Fuzzy Hash: 876494cf5b29e0cd718f9b0bbe165fd6b695fc8c81cc83d44493a9e992d06d9d
              • Instruction Fuzzy Hash: DE01A27690211C9BCB11EF24DD95DEE77BCAB49301F0104A9E906A7151DA70AF49CF50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __EH_prolog3.LIBCMT ref: 0031FD20
              • std::_Locinfo::~_Locinfo.LIBCPMT ref: 0031FD73
                • Part of subcall function 0031D7C5: __EH_prolog3.LIBCMT ref: 0031D7CC
                • Part of subcall function 0031D7C5: std::_Lockit::_Lockit.LIBCPMT ref: 0031D7D9
                • Part of subcall function 0031D7C5: std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0031D816
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: std::_$H_prolog3$LocinfoLocinfo::_Locinfo::~_Locinfo_ctorLockitLockit::_
              • String ID: 1
              • API String ID: 750191490-1195958421
              • Opcode ID: f632065bcca9693d49e5421b72289b0e1e9da1add35b7fb8da07a92ab6bd0afc
              • Instruction ID: 3a579ca426f87459065d4268821dba027455329e4b94ec82ac54398f8b1f5f03
              • Opcode Fuzzy Hash: f632065bcca9693d49e5421b72289b0e1e9da1add35b7fb8da07a92ab6bd0afc
              • Instruction Fuzzy Hash: 71F0C2719017168FD72BEF94D4927EEB370BF08B21F61462DA4856F285DB705E81C780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsValidLocale.KERNEL32(00000000,YQ4,00000000,00000001,?,?,00345159,?,?,?,?,00000004), ref: 00347CEA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: LocaleValid
              • String ID: IsValidLocaleName$YQ4
              • API String ID: 1901932003-85807621
              • Opcode ID: b1ca3109f01123c2e00b9d17db4152849a2881c234b5bcd3bc1a352f5de1aace
              • Instruction ID: 4dcb062b19aa51646a766aeda1880c798cc68230f1aa2b3ae579f3d03aed694b
              • Opcode Fuzzy Hash: b1ca3109f01123c2e00b9d17db4152849a2881c234b5bcd3bc1a352f5de1aace
              • Instruction Fuzzy Hash: E8F0BE30A45608B7CE13AB609C06FAFBBA9DB05B10F014566FE067E2D1CAB16D0186C4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00318146: LoadLibraryW.KERNEL32(mscoree.dll), ref: 0031815B
                • Part of subcall function 00318146: GetLastError.KERNEL32(?,?,0031665E,00000000), ref: 00318167
              • GetProcAddress.KERNEL32(00000000,CLRCreateInstance), ref: 0031666C
              • GetLastError.KERNEL32 ref: 00316678
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ErrorLast$AddressLibraryLoadProc
              • String ID: CLRCreateInstance
              • API String ID: 1866314245-2576948145
              • Opcode ID: e207a8358b781e36cd3c5955f822cde60611b5ac9736e5eb3dc77cbacb11a75a
              • Instruction ID: b5620392a3de328dd23d6b991062be1a1bdfbbff6caa2eb707dae4de5297a9c5
              • Opcode Fuzzy Hash: e207a8358b781e36cd3c5955f822cde60611b5ac9736e5eb3dc77cbacb11a75a
              • Instruction Fuzzy Hash: 21F08C35600229BBCF176BA5CC0ABDE7B6DAF047A5F114021FC05E5160CB75DA80EAA4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: DeleteObject
              • String ID: 83
              • API String ID: 1531683806-1866678815
              • Opcode ID: b8b05b96022834d09348321a9bf5bf1f4f7eaefa3a2207315830851197fc7450
              • Instruction ID: 15d20781459e8825d10d6b99559579b8009e94e8d4f9e2f98a6ab8a748d14c6e
              • Opcode Fuzzy Hash: b8b05b96022834d09348321a9bf5bf1f4f7eaefa3a2207315830851197fc7450
              • Instruction Fuzzy Hash: 3AE0BD71021B10CBDB324F15E88A352BAF4AF00716F114A2DD086048A4C3B4AADCDAD2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,00000000), ref: 00357CDF
              • GetLastError.KERNEL32 ref: 00357CED
              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 00357D48
              Memory Dump Source
              • Source File: 00000000.00000002.365656032.0000000000301000.00000020.00000001.01000000.00000003.sdmp, Offset: 00300000, based on PE: true
              • Associated: 00000000.00000002.365638888.0000000000300000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365707495.0000000000362000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365741113.0000000000365000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365776012.0000000000367000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.365810335.0000000000368000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_300000_aMail_Ver1.jbxd
              Similarity
              • API ID: ByteCharMultiWide$ErrorLast
              • String ID:
              • API String ID: 1717984340-0
              • Opcode ID: 1c94f30a569363839726a0e2f90e930165bd1e9ec911840f14a100eac7bb94c1
              • Instruction ID: 03457830aafc58c9ed6e11ccff890c04cb34a3da276c92b74f2312242e4e3a9b
              • Opcode Fuzzy Hash: 1c94f30a569363839726a0e2f90e930165bd1e9ec911840f14a100eac7bb94c1
              • Instruction Fuzzy Hash: 5241C735508206AFDB238F68E848FBA7BF4EF01312F154169EC595B1B1D7719D05CBA1
              Uniqueness

              Uniqueness Score: -1.00%