Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EDownloader.exe

Overview

General Information

Sample name:EDownloader.exe
Analysis ID:1431754
MD5:3d92268fec3c1cf2e0e29a47d22a79fb
SHA1:445c634e78ec63ccb3a39ee5f6e81a7b46f3a7e5
SHA256:20475e541ca6a061eb5dc587784b9a3910bda519ccfd8d009dfcb4fd60fff0b6
Infos:

Detection

Score:6
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to create an SMB header
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Potential key logger detected (key state polling based)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample searches for specific file, try point organization specific fake files to the analysis machine
  • System is w10x64
  • EDownloader.exe (PID: 3008 cmdline: "C:\Users\user\Desktop\EDownloader.exe" MD5: 3D92268FEC3C1CF2E0E29A47D22A79FB)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005E6300 GetLastError,CreateFileA,GetLastError,GetFileSizeEx,GetLastError,ReadFile,_strstr,_strstr,CryptQueryObject,CertAddCertificateContextToStore,CertFreeCertificateContext,GetLastError,GetLastError,GetLastError,CloseHandle,0_2_005E6300
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EA450 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_005EA450
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005CE400 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_005CE400
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005CE490 CryptAcquireContextA,CryptCreateHash,CryptHashData,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_005CE490
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EA580 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_005EA580
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005CF760 GetModuleHandleA,GetProcAddress,CertOpenStore,GetLastError,CryptStringToBinaryA,CertFindCertificateInStore,CertCloseStore,CertFreeCertificateContext,CertFreeCertificateContext,0_2_005CF760
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005D17C0 CryptAcquireContextA,CryptCreateHash,0_2_005D17C0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005D1800 CryptHashData,0_2_005D1800
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005D1820 CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_005D1820
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00525CD0 CreateFileW,CloseHandle,CryptAcquireContextW,CryptCreateHash,GetFileSize,ReadFile,CryptHashData,CloseHandle,CryptGetHashParam,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00525CD0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: -----BEGIN PUBLIC KEY-----0_2_005B83A0
Source: EDownloader.exeBinary or memory string: -----BEGIN PUBLIC KEY-----
Source: C:\Users\user\Desktop\EDownloader.exeCode function: mov dword ptr [ebx+04h], 424D53FFh0_2_005DCDB0
Source: EDownloader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: EDownloader.exeStatic PE information: certificate valid
Source: EDownloader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: D:\PackageDownloader\mmloader\main\EDownloader\Release\EDownloader.pdb source: EDownloader.exe
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_006119B2 FindFirstFileExW,0_2_006119B2
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984\COMCTL32.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984Jump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\SysWOW64\KERNELBASE.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097Jump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097\gdiplus.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\SysWOW64\KERNEL32.DLLJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005BED70 recv,WSAGetLastError,0_2_005BED70
Source: EDownloader.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: EDownloader.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
Source: EDownloader.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: EDownloader.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: EDownloader.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: EDownloader.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
Source: EDownloader.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: EDownloader.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: EDownloader.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
Source: EDownloader.exeString found in binary or memory: http://ocsp.digicert.com0
Source: EDownloader.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: EDownloader.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: EDownloader.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: EDownloader.exeString found in binary or memory: http://www.digicert.com/CPS0
Source: EDownloader.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: EDownloader.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html#
Source: EDownloader.exeString found in binary or memory: https://www.baidu.com/
Source: EDownloader.exeString found in binary or memory: https://www.google.com/
Source: EDownloader.exeString found in binary or memory: https://www.google.com/https://www.baidu.com/GMT
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005584C0 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_005584C0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00558FB0 PeekMessageW,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetTickCount,_wcsstr,GetKeyState,0_2_00558FB0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EA580 CryptAcquireContextA,CryptImportKey,CryptReleaseContext,CryptEncrypt,CryptDestroyKey,CryptReleaseContext,0_2_005EA580
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005382B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_005382B0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F60650_2_005F6065
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005D00600_2_005D0060
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_006101790_2_00610179
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F21F10_2_005F21F1
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005BE2000_2_005BE200
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F62990_2_005F6299
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0057C2800_2_0057C280
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_006083260_2_00608326
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005A83100_2_005A8310
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005B03D00_2_005B03D0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0059C3F00_2_0059C3F0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005C23F00_2_005C23F0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005A84400_2_005A8440
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F64CD0_2_005F64CD
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F24AC0_2_005F24AC
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005724A00_2_005724A0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0056E5500_2_0056E550
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005A05400_2_005A0540
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005E45000_2_005E4500
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EC5000_2_005EC500
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005A25B00_2_005A25B0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005947D00_2_005947D0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005E28600_2_005E2860
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005608200_2_00560820
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005FC8EA0_2_005FC8EA
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005FE8E00_2_005FE8E0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0059E9500_2_0059E950
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005369D00_2_005369D0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00574AD00_2_00574AD0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00584AB00_2_00584AB0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005ECB000_2_005ECB00
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0059EC800_2_0059EC80
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00572DB00_2_00572DB0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0059CE500_2_0059CE50
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00618EE00_2_00618EE0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005CCF400_2_005CCF40
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0053F03F0_2_0053F03F
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005771500_2_00577150
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0057D11F0_2_0057D11F
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005591B00_2_005591B0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005732700_2_00573270
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_006172EC0_2_006172EC
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005A93700_2_005A9370
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005213800_2_00521380
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005A13800_2_005A1380
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005A33B00_2_005A33B0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_006174100_2_00617410
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005335700_2_00533570
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005595200_2_00559520
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_006156CA0_2_006156CA
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005CF7600_2_005CF760
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F17E00_2_005F17E0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005719100_2_00571910
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F190E0_2_005F190E
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00521A700_2_00521A70
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0055FAF00_2_0055FAF0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00613B670_2_00613B67
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0055DB100_2_0055DB10
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0059BB100_2_0059BB10
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005DDB300_2_005DDB30
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0057BBF00_2_0057BBF0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005E1C600_2_005E1C60
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F1C800_2_005F1C80
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EDDDB0_2_005EDDDB
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00591E700_2_00591E70
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0052BF700_2_0052BF70
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0056FF700_2_0056FF70
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F1F2A0_2_005F1F2A
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00585F900_2_00585F90
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005A6850 appears 54 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005BEB00 appears 319 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005CB6F0 appears 34 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 00522E90 appears 249 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005EF720 appears 68 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005F9D38 appears 52 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 00522BA0 appears 94 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005E83D0 appears 36 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 0052C890 appears 310 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005CB7A0 appears 80 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005BEBE0 appears 270 times
Source: C:\Users\user\Desktop\EDownloader.exeCode function: String function: 005C11F0 appears 36 times
Source: EDownloader.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean6.winEXE@2/1@0/0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005E3590 GetLastError,___swprintf_l,FormatMessageA,___swprintf_l,___swprintf_l,_strncpy,GetLastError,SetLastError,0_2_005E3590
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005382B0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_005382B0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00554FA0 CreateToolhelp32Snapshot,Process32FirstW,CloseHandle,Process32NextW,CloseHandle,0_2_00554FA0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0058F650 LoadLibraryW,GetProcAddress,CoCreateInstance,0_2_0058F650
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005639E0 GetWindowLongW,SetWindowLongW,GetClientRect,SetWindowPos,GetModuleFileNameW,_wcsrchr,FindResourceW,LoadResource,FreeResource,SizeofResource,LockResource,FreeResource,MessageBoxW,ExitProcess,0_2_005639E0
Source: C:\Users\user\Desktop\EDownloader.exeFile created: C:\Users\user\Desktop\EasyLog.logJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeMutant created: NULL
Source: EDownloader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\EDownloader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: EDownloader.exeString found in binary or memory: 0123456789abcdef%d.%d.%d.%dkernel32LoadLibraryExA\/AddDllDirectoryschannel
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeSection loaded: textshaping.dllJump to behavior
Source: EDownloader.exeStatic PE information: certificate valid
Source: EDownloader.exeStatic file information: File size 1327952 > 1048576
Source: EDownloader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: EDownloader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: EDownloader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: EDownloader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: EDownloader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: EDownloader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: EDownloader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: EDownloader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: D:\PackageDownloader\mmloader\main\EDownloader\Release\EDownloader.pdb source: EDownloader.exe
Source: EDownloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EDownloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EDownloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EDownloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EDownloader.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005287D0 RegCreateKeyExA,RegSetValueExA,RegCloseKey,LoadLibraryA,GetProcAddress,FreeLibrary,0_2_005287D0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EF5D5 push ecx; ret 0_2_005EF5E8
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EF766 push ecx; ret 0_2_005EF779
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005FB94E push ecx; iretd 0_2_005FB94F
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005581C0 GetWindowRect,GetParent,GetWindow,MonitorFromWindow,GetMonitorInfoW,IsIconic,GetWindowRect,SetWindowPos,0_2_005581C0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005591B0 IsIconic,ScreenToClient,SendMessageW,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SendMessageW,_TrackMouseEvent,GetTickCount,SendMessageW,SetFocus,SetCapture,GetTickCount,SetFocus,SetCapture,GetTickCount,ReleaseCapture,GetTickCount,SetFocus,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,0_2_005591B0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005591B0 IsIconic,ScreenToClient,SendMessageW,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SendMessageW,_TrackMouseEvent,GetTickCount,SendMessageW,SetFocus,SetCapture,GetTickCount,SetFocus,SetCapture,GetTickCount,ReleaseCapture,GetTickCount,SetFocus,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,0_2_005591B0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005591B0 IsIconic,ScreenToClient,SendMessageW,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SendMessageW,_TrackMouseEvent,GetTickCount,SendMessageW,SetFocus,SetCapture,GetTickCount,SetFocus,SetCapture,GetTickCount,ReleaseCapture,GetTickCount,SetFocus,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,0_2_005591B0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00563400 IsIconic,0_2_00563400
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00525500 GetWindowLongW,SetWindowLongW,IsIconic,ScreenToClient,GetClientRect,IsIconic,GetWindowRect,OffsetRect,CreateRoundRectRgn,SetWindowRgn,DeleteObject,CallWindowProcW,0_2_00525500
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00525500 GetWindowLongW,SetWindowLongW,IsIconic,ScreenToClient,GetClientRect,IsIconic,GetWindowRect,OffsetRect,CreateRoundRectRgn,SetWindowRgn,DeleteObject,CallWindowProcW,0_2_00525500
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00563820 IsIconic,GetWindowRect,OffsetRect,CreateRoundRectRgn,SetWindowRgn,DeleteObject,0_2_00563820
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EDDDB GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_005EDDDB
Source: C:\Users\user\Desktop\EDownloader.exeAPI coverage: 2.3 %
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_006119B2 FindFirstFileExW,0_2_006119B2
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984\COMCTL32.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984Jump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\SysWOW64\KERNELBASE.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097Jump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097\gdiplus.dllJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeFile opened: C:\Windows\SysWOW64\KERNEL32.DLLJump to behavior
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EF77B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005EF77B
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005287D0 RegCreateKeyExA,RegSetValueExA,RegCloseKey,LoadLibraryA,GetProcAddress,FreeLibrary,0_2_005287D0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0060FAEA mov eax, dword ptr fs:[00000030h]0_2_0060FAEA
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0060FB30 mov eax, dword ptr fs:[00000030h]0_2_0060FB30
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00605E63 mov eax, dword ptr fs:[00000030h]0_2_00605E63
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EEB22 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_005EEB22
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EF77B IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005EF77B
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005EF90E SetUnhandledExceptionFilter,0_2_005EF90E
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005F3FEE IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_005F3FEE
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0059E130 cpuid 0_2_0059E130
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,0_2_006140C0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: EnumSystemLocalesW,0_2_0060C26F
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetLocaleInfoW,MultiByteToWideChar,GetVersionExW,IsWindow,PostMessageW,0_2_0054C350
Source: C:\Users\user\Desktop\EDownloader.exeCode function: EnumSystemLocalesW,0_2_00614366
Source: C:\Users\user\Desktop\EDownloader.exeCode function: EnumSystemLocalesW,0_2_006143B1
Source: C:\Users\user\Desktop\EDownloader.exeCode function: EnumSystemLocalesW,0_2_0061444C
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_006144D7
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetLocaleInfoW,0_2_0061472C
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00614854
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetLocaleInfoW,0_2_0060C822
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetLocaleInfoW,0_2_0061495C
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_00614A2F
Source: C:\Users\user\Desktop\EDownloader.exeCode function: GetLocaleInfoW,0_2_005394D0
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0060C861 GetSystemTimeAsFileTime,0_2_0060C861
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_00526920 GetUserNameW,LookupAccountNameW,IsValidSid,GetSidIdentifierAuthority,GetSidSubAuthorityCount,GetSidSubAuthority,0_2_00526920
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0060EC7B _free,_free,_free,GetTimeZoneInformation,_free,0_2_0060EC7B
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_0054C350 GetLocaleInfoW,MultiByteToWideChar,GetVersionExW,IsWindow,PostMessageW,0_2_0054C350
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005C0240 htons,htons,bind,htons,bind,getsockname,WSAGetLastError,WSAGetLastError,0_2_005C0240
Source: C:\Users\user\Desktop\EDownloader.exeCode function: 0_2_005DF6C0 bind,WSAGetLastError,0_2_005DF6C0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
Access Token Manipulation
1
Masquerading
1
Input Capture
2
System Time Discovery
1
Exploitation of Remote Services
1
Input Capture
2
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Access Token Manipulation
LSASS Memory1
Security Software Discovery
Remote Desktop Protocol12
Archive Collected Data
1
Ingress Tool Transfer
Exfiltration Over Bluetooth1
System Shutdown/Reboot
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS1
Application Window Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA Secrets1
Account Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
System Owner/User Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync2
File and Directory Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem23
System Information Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EDownloader.exe0%ReversingLabs
EDownloader.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.google.com/https://www.baidu.com/GMTEDownloader.exefalse
    high
    https://www.google.com/EDownloader.exefalse
      high
      https://curl.haxx.se/docs/http-cookies.htmlEDownloader.exefalse
        high
        https://curl.haxx.se/docs/http-cookies.html#EDownloader.exefalse
          high
          https://www.baidu.com/EDownloader.exefalse
            high
            No contacted IP infos
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1431754
            Start date and time:2024-04-25 18:17:19 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 2m 47s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:2
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:EDownloader.exe
            Detection:CLEAN
            Classification:clean6.winEXE@2/1@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 35
            • Number of non-executed functions: 213
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe
            • Report size exceeded maximum capacity and may have missing disassembly code.
            No simulations
            No context
            No context
            No context
            No context
            No context
            Process:C:\Users\user\Desktop\EDownloader.exe
            File Type:ASCII text, with CRLF line terminators
            Category:dropped
            Size (bytes):113
            Entropy (8bit):4.9697947247990175
            Encrypted:false
            SSDEEP:3:bRAv+OwnvQNOo2yjEQdVMcLvQNOo2yn:bb34jT7HL4jX
            MD5:FF0DA2AA2413F1F278FFD795A4293747
            SHA1:2E10D553A646C21CFA8F0F07BDB54423F6A724DC
            SHA-256:EA9DF83AB19A8C46D7E6604C2DC87511F99044A2B0161D547CA68FD2D3EF680E
            SHA-512:D18960256B89CF86759F2EF96CD95A8A8AFC4EC3F9FE6D7DCAC220ED6C4BEFB733BA730BFD5A86C96C1D4C892384FB07E0FD4119173850548E663E0867761977
            Malicious:false
            Reputation:low
            Preview:ParseCmdLine param=...[2024.04.25 19:24:51 Thursday]..Install recomand ErrCode=3.[2024.04.25 19:24:51 Thursday]..
            File type:PE32 executable (GUI) Intel 80386, for MS Windows
            Entropy (8bit):6.591503398666959
            TrID:
            • Win32 Executable (generic) a (10002005/4) 99.96%
            • Generic Win/DOS Executable (2004/3) 0.02%
            • DOS Executable Generic (2002/1) 0.02%
            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
            File name:EDownloader.exe
            File size:1'327'952 bytes
            MD5:3d92268fec3c1cf2e0e29a47d22a79fb
            SHA1:445c634e78ec63ccb3a39ee5f6e81a7b46f3a7e5
            SHA256:20475e541ca6a061eb5dc587784b9a3910bda519ccfd8d009dfcb4fd60fff0b6
            SHA512:d378a3def28412392e4b7426e53d6c2154c1b59c85815559843084d8381f91761cf0d7fd58b88014c69ee3ef215402217249b82e4a64c00dd5dce9674beabc31
            SSDEEP:24576:95ZO2T67qsf6EbDOt20wjgrccMT8wGo20zd:927UdrccNwGo20zd
            TLSH:69558E617D42C172E1910170AEBFAFB6996DB5380B3540DBA7C00D3E9530AD2BA35B7B
            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$........".;.C.h.C.h.C.h.%.i.C.h.%.i C.h.%.i.C.ht..h.C.h.+.i.C.h.+.i.C.h.+.i.C.h.%.i.C.h.%.i.C.h.C.hPB.h.%.i.C.hO*.i.C.hO*9h.C.h.CQh.C.
            Icon Hash:00928e8e8686b000
            Entrypoint:0x4cef5e
            Entrypoint Section:.text
            Digitally signed:true
            Imagebase:0x400000
            Subsystem:windows gui
            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
            Time Stamp:0x657FECEB [Mon Dec 18 06:55:39 2023 UTC]
            TLS Callbacks:
            CLR (.Net) Version:
            OS Version Major:6
            OS Version Minor:0
            File Version Major:6
            File Version Minor:0
            Subsystem Version Major:6
            Subsystem Version Minor:0
            Import Hash:83b999c43d5940cad2066ca37770b561
            Signature Valid:true
            Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
            Signature Validation Error:The operation completed successfully
            Error Number:0
            Not Before, Not After
            • 30/08/2022 02:00:00 03/10/2025 01:59:59
            Subject Chain
            • CN="CHENGDU YIWO Tech Development Co., Ltd.", O="CHENGDU YIWO Tech Development Co., Ltd.", L=\u6210\u90fd\u5e02, S=\u56db\u5ddd\u7701, C=CN
            Version:3
            Thumbprint MD5:A9CA0963936C7546B2348E650C8D8514
            Thumbprint SHA-1:8F5F832BA07AE78DC635886D20042C21300D5DB9
            Thumbprint SHA-256:8A6407872F4E2E95BB570B1751BED91D0B9D0BC90643F8F9E505374BF77519AB
            Serial:0AB53526DD9E3F80814952E212FFB1C4
            Instruction
            call 00007F616CE8BC39h
            jmp 00007F616CE8AEBFh
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            int3
            push edi
            push esi
            push ebx
            xor edi, edi
            mov eax, dword ptr [esp+14h]
            or eax, eax
            jnl 00007F616CE8B056h
            inc edi
            mov edx, dword ptr [esp+10h]
            neg eax
            neg edx
            sbb eax, 00000000h
            mov dword ptr [esp+14h], eax
            mov dword ptr [esp+10h], edx
            mov eax, dword ptr [esp+1Ch]
            or eax, eax
            jnl 00007F616CE8B056h
            inc edi
            mov edx, dword ptr [esp+18h]
            neg eax
            neg edx
            sbb eax, 00000000h
            mov dword ptr [esp+1Ch], eax
            mov dword ptr [esp+18h], edx
            or eax, eax
            jne 00007F616CE8B05Ah
            mov ecx, dword ptr [esp+18h]
            mov eax, dword ptr [esp+14h]
            xor edx, edx
            div ecx
            mov ebx, eax
            mov eax, dword ptr [esp+10h]
            div ecx
            mov edx, ebx
            jmp 00007F616CE8B083h
            mov ebx, eax
            mov ecx, dword ptr [esp+18h]
            mov edx, dword ptr [esp+14h]
            mov eax, dword ptr [esp+10h]
            shr ebx, 1
            rcr ecx, 1
            shr edx, 1
            rcr eax, 1
            or ebx, ebx
            jne 00007F616CE8B036h
            div ecx
            mov esi, eax
            mul dword ptr [esp+1Ch]
            mov ecx, eax
            mov eax, dword ptr [esp+18h]
            mul esi
            add edx, ecx
            jc 00007F616CE8B050h
            cmp edx, dword ptr [esp+14h]
            jnbe 00007F616CE8B04Ah
            jc 00007F616CE8B049h
            cmp eax, dword ptr [esp+10h]
            jbe 00007F616CE8B043h
            dec esi
            xor edx, edx
            mov eax, esi
            dec edi
            jne 00007F616CE8B049h
            neg edx
            neg eax
            sbb edx, 00000000h
            pop ebx
            pop esi
            pop edi
            retn 0010h
            int3
            int3
            int3
            int3
            int3
            int3
            push ecx
            lea ecx, dword ptr [esp+04h]
            NameVirtual AddressVirtual Size Is in Section
            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IMPORT0x13186c0x118.rdata
            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1380000x5f0.rsrc
            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
            IMAGE_DIRECTORY_ENTRY_SECURITY0x141a000x2950.reloc
            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1390000xc230.reloc
            IMAGE_DIRECTORY_ENTRY_DEBUG0x126f300x70.rdata
            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
            IMAGE_DIRECTORY_ENTRY_TLS0x1270400x18.rdata
            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x126fa00x40.rdata
            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_IAT0x1010000x6c0.rdata
            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
            .text0x10000xffb3b0xffc00800a547f152deb58dcc7637bebfe7b21False0.48263761608015643data6.521448412368595IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            .rdata0x1010000x32bde0x32c008f7afa3ae6070acb034335b4e2bae657False0.3848041102216749DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.0000005.367310260450011IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .data0x1340000x39a40x24004b0958377ef3c5000d2a7ace9f05b544False0.19813368055555555data3.9789298039521968IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
            .rsrc0x1380000x5f00x6001752197a1bbfd2bf6b2ae489af36291fFalse0.4765625data4.544009189321645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
            .reloc0x1390000xc2300xc4008822af14128603b305d1eb503da79d4fFalse0.5656688456632653data6.587363980280129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
            NameRVASizeTypeLanguageCountryZLIB Complexity
            RT_MENU0x1381800x50dataChineseChina0.8375
            RT_DIALOG0x1381e00x12cdataChineseChina0.61
            RT_STRING0x1383100x4cdataChineseChina0.6710526315789473
            RT_ACCELERATOR0x1381d00x10dataChineseChina1.25
            RT_MANIFEST0x1383600x28bXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5529953917050692
            DLLImport
            KERNEL32.dllIsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, SetStdHandle, GetFullPathNameW, HeapReAlloc, GetFileAttributesExW, FlushFileBuffers, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, HeapAlloc, HeapFree, GetConsoleCP, ReadConsoleW, GetConsoleMode, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, FileTimeToSystemTime, SystemTimeToTzSpecificLocalTime, GetFileInformationByHandle, GetDriveTypeW, GetModuleFileNameA, SetEnvironmentVariableW, RtlUnwind, InitializeSListHead, GetCommandLineA, GetCurrentProcessId, QueryPerformanceCounter, GetStartupInfoW, IsDebuggerPresent, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, ResetEvent, SetEvent, GetCPInfo, LCMapStringW, CompareStringW, GetSystemTimeAsFileTime, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, SwitchToThread, CreateEventW, EncodePointer, GetStringTypeW, GetProcessHeap, HeapSize, GetFileSizeEx, CreateFileA, FormatMessageA, SetLastError, PeekNamedPipe, GetStdHandle, ExpandEnvironmentStringsA, VerifyVersionInfoA, GetModuleHandleA, GetSystemDirectoryA, VerSetConditionMask, GetOEMCP, GetCommandLineW, GetEnvironmentStringsW, GetCurrentThreadId, FreeEnvironmentStringsW, WaitForSingleObjectEx, GetTickCount64, SleepEx, LeaveCriticalSection, LoadLibraryW, GetPrivateProfileStringA, GetLocaleInfoW, Sleep, EnterCriticalSection, WaitForMultipleObjects, DecodePointer, DeleteCriticalSection, InitializeCriticalSectionEx, RaiseException, WaitForSingleObject, SetEndOfFile, SetFilePointerEx, OutputDebugStringW, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, DosDateTimeToFileTime, GetFileType, SystemTimeToFileTime, DuplicateHandle, WriteFile, InitializeCriticalSectionAndSpinCount, ExitProcess, LockResource, SizeofResource, FreeResource, LoadResource, FindResourceW, GetACP, GetTickCount, GetCurrentDirectoryW, GetUserDefaultUILanguage, CreateMutexW, TerminateProcess, OpenProcess, Process32NextW, Process32FirstW, CreateToolhelp32Snapshot, ReleaseMutex, GetModuleHandleW, OutputDebugStringA, LoadLibraryExW, GetLocalTime, CreateDirectoryW, GetEnvironmentVariableW, SetFilePointer, DeleteFileW, GetTempPathW, MultiByteToWideChar, GetSystemInfo, GetTimeZoneInformation, CreateThread, FreeLibrary, GetProcAddress, LoadLibraryA, GetVersionExW, GetCurrentProcess, GetExitCodeProcess, GetLastError, CreateProcessW, ReadFile, GetFileSize, CloseHandle, CreateFileW, GetModuleFileNameW, WideCharToMultiByte, MoveFileExW, WriteConsoleW
            USER32.dllGetWindowLongW, SetWindowLongW, IsIconic, ScreenToClient, SendMessageW, LoadImageW, GetParent, DestroyWindow, InvalidateRgn, GetClientRect, GetWindowRect, SetWindowRgn, MsgWaitForMultipleObjects, PeekMessageW, TranslateMessage, DispatchMessageW, ExitWindowsEx, GetSystemMetrics, KillTimer, CreateAcceleratorTableW, ClientToScreen, PtInRect, SetTimer, PostQuitMessage, MoveWindow, GetWindowDC, ReleaseDC, FindWindowW, IsWindow, SetForegroundWindow, SetFocus, GetDC, DefWindowProcW, CreateWindowExW, ShowWindow, GetWindow, EnableWindow, GetMessageW, GetMonitorInfoW, MonitorFromWindow, SetWindowPos, LoadCursorW, RegisterClassW, GetClassInfoExW, RegisterClassExW, CallWindowProcW, SetPropW, GetPropW, PostMessageW, AdjustWindowRectEx, GetGUIThreadInfo, IsZoomed, GetWindowTextW, GetWindowTextLengthW, SetWindowTextW, GetCaretBlinkTime, GetSysColor, SetCaretPos, GetCaretPos, HideCaret, ShowCaret, CreateCaret, CharPrevW, SetRect, DrawTextW, FillRect, MessageBoxW, SetCursor, wvsprintfW, OffsetRect, CharNextW, ReleaseCapture, GetMenu, GetKeyState, GetActiveWindow, BeginPaint, EndPaint, IsRectEmpty, GetUpdateRect, IsWindowVisible, IntersectRect, MapWindowPoints, GetCursorPos, GetFocus, InvalidateRect, UnionRect, SetCapture
            GDI32.dllCombineRgn, ExtSelectClipRgn, CreateRectRgnIndirect, GetClipBox, SelectClipRgn, GetObjectA, GetTextMetricsW, SetWindowOrgEx, Rectangle, RestoreDC, BitBlt, SaveDC, CreateDIBSection, CreateCompatibleDC, DeleteDC, CreatePen, CreateFontIndirectW, GetStockObject, GetObjectW, GetTextExtentPoint32W, CreateFontW, GetTextExtentPointW, SelectObject, DeleteObject, CreateRoundRectRgn, StretchBlt, SetStretchBltMode, SetBkColor, ExtTextOutW, CreateSolidBrush, CreatePenIndirect, MoveToEx, LineTo, RoundRect, SetBkMode, SetTextColor, GetCharABCWidthsW, TextOutW, GdiFlush, GetDeviceCaps, CreateCompatibleBitmap, CreatePatternBrush
            ADVAPI32.dllRegOpenKeyExW, RegEnumKeyExW, RegSetValueExA, RegCreateKeyExA, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, GetSidSubAuthority, GetSidSubAuthorityCount, GetSidIdentifierAuthority, IsValidSid, LookupAccountNameW, GetUserNameW, RegCloseKey, RegQueryValueExW, CryptReleaseContext, CryptDestroyHash, CryptGetHashParam, CryptHashData, CryptCreateHash, CryptAcquireContextW, CryptGenRandom, CryptDestroyKey, CryptImportKey, CryptEncrypt, CryptAcquireContextA
            SHELL32.dllSHBrowseForFolderW, ShellExecuteW, SHGetSpecialFolderPathW, SHGetSpecialFolderLocation, SHGetPathFromIDListW
            ole32.dllCreateStreamOnHGlobal, CoCreateInstance, CLSIDFromProgID, CLSIDFromString, CoUninitialize, CoInitialize, OleLockRunning, CoCreateGuid
            OLEAUT32.dllVariantClear, VariantInit, SysAllocString, SysFreeString
            gdiplus.dllGdipAlloc, GdipLoadImageFromStream, GdipImageSelectActiveFrame, GdipGetImageHeight, GdipGetImageWidth, GdipGetPropertyItem, GdipGetPropertyItemSize, GdipImageGetFrameCount, GdipImageGetFrameDimensionsList, GdipImageGetFrameDimensionsCount, GdipDrawImage, GdipGraphicsClear, GdipDrawImageRectI, GdipDrawString, GdipGetFamily, GdipDeleteFontFamily, GdipSetPixelOffsetMode, GdipSetInterpolationMode, GdipSetCompositingQuality, GdipSetSmoothingMode, GdipGetImageGraphicsContext, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromScan0, GdipFree, GdipDeleteBrush, GdipCreateLineBrushI, GdipSetStringFormatAlign, GdipSetStringFormatLineAlign, GdipDeleteStringFormat, GdipCreateStringFormat, GdipSetTextRenderingHint, GdipDeleteGraphics, GdipCreateFromHDC, GdipDeleteFont, GdipCreateFontFromLogfontA, GdipCreateFontFromDC, GdiplusShutdown, GdiplusStartup
            COMCTL32.dll_TrackMouseEvent
            IMM32.dllImmGetContext, ImmSetCompositionFontW, ImmReleaseContext, ImmSetCompositionWindow
            CRYPT32.dllCryptQueryObject, CertGetNameStringA, CertAddCertificateContextToStore, CertFreeCertificateChainEngine, CertFreeCertificateContext, CertFindCertificateInStore, CertCloseStore, CertOpenStore, CertCreateCertificateChainEngine, CertGetCertificateChain, CryptStringToBinaryA, CertFreeCertificateChain
            WS2_32.dllconnect, ntohl, htonl, ioctlsocket, sendto, recvfrom, listen, accept, freeaddrinfo, getaddrinfo, WSAIoctl, socket, setsockopt, ntohs, htons, getsockopt, getsockname, getpeername, closesocket, bind, send, recv, WSASetLastError, select, __WSAFDIsSet, WSAGetLastError, WSACleanup, gethostname, WSAStartup
            WLDAP32.dll
            Language of compilation systemCountry where language is spokenMap
            ChineseChina
            EnglishUnited States
            No network behavior found

            Click to jump to process

            Click to jump to process

            Target ID:0
            Start time:18:18:05
            Start date:25/04/2024
            Path:C:\Users\user\Desktop\EDownloader.exe
            Wow64 process (32bit):true
            Commandline:"C:\Users\user\Desktop\EDownloader.exe"
            Imagebase:0x520000
            File size:1'327'952 bytes
            MD5 hash:3D92268FEC3C1CF2E0E29A47D22A79FB
            Has elevated privileges:true
            Has administrator privileges:true
            Programmed in:C, C++ or other language
            Reputation:low
            Has exited:true

            Reset < >

              Execution Graph

              Execution Coverage:2.2%
              Dynamic/Decrypted Code Coverage:0%
              Signature Coverage:15.2%
              Total number of Nodes:2000
              Total number of Limit Nodes:37
              execution_graph 106537 5fa2cf 106540 5fa149 106537->106540 106539 5fa2e1 106543 5fa155 ___BuildCatchObject 106540->106543 106541 5fa15c 106565 60228d 14 API calls __dosmaperr 106541->106565 106543->106541 106545 5fa17c 106543->106545 106544 5fa161 106566 5f419c 25 API calls SimpleUString::operator= 106544->106566 106547 5fa18e 106545->106547 106548 5fa181 106545->106548 106557 60d919 106547->106557 106567 60228d 14 API calls __dosmaperr 106548->106567 106551 5fa197 106552 5fa19e 106551->106552 106553 5fa1ab 106551->106553 106568 60228d 14 API calls __dosmaperr 106552->106568 106569 5fa1df LeaveCriticalSection _Xfiopen 106553->106569 106554 5fa16c _Atexit 106554->106539 106558 60d925 ___BuildCatchObject 106557->106558 106570 603d1b EnterCriticalSection 106558->106570 106560 60d933 106571 60d9b3 106560->106571 106564 60d964 _Atexit 106564->106551 106565->106544 106566->106554 106567->106554 106568->106554 106569->106554 106570->106560 106578 60d9d6 106571->106578 106572 60da30 106589 60c205 106572->106589 106577 60da42 106583 60d940 106577->106583 106604 60c921 6 API calls __Getctype 106577->106604 106578->106572 106578->106578 106578->106583 106587 5f9c1f EnterCriticalSection 106578->106587 106588 5f9c33 LeaveCriticalSection 106578->106588 106580 60da61 106605 5f9c1f EnterCriticalSection 106580->106605 106584 60d96f 106583->106584 106609 603d63 LeaveCriticalSection 106584->106609 106586 60d976 106586->106564 106587->106578 106588->106578 106590 60c212 106589->106590 106591 60c252 106590->106591 106592 60c23d HeapAlloc 106590->106592 106597 60c226 _strftime 106590->106597 106607 60228d 14 API calls __dosmaperr 106591->106607 106594 60c250 106592->106594 106592->106597 106595 60c257 106594->106595 106598 60aea3 106595->106598 106597->106591 106597->106592 106606 605adf EnterCriticalSection LeaveCriticalSection std::_Facet_Register 106597->106606 106599 60aed7 _free 106598->106599 106600 60aeae HeapFree 106598->106600 106599->106577 106600->106599 106601 60aec3 106600->106601 106608 60228d 14 API calls __dosmaperr 106601->106608 106603 60aec9 GetLastError 106603->106599 106604->106580 106605->106583 106606->106597 106607->106595 106608->106603 106609->106586 106610 521270 CreateMutexW 106613 5eea1f 106610->106613 106616 5ee9e4 28 API calls __onexit 106613->106616 106615 52128b 106616->106615 106617 521230 CreateMutexW 106618 5eea1f pre_c_initialization 28 API calls 106617->106618 106619 52124b 106618->106619 106620 522420 106645 522fe0 106620->106645 106624 52246f 106625 5224c7 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106624->106625 106627 5225df 106624->106627 106658 522bf0 106625->106658 106705 5f41ac 25 API calls 2 library calls 106627->106705 106628 5224f6 106669 5225f0 106628->106669 106632 5225e4 106706 5f41ac 25 API calls 2 library calls 106632->106706 106633 5234d0 26 API calls 106636 52251c 106633->106636 106635 5225e9 106707 5f41ac 25 API calls 2 library calls 106635->106707 106677 526110 CreateProcessW 106636->106677 106640 522556 106640->106632 106641 522585 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106640->106641 106641->106635 106642 5225bb std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106641->106642 106698 5ee388 106642->106698 106644 5225db 106646 523040 106645->106646 106646->106646 106708 523430 106646->106708 106648 523064 106649 5234d0 26 API calls 106648->106649 106650 523088 106649->106650 106651 5234d0 26 API calls 106650->106651 106652 522457 106651->106652 106653 5234d0 106652->106653 106654 52351d 106653->106654 106657 5234e5 BuildCatchObjectHelperInternal 106653->106657 106719 523670 26 API calls 4 library calls 106654->106719 106656 523530 106656->106624 106657->106624 106659 522c15 106658->106659 106660 522c1c 106659->106660 106661 522c52 106659->106661 106662 522c82 106659->106662 106660->106628 106720 5ee3a7 106661->106720 106664 5ee3a7 std::_Facet_Register 3 API calls 106662->106664 106666 522c77 _Yarn 106662->106666 106664->106666 106666->106628 106730 5f0910 106669->106730 106672 52264a _wcsrchr 106732 522e90 106672->106732 106674 52268e 106675 5ee388 _ValidateLocalCookies 5 API calls 106674->106675 106676 522502 106675->106676 106676->106633 106678 5261f5 GetExitCodeProcess 106677->106678 106679 5261bd GetLastError 106677->106679 106681 526242 CloseHandle CloseHandle 106678->106681 106682 52620d GetLastError 106678->106682 106747 52c890 106679->106747 106683 52c890 26 API calls 106681->106683 106685 52c890 26 API calls 106682->106685 106686 526293 106683->106686 106684 5261e6 106760 5a6850 106684->106760 106688 526236 106685->106688 106689 5a6850 116 API calls 106686->106689 106690 5a6850 116 API calls 106688->106690 106691 526298 106689->106691 106692 5261eb 106690->106692 106691->106692 106694 5262ca std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106692->106694 106808 5f41ac 25 API calls 2 library calls 106692->106808 106696 526314 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106694->106696 106809 5f41ac 25 API calls 2 library calls 106694->106809 106696->106640 106699 5ee393 IsProcessorFeaturePresent 106698->106699 106700 5ee391 106698->106700 106702 5eeb5e 106699->106702 106700->106644 107826 5eeb22 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 106702->107826 106704 5eec41 106704->106644 106709 523441 106708->106709 106713 5234a5 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106708->106713 106710 52344a 106709->106710 106709->106713 106714 523464 _Yarn 106709->106714 106717 523540 26 API calls 4 library calls 106710->106717 106712 52345b 106712->106648 106713->106648 106714->106713 106718 5f41ac 25 API calls 2 library calls 106714->106718 106717->106712 106719->106656 106721 5ee3ac ___std_exception_copy 106720->106721 106722 522c70 106721->106722 106724 5ee3c8 std::_Facet_Register 106721->106724 106728 605adf EnterCriticalSection LeaveCriticalSection std::_Facet_Register 106721->106728 106722->106666 106727 5f41ac 25 API calls 2 library calls 106722->106727 106729 5f188d RaiseException 106724->106729 106726 5ef71b 106728->106721 106729->106726 106731 522625 GetModuleFileNameW 106730->106731 106731->106672 106735 522ed3 106732->106735 106736 522ea6 BuildCatchObjectHelperInternal 106732->106736 106733 522fc6 106746 523420 26 API calls 3 library calls 106733->106746 106735->106733 106738 522f1d 106735->106738 106740 522f4d 106735->106740 106736->106674 106737 522fcb 106739 5ee3a7 std::_Facet_Register 3 API calls 106738->106739 106743 522f3b _Yarn 106739->106743 106741 5ee3a7 std::_Facet_Register 3 API calls 106740->106741 106740->106743 106741->106743 106744 522fa8 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106743->106744 106745 5f41ac 25 API calls 2 library calls 106743->106745 106744->106674 106746->106737 106751 52c8a6 BuildCatchObjectHelperInternal 106747->106751 106752 52c8ce 106747->106752 106748 52c9ad 106811 523420 26 API calls 3 library calls 106748->106811 106750 52c9b2 106751->106684 106752->106748 106753 52c917 106752->106753 106754 52c93c 106752->106754 106755 5ee3a7 std::_Facet_Register 3 API calls 106753->106755 106756 5ee3a7 std::_Facet_Register 3 API calls 106754->106756 106758 52c928 _Yarn 106754->106758 106755->106758 106756->106758 106759 52c98f std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106758->106759 106810 5f41ac 25 API calls 2 library calls 106758->106810 106759->106684 106762 5a68ab ___crtLCMapStringA 106760->106762 106761 5a68fe 106812 55f9b0 106761->106812 106762->106761 106764 5a68dd MultiByteToWideChar 106762->106764 106764->106761 106766 522e90 SimpleUString::operator= 26 API calls 106767 5a6968 106766->106767 106768 5234d0 26 API calls 106767->106768 106769 5a697e 106768->106769 106770 5a6df2 106769->106770 106772 5a69f6 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t ___scrt_fastfail 106769->106772 106894 5f41ac 25 API calls 2 library calls 106770->106894 106816 52db80 106772->106816 106773 5a6df7 106895 5f41ac 25 API calls 2 library calls 106773->106895 106777 5a6dfc 106896 5f41ac 25 API calls 2 library calls 106777->106896 106788 5a6cbf 106876 5a7720 106788->106876 106792 5a6bc1 106801 5a6c20 106792->106801 106839 5a8100 106792->106839 106793 5a6ce4 106886 5a7b00 76 API calls 106793->106886 106796 5a6ceb 106887 5a7a20 106796->106887 106799 5a6d25 106893 5a6e10 75 API calls std::ios_base::_Ios_base_dtor 106799->106893 106860 524730 106801->106860 106802 524730 44 API calls 106802->106799 106803 5a6d77 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106803->106777 106805 5a6dc4 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 106803->106805 106804 5a6d30 106804->106773 106804->106803 106806 5ee388 _ValidateLocalCookies 5 API calls 106805->106806 106807 5a6deb 106806->106807 106807->106692 106811->106750 106813 55f9c9 ___scrt_initialize_default_local_stdio_options 106812->106813 106897 5f775c 106813->106897 106983 5247b0 106816->106983 106821 52dc31 106823 52d930 106821->106823 106822 524730 44 API calls 106822->106821 106824 5ee3a7 std::_Facet_Register 3 API calls 106823->106824 106825 52d963 106824->106825 106826 5ed078 std::locale::_Init 42 API calls 106825->106826 106827 52d973 106826->106827 106828 5f789a 106827->106828 107160 5f7815 106828->107160 106830 5a6b92 106831 6011fe 106830->106831 107171 5ff025 106831->107171 106834 5a6bad 106836 601aa5 106834->106836 107435 6019a6 106836->107435 106840 5ece39 std::_Lockit::_Lockit 7 API calls 106839->106840 106841 5a813a 106840->106841 106842 5ece39 std::_Lockit::_Lockit 7 API calls 106841->106842 106846 5a817c 106841->106846 106844 5a815c 106842->106844 106843 5a81c1 106845 5ece91 std::_Lockit::~_Lockit 2 API calls 106843->106845 106847 5ece91 std::_Lockit::~_Lockit 2 API calls 106844->106847 106848 5a8264 106845->106848 106846->106843 106850 5ee3a7 std::_Facet_Register 3 API calls 106846->106850 106847->106846 106849 5ee388 _ValidateLocalCookies 5 API calls 106848->106849 106851 5a827d 106849->106851 106852 5a81cf 106850->106852 106851->106801 106853 5239d0 71 API calls 106852->106853 106854 5a81ff 106853->106854 106855 5ed3fa __Getcvt 37 API calls 106854->106855 106856 5a8215 106855->106856 106857 523a90 70 API calls 106856->106857 106858 5a823f 106857->106858 107487 5ed046 RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 106858->107487 106861 52474a 106860->106861 106861->106788 106863 524762 106861->106863 107488 5f188d RaiseException 106861->107488 107489 524310 39 API calls BuildCatchObjectHelperInternal 106863->107489 106865 524787 107490 524650 44 API calls 6 library calls 106865->107490 106867 524792 107491 5f188d RaiseException 106867->107491 106869 5247a1 106870 524730 44 API calls 106869->106870 106871 524825 106870->106871 106872 5ee3a7 std::_Facet_Register 3 API calls 106871->106872 106873 52482c 106872->106873 106874 5ed078 std::locale::_Init 42 API calls 106873->106874 106875 52483f 106874->106875 106875->106788 107492 52bdf0 106876->107492 106879 524730 44 API calls 106881 5a77eb 106879->106881 106882 5a6cd6 106881->106882 107503 52d8a0 44 API calls 106881->107503 106885 5a7dc0 76 API calls 106882->106885 106883 5a7767 106883->106879 106885->106793 106886->106796 106888 5a6cf6 106887->106888 106889 5a7a2e 106887->106889 106888->106799 106888->106802 107563 5a78d0 106889->107563 106891 5a7a33 107578 5f9cbe 106891->107578 106893->106804 106900 5f47f0 106897->106900 106901 5f4818 106900->106901 106903 5f4830 106900->106903 106915 60228d 14 API calls __dosmaperr 106901->106915 106902 5f4838 106917 5f5009 106902->106917 106903->106901 106903->106902 106906 5f481d 106916 5f419c 25 API calls SimpleUString::operator= 106906->106916 106908 5ee388 _ValidateLocalCookies 5 API calls 106910 55f9d7 106908->106910 106909 5f4848 106925 5f58bf 50 API calls 3 library calls 106909->106925 106910->106766 106913 5f48cf 106926 5f509c 14 API calls _free 106913->106926 106914 5f4828 106914->106908 106915->106906 106916->106914 106918 5f5029 106917->106918 106919 5f5020 106917->106919 106918->106919 106927 60ac51 GetLastError 106918->106927 106919->106909 106925->106913 106926->106914 106928 60ac68 106927->106928 106932 60ac6e 106927->106932 106959 60c74a 6 API calls __Getctype 106928->106959 106931 60ac8c 106933 60c205 __Getctype 14 API calls 106931->106933 106953 60ac74 SetLastError 106931->106953 106932->106953 106960 60c789 6 API calls __Getctype 106932->106960 106935 60ac9c 106933->106935 106936 60aca4 106935->106936 106937 60acbb 106935->106937 106961 60c789 6 API calls __Getctype 106936->106961 106962 60c789 6 API calls __Getctype 106937->106962 106938 5f5049 106954 60b4a0 106938->106954 106939 60ad08 106965 604519 37 API calls _Atexit 106939->106965 106943 60acb2 106950 60aea3 _free 14 API calls 106943->106950 106945 60acc7 106946 60accb 106945->106946 106947 60acdc 106945->106947 106963 60c789 6 API calls __Getctype 106946->106963 106964 60aa7b 14 API calls __Getctype 106947->106964 106950->106953 106951 60ace7 106952 60aea3 _free 14 API calls 106951->106952 106952->106953 106953->106938 106953->106939 106955 60b4b3 106954->106955 106957 5f505f 106954->106957 106955->106957 106966 6138ef 106955->106966 106958 60b4cd 47 API calls __fassign 106957->106958 106958->106919 106959->106932 106960->106931 106961->106943 106962->106945 106963->106943 106964->106951 106967 6138fb ___BuildCatchObject 106966->106967 106968 60ac51 __Getctype 37 API calls 106967->106968 106969 613904 106968->106969 106972 61394a _Atexit 106969->106972 106979 603d1b EnterCriticalSection 106969->106979 106971 613922 106980 613966 14 API calls __Getctype 106971->106980 106972->106957 106974 613933 106981 61394f LeaveCriticalSection std::_Lockit::~_Lockit 106974->106981 106976 613946 106976->106972 106982 604519 37 API calls _Atexit 106976->106982 106979->106971 106980->106974 106981->106976 106984 524730 44 API calls 106983->106984 106985 524825 106984->106985 106986 5ee3a7 std::_Facet_Register 3 API calls 106985->106986 106987 52482c 106986->106987 107011 5ed078 106987->107011 106989 52483f 106990 52e7e0 106989->106990 106991 5ece39 std::_Lockit::_Lockit 7 API calls 106990->106991 106992 52e828 106991->106992 106993 5ece39 std::_Lockit::_Lockit 7 API calls 106992->106993 106999 52e86a 106992->106999 106995 52e84a 106993->106995 106994 52e8b2 106996 5ece91 std::_Lockit::~_Lockit 2 API calls 106994->106996 106998 5ece91 std::_Lockit::~_Lockit 2 API calls 106995->106998 106997 52dbe3 106996->106997 106997->106821 106997->106822 106998->106999 106999->106994 107000 5ee3a7 std::_Facet_Register 3 API calls 106999->107000 107001 52e8c0 107000->107001 107047 5239d0 107001->107047 107012 5ed084 std::locale::_Init 107011->107012 107023 5ece39 107012->107023 107017 5ed0a2 107037 5ed207 39 API calls _Atexit 107017->107037 107019 5ed0c0 107029 5ece91 107019->107029 107020 5ed100 std::locale::_Init 107020->106989 107021 5ed0aa 107038 5ecfd0 107021->107038 107024 5ece4f 107023->107024 107025 5ece48 107023->107025 107027 5ece4d 107024->107027 107043 5edb01 EnterCriticalSection 107024->107043 107042 603d7a 6 API calls 2 library calls 107025->107042 107027->107019 107036 5ed1e4 15 API calls 2 library calls 107027->107036 107030 5ece9b 107029->107030 107031 603d88 107029->107031 107033 5eceae 107030->107033 107044 5edb0f LeaveCriticalSection 107030->107044 107045 603d63 LeaveCriticalSection 107031->107045 107033->107020 107035 603d8f 107035->107020 107036->107017 107037->107021 107039 5ecfde 107038->107039 107041 5ecfea _Yarn ___std_exception_copy 107038->107041 107039->107041 107046 5f41fd 14 API calls _free 107039->107046 107041->107019 107041->107041 107042->107027 107043->107027 107044->107033 107045->107035 107046->107041 107048 5ece39 std::_Lockit::_Lockit 7 API calls 107047->107048 107049 523a02 107048->107049 107050 523a4a 107049->107050 107051 523a68 107049->107051 107087 5ed17f 107050->107087 107096 523970 25 API calls ___std_exception_copy 107051->107096 107054 523a75 107097 5f188d RaiseException 107054->107097 107057 523a83 107098 5fa53a 107087->107098 107096->107054 107097->107057 107103 60cae5 107098->107103 107124 60c310 5 API calls __Getctype 107103->107124 107105 60caea 107125 60c32a 5 API calls __Getctype 107105->107125 107107 60caef 107126 60c344 5 API calls __Getctype 107107->107126 107109 60caf4 107127 60c35e 5 API calls __Getctype 107109->107127 107111 60caf9 107128 60c378 5 API calls __Getctype 107111->107128 107113 60cafe 107129 60c392 5 API calls __Getctype 107113->107129 107115 60cb03 107130 60c3ac 5 API calls __Getctype 107115->107130 107117 60cb08 107131 60c3c6 5 API calls __Getctype 107117->107131 107119 60cb0d 107132 60c3fa 5 API calls __Getctype 107119->107132 107121 60cb12 107133 60c3e0 5 API calls __Getctype 107121->107133 107123 60cb17 107123->107123 107124->107105 107125->107107 107126->107109 107127->107111 107128->107113 107129->107115 107130->107117 107131->107119 107132->107121 107133->107123 107161 5f7824 107160->107161 107163 5f783b 107160->107163 107168 60228d 14 API calls __dosmaperr 107161->107168 107167 5f7834 __alldvrm 107163->107167 107170 60c861 6 API calls __Getctype 107163->107170 107165 5f7829 107169 5f419c 25 API calls SimpleUString::operator= 107165->107169 107167->106830 107168->107165 107169->107167 107170->107167 107215 60ada8 GetLastError 107171->107215 107173 5ff02d 107174 5ff04b 107173->107174 107175 5ff059 107173->107175 107238 60b17a 107173->107238 107174->107175 107245 60228d 14 API calls __dosmaperr 107174->107245 107175->106834 107180 600f6d 107175->107180 107179 60aea3 _free 14 API calls 107179->107174 107181 600f90 107180->107181 107182 600f7d 107180->107182 107183 600fa2 107181->107183 107193 600fb5 107181->107193 107273 60228d 14 API calls __dosmaperr 107182->107273 107275 60228d 14 API calls __dosmaperr 107183->107275 107186 600f82 107274 5f419c 25 API calls SimpleUString::operator= 107186->107274 107188 600fa7 107276 5f419c 25 API calls SimpleUString::operator= 107188->107276 107189 600fd5 107277 60228d 14 API calls __dosmaperr 107189->107277 107190 600fe8 107254 60f095 107190->107254 107193->107189 107193->107190 107195 600fed 107262 60e899 107195->107262 107197 600fff 107198 6011f3 107197->107198 107278 60e8c5 107197->107278 107269 5f41c9 IsProcessorFeaturePresent 107198->107269 107201 6011fd 107203 5ff025 15 API calls 107201->107203 107202 601011 107202->107198 107285 60e8f1 107202->107285 107205 601209 107203->107205 107207 601218 107205->107207 107209 600f6d 49 API calls 107205->107209 107206 601023 107206->107198 107208 60102c 107206->107208 107207->106834 107210 6010b1 107208->107210 107211 60104d 107208->107211 107209->107207 107214 600f8c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 107210->107214 107293 60f0e8 25 API calls 2 library calls 107210->107293 107211->107214 107292 60f0e8 25 API calls 2 library calls 107211->107292 107214->106834 107216 60adbf 107215->107216 107219 60adc5 107215->107219 107246 60c74a 6 API calls __Getctype 107216->107246 107235 60adcb SetLastError 107219->107235 107247 60c789 6 API calls __Getctype 107219->107247 107220 60ade3 107221 60c205 __Getctype 12 API calls 107220->107221 107220->107235 107223 60adf3 107221->107223 107224 60ae12 107223->107224 107225 60adfb 107223->107225 107249 60c789 6 API calls __Getctype 107224->107249 107248 60c789 6 API calls __Getctype 107225->107248 107228 60ae1e 107230 60ae22 107228->107230 107231 60ae33 107228->107231 107229 60ae09 107234 60aea3 _free 12 API calls 107229->107234 107250 60c789 6 API calls __Getctype 107230->107250 107251 60aa7b 14 API calls __Getctype 107231->107251 107234->107235 107235->107173 107236 60ae3e 107237 60aea3 _free 12 API calls 107236->107237 107237->107235 107239 60b1b8 107238->107239 107243 60b188 _strftime 107238->107243 107253 60228d 14 API calls __dosmaperr 107239->107253 107241 60b1a3 RtlAllocateHeap 107242 5ff041 107241->107242 107241->107243 107242->107179 107243->107239 107243->107241 107252 605adf EnterCriticalSection LeaveCriticalSection std::_Facet_Register 107243->107252 107245->107175 107246->107219 107247->107220 107248->107229 107249->107228 107250->107229 107251->107236 107252->107243 107253->107242 107255 60f0a1 ___BuildCatchObject 107254->107255 107256 60f0d9 _Atexit 107255->107256 107294 603d1b EnterCriticalSection 107255->107294 107256->107195 107258 60f0b2 107261 60f0c6 107258->107261 107295 60efb5 107258->107295 107313 60f0df LeaveCriticalSection std::_Lockit::~_Lockit 107261->107313 107263 60e8a5 107262->107263 107264 60e8ba 107262->107264 107423 60228d 14 API calls __dosmaperr 107263->107423 107264->107197 107266 60e8aa 107424 5f419c 25 API calls SimpleUString::operator= 107266->107424 107268 60e8b5 107268->107197 107270 5f41d5 107269->107270 107425 5f3fee 107270->107425 107273->107186 107274->107214 107275->107188 107276->107214 107277->107214 107279 60e8d1 107278->107279 107280 60e8e6 107278->107280 107431 60228d 14 API calls __dosmaperr 107279->107431 107280->107202 107282 60e8d6 107432 5f419c 25 API calls SimpleUString::operator= 107282->107432 107284 60e8e1 107284->107202 107286 60e912 107285->107286 107287 60e8fd 107285->107287 107286->107206 107433 60228d 14 API calls __dosmaperr 107287->107433 107289 60e902 107434 5f419c 25 API calls SimpleUString::operator= 107289->107434 107291 60e90d 107291->107206 107292->107214 107293->107214 107294->107258 107297 60f001 _strftime 107295->107297 107296 60f008 107298 60f078 107296->107298 107301 60f06f 107296->107301 107297->107296 107299 60b17a _strftime 15 API calls 107297->107299 107306 60f075 107298->107306 107376 60ee58 107298->107376 107305 60f020 _strftime 107299->107305 107314 60ec7b 107301->107314 107303 60aea3 _free 14 API calls 107307 60f083 107303->107307 107304 60f027 107308 60aea3 _free 14 API calls 107304->107308 107305->107304 107310 60f04d 107305->107310 107306->107303 107309 5ee388 _ValidateLocalCookies 5 API calls 107307->107309 107308->107296 107311 60f091 107309->107311 107312 60aea3 _free 14 API calls 107310->107312 107311->107261 107312->107296 107313->107256 107315 60ec8a _strftime 107314->107315 107316 60e8f1 _strftime 25 API calls 107315->107316 107317 60eca0 107316->107317 107318 60ee25 107317->107318 107320 60e899 _strftime 25 API calls 107317->107320 107319 5f41c9 __Getctype 11 API calls 107318->107319 107374 60ee2c _strftime 107318->107374 107322 60ee57 _strftime 107319->107322 107321 60ecb2 107320->107321 107321->107318 107323 60aea3 _free 14 API calls 107321->107323 107321->107374 107324 60e8f1 _strftime 25 API calls 107322->107324 107325 60ed02 107323->107325 107326 60ee7d 107324->107326 107330 60b17a _strftime 15 API calls 107325->107330 107327 60efaa 107326->107327 107328 60e899 _strftime 25 API calls 107326->107328 107329 5f41c9 __Getctype 11 API calls 107327->107329 107331 60ee8f 107328->107331 107335 60efb4 _strftime 107329->107335 107332 60ed1a 107330->107332 107331->107327 107334 60e8c5 _strftime 25 API calls 107331->107334 107333 60aea3 _free 14 API calls 107332->107333 107338 60ed26 107333->107338 107336 60eea1 107334->107336 107343 60b17a _strftime 15 API calls 107335->107343 107357 60f008 107335->107357 107336->107327 107337 60eeaa 107336->107337 107339 60aea3 _free 14 API calls 107337->107339 107338->107374 107413 60a8dd 25 API calls 2 library calls 107338->107413 107340 60eeb5 GetTimeZoneInformation 107339->107340 107354 60eed1 107340->107354 107364 60ef6c _strftime 107340->107364 107341 60f078 107344 60f075 107341->107344 107345 60ee58 _strftime 48 API calls 107341->107345 107355 60f020 _strftime 107343->107355 107349 60aea3 _free 14 API calls 107344->107349 107345->107344 107346 60f06f 107348 60ec7b _strftime 48 API calls 107346->107348 107347 60ed50 107347->107318 107414 60fc56 25 API calls 2 library calls 107347->107414 107348->107344 107352 60f083 107349->107352 107350 60f027 107353 60aea3 _free 14 API calls 107350->107353 107356 5ee388 _ValidateLocalCookies 5 API calls 107352->107356 107353->107357 107359 603e16 __Getctype 37 API calls 107354->107359 107355->107350 107358 60f04d 107355->107358 107360 60f091 107356->107360 107357->107341 107357->107346 107361 60aea3 _free 14 API calls 107358->107361 107362 60ef24 107359->107362 107360->107306 107361->107357 107419 60e4b9 WideCharToMultiByte 107362->107419 107364->107306 107365 60ed69 107365->107318 107415 5f8951 47 API calls ___swprintf_l 107365->107415 107366 60ef3d 107420 60e4b9 WideCharToMultiByte 107366->107420 107369 60ed8e 107370 60ede4 107369->107370 107416 5f8951 47 API calls ___swprintf_l 107369->107416 107370->107374 107418 60fc56 25 API calls 2 library calls 107370->107418 107372 60edb5 107372->107370 107417 5f8951 47 API calls ___swprintf_l 107372->107417 107374->107306 107377 60ee67 _strftime 107376->107377 107378 60e8f1 _strftime 25 API calls 107377->107378 107379 60ee7d 107378->107379 107380 60efaa 107379->107380 107381 60e899 _strftime 25 API calls 107379->107381 107382 5f41c9 __Getctype 11 API calls 107380->107382 107383 60ee8f 107381->107383 107385 60efb4 _strftime 107382->107385 107383->107380 107384 60e8c5 _strftime 25 API calls 107383->107384 107386 60eea1 107384->107386 107387 60f008 107385->107387 107392 60b17a _strftime 15 API calls 107385->107392 107386->107380 107388 60eeaa 107386->107388 107391 60f078 107387->107391 107396 60f06f 107387->107396 107389 60aea3 _free 14 API calls 107388->107389 107390 60eeb5 GetTimeZoneInformation 107389->107390 107393 60eed1 107390->107393 107412 60ef6c _strftime 107390->107412 107394 60f075 107391->107394 107395 60ee58 _strftime 48 API calls 107391->107395 107397 60f020 _strftime 107392->107397 107405 603e16 __Getctype 37 API calls 107393->107405 107399 60aea3 _free 14 API calls 107394->107399 107395->107394 107398 60ec7b _strftime 48 API calls 107396->107398 107403 60f027 107397->107403 107404 60f04d 107397->107404 107398->107394 107400 60f083 107399->107400 107402 5ee388 _ValidateLocalCookies 5 API calls 107400->107402 107401 60aea3 _free 14 API calls 107401->107387 107406 60f091 107402->107406 107403->107401 107407 60aea3 _free 14 API calls 107404->107407 107408 60ef24 107405->107408 107406->107306 107407->107387 107421 60e4b9 WideCharToMultiByte 107408->107421 107410 60ef3d 107422 60e4b9 WideCharToMultiByte 107410->107422 107412->107306 107413->107347 107414->107365 107415->107369 107416->107372 107417->107370 107418->107318 107419->107366 107420->107364 107421->107410 107422->107412 107423->107266 107424->107268 107426 5f400a ___scrt_fastfail 107425->107426 107427 5f4036 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 107426->107427 107428 5f4107 ___scrt_fastfail 107427->107428 107429 5ee388 _ValidateLocalCookies 5 API calls 107428->107429 107430 5f4125 GetCurrentProcess TerminateProcess 107429->107430 107430->107201 107431->107282 107432->107284 107433->107289 107434->107291 107436 5f5009 __fassign 47 API calls 107435->107436 107437 6019bb 107436->107437 107438 6019e0 107437->107438 107441 6019f5 107437->107441 107455 60228d 14 API calls __dosmaperr 107438->107455 107440 6019e5 107456 5f419c 25 API calls SimpleUString::operator= 107440->107456 107457 5fa9b6 107441->107457 107445 601a7c 107446 6019f0 107445->107446 107449 60aea3 _free 14 API calls 107445->107449 107446->106792 107447 60b17a _strftime 15 API calls 107448 601a25 107447->107448 107450 601a68 107448->107450 107460 6058e7 53 API calls 3 library calls 107448->107460 107449->107446 107452 60aea3 _free 14 API calls 107450->107452 107452->107445 107453 601a3f 107453->107450 107461 60194c 17 API calls _strftime 107453->107461 107455->107440 107456->107446 107462 5fa904 107457->107462 107460->107453 107461->107450 107463 5fa92c 107462->107463 107464 5fa912 107462->107464 107466 5fa933 107463->107466 107467 5fa952 107463->107467 107480 5faa16 14 API calls _free 107464->107480 107472 5fa91c 107466->107472 107481 5faa30 15 API calls _strftime 107466->107481 107482 60e666 MultiByteToWideChar 107467->107482 107470 5fa961 107471 5fa968 GetLastError 107470->107471 107474 5fa98e 107470->107474 107485 5faa30 15 API calls _strftime 107470->107485 107483 602257 14 API calls 2 library calls 107471->107483 107472->107445 107472->107447 107474->107472 107486 60e666 MultiByteToWideChar 107474->107486 107475 5fa974 107484 60228d 14 API calls __dosmaperr 107475->107484 107479 5fa9a5 107479->107471 107479->107472 107480->107472 107481->107472 107482->107470 107483->107475 107484->107472 107485->107474 107486->107479 107487->106843 107488->106863 107489->106865 107490->106867 107491->106869 107493 52be2f 107492->107493 107494 52bdf0 44 API calls 107493->107494 107498 52beb6 107493->107498 107496 52be6e 107494->107496 107495 52bea1 107495->107498 107504 52d8a0 44 API calls 107495->107504 107496->107495 107499 524730 44 API calls 107496->107499 107498->106883 107500 5a7ae0 107498->107500 107499->107495 107505 5a7170 107500->107505 107503->106882 107504->107498 107508 52b2f0 107505->107508 107509 52b3bf 107508->107509 107510 52b31c _Yarn 107508->107510 107509->106883 107510->107509 107512 5a7510 107510->107512 107513 5a7531 107512->107513 107518 5a7545 107512->107518 107514 5ee388 _ValidateLocalCookies 5 API calls 107513->107514 107517 5a753f 107514->107517 107515 5a755b 107519 5ee388 _ValidateLocalCookies 5 API calls 107515->107519 107516 5a764c 107520 5ee388 _ValidateLocalCookies 5 API calls 107516->107520 107517->107510 107518->107515 107518->107516 107526 5a761f 107518->107526 107529 5a75b4 107518->107529 107521 5a757d 107519->107521 107522 5a765e 107520->107522 107521->107510 107522->107510 107524 5a75fa 107524->107516 107525 5a760a 107524->107525 107527 5ee388 _ValidateLocalCookies 5 API calls 107525->107527 107528 5a7635 107526->107528 107532 5f9737 107526->107532 107530 5a7619 107527->107530 107528->107515 107528->107516 107529->107516 107541 601562 50 API calls 5 library calls 107529->107541 107530->107510 107533 5f9745 107532->107533 107534 5f9762 107532->107534 107533->107534 107535 5f9768 107533->107535 107536 5f9752 107533->107536 107534->107528 107542 5f951e 107535->107542 107550 60228d 14 API calls __dosmaperr 107536->107550 107539 5f9757 107551 5f419c 25 API calls SimpleUString::operator= 107539->107551 107541->107524 107543 5f952a ___BuildCatchObject 107542->107543 107552 5f9c1f EnterCriticalSection 107543->107552 107545 5f9538 107553 5f956f 107545->107553 107549 5f9556 _Atexit 107549->107534 107550->107539 107551->107534 107552->107545 107554 60bf2a 26 API calls 107553->107554 107555 5f9583 107554->107555 107556 5f95b4 70 API calls 107555->107556 107557 5f959e 107556->107557 107558 60bfdd 70 API calls 107557->107558 107559 5f9545 107558->107559 107560 5f9563 107559->107560 107561 5f9c33 _Xfiopen LeaveCriticalSection 107560->107561 107562 5f956d 107561->107562 107562->107549 107564 5a797d 107563->107564 107567 5a78ee 107563->107567 107565 5ee388 _ValidateLocalCookies 5 API calls 107564->107565 107566 5a798b 107565->107566 107566->106891 107567->107564 107568 5a7933 107567->107568 107571 5a7945 107567->107571 107572 5a792e 107567->107572 107569 5ee388 _ValidateLocalCookies 5 API calls 107568->107569 107570 5a7941 107569->107570 107570->106891 107573 5a7966 107571->107573 107574 5f9737 72 API calls 107571->107574 107572->107564 107572->107568 107575 5ee388 _ValidateLocalCookies 5 API calls 107573->107575 107576 5a795f 107574->107576 107577 5a7979 107575->107577 107576->107568 107576->107573 107577->106891 107579 5f9cca ___BuildCatchObject 107578->107579 107580 5f9cd4 107579->107580 107582 5f9ce9 107579->107582 107608 60228d 14 API calls __dosmaperr 107580->107608 107590 5f9ce4 _Xfiopen _Atexit 107582->107590 107591 5f9c1f EnterCriticalSection 107582->107591 107583 5f9cd9 107609 5f419c 25 API calls SimpleUString::operator= 107583->107609 107586 5f9d06 107592 5f9c47 107586->107592 107588 5f9d11 107610 5f9d2e LeaveCriticalSection _Xfiopen 107588->107610 107590->106888 107591->107586 107593 5f9c69 107592->107593 107594 5f9c54 107592->107594 107601 5f9c64 _Xfiopen 107593->107601 107611 5f8ef1 107593->107611 107643 60228d 14 API calls __dosmaperr 107594->107643 107596 5f9c59 107644 5f419c 25 API calls SimpleUString::operator= 107596->107644 107601->107588 107604 5f9c8c 107628 609c27 107604->107628 107607 60aea3 _free 14 API calls 107607->107601 107608->107583 107609->107590 107610->107590 107612 5f8f09 107611->107612 107613 5f8f2e 107611->107613 107612->107613 107614 60beee __fread_nolock 25 API calls 107612->107614 107617 60d838 107613->107617 107615 5f8f27 107614->107615 107645 6098d9 107615->107645 107618 5f9c86 107617->107618 107619 60d84f 107617->107619 107621 60beee 107618->107621 107619->107618 107620 60aea3 _free 14 API calls 107619->107620 107620->107618 107622 60befa 107621->107622 107623 60bf0f 107621->107623 107770 60228d 14 API calls __dosmaperr 107622->107770 107623->107604 107625 60beff 107771 5f419c 25 API calls SimpleUString::operator= 107625->107771 107627 60bf0a 107627->107604 107629 609c38 107628->107629 107630 609c4d 107628->107630 107783 60227a 14 API calls __dosmaperr 107629->107783 107632 609c96 107630->107632 107635 609c74 107630->107635 107785 60227a 14 API calls __dosmaperr 107632->107785 107634 609c3d 107784 60228d 14 API calls __dosmaperr 107634->107784 107772 609ba5 107635->107772 107636 609c9b 107786 60228d 14 API calls __dosmaperr 107636->107786 107640 5f9c92 107640->107601 107640->107607 107641 609ca3 107787 5f419c 25 API calls SimpleUString::operator= 107641->107787 107643->107596 107644->107601 107646 6098e5 ___BuildCatchObject 107645->107646 107647 609905 107646->107647 107648 6098ed 107646->107648 107650 6099a0 107647->107650 107655 609937 107647->107655 107715 60227a 14 API calls __dosmaperr 107648->107715 107720 60227a 14 API calls __dosmaperr 107650->107720 107651 6098f2 107716 60228d 14 API calls __dosmaperr 107651->107716 107654 6099a5 107721 60228d 14 API calls __dosmaperr 107654->107721 107670 60f5ed EnterCriticalSection 107655->107670 107656 6098fa _Atexit 107656->107613 107659 6099ad 107722 5f419c 25 API calls SimpleUString::operator= 107659->107722 107660 60993d 107662 609959 107660->107662 107663 60996e 107660->107663 107717 60228d 14 API calls __dosmaperr 107662->107717 107671 6099c1 107663->107671 107666 60995e 107718 60227a 14 API calls __dosmaperr 107666->107718 107667 609969 107719 609998 LeaveCriticalSection __wsopen_s 107667->107719 107670->107660 107672 6099e3 107671->107672 107673 6099ff 107671->107673 107674 6099e7 107672->107674 107676 609a37 107672->107676 107673->107667 107740 60227a 14 API calls __dosmaperr 107674->107740 107678 609a4a 107676->107678 107723 603c09 107676->107723 107677 6099ec 107741 60228d 14 API calls __dosmaperr 107677->107741 107726 60956a 107678->107726 107682 6099f4 107742 5f419c 25 API calls SimpleUString::operator= 107682->107742 107685 609a60 107689 609a64 107685->107689 107690 609a89 107685->107690 107686 609a9f 107687 609ab3 107686->107687 107688 609af8 WriteFile 107686->107688 107693 609ae8 107687->107693 107694 609abe 107687->107694 107691 609b1c GetLastError 107688->107691 107707 609ad6 107688->107707 107695 609a7f 107689->107695 107743 609500 6 API calls _Xfiopen 107689->107743 107744 609154 51 API calls 5 library calls 107690->107744 107691->107707 107733 6095dd 107693->107733 107696 609ac3 107694->107696 107697 609ad8 107694->107697 107695->107673 107703 609b42 107695->107703 107704 609b6c 107695->107704 107696->107695 107700 609ac8 107696->107700 107746 6097a5 8 API calls 3 library calls 107697->107746 107745 6096ba 7 API calls 2 library calls 107700->107745 107705 609b60 107703->107705 107706 609b49 107703->107706 107704->107673 107750 60228d 14 API calls __dosmaperr 107704->107750 107749 602257 14 API calls 2 library calls 107705->107749 107747 60228d 14 API calls __dosmaperr 107706->107747 107707->107695 107711 609b84 107751 60227a 14 API calls __dosmaperr 107711->107751 107712 609b4e 107748 60227a 14 API calls __dosmaperr 107712->107748 107715->107651 107716->107656 107717->107666 107718->107667 107719->107656 107720->107654 107721->107659 107722->107656 107752 603b70 107723->107752 107761 61514a 107726->107761 107728 60957b 107729 6095d1 107728->107729 107730 60ac51 __Getctype 37 API calls 107728->107730 107729->107685 107729->107686 107731 60959e 107730->107731 107731->107729 107732 6095b8 GetConsoleMode 107731->107732 107732->107729 107734 6095ec _Xfiopen 107733->107734 107737 60965c WriteFile 107734->107737 107739 60969d 107734->107739 107735 5ee388 _ValidateLocalCookies 5 API calls 107736 6096b6 107735->107736 107736->107695 107737->107734 107738 60969f GetLastError 107737->107738 107738->107739 107739->107735 107740->107677 107741->107682 107742->107673 107743->107695 107744->107695 107745->107707 107746->107707 107747->107712 107748->107673 107749->107673 107750->107711 107751->107673 107753 60f861 __wsopen_s 25 API calls 107752->107753 107754 603b82 107753->107754 107755 603b8a 107754->107755 107756 603b9b SetFilePointerEx 107754->107756 107757 60228d _free 14 API calls 107755->107757 107758 603b8f 107756->107758 107759 603bb3 GetLastError 107756->107759 107757->107758 107758->107678 107760 602257 __dosmaperr 14 API calls 107759->107760 107760->107758 107762 615164 107761->107762 107763 615157 107761->107763 107765 615170 107762->107765 107766 60228d _free 14 API calls 107762->107766 107764 60228d _free 14 API calls 107763->107764 107767 61515c 107764->107767 107765->107728 107768 615191 107766->107768 107767->107728 107769 5f419c __fassign 25 API calls 107768->107769 107769->107767 107770->107625 107771->107627 107773 609bb1 ___BuildCatchObject 107772->107773 107788 60f5ed EnterCriticalSection 107773->107788 107775 609bbf 107776 609bf1 107775->107776 107777 609be6 107775->107777 107804 60228d 14 API calls __dosmaperr 107776->107804 107789 609cb6 107777->107789 107780 609bec 107805 609c1b LeaveCriticalSection __wsopen_s 107780->107805 107782 609c0e _Atexit 107782->107640 107783->107634 107784->107640 107785->107636 107786->107641 107787->107640 107788->107775 107806 60f861 107789->107806 107791 609cc6 107792 609ccc 107791->107792 107794 609cfe 107791->107794 107796 60f861 __wsopen_s 25 API calls 107791->107796 107819 60f7d0 15 API calls 3 library calls 107792->107819 107794->107792 107797 60f861 __wsopen_s 25 API calls 107794->107797 107795 609d24 107798 609d46 107795->107798 107820 602257 14 API calls 2 library calls 107795->107820 107799 609cf5 107796->107799 107800 609d0a FindCloseChangeNotification 107797->107800 107798->107780 107803 60f861 __wsopen_s 25 API calls 107799->107803 107800->107792 107801 609d16 GetLastError 107800->107801 107801->107792 107803->107794 107804->107780 107805->107782 107807 60f883 107806->107807 107808 60f86e 107806->107808 107812 60f8a8 107807->107812 107823 60227a 14 API calls __dosmaperr 107807->107823 107821 60227a 14 API calls __dosmaperr 107808->107821 107811 60f873 107822 60228d 14 API calls __dosmaperr 107811->107822 107812->107791 107813 60f8b3 107824 60228d 14 API calls __dosmaperr 107813->107824 107816 60f87b 107816->107791 107817 60f8bb 107825 5f419c 25 API calls SimpleUString::operator= 107817->107825 107819->107795 107820->107798 107821->107811 107822->107816 107823->107813 107824->107817 107825->107816 107826->106704 107827 526920 107828 5f0910 ___scrt_fastfail 107827->107828 107829 526952 GetUserNameW 107828->107829 107830 526b2d 107829->107830 107833 52697b ___scrt_fastfail 107829->107833 107831 5ee388 _ValidateLocalCookies 5 API calls 107830->107831 107832 526b3e 107831->107832 107834 5269a1 LookupAccountNameW 107833->107834 107834->107830 107835 5269fc IsValidSid 107834->107835 107835->107830 107836 526a11 GetSidIdentifierAuthority 107835->107836 107836->107830 107837 526a29 107836->107837 107849 52f8e0 50 API calls 107837->107849 107839 526a45 107839->107830 107850 52f8e0 50 API calls 107839->107850 107841 526a9e 107841->107830 107842 526aaa GetSidSubAuthorityCount 107841->107842 107842->107830 107843 526ac1 107842->107843 107843->107830 107844 526ad1 GetSidSubAuthority 107843->107844 107846 526b1a 107843->107846 107851 52f8e0 50 API calls 107843->107851 107844->107830 107844->107843 107847 5ee388 _ValidateLocalCookies 5 API calls 107846->107847 107848 526b29 107847->107848 107849->107839 107850->107841 107851->107843 107852 545670 107853 5456a8 107852->107853 107856 545830 107852->107856 107854 5ee3a7 std::_Facet_Register 3 API calls 107853->107854 107855 5456b8 107854->107855 107889 545120 107855->107889 107861 545862 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 107856->107861 107930 5f41ac 25 API calls 2 library calls 107856->107930 107859 5458f6 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 107864 5458ac std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 107861->107864 107931 5f41ac 25 API calls 2 library calls 107861->107931 107864->107859 107932 5f41ac 25 API calls 2 library calls 107864->107932 107865 545705 107904 55ed90 107865->107904 107869 545717 107870 54572d 107869->107870 107926 5f41fd 14 API calls _free 107869->107926 107872 55ecb0 16 API calls 107870->107872 107873 54575e 107872->107873 107874 55ed90 16 API calls 107873->107874 107875 545770 107874->107875 107876 545786 107875->107876 107927 5f41fd 14 API calls _free 107875->107927 107877 55ecb0 16 API calls 107876->107877 107879 5457b0 107877->107879 107880 55ed90 16 API calls 107879->107880 107881 5457c2 107880->107881 107882 5457d8 107881->107882 107928 5f41fd 14 API calls _free 107881->107928 107911 557ec0 107882->107911 107885 54580f 107929 5581c0 13 API calls _ValidateLocalCookies 107885->107929 107887 545816 IsWindow 107887->107856 107888 545823 ShowWindow 107887->107888 107888->107856 107890 545189 ___scrt_fastfail 107889->107890 107933 5586b0 107890->107933 107897 55ecb0 107898 55ecd0 107897->107898 107899 55ecee 107898->107899 107902 55ed01 107898->107902 107900 55ecf8 107899->107900 107970 5f41fd 14 API calls _free 107899->107970 107900->107865 107902->107900 107971 5fae2f 16 API calls 3 library calls 107902->107971 107905 55edb0 107904->107905 107905->107905 107906 55edc9 107905->107906 107908 55eddc 107905->107908 107909 55edd3 107906->107909 107972 5f41fd 14 API calls _free 107906->107972 107908->107909 107973 5fae2f 16 API calls 3 library calls 107908->107973 107909->107869 107913 557ed4 ___scrt_fastfail 107911->107913 107912 557f81 107914 55802b CreateWindowExW 107912->107914 107916 557fae LoadCursorW 107912->107916 107913->107912 107915 557f09 GetClassInfoExW 107913->107915 107914->107885 107917 557f16 GetClassInfoExW 107915->107917 107924 557f3a RegisterClassExW 107915->107924 107919 558004 RegisterClassW 107916->107919 107923 558021 107917->107923 107917->107924 107919->107914 107922 558018 GetLastError 107919->107922 107922->107914 107922->107923 107923->107885 107924->107912 107925 557f74 GetLastError 107924->107925 107925->107912 107925->107923 107926->107870 107927->107876 107928->107882 107929->107887 107949 558510 107933->107949 107935 5587b5 ___scrt_fastfail 107938 558a34 GetStockObject GetObjectW CreateFontIndirectW 107935->107938 107942 558a6d ___scrt_fastfail 107935->107942 107936 558b11 107939 5ee388 _ValidateLocalCookies 5 API calls 107936->107939 107937 558aec CreatePen #17 LoadLibraryW 107937->107936 107955 55ee40 107938->107955 107940 5451e1 107939->107940 107943 5469a0 107940->107943 107942->107936 107942->107937 107944 5ee3a7 std::_Facet_Register 3 API calls 107943->107944 107945 545224 107944->107945 107946 546940 107945->107946 107947 5ee3a7 std::_Facet_Register 3 API calls 107946->107947 107948 54526c 107947->107948 107948->107856 107948->107897 107950 558523 107949->107950 107951 55851d 107949->107951 107953 558543 ___scrt_fastfail 107950->107953 107966 5f41fd 14 API calls _free 107950->107966 107965 5f41fd 14 API calls _free 107951->107965 107953->107935 107956 55ee56 107955->107956 107957 55eeea 107955->107957 107956->107956 107960 55ee76 107956->107960 107963 55ee89 107956->107963 107958 55eef6 107957->107958 107969 5f41fd 14 API calls _free 107957->107969 107958->107942 107961 55ee80 107960->107961 107967 5f41fd 14 API calls _free 107960->107967 107961->107942 107963->107961 107968 5fae2f 16 API calls 3 library calls 107963->107968 107965->107950 107966->107953 107967->107961 107968->107961 107969->107958 107970->107900 107971->107900 107972->107909 107973->107909 107974 554810 108042 556130 107974->108042 107977 52c890 26 API calls 107978 554866 107977->107978 108427 5544c0 GetModuleFileNameA 107978->108427 107982 55488c 108458 5249b0 107982->108458 108552 557200 108042->108552 108044 55614c 108045 52c890 26 API calls 108044->108045 108046 55615a 108045->108046 108047 557200 26 API calls 108046->108047 108048 55616e 108047->108048 108049 52c890 26 API calls 108048->108049 108050 55617c 108049->108050 108051 557200 26 API calls 108050->108051 108052 556190 108051->108052 108053 52c890 26 API calls 108052->108053 108054 55619e 108053->108054 108055 557200 26 API calls 108054->108055 108056 5561b2 108055->108056 108057 52c890 26 API calls 108056->108057 108058 5561c0 108057->108058 108059 557200 26 API calls 108058->108059 108060 5561d4 108059->108060 108061 52c890 26 API calls 108060->108061 108062 5561e2 108061->108062 108063 557200 26 API calls 108062->108063 108064 5561f6 108063->108064 108065 52c890 26 API calls 108064->108065 108066 556204 108065->108066 108067 557200 26 API calls 108066->108067 108068 556218 108067->108068 108069 52c890 26 API calls 108068->108069 108070 556226 108069->108070 108071 557200 26 API calls 108070->108071 108072 55623a 108071->108072 108073 52c890 26 API calls 108072->108073 108074 556248 108073->108074 108075 557200 26 API calls 108074->108075 108076 55625c 108075->108076 108077 52c890 26 API calls 108076->108077 108078 55626a 108077->108078 108079 557200 26 API calls 108078->108079 108080 55627e 108079->108080 108081 52c890 26 API calls 108080->108081 108082 55628c 108081->108082 108083 557200 26 API calls 108082->108083 108084 5562a0 108083->108084 108085 52c890 26 API calls 108084->108085 108086 5562ae 108085->108086 108087 557200 26 API calls 108086->108087 108088 5562c2 108087->108088 108089 52c890 26 API calls 108088->108089 108090 5562d0 108089->108090 108091 557200 26 API calls 108090->108091 108092 5562e4 108091->108092 108093 52c890 26 API calls 108092->108093 108094 5562f2 108093->108094 108095 557200 26 API calls 108094->108095 108096 556306 108095->108096 108097 52c890 26 API calls 108096->108097 108098 556314 108097->108098 108099 557200 26 API calls 108098->108099 108100 556328 108099->108100 108101 52c890 26 API calls 108100->108101 108102 556336 108101->108102 108103 557200 26 API calls 108102->108103 108104 55634a 108103->108104 108105 52c890 26 API calls 108104->108105 108106 556358 108105->108106 108107 557200 26 API calls 108106->108107 108108 55636c 108107->108108 108109 52c890 26 API calls 108108->108109 108110 55637a 108109->108110 108111 557200 26 API calls 108110->108111 108112 55638e 108111->108112 108113 52c890 26 API calls 108112->108113 108114 55639c 108113->108114 108115 557200 26 API calls 108114->108115 108116 5563b0 108115->108116 108117 52c890 26 API calls 108116->108117 108118 5563be 108117->108118 108119 557200 26 API calls 108118->108119 108120 5563d2 108119->108120 108121 52c890 26 API calls 108120->108121 108122 5563e0 108121->108122 108123 557200 26 API calls 108122->108123 108124 5563f4 108123->108124 108125 52c890 26 API calls 108124->108125 108126 556402 108125->108126 108127 557200 26 API calls 108126->108127 108128 556416 108127->108128 108129 52c890 26 API calls 108128->108129 108130 556424 108129->108130 108131 557200 26 API calls 108130->108131 108132 556438 108131->108132 108133 52c890 26 API calls 108132->108133 108134 556446 108133->108134 108135 557200 26 API calls 108134->108135 108136 55645a 108135->108136 108137 52c890 26 API calls 108136->108137 108138 556468 108137->108138 108139 557200 26 API calls 108138->108139 108140 55647c 108139->108140 108141 52c890 26 API calls 108140->108141 108142 55648a 108141->108142 108143 557200 26 API calls 108142->108143 108144 55649e 108143->108144 108145 52c890 26 API calls 108144->108145 108146 5564ac 108145->108146 108147 557200 26 API calls 108146->108147 108148 5564c0 108147->108148 108149 52c890 26 API calls 108148->108149 108150 5564ce 108149->108150 108151 557200 26 API calls 108150->108151 108152 5564e2 108151->108152 108153 52c890 26 API calls 108152->108153 108154 5564f0 108153->108154 108155 557200 26 API calls 108154->108155 108156 556504 108155->108156 108157 52c890 26 API calls 108156->108157 108158 556512 108157->108158 108159 557200 26 API calls 108158->108159 108160 556526 108159->108160 108161 52c890 26 API calls 108160->108161 108162 556534 108161->108162 108163 557200 26 API calls 108162->108163 108164 556548 108163->108164 108165 52c890 26 API calls 108164->108165 108166 556556 108165->108166 108167 557200 26 API calls 108166->108167 108168 55656a 108167->108168 108169 52c890 26 API calls 108168->108169 108170 556578 108169->108170 108171 557200 26 API calls 108170->108171 108172 55658c 108171->108172 108173 52c890 26 API calls 108172->108173 108174 55659a 108173->108174 108175 557200 26 API calls 108174->108175 108176 5565ae 108175->108176 108177 52c890 26 API calls 108176->108177 108178 5565bc 108177->108178 108179 557200 26 API calls 108178->108179 108180 5565d0 108179->108180 108181 52c890 26 API calls 108180->108181 108182 5565de 108181->108182 108183 557200 26 API calls 108182->108183 108184 5565f2 108183->108184 108185 52c890 26 API calls 108184->108185 108186 556600 108185->108186 108187 557200 26 API calls 108186->108187 108188 556614 108187->108188 108189 52c890 26 API calls 108188->108189 108190 556622 108189->108190 108191 557200 26 API calls 108190->108191 108192 556636 108191->108192 108193 52c890 26 API calls 108192->108193 108194 556644 108193->108194 108195 557200 26 API calls 108194->108195 108196 556658 108195->108196 108197 52c890 26 API calls 108196->108197 108198 556666 108197->108198 108199 557200 26 API calls 108198->108199 108200 55667a 108199->108200 108201 52c890 26 API calls 108200->108201 108202 556688 108201->108202 108203 557200 26 API calls 108202->108203 108204 55669c 108203->108204 108205 52c890 26 API calls 108204->108205 108206 5566aa 108205->108206 108207 557200 26 API calls 108206->108207 108208 5566be 108207->108208 108209 52c890 26 API calls 108208->108209 108210 5566cc 108209->108210 108211 557200 26 API calls 108210->108211 108212 5566e0 108211->108212 108213 52c890 26 API calls 108212->108213 108214 5566ee 108213->108214 108215 557200 26 API calls 108214->108215 108216 556702 108215->108216 108217 52c890 26 API calls 108216->108217 108218 556710 108217->108218 108219 557200 26 API calls 108218->108219 108220 556724 108219->108220 108221 52c890 26 API calls 108220->108221 108222 556732 108221->108222 108223 557200 26 API calls 108222->108223 108224 556746 108223->108224 108225 52c890 26 API calls 108224->108225 108226 556754 108225->108226 108227 557200 26 API calls 108226->108227 108228 556768 108227->108228 108229 52c890 26 API calls 108228->108229 108230 556776 108229->108230 108231 557200 26 API calls 108230->108231 108232 55678a 108231->108232 108233 52c890 26 API calls 108232->108233 108234 556798 108233->108234 108235 557200 26 API calls 108234->108235 108236 5567ac 108235->108236 108237 52c890 26 API calls 108236->108237 108238 5567ba 108237->108238 108239 557200 26 API calls 108238->108239 108240 5567ce 108239->108240 108241 52c890 26 API calls 108240->108241 108242 5567dc 108241->108242 108243 557200 26 API calls 108242->108243 108244 5567f0 108243->108244 108245 52c890 26 API calls 108244->108245 108246 5567fe 108245->108246 108247 557200 26 API calls 108246->108247 108248 556812 108247->108248 108249 52c890 26 API calls 108248->108249 108250 556820 108249->108250 108251 557200 26 API calls 108250->108251 108252 556834 108251->108252 108253 52c890 26 API calls 108252->108253 108254 556842 108253->108254 108255 557200 26 API calls 108254->108255 108256 556856 108255->108256 108257 52c890 26 API calls 108256->108257 108258 556864 108257->108258 108259 557200 26 API calls 108258->108259 108260 556878 108259->108260 108261 52c890 26 API calls 108260->108261 108262 556886 108261->108262 108263 557200 26 API calls 108262->108263 108264 55689a 108263->108264 108265 52c890 26 API calls 108264->108265 108266 5568a8 108265->108266 108267 557200 26 API calls 108266->108267 108268 5568bc 108267->108268 108269 52c890 26 API calls 108268->108269 108270 5568ca 108269->108270 108271 557200 26 API calls 108270->108271 108272 5568de 108271->108272 108273 52c890 26 API calls 108272->108273 108274 5568ec 108273->108274 108275 557200 26 API calls 108274->108275 108276 556900 108275->108276 108277 52c890 26 API calls 108276->108277 108278 55690e 108277->108278 108279 557200 26 API calls 108278->108279 108280 556922 108279->108280 108281 52c890 26 API calls 108280->108281 108282 556930 108281->108282 108283 557200 26 API calls 108282->108283 108284 556944 108283->108284 108285 52c890 26 API calls 108284->108285 108286 556952 108285->108286 108287 557200 26 API calls 108286->108287 108288 556966 108287->108288 108289 52c890 26 API calls 108288->108289 108290 556974 108289->108290 108291 557200 26 API calls 108290->108291 108292 556988 108291->108292 108293 52c890 26 API calls 108292->108293 108294 556996 108293->108294 108295 557200 26 API calls 108294->108295 108296 5569aa 108295->108296 108297 52c890 26 API calls 108296->108297 108298 5569b8 108297->108298 108299 557200 26 API calls 108298->108299 108300 5569cc 108299->108300 108301 52c890 26 API calls 108300->108301 108302 5569da 108301->108302 108303 557200 26 API calls 108302->108303 108304 5569ee 108303->108304 108305 52c890 26 API calls 108304->108305 108306 5569fc 108305->108306 108307 557200 26 API calls 108306->108307 108308 556a10 108307->108308 108309 52c890 26 API calls 108308->108309 108310 556a1e 108309->108310 108311 557200 26 API calls 108310->108311 108312 556a32 108311->108312 108313 52c890 26 API calls 108312->108313 108314 556a40 108313->108314 108315 557200 26 API calls 108314->108315 108316 556a54 108315->108316 108317 52c890 26 API calls 108316->108317 108318 556a62 108317->108318 108319 557200 26 API calls 108318->108319 108320 556a76 108319->108320 108321 52c890 26 API calls 108320->108321 108322 556a84 108321->108322 108323 557200 26 API calls 108322->108323 108324 556a98 108323->108324 108325 52c890 26 API calls 108324->108325 108326 556aa6 108325->108326 108327 557200 26 API calls 108326->108327 108328 556aba 108327->108328 108329 52c890 26 API calls 108328->108329 108330 556ac8 108329->108330 108331 557200 26 API calls 108330->108331 108332 556adc 108331->108332 108333 52c890 26 API calls 108332->108333 108334 556aea 108333->108334 108335 557200 26 API calls 108334->108335 108336 556afe 108335->108336 108337 52c890 26 API calls 108336->108337 108338 556b0c 108337->108338 108339 557200 26 API calls 108338->108339 108340 556b20 108339->108340 108341 52c890 26 API calls 108340->108341 108342 556b2e 108341->108342 108343 557200 26 API calls 108342->108343 108344 556b42 108343->108344 108345 52c890 26 API calls 108344->108345 108346 556b50 108345->108346 108347 557200 26 API calls 108346->108347 108348 556b64 108347->108348 108349 52c890 26 API calls 108348->108349 108350 556b72 108349->108350 108351 557200 26 API calls 108350->108351 108352 556b86 108351->108352 108353 52c890 26 API calls 108352->108353 108354 556b94 108353->108354 108355 557200 26 API calls 108354->108355 108356 556ba8 108355->108356 108357 52c890 26 API calls 108356->108357 108358 556bb6 108357->108358 108359 557200 26 API calls 108358->108359 108360 556bca 108359->108360 108361 52c890 26 API calls 108360->108361 108362 556bd8 108361->108362 108363 557200 26 API calls 108362->108363 108364 556bec 108363->108364 108365 52c890 26 API calls 108364->108365 108366 556bfa 108365->108366 108367 557200 26 API calls 108366->108367 108368 556c0e 108367->108368 108369 52c890 26 API calls 108368->108369 108370 556c1c 108369->108370 108371 557200 26 API calls 108370->108371 108372 556c30 108371->108372 108373 52c890 26 API calls 108372->108373 108374 556c3e 108373->108374 108375 557200 26 API calls 108374->108375 108376 556c52 108375->108376 108377 52c890 26 API calls 108376->108377 108378 556c60 108377->108378 108379 557200 26 API calls 108378->108379 108380 556c74 108379->108380 108381 52c890 26 API calls 108380->108381 108382 556c82 108381->108382 108383 557200 26 API calls 108382->108383 108384 556c96 108383->108384 108385 52c890 26 API calls 108384->108385 108386 556ca4 108385->108386 108387 557200 26 API calls 108386->108387 108388 556cb8 108387->108388 108389 52c890 26 API calls 108388->108389 108390 556cc6 108389->108390 108391 557200 26 API calls 108390->108391 108392 556cda 108391->108392 108393 52c890 26 API calls 108392->108393 108394 556ce8 108393->108394 108395 557200 26 API calls 108394->108395 108396 556cfc 108395->108396 108397 52c890 26 API calls 108396->108397 108398 556d0a 108397->108398 108399 557200 26 API calls 108398->108399 108400 556d1e 108399->108400 108401 52c890 26 API calls 108400->108401 108402 556d2c 108401->108402 108403 557200 26 API calls 108402->108403 108404 556d40 108403->108404 108405 52c890 26 API calls 108404->108405 108406 556d4e 108405->108406 108407 557200 26 API calls 108406->108407 108408 556d62 108407->108408 108409 52c890 26 API calls 108408->108409 108410 556d70 108409->108410 108411 557200 26 API calls 108410->108411 108412 556d84 108411->108412 108413 52c890 26 API calls 108412->108413 108414 556d92 108413->108414 108415 557200 26 API calls 108414->108415 108416 556da6 108415->108416 108417 52c890 26 API calls 108416->108417 108418 556db4 108417->108418 108419 557200 26 API calls 108418->108419 108420 556dc8 108419->108420 108421 52c890 26 API calls 108420->108421 108422 556dd6 108421->108422 108423 557200 26 API calls 108422->108423 108424 556dea 108423->108424 108425 52c890 26 API calls 108424->108425 108426 554844 108425->108426 108426->107977 108428 55452d 108427->108428 108429 554628 108428->108429 108430 55454a 108428->108430 108574 5eec43 5 API calls ___report_securityfailure 108429->108574 108434 52c890 26 API calls 108430->108434 108432 55462d 108575 5f41ac 25 API calls 2 library calls 108432->108575 108436 554580 108434->108436 108435 554632 108576 5f41ac 25 API calls 2 library calls 108435->108576 108566 54b860 108436->108566 108440 55459b 108441 52a4f0 25 API calls 108440->108441 108442 5545a6 108441->108442 108442->108432 108443 5545d2 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108442->108443 108443->108435 108444 554602 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108443->108444 108445 5ee388 _ValidateLocalCookies 5 API calls 108444->108445 108446 554624 108445->108446 108447 52a5d0 108446->108447 108448 52a5f5 108447->108448 108449 52a5fc 108448->108449 108450 52a630 108448->108450 108452 52a653 108448->108452 108449->107982 108451 5ee3a7 std::_Facet_Register 3 API calls 108450->108451 108453 52a641 108451->108453 108454 5ee3a7 std::_Facet_Register 3 API calls 108452->108454 108455 52a648 _Yarn 108452->108455 108453->108455 108593 5f41ac 25 API calls 2 library calls 108453->108593 108454->108455 108455->107982 108459 524aa9 108458->108459 108460 5249ec 108458->108460 108474 543820 108459->108474 108594 5ee6c3 5 API calls __Init_thread_wait 108460->108594 108462 5249f6 108462->108459 108595 52dc50 RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 108462->108595 108475 52c890 26 API calls 108474->108475 108476 543879 108475->108476 108553 557215 108552->108553 108558 557234 108553->108558 108559 557550 108553->108559 108557 55725e 108557->108044 108558->108044 108563 557800 108559->108563 108562 557580 26 API calls 108562->108557 108564 5ee3a7 std::_Facet_Register 3 API calls 108563->108564 108565 55724d 108564->108565 108565->108562 108577 54ba90 108566->108577 108568 54b8ce 108570 54b8e9 BuildCatchObjectHelperInternal 108568->108570 108589 52e690 26 API calls 4 library calls 108568->108589 108573 54b93d BuildCatchObjectHelperInternal 108570->108573 108590 52e690 26 API calls 4 library calls 108570->108590 108572 54b983 108572->108440 108573->108440 108574->108432 108578 54baab 108577->108578 108587 54bb90 _Yarn std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108577->108587 108579 54bc1d 108578->108579 108581 54bb22 _Yarn 108578->108581 108583 54bb11 108578->108583 108584 54bb3b 108578->108584 108578->108587 108592 523420 26 API calls 3 library calls 108579->108592 108581->108587 108591 5f41ac 25 API calls 2 library calls 108581->108591 108582 54bc22 108585 5ee3a7 std::_Facet_Register 3 API calls 108583->108585 108584->108581 108586 5ee3a7 std::_Facet_Register 3 API calls 108584->108586 108585->108581 108586->108581 108587->108568 108589->108570 108590->108572 108592->108582 108594->108462 108645 558330 108646 558344 SetWindowLongW 108645->108646 108647 55836f GetWindowLongW 108645->108647 108648 558356 108646->108648 108647->108648 108649 558382 108647->108649 108650 5583cb DefWindowProcW 108648->108650 108651 55835a 108648->108651 108649->108650 108652 558386 CallWindowProcW SetWindowLongW 108649->108652 108658 564070 108651->108658 108653 5583ac 108652->108653 108656 5583b3 108652->108656 108666 558070 IsWindow SetWindowLongW 108653->108666 108654 558368 108659 564095 108658->108659 108660 5640c5 108658->108660 108659->108660 108667 5639e0 GetWindowLongW SetWindowLongW GetClientRect SetWindowPos 108659->108667 108661 5642c1 108660->108661 108761 5591b0 108660->108761 108661->108654 108664 5642a7 CallWindowProcW 108664->108654 108666->108656 108870 558f20 108667->108870 108670 563a95 108890 55eb00 108670->108890 108673 563ae5 108674 563c51 108673->108674 108676 563b03 108673->108676 108677 563b1c ___scrt_fastfail 108673->108677 108675 55ee40 16 API calls 108674->108675 108686 563c64 108675->108686 108679 55ed90 16 API calls 108676->108679 108680 563b2f GetModuleFileNameW 108677->108680 108678 563cae 108685 563cbe 108678->108685 108708 563e6e 108678->108708 108681 563c02 108679->108681 108682 55ecb0 16 API calls 108680->108682 108683 563c18 108681->108683 108916 5f41fd 14 API calls _free 108681->108916 108689 563b6e _wcsrchr 108682->108689 108691 563c3b 108683->108691 108692 55ebe0 16 API calls 108683->108692 108687 563df8 108685->108687 108694 563ce2 FindResourceW 108685->108694 108686->108678 108690 55ebe0 16 API calls 108686->108690 108697 563f76 108687->108697 108698 563e1e 108687->108698 108688 563bc2 108693 55eb00 16 API calls 108688->108693 108689->108688 108913 55ef60 16 API calls 108689->108913 108690->108678 108691->108674 108917 5f41fd 14 API calls _free 108691->108917 108692->108691 108700 563bd7 108693->108700 108695 564006 108694->108695 108696 563cf4 LoadResource 108694->108696 108705 56401c 108695->108705 108929 5f41fd 14 API calls _free 108695->108929 108702 563d15 FreeResource 108696->108702 108703 563d20 SizeofResource 108696->108703 108925 55f9f0 203 API calls 108697->108925 108919 5f892c 48 API calls std::_Locinfo::_Locinfo_dtor 108698->108919 108700->108676 108915 5f41fd 14 API calls _free 108700->108915 108702->108695 108703->108695 108707 563d3f 108703->108707 108704 563ba0 108709 55ed90 16 API calls 108704->108709 108706 56402f 108705->108706 108930 5f41fd 14 API calls _free 108705->108930 108715 564042 108706->108715 108931 5f41fd 14 API calls _free 108706->108931 108728 563d51 LockResource 108707->108728 108729 563d6d FreeResource 108707->108729 108716 563ee9 108708->108716 108718 563f4d 108708->108718 108723 563eda 108708->108723 108717 563bac 108709->108717 108712 563bed 108712->108676 108722 5ee388 _ValidateLocalCookies 5 API calls 108715->108722 108724 55ee40 16 API calls 108716->108724 108717->108688 108914 5f41fd 14 API calls _free 108717->108914 108718->108687 108924 5f41fd 14 API calls _free 108718->108924 108720 563e28 108727 563e44 108720->108727 108920 5f41fd 14 API calls _free 108720->108920 108733 56405f 108722->108733 108922 575340 15 API calls 2 library calls 108723->108922 108734 563ef4 108724->108734 108725 563fa0 108726 563e67 108725->108726 108926 5f41fd 14 API calls _free 108725->108926 108736 563fc3 MessageBoxW ExitProcess 108726->108736 108737 563fde 108726->108737 108921 55f9f0 203 API calls 108727->108921 108738 563d6a _Yarn 108728->108738 108747 563d84 108729->108747 108733->108660 108742 55eb00 16 API calls 108734->108742 108927 55b8c0 29 API calls 2 library calls 108737->108927 108738->108729 108741 563edf 108741->108716 108744 563f0b 108742->108744 108897 55ebe0 108744->108897 108746 563fe6 108749 563fff 108746->108749 108928 55e990 16 API calls 108746->108928 108747->108687 108750 563dd5 108747->108750 108753 563dc6 108747->108753 108748 563f20 108904 574fc0 108748->108904 108749->108695 108755 55ee40 16 API calls 108750->108755 108918 575340 15 API calls 2 library calls 108753->108918 108754 563f2f 108754->108718 108923 5f41fd 14 API calls _free 108754->108923 108757 563de4 108755->108757 108757->108687 108760 574fc0 29 API calls 108757->108760 108758 563dcb 108758->108750 108760->108687 108768 55920d 108761->108768 108853 5592b7 108761->108853 108762 55926c 108764 559377 108762->108764 108776 5592a3 IsIconic 108762->108776 108762->108853 108763 5ee388 _ValidateLocalCookies 5 API calls 108765 55b690 108763->108765 108769 559384 108764->108769 108782 5593a9 108764->108782 108765->108661 108765->108664 108766 55ab25 108772 55ab30 108766->108772 108773 55b02a 108766->108773 108767 55a6c4 108770 55a839 108767->108770 108771 55a6ca 108767->108771 108768->108762 108774 5592cb 108768->108774 108775 55938c SendMessageW 108769->108775 108769->108853 108791 55a870 108770->108791 108792 55a878 SendMessageW 108770->108792 108817 55a89c 108770->108817 108770->108853 108778 55a6d4 108771->108778 108779 55a708 108771->108779 108780 55ab36 108772->108780 108781 55aeff 108772->108781 108777 55b035 108773->108777 108836 55b57d std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108773->108836 108785 559317 ScreenToClient 108774->108785 108774->108853 108775->108853 108776->108782 108776->108853 108783 55b48e 108777->108783 108786 55b046 108777->108786 108816 55b15f 108777->108816 108793 55a6ea SendMessageW 108778->108793 108778->108853 108794 55a724 IsRectEmpty 108779->108794 108804 55a768 108779->108804 108787 55ad57 108780->108787 108788 55ae01 108780->108788 108789 55ac5e 108780->108789 108790 55ab4b 108780->108790 108780->108853 108784 55af0c ScreenToClient 108781->108784 108781->108853 108782->108766 108782->108767 108782->108853 108795 55b49b GetClientRect SaveDC 108783->108795 108783->108853 108801 55af76 108784->108801 108785->108853 108808 55b07c 108786->108808 108809 55b06b SendMessageW 108786->108809 108786->108853 108796 55ad85 ReleaseCapture GetTickCount 108787->108796 108787->108853 108798 55ae0a SetFocus 108788->108798 108831 55ae16 108788->108831 108802 55ac67 SetFocus 108789->108802 108834 55ac73 108789->108834 108799 55ab54 SetFocus 108790->108799 108824 55ab60 108790->108824 108800 55a888 _TrackMouseEvent 108791->108800 108792->108800 108793->108853 108803 55a735 IsIconic 108794->108803 108794->108804 108807 55b4cd 108795->108807 108828 55a80d 108796->108828 108797 55b61d 108797->108853 109026 5f41fd 14 API calls _free 108797->109026 108798->108831 108799->108824 108800->108817 108827 55af95 108801->108827 108801->108853 108802->108834 108806 55a74f 108803->108806 108803->108853 108814 55a7cf GetTickCount 108804->108814 108804->108853 108805 55a906 GetTickCount 109018 5584c0 GetKeyState GetKeyState GetKeyState GetKeyState GetKeyState 108805->109018 108811 5591b0 54 API calls 108806->108811 108812 55b56b RestoreDC 108807->108812 108813 55b4da GetWindow 108807->108813 108815 55b089 GetCursorPos GetWindowRect IsIconic 108808->108815 108808->108853 108809->108808 108811->108853 108812->108853 108813->108812 108819 55b4f2 108813->108819 109017 5584c0 GetKeyState GetKeyState GetKeyState GetKeyState GetKeyState 108814->109017 108822 55b142 108815->108822 108823 55b0c9 GetActiveWindow 108815->108823 108825 55b226 108816->108825 108826 55b1cd GetTickCount 108816->108826 108816->108853 108817->108805 108817->108853 108820 55b500 GetWindowRect MapWindowPoints SetWindowOrgEx SendMessageW GetWindow 108819->108820 108820->108812 108820->108820 108830 55b144 SendMessageW 108822->108830 108823->108822 108829 55b0d7 PtInRect 108823->108829 108843 55abd6 SetCapture GetTickCount 108824->108843 108824->108853 108844 55b250 108825->108844 108845 55b26a 108825->108845 109022 5584c0 GetKeyState GetKeyState GetKeyState GetKeyState GetKeyState 108826->109022 109021 5584c0 GetKeyState GetKeyState GetKeyState GetKeyState GetKeyState 108827->109021 108828->108853 108829->108822 108835 55b0f1 SendMessageW 108829->108835 108830->108853 108837 55ae84 GetTickCount 108831->108837 108831->108853 108841 55ace1 SetCapture GetTickCount 108834->108841 108834->108853 108835->108822 108842 55b119 ScreenToClient 108835->108842 108836->108797 108836->108853 109025 557c20 14 API calls __freea 108836->109025 108837->108828 108839 55b210 108839->108825 108840 55afdf GetTickCount 108848 55affe SendMessageW 108840->108848 108841->108828 108842->108830 108843->108828 108844->108853 109023 5f41fd 14 API calls _free 108844->109023 109024 55e350 49 API calls 4 library calls 108845->109024 108848->108853 108849 55b275 108855 55b304 CreateWindowExW SendMessageW 108849->108855 108856 55b3ab 108849->108856 108852 55a938 ___std_exception_copy 108852->108828 108852->108853 109019 55e930 14 API calls 3 library calls 108852->109019 108853->108763 108859 55b363 SendMessageW SendMessageW SendMessageW 108855->108859 108858 55b3b5 108856->108858 108861 55b418 SendMessageW 108856->108861 108864 55b3d4 108856->108864 108857 55aa06 _Yarn 108866 55aa8f 108857->108866 108867 55aa7a SendMessageW 108857->108867 108860 55b45c SendMessageW 108858->108860 108859->108856 108860->108783 108865 55b430 SendMessageW SendMessageW 108861->108865 108863 55b40a 108863->108865 108864->108863 108868 55b3ea SendMessageW 108864->108868 108865->108860 108866->108828 109020 5f41fd 14 API calls _free 108866->109020 108867->108866 108868->108863 108932 55f5f0 108870->108932 108872 558f34 108936 55d360 108872->108936 108885 558f85 GetDC 108975 55e990 16 API calls 108885->108975 108886 558fa3 108886->108670 108912 55e990 16 API calls 108886->108912 108888 558f70 108888->108885 108888->108886 108891 55eb30 108890->108891 108891->108891 108892 55eb46 108891->108892 108895 55eb59 108891->108895 108893 55eb50 108892->108893 108983 5f41fd 14 API calls _free 108892->108983 108893->108673 108895->108893 108984 5fae2f 16 API calls 3 library calls 108895->108984 108898 55ebf0 108897->108898 108899 55ec1f 108898->108899 108900 55ec59 108898->108900 108903 55ec2b ___std_exception_copy 108899->108903 108985 5fae2f 16 API calls 3 library calls 108899->108985 108900->108903 108986 5f41fd 14 API calls _free 108900->108986 108903->108748 108903->108903 108905 5ee3a7 std::_Facet_Register 3 API calls 108904->108905 108906 574fd7 108905->108906 108987 574920 108906->108987 108908 575002 108909 57500b std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108908->108909 108910 5ee3a7 std::_Facet_Register 3 API calls 108908->108910 108909->108754 108911 575029 108910->108911 108911->108754 108912->108670 108913->108704 108914->108688 108915->108712 108916->108683 108917->108674 108918->108758 108919->108720 108920->108727 108921->108726 108922->108741 108923->108718 108924->108687 108925->108725 108926->108726 108927->108746 108928->108749 108929->108705 108930->108706 108931->108715 108933 55f657 ___scrt_fastfail 108932->108933 108934 55f601 std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108932->108934 108933->108872 108934->108933 108976 5f41fd 14 API calls _free 108934->108976 108939 55d40d 108936->108939 108942 55d37a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108936->108942 108937 55f5f0 14 API calls 108938 558f3c 108937->108938 108943 55d8b0 108938->108943 108939->108937 108940 55d3d1 DeleteObject 108940->108942 108942->108939 108942->108940 108977 5f41fd 14 API calls _free 108942->108977 108944 55d932 108943->108944 108945 55d8c6 108943->108945 108946 55f5f0 14 API calls 108944->108946 108945->108944 108978 579b00 15 API calls 2 library calls 108945->108978 108947 558f44 108946->108947 108949 55d990 108947->108949 108950 55da30 108949->108950 108951 55d9aa std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108949->108951 108952 55f5f0 14 API calls 108950->108952 108951->108950 108979 5f41fd 14 API calls _free 108951->108979 108953 558f4c 108952->108953 108955 55da50 108953->108955 108956 55daf0 108955->108956 108959 55da6a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108955->108959 108957 55f5f0 14 API calls 108956->108957 108958 558f53 108957->108958 108961 55be70 108958->108961 108959->108956 108980 5f41fd 14 API calls _free 108959->108980 108964 55bf0a 108961->108964 108966 55be8a std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108961->108966 108962 55f5f0 14 API calls 108963 558f5a 108962->108963 108967 55c360 108963->108967 108964->108962 108966->108964 108981 5f41fd 14 API calls _free 108966->108981 108968 55c36e std::_Fac_tidy_reg_t::~_Fac_tidy_reg_t 108967->108968 108972 55c3b8 108967->108972 108971 55c38a IsWindow 108968->108971 108968->108972 108970 558f61 108970->108888 108974 5f41fd 14 API calls _free 108970->108974 108971->108968 108973 55c395 KillTimer 108971->108973 108972->108970 108982 5f41fd 14 API calls _free 108972->108982 108973->108968 108974->108888 108975->108886 108976->108934 108977->108942 108978->108945 108979->108951 108980->108959 108981->108966 108982->108970 108983->108893 108984->108893 108985->108903 108986->108903 108988 574932 108987->108988 108989 574abc 108987->108989 108988->108989 108990 57493c GetCurrentDirectoryW 108988->108990 108989->108908 108991 574951 108990->108991 108991->108991 108992 57496c GetFileType 108991->108992 108993 574988 108991->108993 108992->108993 108994 57497a 108992->108994 108995 574992 108993->108995 108996 5749e7 GetCurrentProcess GetCurrentProcess DuplicateHandle 108993->108996 108997 5749b3 108993->108997 108994->108908 108995->108908 109000 574a0a 108996->109000 109001 574a18 108996->109001 108998 574a29 108997->108998 108999 5749b8 CreateFileW 108997->108999 109002 5ee3a7 std::_Facet_Register 3 API calls 108998->109002 109003 574a1b GetFileType 108999->109003 109004 5749d9 108999->109004 109000->108908 109001->109003 109005 574a30 109002->109005 109003->108998 109004->108908 109006 574a75 109005->109006 109007 574a3a 109005->109007 109009 574aa5 109006->109009 109010 574a93 SetFilePointer 109006->109010 109007->109006 109008 574a3f 109007->109008 109015 573990 20 API calls 2 library calls 109008->109015 109016 573990 20 API calls 2 library calls 109009->109016 109010->109009 109013 574a65 109013->108908 109014 574aac 109014->108908 109015->109013 109016->109014 109017->108828 109018->108852 109019->108857 109020->108828 109021->108840 109022->108839 109023->108853 109024->108849 109025->108836 109026->108853 109027 60ceec 109028 60beee __fread_nolock 25 API calls 109027->109028 109029 60cefa 109028->109029 109030 60cf28 109029->109030 109031 60cf09 109029->109031 109033 60cf43 109030->109033 109034 60cf36 109030->109034 109055 60228d 14 API calls __dosmaperr 109031->109055 109039 60cf56 109033->109039 109057 60d2b4 27 API calls __wsopen_s 109033->109057 109056 60228d 14 API calls __dosmaperr 109034->109056 109037 60cfd5 109044 60d11a 109037->109044 109039->109037 109040 60cf0e 109039->109040 109041 61514a __fread_nolock 25 API calls 109039->109041 109042 60cfc8 109039->109042 109041->109042 109042->109037 109058 60d351 15 API calls 2 library calls 109042->109058 109045 60beee __fread_nolock 25 API calls 109044->109045 109046 60d129 109045->109046 109047 60d1cc 109046->109047 109048 60d13c 109046->109048 109049 6098d9 _Xfiopen 70 API calls 109047->109049 109050 60d159 109048->109050 109053 60d17d 109048->109053 109052 60d166 109049->109052 109051 6098d9 _Xfiopen 70 API calls 109050->109051 109051->109052 109052->109040 109053->109052 109059 603bee 109053->109059 109055->109040 109056->109040 109057->109039 109058->109037 109062 603a6e 109059->109062 109061 603c04 109061->109052 109063 603a7a ___BuildCatchObject 109062->109063 109064 603a82 109063->109064 109065 603a9a 109063->109065 109088 60227a 14 API calls __dosmaperr 109064->109088 109067 603b4b 109065->109067 109071 603acf 109065->109071 109093 60227a 14 API calls __dosmaperr 109067->109093 109068 603a87 109089 60228d 14 API calls __dosmaperr 109068->109089 109087 60f5ed EnterCriticalSection 109071->109087 109072 603b50 109094 60228d 14 API calls __dosmaperr 109072->109094 109075 603ad5 109077 603af9 109075->109077 109078 603b0e 109075->109078 109076 603b58 109095 5f419c 25 API calls SimpleUString::operator= 109076->109095 109090 60228d 14 API calls __dosmaperr 109077->109090 109081 603b70 __wsopen_s 27 API calls 109078->109081 109080 603a8f _Atexit 109080->109061 109084 603b09 109081->109084 109083 603afe 109091 60227a 14 API calls __dosmaperr 109083->109091 109092 603b43 LeaveCriticalSection __wsopen_s 109084->109092 109087->109075 109088->109068 109089->109080 109090->109083 109091->109084 109092->109080 109093->109072 109094->109076 109095->109080 109096 5eede2 109097 5eedee ___BuildCatchObject 109096->109097 109122 5ee82d 109097->109122 109099 5eedf5 109100 5eef48 109099->109100 109109 5eee1f ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock _Atexit 109099->109109 109139 5ef77b IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 109100->109139 109102 5eef4f 109140 605f63 23 API calls _Atexit 109102->109140 109104 5eef55 109141 605f27 23 API calls _Atexit 109104->109141 109106 5eef5d 109107 5eee3e 109108 5eeebf 109130 5ef895 109108->109130 109109->109107 109109->109108 109138 5f77a4 37 API calls 4 library calls 109109->109138 109111 5eeec5 109134 548b90 109111->109134 109123 5ee836 109122->109123 109142 5ef963 IsProcessorFeaturePresent 109123->109142 109125 5ee842 109143 5f2a57 10 API calls 3 library calls 109125->109143 109127 5ee847 109129 5ee84b 109127->109129 109144 5f2a80 8 API calls 3 library calls 109127->109144 109129->109099 109131 5f0910 ___scrt_fastfail 109130->109131 109132 5ef8a8 GetStartupInfoW 109131->109132 109133 5ef8bb 109132->109133 109133->109111 109135 548bd5 109134->109135 109145 525a00 109135->109145 109137 548bda 109138->109108 109139->109102 109140->109104 109141->109106 109142->109125 109143->109127 109144->109129 109146 525a8e 109145->109146 109147 525a38 109145->109147 109146->109137 109155 5ee6c3 5 API calls __Init_thread_wait 109147->109155 109149 525a42 109149->109146 109156 52dc50 RaiseException EnterCriticalSection LeaveCriticalSection std::_Facet_Register 109149->109156 109151 525a6e 109152 5eea1f pre_c_initialization 28 API calls 109151->109152 109153 525a84 109152->109153 109157 5ee679 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 109153->109157 109155->109149 109156->109151 109157->109146 109158 5ed950 109160 5ed96c _Xfiopen 109158->109160 109159 5ed9b8 109160->109159 109161 5ed9b2 109160->109161 109164 5f94a8 72 API calls _Xfiopen 109160->109164 109161->109159 109163 5f9cbe _Xfiopen 75 API calls 109161->109163 109163->109159 109164->109161 109165 60dfde 109170 60db40 109165->109170 109168 60e01d 109171 60db5f 109170->109171 109172 60db72 109171->109172 109180 60db87 __fassign 109171->109180 109190 60228d 14 API calls __dosmaperr 109172->109190 109174 60db77 109191 5f419c 25 API calls SimpleUString::operator= 109174->109191 109176 60db82 109176->109168 109187 60a504 109176->109187 109178 60dd5b 109196 5f419c 25 API calls SimpleUString::operator= 109178->109196 109185 60dcaa 109180->109185 109192 616d77 47 API calls 3 library calls 109180->109192 109182 60dcfa 109182->109185 109193 616d77 47 API calls 3 library calls 109182->109193 109184 60dd18 109184->109185 109194 616d77 47 API calls 3 library calls 109184->109194 109185->109176 109195 60228d 14 API calls __dosmaperr 109185->109195 109197 609dfc 109187->109197 109189 60a51f 109189->109168 109190->109174 109191->109176 109192->109182 109193->109184 109194->109185 109195->109178 109196->109176 109200 609e08 ___BuildCatchObject 109197->109200 109198 609e0f 109217 60228d 14 API calls __dosmaperr 109198->109217 109200->109198 109202 609e3a 109200->109202 109201 609e14 109218 5f419c 25 API calls SimpleUString::operator= 109201->109218 109208 60a494 109202->109208 109207 609e1e _Atexit 109207->109189 109209 5fa9d5 __wsopen_s 47 API calls 109208->109209 109210 60a4b6 109209->109210 109211 5fa9b6 _strftime 17 API calls 109210->109211 109212 60a4c3 109211->109212 109213 60a4ca 109212->109213 109220 60a524 109212->109220 109215 609e5e 109213->109215 109216 60aea3 _free 14 API calls 109213->109216 109219 609e87 LeaveCriticalSection __wsopen_s 109215->109219 109216->109215 109217->109201 109218->109207 109219->109207 109267 60a254 109220->109267 109223 60a556 109298 60227a 14 API calls __dosmaperr 109223->109298 109224 60a56f 109284 60f6c7 109224->109284 109227 60a574 109229 60a594 109227->109229 109230 60a57d 109227->109230 109228 60a55b 109299 60228d 14 API calls __dosmaperr 109228->109299 109297 60a1bf CreateFileW 109229->109297 109300 60227a 14 API calls __dosmaperr 109230->109300 109234 60a568 109234->109213 109235 60a582 109301 60228d 14 API calls __dosmaperr 109235->109301 109237 60a64a GetFileType 109238 60a655 GetLastError 109237->109238 109239 60a69c 109237->109239 109304 602257 14 API calls 2 library calls 109238->109304 109306 60f610 15 API calls 3 library calls 109239->109306 109240 60a61f GetLastError 109303 602257 14 API calls 2 library calls 109240->109303 109243 60a5cd 109243->109237 109243->109240 109302 60a1bf CreateFileW 109243->109302 109244 60a663 CloseHandle 109244->109228 109248 60a68c 109244->109248 109247 60a612 109247->109237 109247->109240 109305 60228d 14 API calls __dosmaperr 109248->109305 109249 60a6bd 109251 60a709 109249->109251 109307 60a3d0 78 API calls 4 library calls 109249->109307 109256 60a710 109251->109256 109308 609f6a 78 API calls 5 library calls 109251->109308 109252 60a691 109252->109228 109255 60a73e 109255->109256 109257 60a74c 109255->109257 109258 609cb6 __wsopen_s 28 API calls 109256->109258 109257->109234 109259 60a7c8 CloseHandle 109257->109259 109258->109234 109309 60a1bf CreateFileW 109259->109309 109261 60a7f3 109262 60a7fd GetLastError 109261->109262 109266 60a829 109261->109266 109310 602257 14 API calls 2 library calls 109262->109310 109264 60a809 109311 60f7d0 15 API calls 3 library calls 109264->109311 109266->109234 109268 60a275 109267->109268 109269 60a28f 109267->109269 109268->109269 109319 60228d 14 API calls __dosmaperr 109268->109319 109312 60a1e4 109269->109312 109272 60a284 109320 5f419c 25 API calls SimpleUString::operator= 109272->109320 109274 60a2c7 109275 60a2f6 109274->109275 109321 60228d 14 API calls __dosmaperr 109274->109321 109282 60a349 109275->109282 109323 606c68 25 API calls 2 library calls 109275->109323 109278 60a344 109281 5f41c9 __Getctype 11 API calls 109278->109281 109278->109282 109279 60a2eb 109322 5f419c 25 API calls SimpleUString::operator= 109279->109322 109283 60a3cf 109281->109283 109282->109223 109282->109224 109285 60f6d3 ___BuildCatchObject 109284->109285 109326 603d1b EnterCriticalSection 109285->109326 109287 60f6da 109288 60f6ff 109287->109288 109292 60f764 EnterCriticalSection 109287->109292 109295 60f721 109287->109295 109330 60f4a7 15 API calls 3 library calls 109288->109330 109291 60f741 _Atexit 109291->109227 109294 60f771 LeaveCriticalSection 109292->109294 109292->109295 109293 60f704 109293->109295 109331 60f5ed EnterCriticalSection 109293->109331 109294->109287 109327 60f7c7 109295->109327 109297->109243 109298->109228 109299->109234 109300->109235 109301->109228 109302->109247 109303->109228 109304->109244 109305->109252 109306->109249 109307->109251 109308->109255 109309->109261 109310->109264 109311->109266 109314 60a1fc 109312->109314 109313 60a217 109313->109274 109314->109313 109324 60228d 14 API calls __dosmaperr 109314->109324 109316 60a23b 109325 5f419c 25 API calls SimpleUString::operator= 109316->109325 109318 60a246 109318->109274 109319->109272 109320->109269 109321->109279 109322->109275 109323->109278 109324->109316 109325->109318 109326->109287 109332 603d63 LeaveCriticalSection 109327->109332 109329 60f7ce 109329->109291 109330->109293 109331->109295 109332->109329

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 0 5639e0-563a87 GetWindowLongW SetWindowLongW GetClientRect SetWindowPos call 558f20 3 563a95-563af3 call 55eb00 0->3 4 563a89-563a90 call 55e990 0->4 8 563c54-563c6e call 55ee40 3->8 9 563af9-563b01 3->9 4->3 16 563c70-563c72 8->16 17 563cae-563cb8 8->17 11 563b03-563b17 9->11 12 563b1c-563b80 call 5f0910 GetModuleFileNameW call 55ecb0 call 5f01fe 9->12 14 563bf0-563c10 call 55ed90 11->14 39 563bc5-563be5 call 55eb00 12->39 40 563b82-563b8a 12->40 24 563c12-563c18 call 5f41fd 14->24 25 563c1b-563c2d 14->25 21 563c75-563c7e 16->21 31 563e6e-563e89 17->31 32 563cbe-563cc1 17->32 21->21 23 563c80-563c8c 21->23 23->17 30 563c8e-563c91 23->30 24->25 42 563c2f-563c36 call 55ebe0 25->42 43 563c3b-563c49 25->43 30->17 34 563c93-563ca9 call 55ebe0 30->34 51 563e90-563e96 31->51 37 563cc7-563cee FindResourceW 32->37 38 563e03-563e18 32->38 34->17 52 564006-564014 37->52 53 563cf4-563d13 LoadResource 37->53 54 563f76-563fb4 call 55f9f0 38->54 55 563e1e-563e3c call 5f892c 38->55 39->14 70 563be7-563bed call 5f41fd 39->70 40->39 45 563b8c-563bba call 55ef60 call 55ed90 40->45 42->43 43->8 47 563c4b-563c51 call 5f41fd 43->47 45->39 100 563bbc-563bc2 call 5f41fd 45->100 47->8 58 563eb6-563eb8 51->58 59 563e98-563e9b 51->59 67 564016-56401c call 5f41fd 52->67 68 56401f-564027 52->68 61 563d15-563d1b FreeResource 53->61 62 563d20-563d39 SizeofResource 53->62 104 563fb6-563fbc call 5f41fd 54->104 105 563fbf-563fc1 54->105 106 563e47-563e69 call 55f9f0 55->106 107 563e3e-563e44 call 5f41fd 55->107 66 563ebb-563ec2 58->66 63 563eb2-563eb4 59->63 64 563e9d-563ea5 59->64 61->52 62->52 74 563d3f-563d4f call 5ee3ff 62->74 63->66 64->58 71 563ea7-563eb0 64->71 76 563ec4-563ec6 66->76 77 563ecc-563ece 66->77 67->68 72 564032-56403a 68->72 73 564029-56402f call 5f41fd 68->73 70->14 71->51 71->63 85 564045-564062 call 5ee388 72->85 86 56403c-564042 call 5f41fd 72->86 73->72 109 563d51-563d6a LockResource call 5f0a70 74->109 110 563d6d-563d7f FreeResource 74->110 76->77 91 563f50-563f62 76->91 88 563ed0-563ed8 77->88 89 563ee9-563f2a call 55ee40 call 55eb00 call 55ebe0 call 574fc0 77->89 86->85 88->89 99 563eda-563edf call 575340 88->99 151 563f2f-563f45 89->151 91->38 101 563f68-563f71 call 5f41fd 91->101 99->89 100->39 101->38 104->105 117 563fc3-563fd8 MessageBoxW ExitProcess 105->117 118 563fde-563ff1 call 55b8c0 105->118 106->105 107->106 109->110 122 563d84-563d8a 110->122 143 563ff3-563ffa call 55e990 118->143 144 563fff-564001 118->144 131 563d8c-563d8f 122->131 132 563daa-563dac 122->132 138 563da6-563da8 131->138 139 563d91-563d99 131->139 135 563daf-563db1 132->135 140 563db3-563dba 135->140 141 563e00 135->141 138->135 139->132 145 563d9b-563da4 139->145 146 563dd5-563deb call 55ee40 140->146 147 563dbc-563dc4 140->147 141->38 143->144 144->52 145->122 145->138 146->141 158 563ded-563dfb call 574fc0 146->158 147->146 150 563dc6-563dcb call 575340 147->150 150->146 151->91 154 563f47-563f4d call 5f41fd 151->154 154->91 158->141
              APIs
              • GetWindowLongW.USER32(?,000000F0), ref: 00563A15
              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00563A2B
              • GetClientRect.USER32(?,?), ref: 00563A3B
              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000020), ref: 00563A68
                • Part of subcall function 00558F20: GetDC.USER32(?), ref: 00558F8C
              • GetModuleFileNameW.KERNEL32(00520000,?,00000104), ref: 00563B3F
              • _wcsrchr.LIBVCRUNTIME ref: 00563B76
              • FindResourceW.KERNEL32(00000000,00000000), ref: 00563CE4
              • LoadResource.KERNEL32(00000000,00000000), ref: 00563D04
              • FreeResource.KERNEL32(00000000), ref: 00563D15
              • SizeofResource.KERNEL32(00000000,00000000), ref: 00563D2F
              • LockResource.KERNEL32(?,00000000), ref: 00563D58
              • MessageBoxW.USER32(00000000,0063F87C,Duilib,00000010), ref: 00563FD0
              • ExitProcess.KERNEL32 ref: 00563FD8
              • FreeResource.KERNEL32(00000000), ref: 00563D6E
                • Part of subcall function 005F41FD: _free.LIBCMT ref: 005F4210
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Resource$Window$FreeLong$ClientExitFileFindLoadLockMessageModuleNameProcessRectSizeof_free_wcsrchr
              • String ID: Duilib$ZIPRES$\$dJe$membuffer$xml
              • API String ID: 111627710-3905235569
              • Opcode ID: 47b4c30d92ecc54e3015bfb2e82aecaa1410db6a1c5d8a818925d25652389470
              • Instruction ID: ea0515c0a6d32a24d3af5f44c13db7ed355ae475b8e6dc4bca6c4178fd9599d3
              • Opcode Fuzzy Hash: 47b4c30d92ecc54e3015bfb2e82aecaa1410db6a1c5d8a818925d25652389470
              • Instruction Fuzzy Hash: 9A02C971A002169FDB25DF24DC59BAA7BBABF54305F0405A8E906E7291EF31AF84CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 729 526920-526975 call 5f0910 GetUserNameW 732 526b30-526b41 call 5ee388 729->732 733 52697b-5269f6 call 5f0910 * 2 LookupAccountNameW 729->733 733->732 740 5269fc-526a0b IsValidSid 733->740 740->732 741 526a11-526a23 GetSidIdentifierAuthority 740->741 742 526a29-526a4d call 52f8e0 741->742 743 526b2f 741->743 742->743 746 526a53-526a6c 742->746 743->732 747 526a70-526a79 746->747 747->747 748 526a7b-526aa4 call 52f8e0 747->748 748->743 751 526aaa-526abf GetSidSubAuthorityCount 748->751 751->743 752 526ac1-526ac7 751->752 752->743 753 526ac9-526acf 752->753 753->743 754 526ad1-526ae1 GetSidSubAuthority 753->754 755 526ae3-526b0d call 52f8e0 754->755 756 526b2d 754->756 755->756 759 526b0f-526b18 755->759 756->743 759->754 760 526b1a-526b2c call 5ee388 759->760
              APIs
              • GetUserNameW.ADVAPI32(?,00000104), ref: 0052696D
              • LookupAccountNameW.ADVAPI32(00000000,?,?,00000208,?,00000104,?), ref: 005269EE
              • IsValidSid.ADVAPI32(?), ref: 00526A03
              • GetSidIdentifierAuthority.ADVAPI32(?), ref: 00526A19
              • GetSidSubAuthorityCount.ADVAPI32(?), ref: 00526AB7
              • GetSidSubAuthority.ADVAPI32(?,00000000), ref: 00526AD9
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Authority$Name$AccountCountIdentifierLookupUserValid
              • String ID: %-lu$-%lu$S-%lu-
              • API String ID: 3075695049-474367829
              • Opcode ID: 6e51cfe307fad3aca5d75cc1a6ba9f5f7bb62ff46af4757466081fb5511eb4ea
              • Instruction ID: 77c1ab69d08ce2e4d8c5651c602bcd24ec29ca5772a8ce577834ed72dc1b85f1
              • Opcode Fuzzy Hash: 6e51cfe307fad3aca5d75cc1a6ba9f5f7bb62ff46af4757466081fb5511eb4ea
              • Instruction Fuzzy Hash: C251B5B1A402285BDB209F64DC49BDABBBDBF89310F0402E6E519D71C2DB719A95CF50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 784 60ec7b-60eca3 call 60e893 call 60e8f1 789 60eca9-60ecb5 call 60e899 784->789 790 60ee4b-60ee80 call 5f41c9 call 60e893 call 60e8f1 784->790 789->790 796 60ecbb-60ecc6 789->796 815 60ee86-60ee92 call 60e899 790->815 816 60efaa-60f006 call 5f41c9 call 603a63 790->816 797 60ecc8-60ecca 796->797 798 60ecfc-60ed05 call 60aea3 796->798 800 60eccc-60ecd0 797->800 811 60ed08-60ed0d 798->811 803 60ecd2-60ecd4 800->803 804 60ecec-60ecee 800->804 807 60ecd6-60ecdc 803->807 808 60ece8-60ecea 803->808 809 60ecf1-60ecf3 804->809 807->804 812 60ecde-60ece6 807->812 808->809 813 60ee45-60ee4a 809->813 814 60ecf9 809->814 811->811 817 60ed0f-60ed30 call 60b17a call 60aea3 811->817 812->800 812->808 814->798 815->816 825 60ee98-60eea4 call 60e8c5 815->825 833 60f010-60f013 816->833 834 60f008-60f00e 816->834 817->813 831 60ed36-60ed39 817->831 825->816 836 60eeaa-60eecb call 60aea3 GetTimeZoneInformation 825->836 835 60ed3c-60ed41 831->835 837 60f056-60f068 833->837 839 60f015-60f025 call 60b17a 833->839 834->837 835->835 838 60ed43-60ed55 call 60a8dd 835->838 846 60eed1-60eef2 836->846 847 60ef86-60efa9 call 60e88d call 60e881 call 60e887 836->847 842 60f078 837->842 843 60f06a-60f06d 837->843 838->790 857 60ed5b-60ed6e call 60fd09 838->857 859 60f027 839->859 860 60f02f-60f048 call 603a63 839->860 848 60f07d-60f094 call 60aea3 call 5ee388 842->848 849 60f078 call 60ee58 842->849 843->842 850 60f06f-60f076 call 60ec7b 843->850 853 60eef4-60eef9 846->853 854 60eefc-60ef03 846->854 849->848 850->848 853->854 862 60ef15-60ef17 854->862 863 60ef05-60ef0c 854->863 857->790 881 60ed74-60ed77 857->881 861 60f028-60f02d call 60aea3 859->861 877 60f04a-60f04b 860->877 878 60f04d-60f053 call 60aea3 860->878 883 60f055 861->883 872 60ef19-60ef42 call 603e16 call 60e4b9 862->872 863->862 870 60ef0e-60ef13 863->870 870->872 897 60ef50-60ef52 872->897 898 60ef44-60ef47 872->898 877->861 878->883 887 60ed79-60ed7d 881->887 888 60ed7f-60ed85 881->888 883->837 887->881 887->888 892 60ed87 888->892 893 60ed88-60ed95 call 5f8951 888->893 892->893 899 60ed98-60ed9d 893->899 901 60ef54-60ef72 call 60e4b9 897->901 898->897 900 60ef49-60ef4e 898->900 903 60eda6-60eda7 899->903 904 60ed9f-60eda4 899->904 900->901 907 60ef81-60ef84 901->907 908 60ef74-60ef77 901->908 903->899 904->903 906 60eda9-60edac 904->906 909 60edfa-60edfd 906->909 910 60edae-60edc5 call 5f8951 906->910 907->847 908->907 911 60ef79-60ef7f 908->911 912 60ee04-60ee18 909->912 913 60edff-60ee01 909->913 919 60edc7 910->919 920 60edd9-60eddb 910->920 911->847 915 60ee1a-60ee2a call 60fd09 912->915 916 60ee2e 912->916 913->912 915->790 926 60ee2c 915->926 921 60ee31-60ee43 call 60e88d call 60e881 916->921 923 60edc9-60edce 919->923 920->909 925 60eddd-60eded call 5f8951 920->925 921->813 923->920 927 60edd0-60edd7 923->927 933 60edf4-60edf8 925->933 926->921 927->920 927->923 933->909 934 60edef-60edf1 933->934 934->909 935 60edf3 934->935 935->933
              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$InformationTimeZone
              • String ID: <,c$W. Europe Standard Time$W. Europe Summer Time
              • API String ID: 597776487-2240955746
              • Opcode ID: f3ecf1d5204a4a34b8be240cde2754b8ea8fb17d0cbad31060e87473f85dc144
              • Instruction ID: 85963cf578f292f5c53d49234422c249efa96752e63695e5339d79abc067c903
              • Opcode Fuzzy Hash: f3ecf1d5204a4a34b8be240cde2754b8ea8fb17d0cbad31060e87473f85dc144
              • Instruction Fuzzy Hash: C6C138719842299BDB2CDF78DC41AFB7BABEF55310F1449AAE445973C2E6328E01C750
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 625 60a524-60a554 call 60a254 628 60a556-60a561 call 60227a 625->628 629 60a56f-60a57b call 60f6c7 625->629 636 60a563-60a56a call 60228d 628->636 634 60a594-60a5dd call 60a1bf 629->634 635 60a57d-60a592 call 60227a call 60228d 629->635 645 60a64a-60a653 GetFileType 634->645 646 60a5df-60a5e8 634->646 635->636 643 60a849-60a84f 636->643 647 60a655-60a686 GetLastError call 602257 CloseHandle 645->647 648 60a69c-60a69f 645->648 650 60a5ea-60a5ee 646->650 651 60a61f-60a645 GetLastError call 602257 646->651 647->636 664 60a68c-60a697 call 60228d 647->664 654 60a6a1-60a6a6 648->654 655 60a6a8-60a6ae 648->655 650->651 656 60a5f0-60a61d call 60a1bf 650->656 651->636 659 60a6b2-60a700 call 60f610 654->659 655->659 660 60a6b0 655->660 656->645 656->651 667 60a702-60a70e call 60a3d0 659->667 668 60a71f-60a747 call 609f6a 659->668 660->659 664->636 667->668 674 60a710 667->674 675 60a749-60a74a 668->675 676 60a74c-60a78d 668->676 677 60a712-60a71a call 609cb6 674->677 675->677 678 60a7ae-60a7bc 676->678 679 60a78f-60a793 676->679 677->643 680 60a7c2-60a7c6 678->680 681 60a847 678->681 679->678 683 60a795-60a7a9 679->683 680->681 684 60a7c8-60a7fb CloseHandle call 60a1bf 680->684 681->643 683->678 688 60a7fd-60a829 GetLastError call 602257 call 60f7d0 684->688 689 60a82f-60a843 684->689 688->689 689->681
              APIs
                • Part of subcall function 0060A1BF: CreateFileW.KERNELBASE(00000000,00000000,?,0060A5CD,?,?,00000000,?,0060A5CD,00000000,0000000C), ref: 0060A1DC
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0060A638
              • __dosmaperr.LIBCMT ref: 0060A63F
              • GetFileType.KERNELBASE(00000000), ref: 0060A64B
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0060A655
              • __dosmaperr.LIBCMT ref: 0060A65E
              • CloseHandle.KERNEL32(00000000), ref: 0060A67E
              • CloseHandle.KERNEL32(?), ref: 0060A7CB
              • GetLastError.KERNEL32 ref: 0060A7FD
              • __dosmaperr.LIBCMT ref: 0060A804
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
              • String ID: H
              • API String ID: 4237864984-2852464175
              • Opcode ID: fba36d1762c6650c5994d6c485536437bf683035df3e9128abe61f361d49ef07
              • Instruction ID: 0e91a80e95e4b4e1659b80538c5df9d8f76a14537532864b88a9832fc3c3501a
              • Opcode Fuzzy Hash: fba36d1762c6650c5994d6c485536437bf683035df3e9128abe61f361d49ef07
              • Instruction Fuzzy Hash: D3A11132A542458FCF2DDFA8DC957AE3BB2AB06360F18415DE811AF3D1DB358912CB52
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 694 526110-5261bb CreateProcessW 695 5261f5-52620b GetExitCodeProcess 694->695 696 5261bd-5261e6 GetLastError call 52c890 call 5a6850 694->696 698 526242-526298 CloseHandle * 2 call 52c890 call 5a6850 695->698 699 52620d-526240 GetLastError call 52c890 call 5a6850 695->699 707 5261eb-5261f0 696->707 710 52629b-5262a4 698->710 699->710 707->710 712 5262a6-5262b8 710->712 713 5262d4-5262ee 710->713 714 5262ca-5262d1 call 5ee399 712->714 715 5262ba-5262c8 712->715 716 5262f0-526302 713->716 717 52631e-526332 713->717 714->713 715->714 718 526333 call 5f41ac 715->718 720 526314-52631b call 5ee399 716->720 721 526304-526312 716->721 724 526338-52633f call 5f41ac 718->724 720->717 721->720 721->724
              APIs
              • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 005261B3
              • GetLastError.KERNEL32 ref: 005261BD
                • Part of subcall function 005A6850: MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,00000000,6F923D37,?,75922EE0), ref: 005A68EF
              • GetExitCodeProcess.KERNEL32(00000008,?), ref: 00526203
              • GetLastError.KERNEL32 ref: 0052620D
              Strings
              • Install recomand ErrCode=%d, xrefs: 005261D9
              • Install recomand return=%ld, xrefs: 00526286
              • Install recomand ErrCode= %ld, xrefs: 00526229
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastProcess$ByteCharCodeCreateExitMultiWide
              • String ID: Install recomand ErrCode= %ld$Install recomand ErrCode=%d$Install recomand return=%ld
              • API String ID: 1556569005-1404938810
              • Opcode ID: c7588ac9e641e37d56351a6b2aea8fd7afdf601419b0cfd5359dada3090d5d1a
              • Instruction ID: d0aba138e56beba04df928a735596e5884cd7de64b8a856fc800c619bed7c55a
              • Opcode Fuzzy Hash: c7588ac9e641e37d56351a6b2aea8fd7afdf601419b0cfd5359dada3090d5d1a
              • Instruction Fuzzy Hash: 91510F719002499BDB14DFA4CD8579E7FB6FF9A308F20425CE800AF286D7759A41CBE1
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 763 557ec0-557edc 765 557f81-557f8c 763->765 766 557ee2-557f14 call 5f0910 GetClassInfoExW 763->766 770 557f92-558016 LoadCursorW RegisterClassW 765->770 771 55802b-558063 CreateWindowExW 765->771 774 557f16-557f34 GetClassInfoExW 766->774 775 557f40-557f72 RegisterClassExW 766->775 770->771 780 558018-55801f GetLastError 770->780 781 558021-558028 774->781 782 557f3a 774->782 775->765 783 557f74-557f7b GetLastError 775->783 780->771 780->781 782->775 783->765 783->781
              APIs
              • GetClassInfoExW.USER32(00000000,00000000), ref: 00557F0C
              • GetClassInfoExW.USER32(00520000,00000000), ref: 00557F2C
              • RegisterClassExW.USER32(00000030), ref: 00557F69
              • GetLastError.KERNEL32 ref: 00557F74
              • LoadCursorW.USER32 ref: 00557FE2
              • RegisterClassW.USER32(00000000), ref: 0055800D
              • GetLastError.KERNEL32(?,?,?,00000000,00007F00), ref: 00558018
              • CreateWindowExW.USER32(00000000,00000000,?,?,?,?,?,?,005252B6,?,00639F54,96C80000), ref: 00558055
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Class$ErrorInfoLastRegister$CreateCursorLoadWindow
              • String ID: 0
              • API String ID: 1185170849-4108050209
              • Opcode ID: 0243cfdd9b42da74e1d56370a7caabe9f3071e9258763b58a2ad55aae3b92436
              • Instruction ID: ce3c5697bc712d4b1b686498f9290c321dc762eefe104f750c465971e9cb1bd1
              • Opcode Fuzzy Hash: 0243cfdd9b42da74e1d56370a7caabe9f3071e9258763b58a2ad55aae3b92436
              • Instruction Fuzzy Hash: D951AC706083069FDB00DF68DC54B6ABBE9FF98345F04152AF918D7260EB70EA19CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              APIs
              • GetStockObject.GDI32(00000011), ref: 00558A3F
              • GetObjectW.GDI32(00000000), ref: 00558A46
              • CreateFontIndirectW.GDI32(?), ref: 00558A54
              • CreatePen.GDI32(00000000,00000001,000000DC), ref: 00558AF5
              • #17.COMCTL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,6F923D37), ref: 00558B00
              • LoadLibraryW.KERNELBASE(msimg32.dll), ref: 00558B0B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CreateObject$FontIndirectLibraryLoadStock
              • String ID: Dve$msimg32.dll
              • API String ID: 2150769274-627266902
              • Opcode ID: 0cb045c9e351c78a6a95169a1b52952bb7903844ac6947ea174e9e3366b8498b
              • Instruction ID: ad637e73de5791c97704f6792d8860f1cd8f68fa504cb85fdece92330d7b28d5
              • Opcode Fuzzy Hash: 0cb045c9e351c78a6a95169a1b52952bb7903844ac6947ea174e9e3366b8498b
              • Instruction Fuzzy Hash: 90C113B0905B458FE361DF34D9597DBBBE8BB09304F10891DE4AE9B291D7B62248CF84
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 965 574920-57492c 966 574932-574936 965->966 967 574abc-574ac7 965->967 966->967 968 57493c-57494e GetCurrentDirectoryW 966->968 969 574951-57495b 968->969 969->969 970 57495d-57496a 969->970 971 57496c-574978 GetFileType 970->971 972 574988-57498b 970->972 973 5749a3-5749b1 971->973 974 57497a-574985 971->974 975 5749a0 972->975 976 57498d-574990 972->976 978 5749e7-574a08 GetCurrentProcess * 2 DuplicateHandle 973->978 979 5749b3-5749b6 973->979 975->973 976->975 977 574992-57499d 976->977 982 574a0a-574a15 978->982 983 574a18 978->983 980 574a29-574a38 call 5ee3a7 979->980 981 5749b8-5749d7 CreateFileW 979->981 988 574a75-574a91 980->988 989 574a3a-574a3d 980->989 985 574a1b-574a25 GetFileType 981->985 986 5749d9-5749e4 981->986 983->985 985->980 991 574aa5-574ab9 call 573990 988->991 992 574a93-574aa2 SetFilePointer 988->992 989->988 990 574a3f-574a72 call 573990 989->990 992->991
              APIs
              • GetCurrentDirectoryW.KERNEL32(00000104,00000138,00000000,?,00000000,00000000,?,005794D7,?,00000000,00000002,?), ref: 00574948
              • GetFileType.KERNEL32(00000000,?,005794D7,?,00000000,00000002,?), ref: 00574970
              • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,005794D7,?,00000000), ref: 005749CB
              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,005794D7,?,00000000), ref: 005749F7
              • GetCurrentProcess.KERNEL32(00000000,00000000,?,005794D7,?,00000000), ref: 005749FD
              • DuplicateHandle.KERNEL32(00000000,?,005794D7,?,00000000), ref: 00574A00
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Current$FileProcess$CreateDirectoryDuplicateHandleType
              • String ID:
              • API String ID: 790408133-0
              • Opcode ID: 4e9b090c664a12a5c23e3e68e24542c61c6515ce0bbdf8af806a3c3b2e5e0d41
              • Instruction ID: 2383afc9229160f36e1c992c31e963aa324690846664357228fc4d1fc6b1b6d9
              • Opcode Fuzzy Hash: 4e9b090c664a12a5c23e3e68e24542c61c6515ce0bbdf8af806a3c3b2e5e0d41
              • Instruction Fuzzy Hash: 1E51A432740204DBDB30CF58F845B9EBBA6FB95321F10816AFA48DB280D371A951DB95
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 997 554810-55493e call 556130 call 52c890 call 5544c0 call 52a5d0 call 5249b0 call 543820 call 52c890 call 5544c0 call 52a5d0 call 5249b0 call 52c890 call 52a5d0 call 553d60 1024 554940-55494c 997->1024 1025 55496c-554980 GetUserDefaultUILanguage 997->1025 1028 554962-554969 call 5ee399 1024->1028 1029 55494e-55495c 1024->1029 1026 554982-554985 1025->1026 1027 55499f 1025->1027 1030 554987-55498a 1026->1030 1031 55498c-55498e 1026->1031 1032 5549a1-5549a3 1027->1032 1028->1025 1029->1028 1033 554c3b-554c5f call 5f41ac 1029->1033 1035 554990-554994 1030->1035 1031->1035 1037 5549a5-5549b1 call 52a5d0 1032->1037 1038 5549b3-5549cf call 52c890 1032->1038 1035->1026 1040 554996-554998 1035->1040 1046 5549d4-5549e8 call 52a4f0 1037->1046 1038->1046 1040->1027 1044 55499a-55499d 1040->1044 1044->1027 1044->1032 1049 554a16-554a7a call 54b9a0 call 5544c0 call 5faa8e call 52a5d0 call 5249b0 call 543b60 1046->1049 1050 5549ea-5549f6 1046->1050 1067 554a81-554abd call 52c890 call 54b9a0 call 5544c0 call 52a4f0 1049->1067 1068 554a7c-554a7f 1049->1068 1051 554a0c-554a13 call 5ee399 1050->1051 1052 5549f8-554a06 1050->1052 1051->1049 1052->1051 1069 554aeb-554b0e call 52a5d0 call 52fab0 call 54bf80 1067->1069 1088 554abf-554acb 1067->1088 1068->1067 1068->1069 1081 554b13-554b19 1069->1081 1083 554b4d-554b67 1081->1083 1084 554b1b-554b2d 1081->1084 1089 554b95-554bad 1083->1089 1090 554b69-554b75 1083->1090 1086 554b43-554b4a call 5ee399 1084->1086 1087 554b2f-554b3d 1084->1087 1086->1083 1087->1086 1096 554ae1-554ae8 call 5ee399 1088->1096 1097 554acd-554adb 1088->1097 1093 554baf-554bbb 1089->1093 1094 554bdb-554bf3 1089->1094 1091 554b77-554b85 1090->1091 1092 554b8b-554b92 call 5ee399 1090->1092 1091->1092 1092->1089 1100 554bd1-554bd8 call 5ee399 1093->1100 1101 554bbd-554bcb 1093->1101 1102 554bf5-554c04 1094->1102 1103 554c20-554c3a call 5ee388 1094->1103 1096->1069 1097->1096 1100->1094 1101->1100 1109 554c16-554c1d call 5ee399 1102->1109 1110 554c06-554c14 1102->1110 1109->1103 1110->1109
              APIs
                • Part of subcall function 005544C0: GetModuleFileNameA.KERNEL32(00000000,?,00000104,6F923D37,00000000), ref: 00554519
                • Part of subcall function 00553D60: GetPrivateProfileStringA.KERNEL32(?,00000000,00000000,?,00000800,?), ref: 00553DEC
              • GetUserDefaultUILanguage.KERNEL32 ref: 0055496C
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: DefaultFileLanguageModuleNamePrivateProfileStringUser
              • String ID: .ini$English$InitConfigure.ini$Language$LanguageTransfor.ini
              • API String ID: 3017490691-2628276212
              • Opcode ID: 9501b2aa205059736ac8cfbc153236d74956fea6b834e5831a00188a084a4433
              • Instruction ID: 1f4aa3db5a5ecf4c8f6f95d9788dbff83061e72adfbc83cf9feb5ae2fa861839
              • Opcode Fuzzy Hash: 9501b2aa205059736ac8cfbc153236d74956fea6b834e5831a00188a084a4433
              • Instruction Fuzzy Hash: 00C14870A001449BDF08EB78CD5A7ADBF72BFC5309F14815DE405AB2C7DB759A888B92
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1115 60ee58-60ee80 call 60e893 call 60e8f1 1120 60ee86-60ee92 call 60e899 1115->1120 1121 60efaa-60f006 call 5f41c9 call 603a63 1115->1121 1120->1121 1126 60ee98-60eea4 call 60e8c5 1120->1126 1132 60f010-60f013 1121->1132 1133 60f008-60f00e 1121->1133 1126->1121 1134 60eeaa-60eecb call 60aea3 GetTimeZoneInformation 1126->1134 1135 60f056-60f068 1132->1135 1136 60f015-60f025 call 60b17a 1132->1136 1133->1135 1142 60eed1-60eef2 1134->1142 1143 60ef86-60efa9 call 60e88d call 60e881 call 60e887 1134->1143 1139 60f078 1135->1139 1140 60f06a-60f06d 1135->1140 1153 60f027 1136->1153 1154 60f02f-60f048 call 603a63 1136->1154 1144 60f07d-60f094 call 60aea3 call 5ee388 1139->1144 1145 60f078 call 60ee58 1139->1145 1140->1139 1146 60f06f-60f076 call 60ec7b 1140->1146 1148 60eef4-60eef9 1142->1148 1149 60eefc-60ef03 1142->1149 1145->1144 1146->1144 1148->1149 1156 60ef15-60ef17 1149->1156 1157 60ef05-60ef0c 1149->1157 1155 60f028-60f02d call 60aea3 1153->1155 1169 60f04a-60f04b 1154->1169 1170 60f04d-60f053 call 60aea3 1154->1170 1174 60f055 1155->1174 1165 60ef19-60ef42 call 603e16 call 60e4b9 1156->1165 1157->1156 1163 60ef0e-60ef13 1157->1163 1163->1165 1182 60ef50-60ef52 1165->1182 1183 60ef44-60ef47 1165->1183 1169->1155 1170->1174 1174->1135 1185 60ef54-60ef72 call 60e4b9 1182->1185 1183->1182 1184 60ef49-60ef4e 1183->1184 1184->1185 1188 60ef81-60ef84 1185->1188 1189 60ef74-60ef77 1185->1189 1188->1143 1189->1188 1190 60ef79-60ef7f 1189->1190 1190->1143
              APIs
              • GetTimeZoneInformation.KERNELBASE(?,00000000,00000000,00000000,?,00632C3C), ref: 0060EEC2
              • _free.LIBCMT ref: 0060EEB0
                • Part of subcall function 0060AEA3: HeapFree.KERNEL32(00000000,00000000,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?), ref: 0060AEB9
                • Part of subcall function 0060AEA3: GetLastError.KERNEL32(?,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?,?), ref: 0060AECB
              • _free.LIBCMT ref: 0060F07E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapInformationLastTimeZone
              • String ID: <,c$W. Europe Standard Time$W. Europe Summer Time
              • API String ID: 2155170405-2240955746
              • Opcode ID: 5be430940e239adae4ccd8c4854e2cb3edc8d64a0e39d7146b934335c5644af6
              • Instruction ID: 81bc2bccf092219ba15fd58373a6a716dd13dfb92d99f3078be304522e10f92e
              • Opcode Fuzzy Hash: 5be430940e239adae4ccd8c4854e2cb3edc8d64a0e39d7146b934335c5644af6
              • Instruction Fuzzy Hash: D5512A71D4432A9BCB18DF64DC418AF7BBFEF40311F100AAAE514972D1EB715E458B50
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1196 600f6d-600f7b 1197 600f90-600fa0 1196->1197 1198 600f7d-600f8e call 60228d call 5f419c 1196->1198 1199 600fa2-600fb3 call 60228d call 5f419c 1197->1199 1200 600fb5-600fbb 1197->1200 1218 600fe3-600fe7 1198->1218 1223 600fe2 1199->1223 1203 600fc3-600fc9 1200->1203 1204 600fbd 1200->1204 1210 600fe8-601002 call 60f095 call 60e899 1203->1210 1211 600fcb 1203->1211 1208 600fd5-600fdf call 60228d 1204->1208 1209 600fbf-600fc1 1204->1209 1221 600fe1 1208->1221 1209->1203 1209->1208 1225 6011f3-60120d call 5f41c9 call 5ff025 1210->1225 1226 601008-601014 call 60e8c5 1210->1226 1211->1208 1215 600fcd-600fd3 1211->1215 1215->1208 1215->1210 1221->1223 1223->1218 1237 601222-601224 1225->1237 1238 60120f-601213 call 600f6d 1225->1238 1226->1225 1232 60101a-601026 call 60e8f1 1226->1232 1232->1225 1239 60102c-601041 1232->1239 1245 601218-601220 1238->1245 1240 6010b1-6010bc call 5ff08a 1239->1240 1241 601043 1239->1241 1240->1221 1249 6010c2-6010cd 1240->1249 1243 601045-60104b 1241->1243 1244 60104d-601069 call 5ff08a 1241->1244 1243->1240 1243->1244 1244->1221 1253 60106f-601072 1244->1253 1245->1237 1251 6010e9 1249->1251 1252 6010cf-6010d8 call 60f0e8 1249->1252 1255 6010ec-601100 call 5ef480 1251->1255 1252->1251 1261 6010da-6010e7 1252->1261 1256 601078-601081 call 60f0e8 1253->1256 1257 6011ec-6011ee 1253->1257 1264 601102-60110a 1255->1264 1265 60110d-601134 call 5eef70 call 5ef480 1255->1265 1256->1257 1266 601087-60109f call 5ff08a 1256->1266 1257->1221 1261->1255 1264->1265 1274 601142-601169 call 5eef70 call 5ef480 1265->1274 1275 601136-60113f 1265->1275 1266->1221 1271 6010a5-6010ac 1266->1271 1271->1257 1280 601177-601186 call 5eef70 1274->1280 1281 60116b-601174 1274->1281 1275->1274 1284 601188 1280->1284 1285 6011ae-6011cc 1280->1285 1281->1280 1288 60118a-60118c 1284->1288 1289 60118e-6011a2 1284->1289 1286 6011e9 1285->1286 1287 6011ce-6011e7 1285->1287 1286->1257 1287->1257 1288->1289 1290 6011a4-6011a6 1288->1290 1289->1257 1290->1257 1291 6011a8 1290->1291 1291->1285 1292 6011aa-6011ac 1291->1292 1292->1257 1292->1285
              APIs
              • __allrem.LIBCMT ref: 006010F7
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00601113
              • __allrem.LIBCMT ref: 0060112A
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00601148
              • __allrem.LIBCMT ref: 0060115F
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0060117D
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
              • String ID:
              • API String ID: 1992179935-0
              • Opcode ID: ff444ecfa856059cc41c698195f07ca9e7e510eb19e685656b9e2395aebca895
              • Instruction ID: dd2f3dd5d283fe7d6f0a7a11a2ccdb248e65c6596fd851507fcd44bc91d52aa6
              • Opcode Fuzzy Hash: ff444ecfa856059cc41c698195f07ca9e7e510eb19e685656b9e2395aebca895
              • Instruction Fuzzy Hash: 648129726807079BE72CAE69CC41BAB77EAAF45760F14462EF511DB7C1EB70DA008790
              Uniqueness

              Uniqueness Score: -1.00%

              Control-flow Graph

              • Executed
              • Not Executed
              control_flow_graph 1293 5a6850-5a68a9 1294 5a68ab-5a68b0 1293->1294 1295 5a68b2-5a68b4 1293->1295 1294->1295 1296 5a68fe 1294->1296 1297 5a68b7-5a68bc 1295->1297 1299 5a6900-5a6918 call 55f9b0 1296->1299 1297->1297 1298 5a68be-5a68ce 1297->1298 1298->1296 1300 5a68d0-5a68db call 5ef6a0 1298->1300 1304 5a691a-5a691c 1299->1304 1305 5a6920-5a6943 1299->1305 1300->1296 1308 5a68dd-5a68fc MultiByteToWideChar 1300->1308 1304->1305 1307 5a6946-5a694f 1305->1307 1307->1307 1309 5a6951-5a69c9 call 522e90 call 5234d0 1307->1309 1308->1299 1314 5a69cb-5a69e0 1309->1314 1315 5a6a00-5a6bcb call 5f0910 call 52db80 call 52d930 call 5f789a call 6011fe call 601aa5 1309->1315 1316 5a69e2-5a69f0 1314->1316 1317 5a69f6-5a69fd call 5ee399 1314->1317 1340 5a6bd1-5a6be4 call 5eda90 1315->1340 1341 5a6c94-5a6cb4 1315->1341 1316->1317 1318 5a6df2 call 5f41ac 1316->1318 1317->1315 1325 5a6df7 call 5f41ac 1318->1325 1329 5a6dfc-5a6e01 call 5f41ac 1325->1329 1340->1341 1347 5a6bea-5a6c1b call 5a7990 call 5a8100 1340->1347 1342 5a6cb7-5a6cf1 call 524730 call 5a7720 call 5a7dc0 call 5a7b00 call 5a7a20 1341->1342 1361 5a6cf6-5a6cf8 1342->1361 1357 5a6c20-5a6c30 1347->1357 1362 5a6c3e-5a6c4a call 52db20 1357->1362 1363 5a6c32-5a6c3c 1357->1363 1364 5a6cfa-5a6d20 call 524730 1361->1364 1365 5a6d25-5a6d4a call 5a6e10 1361->1365 1367 5a6c4f-5a6c5b 1362->1367 1363->1367 1364->1365 1375 5a6d4c-5a6d61 1365->1375 1376 5a6d81-5a6da4 1365->1376 1371 5a6c5d-5a6c66 1367->1371 1372 5a6c70-5a6c92 1367->1372 1371->1372 1377 5a6c68-5a6c6c 1371->1377 1372->1342 1378 5a6d63-5a6d71 1375->1378 1379 5a6d77-5a6d7e call 5ee399 1375->1379 1380 5a6dce-5a6df1 call 5ee388 1376->1380 1381 5a6da6-5a6db2 1376->1381 1377->1372 1378->1325 1378->1379 1379->1376 1384 5a6dc4-5a6dcb call 5ee399 1381->1384 1385 5a6db4-5a6dc2 1381->1385 1384->1380 1385->1329 1385->1384
              APIs
              • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,00000000,6F923D37,?,75922EE0), ref: 005A68EF
              • _strftime.LIBCMT ref: 005A6BBC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ByteCharMultiWide_strftime
              • String ID: [%Y.%m.%d %X %A]$4dd$EasyLog.log
              • API String ID: 1930796987-2667214093
              • Opcode ID: 5e0240ab1f9dd93c787500f22c0e314fd48bf2d0bee2aad0c2b6db174d947720
              • Instruction ID: b9151712a2f1b3056b8ec3ab7e240ff90a72f07c558fe02f790ca3b028b795d1
              • Opcode Fuzzy Hash: 5e0240ab1f9dd93c787500f22c0e314fd48bf2d0bee2aad0c2b6db174d947720
              • Instruction Fuzzy Hash: CAF1BE70A012599FEB14DF24CC48B9EBBF5BF45314F1481E9E449AB292EB359E84CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 005A8135
              • std::_Lockit::_Lockit.LIBCPMT ref: 005A8157
              • std::_Lockit::~_Lockit.LIBCPMT ref: 005A8177
              • __Getcvt.LIBCPMT ref: 005A8210
              • std::_Facet_Register.LIBCPMT ref: 005A8247
              • std::_Lockit::~_Lockit.LIBCPMT ref: 005A825F
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetcvtRegister
              • String ID:
              • API String ID: 3552396256-0
              • Opcode ID: 74f5bf99fec6945f4bd2f3b355d049ff3143346f93a088d2521b272c6d85f502
              • Instruction ID: 17b261f11b9d9312bd5dbe175ec1859c91e723caabb9ba337868a5736abd2c6f
              • Opcode Fuzzy Hash: 74f5bf99fec6945f4bd2f3b355d049ff3143346f93a088d2521b272c6d85f502
              • Instruction Fuzzy Hash: D141FD719002568FCB15CF68C845ABEBBB5FF99304F14465DE846AB252EB30FE46CB80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060B17A: RtlAllocateHeap.NTDLL(00000000,00639F54,00521057,?,0060E7B7,00521057,00654B98,?,0055ED42,00639F54,00639F56,?,?,?,00654B98), ref: 0060B1AC
              • _free.LIBCMT ref: 00607895
              • _free.LIBCMT ref: 006078AC
              • _free.LIBCMT ref: 006078CB
              • _free.LIBCMT ref: 006078E6
              • _free.LIBCMT ref: 006078FD
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$AllocateHeap
              • String ID:
              • API String ID: 3033488037-0
              • Opcode ID: f75db5c672fcab958dd6c77dffa2740de3c793df9f555589a020298a33931120
              • Instruction ID: bd3b427876f6a86fe4f34c6611b67c75bfed5e6eff6e6a66226f3ee6fd6df1d6
              • Opcode Fuzzy Hash: f75db5c672fcab958dd6c77dffa2740de3c793df9f555589a020298a33931120
              • Instruction Fuzzy Hash: 8C51BF71E44305AFDB28DF69CC41AAB77F6EF55720F1446ADE809DB290E731AA01CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetWindowLongW.USER32(?,000000EB), ref: 00558350
              • GetWindowLongW.USER32(?,000000EB), ref: 00558372
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00558391
              • SetWindowLongW.USER32(?,000000EB,00000000), ref: 005583A0
              • DefWindowProcW.USER32(?,?,?,?), ref: 005583D3
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Window$Long$Proc$Call
              • String ID:
              • API String ID: 1819824282-0
              • Opcode ID: 56d64f0f8c1dd52711585debac97a9048c0ecf59540992ecc66d38d7e7fd7b86
              • Instruction ID: 2cb773014f63ee158fc28a5aa663528dbdb6726bb1bc2e84040e0c6b56bde9fe
              • Opcode Fuzzy Hash: 56d64f0f8c1dd52711585debac97a9048c0ecf59540992ecc66d38d7e7fd7b86
              • Instruction Fuzzy Hash: 5621EB32204214AFCB219F45DC58E6FBFA9FF99B71F04491AF955A7161C7319C10DB60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 0060F028
              • _free.LIBCMT ref: 0060F07E
                • Part of subcall function 0060EE58: _free.LIBCMT ref: 0060EEB0
                • Part of subcall function 0060EE58: GetTimeZoneInformation.KERNELBASE(?,00000000,00000000,00000000,?,00632C3C), ref: 0060EEC2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$InformationTimeZone
              • String ID: <,c
              • API String ID: 597776487-1069194922
              • Opcode ID: 4d7c15b62266c9fc2cabceb5bf8ef4925ed64a13a0f6b9e26aa83f13fc92223e
              • Instruction ID: 41c039bf03b7d8c703ed651762ba7871b2f4ff3e48837d8f92579e7ab683e114
              • Opcode Fuzzy Hash: 4d7c15b62266c9fc2cabceb5bf8ef4925ed64a13a0f6b9e26aa83f13fc92223e
              • Instruction Fuzzy Hash: C6216B32C8032996CB7897248C45AEF777FCF91760F1002E9E496A32C2EF705E8586A4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00609154: GetConsoleCP.KERNEL32(005F96C3,00000000,?), ref: 0060919C
              • WriteFile.KERNEL32(?,?,00000000,006513D0,00000000,00000000,00000000,00000000,?,006513D0,00000010,005F96C3,00000000,00000000,00000000,?), ref: 00609B12
              • GetLastError.KERNEL32(?,00000000), ref: 00609B1C
              • __dosmaperr.LIBCMT ref: 00609B61
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ConsoleErrorFileLastWrite__dosmaperr
              • String ID:
              • API String ID: 251514795-0
              • Opcode ID: 6b2abd30ff3e834c6451caccd866c169f7609d0454cb6964cf5c9a0109236e78
              • Instruction ID: 7a125fbc4cb81b2414aa0a05297387cdb53bfc0e30060dee09249035d88e324f
              • Opcode Fuzzy Hash: 6b2abd30ff3e834c6451caccd866c169f7609d0454cb6964cf5c9a0109236e78
              • Instruction Fuzzy Hash: A5518071A8420AAFDB19DBA8CC45BEFBBBBEF49314F040055E400A72D2D7749D418B70
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
              • _free.LIBCMT ref: 005FA3E8
              • _free.LIBCMT ref: 005FA416
              • _free.LIBCMT ref: 005FA45E
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$ErrorLast
              • String ID:
              • API String ID: 3291180501-0
              • Opcode ID: 4b2351d6c3f8aadeea9972d3485bc021dfedc674738f11cb7ab2d0ba01a7431a
              • Instruction ID: 172114dd33e1494ed9efe8f9f62d56140a84b30f0c5238a4141bc0e21ece2355
              • Opcode Fuzzy Hash: 4b2351d6c3f8aadeea9972d3485bc021dfedc674738f11cb7ab2d0ba01a7431a
              • Instruction Fuzzy Hash: 9741AE716002099FDB25DFACC889A79BBF6FF48310B2409ADE609C7391E775EC109B52
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __cftoe.LIBCMT ref: 005FA4C9
              • __cftoe.LIBCMT ref: 005FA4FB
              • _free.LIBCMT ref: 005FA521
                • Part of subcall function 005F41C9: IsProcessorFeaturePresent.KERNEL32(00000017,005F419B,00000000,?,00000004,00000004,?,?,?,005F41A8,00000000,00000000,00000000,00000000,00000000,00615519), ref: 005F41CB
                • Part of subcall function 005F41C9: GetCurrentProcess.KERNEL32(C0000417), ref: 005F41EE
                • Part of subcall function 005F41C9: TerminateProcess.KERNEL32(00000000), ref: 005F41F5
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Process__cftoe$CurrentFeaturePresentProcessorTerminate_free
              • String ID:
              • API String ID: 3294049834-0
              • Opcode ID: 6c4d6ba4781bc4090d013d71b8b04a60aa8f6833bf2349692bff5decaff2eea7
              • Instruction ID: 28ef57d31ffc86b86a0c68daec1b8e3781784bd4bcb532c354e8eb186c032ce4
              • Opcode Fuzzy Hash: 6c4d6ba4781bc4090d013d71b8b04a60aa8f6833bf2349692bff5decaff2eea7
              • Instruction Fuzzy Hash: 5421C9B280410C7ACF24AA959C45DFF7FE9EB85330F20415AFA18D6181FE35DA5486A7
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FindCloseChangeNotification.KERNELBASE(00000000,00000000,0025003D,?,00609BEC,0025003D,006513F0,0000000C,00609C94,00000000), ref: 00609D0C
              • GetLastError.KERNEL32(?,00609BEC,0025003D,006513F0,0000000C,00609C94,00000000), ref: 00609D16
              • __dosmaperr.LIBCMT ref: 00609D41
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
              • String ID:
              • API String ID: 490808831-0
              • Opcode ID: dfa437638f1889d1f920a09a8ad728bbb6d6d2bbba5d94e9cd0a01be36f0e9d6
              • Instruction ID: 52c965150b3d8f7d9957ce793ea58b8ad25b4917d676211a027ea4a2bc98a9c1
              • Opcode Fuzzy Hash: dfa437638f1889d1f920a09a8ad728bbb6d6d2bbba5d94e9cd0a01be36f0e9d6
              • Instruction Fuzzy Hash: 83012B32AD491016D73C6374AC4A7FF6B9B5F82B34F29012DF8088B7D3DA2188428174
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,00000000,00000000,00000000,00000000,00000000,00000000,?,00603C1F,00000000,00000000,00000002,00000000), ref: 00603BA9
              • GetLastError.KERNEL32(?,00603C1F,00000000,00000000,00000002,00000000,?,00609A4A,00000000,00000000,00000000,00000002,00000000,00000000,00000000,?), ref: 00603BB3
              • __dosmaperr.LIBCMT ref: 00603BBA
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorFileLastPointer__dosmaperr
              • String ID:
              • API String ID: 2336955059-0
              • Opcode ID: daa735b971f13f5e93f22e1343151830a566cf0b8449a8c7b62b113a45abf1fe
              • Instruction ID: 24ccbfa3179021d34faeb59e6c8fd6c402b1d11e2cf60a20ec61a236a7fb91b1
              • Opcode Fuzzy Hash: daa735b971f13f5e93f22e1343151830a566cf0b8449a8c7b62b113a45abf1fe
              • Instruction Fuzzy Hash: 0A012D326545256BCB299FA9DC098AF372FDF95321B24024AF810DB3D0EB71DE014790
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsWindow.USER32(?), ref: 00545819
              • ShowWindow.USER32(?,00000000), ref: 00545828
                • Part of subcall function 005F41FD: _free.LIBCMT ref: 005F4210
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Window$Show_free
              • String ID:
              • API String ID: 1511249164-0
              • Opcode ID: a7aeac561df12bbdfe7559a9c43a7b99f512debd01e78fd754cca064365764b0
              • Instruction ID: 6380d0bee952f724fb279218dd47556a08d519c17ff7995e3e49e384aa322b75
              • Opcode Fuzzy Hash: a7aeac561df12bbdfe7559a9c43a7b99f512debd01e78fd754cca064365764b0
              • Instruction Fuzzy Hash: 4271AE70A102199BEB18DF24CC86BDE7BA5FF44314F104669F91A97292EB34AA84CB40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WriteFile.KERNELBASE(?,?,?,?,00000000,005F96C3,00000000,?,?,00609AF6,?,00000000,?,00000000,00000000,00000000), ref: 00609679
              • GetLastError.KERNEL32(?,00609AF6,?,00000000,?,00000000,00000000,00000000,00000000,?,006513D0,00000010,005F96C3,00000000,00000000,00000000), ref: 0060969F
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorFileLastWrite
              • String ID:
              • API String ID: 442123175-0
              • Opcode ID: 9410cfc9e0f5e386da3610b62978e5ccdda93bbd78889f8d960c78b9fd098a24
              • Instruction ID: 6efec6dede774dae2c7fea908609bf8c91f992aec92fbe3cbcefe9d87faeca01
              • Opcode Fuzzy Hash: 9410cfc9e0f5e386da3610b62978e5ccdda93bbd78889f8d960c78b9fd098a24
              • Instruction Fuzzy Hash: EE21D630A102199FDF19CF69DC809EEB7BBEB49301F1440E9E945D7252D6319E42CF64
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00523AB6
              • std::_Lockit::~_Lockit.LIBCPMT ref: 00523B4A
                • Part of subcall function 005F41FD: _free.LIBCMT ref: 005F4210
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: std::_$Locinfo::_Locinfo_dtorLockitLockit::~__free
              • String ID:
              • API String ID: 2189227594-0
              • Opcode ID: 89702abf3a7af80b25a4708ccd372e96a41ab079f5a414c90d5e3a460f45bf80
              • Instruction ID: 36491d7bafaa222f5bb858c1ef53e3739178dad3db4b916c0488c4add9c16b6e
              • Opcode Fuzzy Hash: 89702abf3a7af80b25a4708ccd372e96a41ab079f5a414c90d5e3a460f45bf80
              • Instruction Fuzzy Hash: 901160F1A007455BEB20DF25D80AF27BBECBF14754F044968E84AC7680EB79E505CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CallWindowProcW.USER32(?,00000000,?,?,?), ref: 005642B2
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CallProcWindow
              • String ID:
              • API String ID: 2714655100-0
              • Opcode ID: 7d3280fc22b98894412a89f163c1ce2f6175ff59db86d0d2f8a671db252ad343
              • Instruction ID: 5a2ceab8d4a8403a82d65679861b4c848876e9235dd5804f625a1189ddb65cc9
              • Opcode Fuzzy Hash: 7d3280fc22b98894412a89f163c1ce2f6175ff59db86d0d2f8a671db252ad343
              • Instruction Fuzzy Hash: 5581F4B5204108EFEB18DB94C898DBEBBBEFFD0B04F218949F1519B155D7B0AE409B60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetPrivateProfileStringA.KERNEL32(?,00000000,00000000,?,00000800,?), ref: 00553DEC
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: PrivateProfileString
              • String ID:
              • API String ID: 1096422788-0
              • Opcode ID: 9885e20067a965d533feeaaa6d606644fd6b0f6df119481aec1e4936bb1cbe24
              • Instruction ID: c2e522f2e932439a85ca42d5b15ddeea953f9b541a31eb5b083e883f6cae175a
              • Opcode Fuzzy Hash: 9885e20067a965d533feeaaa6d606644fd6b0f6df119481aec1e4936bb1cbe24
              • Instruction Fuzzy Hash: A131F671A002049FEB14CF18CDC5B597BB9FB49710F6082A9ED059B2C6DB75E984CF91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: __wsopen_s
              • String ID:
              • API String ID: 3347428461-0
              • Opcode ID: 83068cbb46842507fb804f0d167d614ebc4086db43f351d7099926d32c2f30e1
              • Instruction ID: 4a622675563dddbdf13d6f53c2998f68aab4f2fc6c0603aaae28c77aab3096bb
              • Opcode Fuzzy Hash: 83068cbb46842507fb804f0d167d614ebc4086db43f351d7099926d32c2f30e1
              • Instruction Fuzzy Hash: 74114C7190420AAFCB09DF58E94099B7BF6EF48300F014499F909AB351D771DE21CB65
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 50b27a94fd7f7e179ed52a43b6d80de6a70897a9f9bef7ba59bd2e9ef67df7ce
              • Instruction ID: fa85a515373f24440b9f824851405dc540b4d5b7c266bce3fde794d8e77668d1
              • Opcode Fuzzy Hash: 50b27a94fd7f7e179ed52a43b6d80de6a70897a9f9bef7ba59bd2e9ef67df7ce
              • Instruction Fuzzy Hash: 5BF0F932541A1816D6352B698C45B7B3BDAAF51374F100729FA24921D1DB78DC019695
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060C205: HeapAlloc.KERNEL32(00000008,00521057,00000000,?,0060ADF3,00000001,00000364,00000006,000000FF,?,0055ED42,00639F54,00639F56), ref: 0060C246
              • _free.LIBCMT ref: 00606EA5
                • Part of subcall function 0060AEA3: HeapFree.KERNEL32(00000000,00000000,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?), ref: 0060AEB9
                • Part of subcall function 0060AEA3: GetLastError.KERNEL32(?,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?,?), ref: 0060AECB
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Heap$AllocErrorFreeLast_free
              • String ID:
              • API String ID: 3091179305-0
              • Opcode ID: 2369ad8576c190b71131374dc0a9bf9fcbed54944f5c31b3abb38eea69c43639
              • Instruction ID: cbc01880231b5a6fe012bbdaa2893e599d8f1dcf41c8f167554ea84850bb3fa6
              • Opcode Fuzzy Hash: 2369ad8576c190b71131374dc0a9bf9fcbed54944f5c31b3abb38eea69c43639
              • Instruction Fuzzy Hash: 49010C76D40219AFCB50DFA9C441ADEBBB8FB48710F10426AE914E7380E771AA55CBD4
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: c256890aaff1d49386c0b5e4001380d5a62ac8e3746fd226d33b80f694566961
              • Instruction ID: bb28ed52e1b169602cc05c6d0c8545d5d4e8e43cef48d54ba4a551196546851e
              • Opcode Fuzzy Hash: c256890aaff1d49386c0b5e4001380d5a62ac8e3746fd226d33b80f694566961
              • Instruction Fuzzy Hash: 0C011E72C4025DAFCF41AFE88D059EE7FB6BB08350F144165BE18A2191E6758A609B92
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __CxxThrowException@8.LIBVCRUNTIME ref: 005EF716
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Exception@8Throw
              • String ID:
              • API String ID: 2005118841-0
              • Opcode ID: c8ee851c4276518795a20efc6116e26b5eda34f1c7ae03fa1d4c484203453fbf
              • Instruction ID: dd2829aacbb07fb716c81230531b2c0ee5200ec0ef6717a464ef3cf1e5e6924b
              • Opcode Fuzzy Hash: c8ee851c4276518795a20efc6116e26b5eda34f1c7ae03fa1d4c484203453fbf
              • Instruction Fuzzy Hash: A9E0923580064EB68B1C7AA6DC0A46A3F6D7E00360B244631B99A9A4E1EF30EE598591
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RtlAllocateHeap.NTDLL(00000000,00639F54,00521057,?,0060E7B7,00521057,00654B98,?,0055ED42,00639F54,00639F56,?,?,?,00654B98), ref: 0060B1AC
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: AllocateHeap
              • String ID:
              • API String ID: 1279760036-0
              • Opcode ID: ea53193f7d1b3b92c970064192c2ec070ee54d8f079a338bf81bfab8ce898c92
              • Instruction ID: 785b8b436a285c2e8941bad9b655474269e7ab2e47c3705e577f298c112e9a72
              • Opcode Fuzzy Hash: ea53193f7d1b3b92c970064192c2ec070ee54d8f079a338bf81bfab8ce898c92
              • Instruction Fuzzy Hash: E7E02B316C46126AE73937659C15BDB364F9F117A1F1461A4AC16963C0CF60EC0186E9
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateFileW.KERNELBASE(00000000,00000000,?,0060A5CD,?,?,00000000,?,0060A5CD,00000000,0000000C), ref: 0060A1DC
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CreateFile
              • String ID:
              • API String ID: 823142352-0
              • Opcode ID: 83423179f2ad1c88925ca8c85a26406f50550f44b3e96e67a4f8ab4a37985680
              • Instruction ID: 94540992537f9a818f3a36ab923ad3c579381a0f2c6cfa3fcf96ba5b74118396
              • Opcode Fuzzy Hash: 83423179f2ad1c88925ca8c85a26406f50550f44b3e96e67a4f8ab4a37985680
              • Instruction Fuzzy Hash: 8BD06C3201020DBBDF128F84DC06EDA3BAAFB88714F018050BA1856020C732E862AB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateMutexW.KERNELBASE(00000000,00000000,00000000), ref: 00521276
                • Part of subcall function 005EEA1F: __onexit.LIBCMT ref: 005EEA25
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CreateMutex__onexit
              • String ID:
              • API String ID: 732330502-0
              • Opcode ID: e4a0d521ba380856e556f1cad0664cfbe1071f3cceb9963f63f75d87294d3843
              • Instruction ID: c37040ef5f33d0bd87f9cddcc49012873da2eb0e4b771123c8ec0e7a74a221e1
              • Opcode Fuzzy Hash: e4a0d521ba380856e556f1cad0664cfbe1071f3cceb9963f63f75d87294d3843
              • Instruction Fuzzy Hash: 5DC092B968474466E724ABA07C0FF043A52BB60B02F602059F3066E8D2CBE050415A04
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateMutexW.KERNELBASE(00000000,00000000,00000000), ref: 00521236
                • Part of subcall function 005EEA1F: __onexit.LIBCMT ref: 005EEA25
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CreateMutex__onexit
              • String ID:
              • API String ID: 732330502-0
              • Opcode ID: d03ea06c90f81fcc8f94b589a3ba6450af66ec330f518901e7c119a2780a50b5
              • Instruction ID: 92a9cc0c7c59a27ab5971145d0c2fbad6553f622badaea5b2a3be34a6f1da5ec
              • Opcode Fuzzy Hash: d03ea06c90f81fcc8f94b589a3ba6450af66ec330f518901e7c119a2780a50b5
              • Instruction Fuzzy Hash: 39C092B9A84741A6E724ABA06C0FF043A527B40B12F712059B3066E8D2CAA050816A04
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr_strstr$___swprintf_l
              • String ID: %s$%s $%s HTTP/%s%s%s%s%s%s%s%s%s%s%s%s$%s%s$%s%s=%s$%x$/$0$100-continue$;type=$;type=%c$Accept$Accept-Encoding$Accept-Encoding: %s$Accept: */*$Chunky upload is not supported by HTTP 1.0$Content-Length$Content-Length: %I64d$Content-Length: 0$Content-Range$Content-Range: bytes %s%I64d/%I64d$Content-Range: bytes %s/%I64d$Content-Range: bytes 0-%I64d/%I64d$Content-Type$Content-Type: application/x-www-form-urlencoded$Cookie$Cookie: $Could not seek stream$Could only read %I64d bytes from the input$Expect$Expect:$Failed sending HTTP POST request$Failed sending HTTP request$Failed sending POST request$Failed sending PUT request$File already completely uploaded$GET$HEAD$Host$Host:$Host: %s%s%s$Host: %s%s%s:%d$Host:%s$OPTIONS$P;b$Proxy-Connection$Range$Range: bytes=%s$Referer$Referer: %s$Transfer-Encoding$Transfer-Encoding:$Transfer-Encoding: chunked$User-Agent$chunked$ftp://$ftp://%s:%s@%s$multipart/form-data$t,b$t,b$upload completely sent off: %I64d out of %I64d bytes$x,b$x,b
              • API String ID: 3454564989-190793851
              • Opcode ID: 4dd8ac049907f30fa198e500397e3fc1246d00aff67ba0ec0d2ad2138d9704cc
              • Instruction ID: efc8025a87c9a6dece726547f036a2c5b42623fed8e734b489b1894d72cf1d1d
              • Opcode Fuzzy Hash: 4dd8ac049907f30fa198e500397e3fc1246d00aff67ba0ec0d2ad2138d9704cc
              • Instruction Fuzzy Hash: A0E2D270A0061AAFDF14DFA4D849FAEBFB5BF45304F08416DE809AB242E7759E50CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsIconic.USER32(00000000), ref: 005592A9
              • ScreenToClient.USER32(00000000,?), ref: 0055933F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ClientIconicScreen
              • String ID: tooltips_class32
              • API String ID: 3037509956-1918224756
              • Opcode ID: 631f43d84d1c7fd15e6c4cc34bf2bc28b50ebe3b01aa0c5b2a752d265b650425
              • Instruction ID: a1ce2e04fe73baf5898bd4d3b039c79464086d7e8adf91450aaebacea78971b7
              • Opcode Fuzzy Hash: 631f43d84d1c7fd15e6c4cc34bf2bc28b50ebe3b01aa0c5b2a752d265b650425
              • Instruction Fuzzy Hash: 56B23C70A00719DFEB24CF64C898BEABBF5BF49301F10459AE85AE7250DB70A985CF51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsRectEmpty.USER32(?), ref: 0057C302
              • GetClipBox.GDI32(?,?), ref: 0057C3E9
              • CreateRectRgnIndirect.GDI32(?), ref: 0057C3F9
              • CreateRectRgnIndirect.GDI32(?), ref: 0057C407
              • ExtSelectClipRgn.GDI32(?,00000000,00000001), ref: 0057C41C
              • SelectObject.GDI32(?,00000000), ref: 0057C493
              • SetBkMode.GDI32(?,00000001), ref: 0057C4A2
              • SetTextColor.GDI32(?), ref: 0057C4C6
              • SetBkColor.GDI32(?), ref: 0057C4ED
              • PtInRect.USER32(?,?,?), ref: 0057C693
              • CharNextW.USER32(?), ref: 0057C8E7
              • CharNextW.USER32(?), ref: 0057C94D
              • SetTextColor.GDI32(?), ref: 0057CA4E
              • SelectObject.GDI32(?,00000000), ref: 0057CB23
              • SelectObject.GDI32(?,00000000), ref: 0057CC6C
              • CharNextW.USER32(?), ref: 0057DE42
              • CharNextW.USER32(?), ref: 0057DE64
              • SetTextColor.GDI32(?), ref: 0057DF2F
              • CharNextW.USER32(?), ref: 0057E234
              • CharNextW.USER32(?), ref: 0057E247
              • GetTextExtentPoint32W.GDI32(?,0000002F,00000001,?), ref: 0057E2C6
              • TextOutW.GDI32(?,?,?,?,00000001), ref: 0057E377
              • GetTextExtentPoint32W.GDI32(?,0063CE3C,00000001,?), ref: 0057E3F8
              • TextOutW.GDI32(?,?,?,0063CE3C,00000001), ref: 0057E493
              • GetTextExtentPoint32W.GDI32(?,?,00000000,?), ref: 0057E5B3
              • CharNextW.USER32(?), ref: 0057E61B
              • GetTextExtentPoint32W.GDI32(?,?,00000000,?), ref: 0057E666
              • CharNextW.USER32(?), ref: 0057E6DA
              • CharPrevW.USER32(?,?), ref: 0057E763
              • CharPrevW.USER32(?,00000000), ref: 0057E77B
              • TextOutW.GDI32(?,?,?,?,00000000), ref: 0057E829
              • TextOutW.GDI32(?,?,?,...,00000003), ref: 0057E8C7
              • SetRect.USER32(?,?,?,?,?), ref: 0057E99F
              • SetTextColor.GDI32(?), ref: 0057ED2F
              • SelectObject.GDI32(?,00000000), ref: 0057ED73
              • SetBkMode.GDI32(?,00000002), ref: 0057ED85
              • SelectClipRgn.GDI32(?,?), ref: 0057EF08
              • DeleteObject.GDI32(?), ref: 0057EF15
              • DeleteObject.GDI32(?), ref: 0057EF1D
              • SelectObject.GDI32(?,?), ref: 0057EF2B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Text$Char$Next$ObjectSelect$ColorRect$ExtentPoint32$Clip$CreateDeleteIndirectModePrev$Empty
              • String ID: ...
              • API String ID: 74705592-440645147
              • Opcode ID: 21b597813135f3971819e2e7bf8e162e8701a1fd297c256dff274e333f2d75bd
              • Instruction ID: 3b1cb7f0324e0e682c6ce1a139a38af2da47d07598f96d4195a4ab202f1b4d95
              • Opcode Fuzzy Hash: 21b597813135f3971819e2e7bf8e162e8701a1fd297c256dff274e333f2d75bd
              • Instruction Fuzzy Hash: D8035E709002298FDF24CF24DC45BA9BBB6BF99314F0485D9E84DA7251DB32AEA1DF40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CharNextW.USER32(?,6F923D37,?,?), ref: 0057761F
              • CharNextW.USER32(?,6F923D37,?,?), ref: 005776B0
              • _wcschr.LIBVCRUNTIME ref: 0057780E
              • _wcschr.LIBVCRUNTIME ref: 005781DE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CharNext_wcschr
              • String ID: bkcolor$bkcolor1$bkcolor2$bkcolor3$bkimage$bordercolor$borderround$bordersize$borderstyle$colorhsl$enabled$float$focusbordercolor$height$keyboard$maxheight$maxwidth$menu$minheight$minwidth$mouse$name$padding$pos$shortcut$tag$text$tooltip$true$userdata$virtualwnd$visible$width
              • API String ID: 1162395192-3287978572
              • Opcode ID: f3136d518c9a7f1b1b4c7ac18f189b70c3a5dd3ea1983ec4d9eb029cd5ad5424
              • Instruction ID: 1237a6c8ca26df3394083d35687e0f2d6c5e977a0648c088d60a234a75e7438a
              • Opcode Fuzzy Hash: f3136d518c9a7f1b1b4c7ac18f189b70c3a5dd3ea1983ec4d9eb029cd5ad5424
              • Instruction Fuzzy Hash: FEC20536A042198EDF389F20E814BBABB71FF55B04F5980D9D54FAB280EB715D80DB42
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 005EE6C3: EnterCriticalSection.KERNEL32(00656968,?,?,?,005249F6,006578D0,6F923D37,?,?,00619FAA,000000FF), ref: 005EE6CE
                • Part of subcall function 005EE6C3: LeaveCriticalSection.KERNEL32(00656968,?,?,?,005249F6,006578D0,6F923D37,?,?,00619FAA,000000FF), ref: 005EE70B
                • Part of subcall function 005EEA1F: __onexit.LIBCMT ref: 005EEA25
                • Part of subcall function 005EE679: EnterCriticalSection.KERNEL32(00656968,?,?,00524AA9,006578D0,00620570,00000000,00000000), ref: 005EE683
                • Part of subcall function 005EE679: LeaveCriticalSection.KERNEL32(00656968,?,?,00524AA9,006578D0,00620570,00000000,00000000), ref: 005EE6B6
              • GetLocaleInfoW.KERNEL32(00000400,00001002,?,00000104,?,?,0000000F), ref: 0054C806
              • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,?,?,Timezone,00000008,?,0063AB04,00000002,?,Install_Path,0000000C,?), ref: 0054CDD9
              • GetVersionExW.KERNEL32(0000011C,?,?,0000000B), ref: 0054D2E2
              • IsWindow.USER32(?), ref: 0054DAB3
              • PostMessageW.USER32(?,00000010,00000001,00000000), ref: 0054DAC6
                • Part of subcall function 00545930: GetClientRect.USER32(?,?), ref: 0054596B
                • Part of subcall function 00545930: GetWindowLongW.USER32(?,000000F0), ref: 0054599D
                • Part of subcall function 00545930: GetMenu.USER32(?), ref: 005459AD
                • Part of subcall function 00545930: GetWindowLongW.USER32(?,000000EC), ref: 005459CC
                • Part of subcall function 00545930: GetWindowLongW.USER32(?,000000F0), ref: 005459DC
                • Part of subcall function 00545930: AdjustWindowRectEx.USER32(?,00000000), ref: 005459E8
                • Part of subcall function 00545930: SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000016), ref: 00545A0F
                • Part of subcall function 00545930: GetWindowRect.USER32(?,?), ref: 00545A1D
                • Part of subcall function 00545930: MoveWindow.USER32(?,?,?,?,?,00000001), ref: 00545A34
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Window$CriticalSection$LongRect$EnterLeave$AdjustByteCharClientInfoLocaleMenuMessageMoveMultiPostVersionWide__onexit
              • String ID: Button$Canncel$Click_Exit$Click_Install$Click_Reinstall$Click_Update$Country$DIR$DOWNLOAD_VERSION$Exit_Prompt$FreeVersionName$Home_Click_Exit$Home_Installer$Install_Path$LANG$Language$Pageid$ProOnServer$Quit$QuitDilaog$QuitInstallDialog.xml$QuitTips$QuitTipsDetail$Timezone$TrialVersionName$Version$Version_Num$exeNumber$productContrastPage$wizardTab
              • API String ID: 3742564273-1649923944
              • Opcode ID: b1f3c2a2a9e3572d692c71f22fa4d38f5be7b8a0b2b789f1c3219b3295c47ab8
              • Instruction ID: e3d36a1427b98f8b9aab44050c3ae6393c5aaf6b1a16a28bfdbfbdb110c7f09f
              • Opcode Fuzzy Hash: b1f3c2a2a9e3572d692c71f22fa4d38f5be7b8a0b2b789f1c3219b3295c47ab8
              • Instruction Fuzzy Hash: F5E2E1709012599BDF24DB64DC89BDDBFB6BF85308F1041D8E408AB2D2DB75AB84CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,005E67A8,00000000), ref: 005E6326
                • Part of subcall function 005E3C50: GetLastError.KERNEL32(00000000,?,?,?,?,005C01F7,?,?,?,?,?,?,?,?,?,?), ref: 005E3C57
                • Part of subcall function 005E3C50: _strncpy.LIBCMT ref: 005E3C95
                • Part of subcall function 005E3C50: GetLastError.KERNEL32(?,?,?,?,005C01F7,?,?,?,?,?,?,?,?,?,?,005B90AB), ref: 005E3D30
                • Part of subcall function 005E3C50: SetLastError.KERNEL32(00000000,?,?,?,?,005C01F7,?,?,?,?,?,?,?,?,?,?), ref: 005E3D3B
              • CreateFileA.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 005E6360
              • GetLastError.KERNEL32(?,?,?,?,?,?,005E67A8,00000000), ref: 005E636E
              Strings
              • schannel: failed to extract certificate from CA file '%s': %s, xrefs: 005E6596
              • schannel: invalid path name for CA file '%s': %s, xrefs: 005E6337
              • schannel: added %d certificate(s) from CA file '%s', xrefs: 005E65D6
              • schannel: CA file '%s' is not correctly formatted, xrefs: 005E65A1
              • schannel: failed to open CA file '%s': %s, xrefs: 005E637F
              • schannel: CA file exceeds max size of %u bytes, xrefs: 005E63E6
              • schannel: failed to determine size of CA file '%s': %s, xrefs: 005E63B7
              • -----END CERTIFICATE-----, xrefs: 005E6495
              • schannel: failed to read from CA file '%s': %s, xrefs: 005E6534
              • schannel: failed to add certificate from CA file '%s'to certificate store: %s, xrefs: 005E6562
              • schannel: unexpected content type '%d' when extracting certificate from CA file '%s', xrefs: 005E656E
              • schannel: did not add any certificates from CA file '%s', xrefs: 005E65C3
              • -----BEGIN CERTIFICATE-----, xrefs: 005E6468
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast$CreateFile_strncpy
              • String ID: -----END CERTIFICATE-----$-----BEGIN CERTIFICATE-----$schannel: CA file '%s' is not correctly formatted$schannel: CA file exceeds max size of %u bytes$schannel: added %d certificate(s) from CA file '%s'$schannel: did not add any certificates from CA file '%s'$schannel: failed to add certificate from CA file '%s'to certificate store: %s$schannel: failed to determine size of CA file '%s': %s$schannel: failed to extract certificate from CA file '%s': %s$schannel: failed to open CA file '%s': %s$schannel: failed to read from CA file '%s': %s$schannel: invalid path name for CA file '%s': %s$schannel: unexpected content type '%d' when extracting certificate from CA file '%s'
              • API String ID: 496561694-1680000615
              • Opcode ID: 41341722e86daadba921911e1162f4aec4688259f65065b1b5b2685496d5e15b
              • Instruction ID: 7cb6156e6663f211f8c4184f098a2939da0dcf36ca173370fada66ec39073fb4
              • Opcode Fuzzy Hash: 41341722e86daadba921911e1162f4aec4688259f65065b1b5b2685496d5e15b
              • Instruction Fuzzy Hash: DF81D1B1A00655BBDF149F51DC4AFAE7F7AFF54780F54042AF946E6192DB30AE008B60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 005EE6C3: EnterCriticalSection.KERNEL32(00656968,?,?,?,005249F6,006578D0,6F923D37,?,?,00619FAA,000000FF), ref: 005EE6CE
                • Part of subcall function 005EE6C3: LeaveCriticalSection.KERNEL32(00656968,?,?,?,005249F6,006578D0,6F923D37,?,?,00619FAA,000000FF), ref: 005EE70B
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000,?,ProductID), ref: 0053F2E8
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000), ref: 0053F421
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000,?,RecommendProductID), ref: 0053F555
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000), ref: 0053F688
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000), ref: 0053F111
                • Part of subcall function 005EEA1F: __onexit.LIBCMT ref: 005EEA25
                • Part of subcall function 005EE679: EnterCriticalSection.KERNEL32(00656968,?,?,00524AA9,006578D0,00620570,00000000,00000000), ref: 005EE683
                • Part of subcall function 005EE679: LeaveCriticalSection.KERNEL32(00656968,?,?,00524AA9,006578D0,00620570,00000000,00000000), ref: 005EE6B6
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000,?,00000009), ref: 0053F825
              • GetVersionExW.KERNEL32(0000011C,?,?,00000009), ref: 0053F920
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ByteCharMultiWide$CriticalSection$EnterLeave$Version__onexit
              • String ID: DownloadInfoUrl$LANG$ProductID$RecommendProductID$exeNumber$home$lang$pcVersion$pid$server$the DOWNLOAD_VESION read result is :%s.$tid$version$%<$+@$-@$X=$`9$cE
              • API String ID: 1524573255-692924076
              • Opcode ID: 6151c9ab535555ad9fd8259a408146af6e59a8e0291e0d8353ccf61ccb2d4d59
              • Instruction ID: 6bdb5d4a1356c62fb6e86fe79de79354231cddb61e0027d34066dd04121827fa
              • Opcode Fuzzy Hash: 6151c9ab535555ad9fd8259a408146af6e59a8e0291e0d8353ccf61ccb2d4d59
              • Instruction Fuzzy Hash: 2F721230D002599BEB29DB64CC49BDEBFB9BF86304F20419CE4456B2D2DBB15B45CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              • SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu], xrefs: 005E290E
              • Connection time-out, xrefs: 005E2949
              • Undocumented SOCKS5 mode attempted to be used by server., xrefs: 005E2DA6
              • Failed to send SOCKS5 connect request., xrefs: 005E31F9
              • Unable to receive initial SOCKS5 response., xrefs: 005E322A
              • No authentication method was acceptable. (It is quite likely that the SOCKS5 server wanted a username/password, since none was supplied to the server on this connection.), xrefs: 005E2D9B, 005E2DA0
              • No authentication method was acceptable., xrefs: 005E2D94
              • SOCKS5: connecting to HTTP proxy %s port %d, xrefs: 005E28EE
              • SOCKS5 read timeout, xrefs: 005E2B1C
              • Failed to receive SOCKS5 connect request ack., xrefs: 005E2F80
              • Failed to resolve "%s" for SOCKS5 connect., xrefs: 005E3206
              • SOCKS5 read error occurred, xrefs: 005E2B45
              • SOCKS5: error occurred during connection, xrefs: 005E29D6
              • SOCKS5: connection timeout, xrefs: 005E29AD
              • Unable to send initial SOCKS5 request., xrefs: 005E3231
              • Can't complete SOCKS5 connection to %d.%d.%d.%d:%d. (%d), xrefs: 005E3082
              • SOCKS5 request granted., xrefs: 005E31CB
              • Unable to receive SOCKS5 sub-negotiation response., xrefs: 005E2D5D
              • SOCKS5 connect to IPv4 %s (locally resolved), xrefs: 005E2EBC
              • SOCKS5: no connection here, xrefs: 005E299D
              • SOCKS5 GSS-API protection not yet implemented., xrefs: 005E2F1F, 005E2F72
              • SOCKS5 connection to %s not supported, xrefs: 005E2ED2
              • Unable to negotiate SOCKS5 GSS-API context., xrefs: 005E2BF7
              • Can't complete SOCKS5 connection to %02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%d. (%d), xrefs: 005E31A7
              • Failed to send SOCKS5 sub-negotiation request., xrefs: 005E2D67
              • SOCKS5 reply has wrong version, version should be 5., xrefs: 005E2FBE
              • SOCKS5 communication to %s:%d, xrefs: 005E2A85
              • Can't complete SOCKS5 connection to %s:%d. (%d), xrefs: 005E30E7
              • SOCKS5 nothing to read, xrefs: 005E2B0C
              • SOCKS5 GSSAPI per-message authentication is not supported., xrefs: 005E2D79
              • User was rejected by the SOCKS5 server (%d %d)., xrefs: 005E2D39
              • Received invalid version in initial SOCKS5 response., xrefs: 005E2BB4
              • warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu, xrefs: 005E29F1
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ioctlsocket
              • String ID: Can't complete SOCKS5 connection to %02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%02x%02x:%d. (%d)$Can't complete SOCKS5 connection to %d.%d.%d.%d:%d. (%d)$Can't complete SOCKS5 connection to %s:%d. (%d)$Connection time-out$Failed to receive SOCKS5 connect request ack.$Failed to resolve "%s" for SOCKS5 connect.$Failed to send SOCKS5 connect request.$Failed to send SOCKS5 sub-negotiation request.$No authentication method was acceptable.$No authentication method was acceptable. (It is quite likely that the SOCKS5 server wanted a username/password, since none was supplied to the server on this connection.)$Received invalid version in initial SOCKS5 response.$SOCKS5 GSS-API protection not yet implemented.$SOCKS5 GSSAPI per-message authentication is not supported.$SOCKS5 communication to %s:%d$SOCKS5 connect to IPv4 %s (locally resolved)$SOCKS5 connection to %s not supported$SOCKS5 nothing to read$SOCKS5 read error occurred$SOCKS5 read timeout$SOCKS5 reply has wrong version, version should be 5.$SOCKS5 request granted.$SOCKS5: connecting to HTTP proxy %s port %d$SOCKS5: connection timeout$SOCKS5: error occurred during connection$SOCKS5: no connection here$SOCKS5: server resolving disabled for hostnames of length > 255 [actual len=%zu]$Unable to negotiate SOCKS5 GSS-API context.$Unable to receive SOCKS5 sub-negotiation response.$Unable to receive initial SOCKS5 response.$Unable to send initial SOCKS5 request.$Undocumented SOCKS5 mode attempted to be used by server.$User was rejected by the SOCKS5 server (%d %d).$warning: unsupported value passed to CURLOPT_SOCKS5_AUTH: %lu
              • API String ID: 3577187118-3450089137
              • Opcode ID: 9d138138968b0ecb5b8be66b33d0273b97403fe3cf01f33ba80df102a699f163
              • Instruction ID: 641cc1d70f7264037d8847817f07c532d06673c1e6ad3949a18ad53e8b6ed412
              • Opcode Fuzzy Hash: 9d138138968b0ecb5b8be66b33d0273b97403fe3cf01f33ba80df102a699f163
              • Instruction Fuzzy Hash: 75422871A046A9AEDF259B159C5ABFEBFBDBF85301F1400E5E48DA2182D7315F808F21
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _wcsstr.LIBVCRUNTIME ref: 0057D2C2
              • _wcsstr.LIBVCRUNTIME ref: 0057D2D9
              • CharNextW.USER32(?), ref: 0057D39C
              • CharNextW.USER32(?), ref: 0057D3D7
              • CharNextW.USER32(?), ref: 0057D45E
              • SelectObject.GDI32(?,00000000), ref: 0057D987
              • CharNextW.USER32(?), ref: 0057D49A
                • Part of subcall function 0055D430: SelectObject.GDI32(?,00000000), ref: 0055D4B1
                • Part of subcall function 0055D430: GetTextMetricsW.GDI32(?,00000000), ref: 0055D4C5
                • Part of subcall function 0055D430: SelectObject.GDI32(?,00000000), ref: 0055D4D5
              • CharNextW.USER32(?), ref: 0057D4DA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CharNext$ObjectSelect$_wcsstr$MetricsText
              • String ID: $file$file='$res$res='$restype
              • API String ID: 1690279798-2820399831
              • Opcode ID: 6dc6ad85be771ef034544a65003dde8a46460a96564976ab71c3cb8defd4886f
              • Instruction ID: ca51b64dcd0a8803e5348173d15badce7f3159c5245f09f17be6a6bc323e4b02
              • Opcode Fuzzy Hash: 6dc6ad85be771ef034544a65003dde8a46460a96564976ab71c3cb8defd4886f
              • Instruction Fuzzy Hash: 61825D75D002298BDF24DF24DC45BA9BBB6BF94310F0485E9E84DA7250EB329E91DF60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetCaretBlinkTime.USER32(00000000), ref: 00584AFD
              • SetTimer.USER32(?,00000014,00000000), ref: 00584B09
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00584B1D
              • DefWindowProcW.USER32(?,?,?,?), ref: 00584B43
              • SendMessageW.USER32(?,00000008,?,?), ref: 00584B75
              • GetClientRect.USER32(?,?), ref: 00584D55
              • InvalidateRect.USER32(?,?,00000000), ref: 00584D65
                • Part of subcall function 00584EB0: GetWindowTextLengthW.USER32(?), ref: 00584ED2
                • Part of subcall function 00584EB0: GetWindowTextW.USER32(?,?,00000001), ref: 00584EEE
              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00584B84
                • Part of subcall function 0055C680: GetWindowRect.USER32(?,?), ref: 0055C6AF
                • Part of subcall function 0055C680: ScreenToClient.USER32(?,?), ref: 0055C6C5
                • Part of subcall function 0055C680: ScreenToClient.USER32(?,?), ref: 0055C6D1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Window$ClientRect$MessageProcScreenSendText$BlinkCallCaretInvalidateLengthTimeTimer
              • String ID: return
              • API String ID: 2606525845-2812165903
              • Opcode ID: cd79113ebe44cc6b8a3eb1ce83440a503ed268399257bd75b2e32a706b3328d2
              • Instruction ID: 4dcf0261aa583efd228f917bfe459255917f25e2aa1d20e63ae34cbcaafe4bef
              • Opcode Fuzzy Hash: cd79113ebe44cc6b8a3eb1ce83440a503ed268399257bd75b2e32a706b3328d2
              • Instruction Fuzzy Hash: 89C19F75604602AFDB14EF68D949B69BBF5FF99301F000A69F949DB2A0CB30EC50CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000,DownloadThreadCount), ref: 00536A9E
                • Part of subcall function 00521300: MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,?,?), ref: 0052131E
              • SimpleUString::operator=.MSOBJ140-MSVCRT ref: 00537442
                • Part of subcall function 00521340: WideCharToMultiByte.KERNEL32(?,00000000,?,000000FF,?,?,00000000,00000000), ref: 00521361
                • Part of subcall function 005267E0: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00526887
              • Sleep.KERNEL32(?), ref: 0053784B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ByteCharMultiWide$Ios_base_dtorSimpleSleepString::operator=std::ios_base::_
              • String ID: DownloadThreadCount$Downloading$Errorinfo$Failed$Info_iTunesdevicedriver$InstallIntervalTime$Result$Result_iTunesdevicedriver$Stopped$Success$progressValue$slrProgress$text$value
              • API String ID: 1622151193-399109315
              • Opcode ID: 6885832ddf4e84a2ebe5ab422993bef6dd908d0fb90f7e1a48ba30c92dbd83de
              • Instruction ID: 19b7889290e19870589e35042f8acf4a3fd70ce7ebd4fe819eff4b11d6a29974
              • Opcode Fuzzy Hash: 6885832ddf4e84a2ebe5ab422993bef6dd908d0fb90f7e1a48ba30c92dbd83de
              • Instruction Fuzzy Hash: 3792DD70D00359ABDF14DFA4D849BEDBFB2BF8A304F148158E4456B2C2DB746A09CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CharNext
              • String ID: ?d$Combo$Default$Edit$Font$HBox$IContainer$Image$Include$L8d$Label$List$MultiLanguage$T8d$Text$Tree$TreeNode$TreeNodeUI$TreeView$VBox$count$cover$source$true
              • API String ID: 3213498283-692308923
              • Opcode ID: b3be5904db14335f7cb4630a4ac21c6fea7260cab67de9e05efa89701d557a06
              • Instruction ID: f3d5c08d22ea3da3b99036adcbb3e2048e689502e5295e0965dd55a932d1baa2
              • Opcode Fuzzy Hash: b3be5904db14335f7cb4630a4ac21c6fea7260cab67de9e05efa89701d557a06
              • Instruction Fuzzy Hash: 6E72B670A016199FDB24DF24CC45BAABBF5BF94300F1445ECE849A7292EB719E85CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,00000000,00000000,00000000), ref: 005A839F
              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,005A8C6E,000000FF,00000000,00000000,00000000,00000000,6F923D37,00000018,00620238), ref: 005A84BE
              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,005A8C6E,000000FF,00000000,00000000,00000000,00000000), ref: 005A84FF
                • Part of subcall function 005A8310: Sleep.KERNEL32(00000064), ref: 005A87BD
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000), ref: 005A8569
              • CreateThread.KERNEL32(00000000,00000000,005A8C00,00000000,00000000,00000000), ref: 005A8ADD
              • WaitForSingleObject.KERNEL32(00000000,00002710,?,?,?,?,?,?,?,?,00000004), ref: 005A8AEF
              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000004), ref: 005A8AF6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ByteCharMultiWide$CloseCreateHandleObjectSingleSleepThreadWait
              • String ID: &downloader_num=$&install_finish_downloader=true$&install_start_downloader=true$&url=$GUID$UpdateEventUrl$iTry=%d,lastCode=%d$uid=
              • API String ID: 4137312769-3209941931
              • Opcode ID: 96b67ce3e493f61ab800d00cf696553f02ad0ea193483adf8108742e1dbd7c7b
              • Instruction ID: e6ac14c4613411bdd686b5d6e11bfcd3eaf940235bce20a76584cad42f68d6ac
              • Opcode Fuzzy Hash: 96b67ce3e493f61ab800d00cf696553f02ad0ea193483adf8108742e1dbd7c7b
              • Instruction Fuzzy Hash: 3F423671A002499BDF14DF64DC4ABAE7FB2FF8A304F10465CE405AB2D1EB75AA44CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetCurrentProcess.KERNEL32(000F01FF,?), ref: 00538849
              • OpenProcessToken.ADVAPI32(00000000), ref: 00538850
              • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00538865
              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 0053888C
              • ExitWindowsEx.USER32(00000006,00040000), ref: 0053889D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ProcessToken$AdjustCurrentExitLookupOpenPrivilegePrivilegesValueWindows
              • String ID: Auto_Retry$Click_Retry$Download_Failed$Downloading$Errorinfo$File MD5 can't pass$Result$Result_Loading$SeShutdownPrivilege$failed$wizardTab
              • API String ID: 1314775590-1435622279
              • Opcode ID: c858744d70ee5715cc95329f55c72d83c0b1e529e130cf443cada16d38946176
              • Instruction ID: e13c7a3bf19889151ae78ccc0d2be2cc1bfb00db9681c72a52618f2464f4f186
              • Opcode Fuzzy Hash: c858744d70ee5715cc95329f55c72d83c0b1e529e130cf443cada16d38946176
              • Instruction Fuzzy Hash: 82F1E571A002099BDF08DBA4DC8ABADBF76FF85300F608518F415AB2D2DB756A45CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              • Local Interface %s is ip %s using address family %i, xrefs: 005C04FB
              • getsockname() failed with errno %d: %s, xrefs: 005C0681
              • Couldn't bind to interface '%s', xrefs: 005C0532
              • Bind to local port %hu failed, trying next, xrefs: 005C05E9
              • Local port: %hu, xrefs: 005C06E9
              • bind failed with errno %d: %s, xrefs: 005C06C1
              • Name '%s' family %i resolved to '%s' family %i, xrefs: 005C042A
              • Couldn't bind to '%s', xrefs: 005C0557
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastbindhtons$getsockname
              • String ID: Bind to local port %hu failed, trying next$Couldn't bind to '%s'$Couldn't bind to interface '%s'$Local Interface %s is ip %s using address family %i$Local port: %hu$Name '%s' family %i resolved to '%s' family %i$bind failed with errno %d: %s$getsockname() failed with errno %d: %s
              • API String ID: 1307802678-2769131373
              • Opcode ID: 6fe2b286e57cb490a9696899e22f84d45922c15573a55c3da8b571e6e6423ddc
              • Instruction ID: 18370e166b2bef06ab68a45948f15a3dff71accc002585d98e3464eef8f90439
              • Opcode Fuzzy Hash: 6fe2b286e57cb490a9696899e22f84d45922c15573a55c3da8b571e6e6423ddc
              • Instruction Fuzzy Hash: 8FC1C275A00219AFDF209F64DC5AFEA7BB8FF45304F0440E9E909A7282EB715E458F90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,005A8C6E,000000FF,00000000,00000000,00000000,00000000,6F923D37,00000018,00620238), ref: 005A84BE
              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,005A8C6E,000000FF,00000000,00000000,00000000,00000000), ref: 005A84FF
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000), ref: 005A8569
              • Sleep.KERNEL32(00000064), ref: 005A87BD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ByteCharMultiWide$Sleep
              • String ID: &downloader_num=$&install_finish_downloader=true$&install_start_downloader=true$&url=$GUID$UpdateEventUrl$iTry=%d,lastCode=%d$uid=
              • API String ID: 556109852-3209941931
              • Opcode ID: 25b2d34471f5a80c9be82e4481234fdab6aa7d5f45ddab816b9346f3bb1c0fba
              • Instruction ID: 18f19c90bc41318c5ebbfae05dbb695a5b379bd8346930ba918875ae899d4556
              • Opcode Fuzzy Hash: 25b2d34471f5a80c9be82e4481234fdab6aa7d5f45ddab816b9346f3bb1c0fba
              • Instruction Fuzzy Hash: 18322771E00249ABDB14DF64DC4ABAE7F72FF8A314F104658F405AB2D1EB75AA40CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 005550C6
              • Process32FirstW.KERNEL32(00000000,?), ref: 0055518B
              • CloseHandle.KERNEL32(00000000), ref: 0055519A
              • Process32NextW.KERNEL32(00000000,0000022C), ref: 00555277
              • CloseHandle.KERNEL32(00000000), ref: 0055528B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32
              • String ID: GetNativeSystemInfo$ProductEventName$ProductProcess$RegistryAddress$RegistryName$hha$kernel32
              • API String ID: 1789362936-1369795354
              • Opcode ID: aff50e9f5eeda81cb0bf92f751b331cfed28d66f78c6f9a770e4135fbd817556
              • Instruction ID: 72c347de1ee38729180302cc980704aa41b462725298a9b9d5a4490304909bb2
              • Opcode Fuzzy Hash: aff50e9f5eeda81cb0bf92f751b331cfed28d66f78c6f9a770e4135fbd817556
              • Instruction Fuzzy Hash: 72D114709006058FDF24DF74CC6DB9DBFB5BF49301F144699E849AB391E774AA888B90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              • schannel: received incomplete message, need more data, xrefs: 005D06AF
              • schannel: SNI or certificate check failed: %s, xrefs: 005D063D, 005D0646
              • schannel: failed to receive handshake, SSL/TLS connection failed, xrefs: 005D04AF
              • schannel: SSL/TLS connection with %s port %hu (step 2/3), xrefs: 005D00D8
              • schannel: encrypted data got %zd, xrefs: 005D0280
              • schannel: failed to receive handshake, need more data, xrefs: 005D04E6
              • schannel: sending next handshake data: sending %lu bytes..., xrefs: 005D03E3
              • schannel: SSL/TLS handshake complete, xrefs: 005D055D
              • schannel: encrypted data length: %lu, xrefs: 005D0456
              • SSL: public key does not match pinned public key!, xrefs: 005D05C1
              • schannel: a client certificate has been requested, xrefs: 005D067B
              • schannel: encrypted data buffer: offset %zu length %zu, xrefs: 005D029A
              • schannel: failed to send next handshake data: sent %zd of %lu bytes, xrefs: 005D050F
              • schannel: unable to re-allocate memory, xrefs: 005D01E1
              • schannel: unable to allocate memory, xrefs: 005D0147
              • schannel: next InitializeSecurityContext failed: %s, xrefs: 005D0638
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastrecv
              • String ID: SSL: public key does not match pinned public key!$schannel: SNI or certificate check failed: %s$schannel: SSL/TLS connection with %s port %hu (step 2/3)$schannel: SSL/TLS handshake complete$schannel: a client certificate has been requested$schannel: encrypted data buffer: offset %zu length %zu$schannel: encrypted data got %zd$schannel: encrypted data length: %lu$schannel: failed to receive handshake, SSL/TLS connection failed$schannel: failed to receive handshake, need more data$schannel: failed to send next handshake data: sent %zd of %lu bytes$schannel: next InitializeSecurityContext failed: %s$schannel: received incomplete message, need more data$schannel: sending next handshake data: sending %lu bytes...$schannel: unable to allocate memory$schannel: unable to re-allocate memory
              • API String ID: 2514157807-2923914744
              • Opcode ID: 31ccf7529ff4ab9352414e4f901df5c9bbdf5fe7d5efad184e68deb1e6c2bee4
              • Instruction ID: 2d634369077057eb6862636a7bcda89ad665d520fc5bc0805405ab96207597a0
              • Opcode Fuzzy Hash: 31ccf7529ff4ab9352414e4f901df5c9bbdf5fe7d5efad184e68deb1e6c2bee4
              • Instruction Fuzzy Hash: 4012A171A00205AFDB24DF98D886FED7BB5FF48318F54057AF90A9B282DB31A951CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RegCreateKeyExA.ADVAPI32(80000002,?,00000000,00000000,00000000,000F003F,00000000,?,00000000), ref: 005287FF
              • RegSetValueExA.ADVAPI32(00000000,?,00000000,00000001,?), ref: 0052882B
              • RegCloseKey.ADVAPI32(00000000), ref: 00528839
              • LoadLibraryA.KERNEL32(Wininet.dll,00000000), ref: 00528916
              • GetProcAddress.KERNEL32(00000000,InternetCheckConnectionA), ref: 00528929
              • FreeLibrary.KERNEL32(00000000), ref: 0052895A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Library$AddressCloseCreateFreeLoadProcValue
              • String ID: InternetCheckConnectionA$Wininet.dll$https://www.baidu.com/$https://www.google.com/
              • API String ID: 325391000-516931071
              • Opcode ID: 9faccfd32b85b4a2c62a57ae527784fff73c1d20becb323f7fadbf54b1163032
              • Instruction ID: 13bdd5449599251fef5974777563d9c28a0cb32258ced5b7b1dea52bba4c29bb
              • Opcode Fuzzy Hash: 9faccfd32b85b4a2c62a57ae527784fff73c1d20becb323f7fadbf54b1163032
              • Instruction Fuzzy Hash: CF414471211209ABEB28CF68EC89FAD3F66FF86740F904518F804EA2D1DB75D981CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetKeyState.USER32(00000011), ref: 005590C3
              • GetKeyState.USER32(00000002), ref: 005590D2
              • GetKeyState.USER32(00000001), ref: 005590DE
              • GetKeyState.USER32(00000010), ref: 005590EA
              • GetKeyState.USER32(00000012), ref: 005590F6
              • GetTickCount.KERNEL32 ref: 00559104
              • _wcsstr.LIBVCRUNTIME ref: 0055916D
              • GetKeyState.USER32(00000010), ref: 0055918A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: State$CountTick_wcsstr
              • String ID: RichEdit
              • API String ID: 732035549-1265552804
              • Opcode ID: 6f695f1e587d5aee9bcce27f44c9706040e59bef7414d3b1f95e5cb79ee82131
              • Instruction ID: 042f81f02b6ba71e44f6b4329f584106f162f5a039d73734fa19fca997428329
              • Opcode Fuzzy Hash: 6f695f1e587d5aee9bcce27f44c9706040e59bef7414d3b1f95e5cb79ee82131
              • Instruction Fuzzy Hash: A4510A3560070ADFDB10CF64C899BF97BA1FF88301F00846AED5AAB251DB75AD45DB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetWindowRect.USER32(?,?), ref: 005581F2
              • GetParent.USER32(?), ref: 00558204
              • GetWindow.USER32(?,00000004), ref: 0055820F
              • MonitorFromWindow.USER32 ref: 0055823F
              • GetMonitorInfoW.USER32(00000000), ref: 00558246
              • IsIconic.USER32(00000000), ref: 00558260
              • GetWindowRect.USER32(00000000,?), ref: 00558270
              • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 00558313
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Window$MonitorRect$FromIconicInfoParent
              • String ID: (
              • API String ID: 1680950861-3887548279
              • Opcode ID: a66cbaacc019e0cb14930f35a677e2c6f25fa581db4dbe1500e7d20b8230a884
              • Instruction ID: 0d2e9fc12ce90f74a559642ffc4311c73c68f14897542901229b953c233df574
              • Opcode Fuzzy Hash: a66cbaacc019e0cb14930f35a677e2c6f25fa581db4dbe1500e7d20b8230a884
              • Instruction Fuzzy Hash: BA41CF31508B419BD710CF3CC846AAABBFABFD9315F145A19F994D7160EB30E8468B81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CLSIDFromString.OLE32(?,?), ref: 0056E6F3
              • CLSIDFromProgID.OLE32(?,?), ref: 0056E6FB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: From$ProgString
              • String ID: autonavi$clsid$delaycreate$homepage$modulename$true
              • API String ID: 2510552579-3099872486
              • Opcode ID: 52fa0a5b861908de964b18198a7f48114ce499ae39a82d0ade85b99c8c6a779f
              • Instruction ID: 14c34c29a6871339f11fa19a59538150b2dee17e646b790336b93e24574b2e2e
              • Opcode Fuzzy Hash: 52fa0a5b861908de964b18198a7f48114ce499ae39a82d0ade85b99c8c6a779f
              • Instruction Fuzzy Hash: 4EA13B367162439AD724AF24D8137FBBBA2FFB5314F84496AD8468B241FB32D940C391
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: alnum$alpha$blank$digit$graph$lower$print$space$upper$xdigit
              • API String ID: 0-2602438971
              • Opcode ID: 424687559025e1274798b5cc233be01b0ad40ce0b872c9b0eea2cf8a26eb4c51
              • Instruction ID: 79378a0bf0e41eb0bd13783d420cbabdf4a65f4f891f10025129662c6ba0f154
              • Opcode Fuzzy Hash: 424687559025e1274798b5cc233be01b0ad40ce0b872c9b0eea2cf8a26eb4c51
              • Instruction Fuzzy Hash: A9C1C561A081C54ACB198F7A95A17FA7FA3FB66314F5804EAC8C6DB242D713DD0A8750
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
              • GetACP.KERNEL32(00000055,?,?,?,?,?,0060748B,?,?,?,?,?,?,00000004), ref: 00614181
              • IsValidCodePage.KERNEL32(00000000,00000055,?,?,?,?,?,0060748B,?,?,?,?,?,?,00000004), ref: 006141AC
              • _wcschr.LIBVCRUNTIME ref: 00614240
              • _wcschr.LIBVCRUNTIME ref: 0061424E
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,0060748B,00000000,006075AB), ref: 00614311
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
              • String ID: X2c$utf8
              • API String ID: 4147378913-1921029068
              • Opcode ID: 71b69bc81da5b04e16964b82417e9f5eba6d95afedd3fd5c8182e6cd8c4c38ad
              • Instruction ID: a2236a5735c6456e6765e8268d2261835a9d9fb01af74a93de7deacdfa57ad2e
              • Opcode Fuzzy Hash: 71b69bc81da5b04e16964b82417e9f5eba6d95afedd3fd5c8182e6cd8c4c38ad
              • Instruction Fuzzy Hash: 17712831600306AADB24AB35CC46BF773AAEF45710F184469FA05DB281EF70EEC18795
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
                • Part of subcall function 0060AC51: _free.LIBCMT ref: 0060ACB3
                • Part of subcall function 0060AC51: _free.LIBCMT ref: 0060ACE9
              • GetUserDefaultLCID.KERNEL32(00000055,?,?), ref: 00614B3B
              • IsValidCodePage.KERNEL32(00000000), ref: 00614B86
              • IsValidLocale.KERNEL32(?,00000001), ref: 00614B95
              • GetLocaleInfoW.KERNEL32(?,00001001,00607484,00000040,?,006075A4,00000055,00000000,?,?,00000055,00000000), ref: 00614BDD
              • GetLocaleInfoW.KERNEL32(?,00001002,00607504,00000040), ref: 00614BFC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Locale$ErrorInfoLastValid_free$CodeDefaultPageUser
              • String ID: X2c
              • API String ID: 949163717-2753938057
              • Opcode ID: 7e604d8b20b129a437fe107b2377d2581a765679e21ad8b9df35806ae03d7ae0
              • Instruction ID: e965be827e588b99c45d90eb79250d8a14945c12b73ba1e571d76510b925aea9
              • Opcode Fuzzy Hash: 7e604d8b20b129a437fe107b2377d2581a765679e21ad8b9df35806ae03d7ae0
              • Instruction Fuzzy Hash: 91518F71A04209AFEB10DFA5CC45BFAB7BAFF44700F1D4469A915EB290DB70DA808B65
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,?,F0000000), ref: 005CE4D7
              • CryptCreateHash.ADVAPI32(00000000,?,00000000,00000000,00000000), ref: 005CE4EF
              • CryptHashData.ADVAPI32(00000000,00000000,00000000,00000000), ref: 005CE504
              • CryptGetHashParam.ADVAPI32(00000000,00000004,00000000,00000004,00000000), ref: 005CE51D
              • CryptGetHashParam.ADVAPI32(00000000,00000002,00000004,?,00000000), ref: 005CE53A
              • CryptDestroyHash.ADVAPI32(00000000), ref: 005CE548
              • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 005CE558
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Crypt$Hash$ContextParam$AcquireCreateDataDestroyRelease
              • String ID:
              • API String ID: 3606780921-0
              • Opcode ID: b3f16c71c72692ada65721a3e953b9b25d7ce11e43fd01d8f96e5a16964fd7ed
              • Instruction ID: b3c569df2ea55a41556101f4878b7ebf81d8bf5af45a35f9e1379ecab64e52eb
              • Opcode Fuzzy Hash: b3f16c71c72692ada65721a3e953b9b25d7ce11e43fd01d8f96e5a16964fd7ed
              • Instruction Fuzzy Hash: 31212571A00209BBEF209F90DD4AFEE7B79FB04700F140054FA00EA190EB75AA51DBA5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,?,?,?,?,00000000,?), ref: 005EA4CC
              • CryptCreateHash.ADVAPI32(00000000,00008002,00000000,00000000,?,?,?,?,?,?,00000000,?), ref: 005EA4E9
              • CryptHashData.ADVAPI32(?,00000000,00000000,00000000,?,?,?,?), ref: 005EA501
              • CryptGetHashParam.ADVAPI32(?,00000002,?,00000010,00000000,?,?,?,?), ref: 005EA513
              • CryptDestroyHash.ADVAPI32(?,?,?,?,?), ref: 005EA51C
              • CryptReleaseContext.ADVAPI32(00000000,00000000,?,?,?,?,?,00000000,?), ref: 005EA527
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Crypt$Hash$Context$AcquireCreateDataDestroyParamRelease
              • String ID:
              • API String ID: 3186506766-0
              • Opcode ID: ffcab465d37ab876879682a217f4d4c2012b1be377305db6831d650d41072df4
              • Instruction ID: 155851f109cb51c6404ea62257e7731bca663734ad3bd08961d8b21fb1fd7f20
              • Opcode Fuzzy Hash: ffcab465d37ab876879682a217f4d4c2012b1be377305db6831d650d41072df4
              • Instruction Fuzzy Hash: A5312532900248BBDB209FA4EC49FDE7F7DFF45715F100066F945A61D0DBB1AA158BA2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptAcquireContextA.ADVAPI32(00000000,00000000,00000000,00000001,F0000000,?,0000000E,?), ref: 005EA5AE
              • CryptImportKey.ADVAPI32(00000000,00000208,00000014,00000000,00000000,?), ref: 005EA603
              • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 005EA611
              • CryptEncrypt.ADVAPI32(?,00000000,00000000,00000000,0000000E,00000008,00000008), ref: 005EA647
              • CryptDestroyKey.ADVAPI32(?), ref: 005EA650
              • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 005EA65B
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Crypt$Context$Release$AcquireDestroyEncryptImport
              • String ID:
              • API String ID: 3016261861-0
              • Opcode ID: c09529533073f6c062a86ea7997b13d2ad87e2e0748a20cd8715b7028e50b581
              • Instruction ID: 8812aea2caa7b12614de8708cfbade41015581e2193fde32f0f06b55d9baa9e5
              • Opcode Fuzzy Hash: c09529533073f6c062a86ea7997b13d2ad87e2e0748a20cd8715b7028e50b581
              • Instruction Fuzzy Hash: 48318E31A4024DABDF10DFA5DC46FEEBBB9FF59700F204059FA04BA290DB7169858B64
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLocaleInfoW.KERNEL32(51CEB70F,2000000B,00000000,00000002,00000000,?,?,?,00614B7A,?,00000000), ref: 006148ED
              • GetLocaleInfoW.KERNEL32(51CEB70F,20001004,00000000,00000002,00000000,?,?,?,00614B7A,?,00000000), ref: 00614916
              • GetACP.KERNEL32(?,?,00614B7A,?,00000000), ref: 0061492B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: InfoLocale
              • String ID: ACP$OCP
              • API String ID: 2299586839-711371036
              • Opcode ID: 53f8036d3d0d8a4c460e3ed4f2be076eedee8f152f69e6767bd8c00178da2313
              • Instruction ID: 9276a801f5bcf634775eb29e9bbf9a0980d154c2e0d202347d7b1fc82938b52f
              • Opcode Fuzzy Hash: 53f8036d3d0d8a4c460e3ed4f2be076eedee8f152f69e6767bd8c00178da2313
              • Instruction Fuzzy Hash: 8321B322A05105A6DB74CF65C901BE7B3A7EF51B60B5E8865E90ADB310EF32DEC1C350
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: DNEI$ETLP$IBgC$RDHI$SNRt$TADI
              • API String ID: 0-81932513
              • Opcode ID: 178093d71cda729e451bc27d2bb85e01f00579b880a5f6fe4e77d37b3990dd4a
              • Instruction ID: fcff4173b03a781044bfa61d123b8848c7137474fbacc5e0ddaa6750c369752c
              • Opcode Fuzzy Hash: 178093d71cda729e451bc27d2bb85e01f00579b880a5f6fe4e77d37b3990dd4a
              • Instruction Fuzzy Hash: E272BF34A007458FCB25CF29C8947AABFE1BF4B340F1499ADD49A87392D730A985CF95
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastselect
              • String ID:
              • API String ID: 215497628-0
              • Opcode ID: 28eb2156f2d06c77ebf5ab018247b10644e19a41479297fd686b39a3b124c313
              • Instruction ID: 1ad0c940a3817f6be674803b59791ffa237f1f3658c4fad218fd1bb4879e2ef7
              • Opcode Fuzzy Hash: 28eb2156f2d06c77ebf5ab018247b10644e19a41479297fd686b39a3b124c313
              • Instruction Fuzzy Hash: 0CC142749002198BDF25CF29C9867EDBBB9BF98310F5849E9D859A7241D730AFC18F50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetKeyState.USER32(00000011), ref: 005584CC
              • GetKeyState.USER32(00000002), ref: 005584DB
              • GetKeyState.USER32(00000001), ref: 005584E7
              • GetKeyState.USER32(00000010), ref: 005584F3
              • GetKeyState.USER32(00000012), ref: 005584FF
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: State
              • String ID:
              • API String ID: 1649606143-0
              • Opcode ID: cf2d8ee1f580c170df160aac9ae4612a52806b6ae81d3e71137e7aa4d1f4c146
              • Instruction ID: f1696334641c026382654bf44b4c6aec8c10fee52b8e56ef6a7ab04f747e181b
              • Opcode Fuzzy Hash: cf2d8ee1f580c170df160aac9ae4612a52806b6ae81d3e71137e7aa4d1f4c146
              • Instruction Fuzzy Hash: 06E0656BF8027B50EE2032D89C01FB58D106FA4BD9F430166EE48FB0881DC2284328B0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              • -----END PUBLIC KEY-----, xrefs: 005B83DC
              • -----BEGIN PUBLIC KEY-----, xrefs: 005B83BA
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _strstr
              • String ID: -----END PUBLIC KEY-----$-----BEGIN PUBLIC KEY-----
              • API String ID: 2882301372-1157147699
              • Opcode ID: 53ea3bd3852a7c45fd506b19262db720dcc97750ade097545849249c7723dd05
              • Instruction ID: 8292c52ff0a459c3cd01ec627884aabde3ea079dfa83193971485d63056b79e8
              • Opcode Fuzzy Hash: 53ea3bd3852a7c45fd506b19262db720dcc97750ade097545849249c7723dd05
              • Instruction Fuzzy Hash: 39213772A0021667CF205F6DBC457F9BFDDFB45255F8416B6ED08C7201EA22AC50C6D0
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: %02d:%02d%n$%02d:%02d:%02d%n$%31[ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz]$+$<
              • API String ID: 0-2356964677
              • Opcode ID: 09a3d68d9e618e22dc01181029a826c0fe57d9c00eb48dd07dd92185b436001d
              • Instruction ID: b9345412fbfbc9029af96dbf16c3d361bb5836503dd649196b65d063c9309b2a
              • Opcode Fuzzy Hash: 09a3d68d9e618e22dc01181029a826c0fe57d9c00eb48dd07dd92185b436001d
              • Instruction Fuzzy Hash: CED18E71E002599EDF14DFE8C885AADBBB5BF85320F24423EE425E72C1E7309D468B61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000040), ref: 005CE41A
              • CryptGenRandom.ADVAPI32(00000000,?,?), ref: 005CE42D
              • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 005CE43C
              • CryptReleaseContext.ADVAPI32(00000000,00000000), ref: 005CE44B
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Crypt$Context$Release$AcquireRandom
              • String ID:
              • API String ID: 2916321625-0
              • Opcode ID: b4dfb578a03a355578c9489c4d1ff1e872430aa353ffda9ee9dc6d4729f0c686
              • Instruction ID: 4bfab8897a369bf78b4ebf891adba545653c65070af2e42ab68cfec47050f764
              • Opcode Fuzzy Hash: b4dfb578a03a355578c9489c4d1ff1e872430aa353ffda9ee9dc6d4729f0c686
              • Instruction Fuzzy Hash: 23F01C3074824DFBEF208FA0DD0AFA97B79FB05741F104095FA08E9190EA769A519B55
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
                • Part of subcall function 0060AC51: _free.LIBCMT ref: 0060ACB3
                • Part of subcall function 0060AC51: _free.LIBCMT ref: 0060ACE9
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0061452B
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00614575
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0061463B
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: InfoLocale$ErrorLast_free
              • String ID:
              • API String ID: 3140898709-0
              • Opcode ID: 4fee15ec7da1ceb5cfc05e1858861e46d64b5c9bcb983cc1d0c5687b39940100
              • Instruction ID: 9785774b0aabc06a24d78beece9f3546b07668f488f7ff7b19f860e0baf93630
              • Opcode Fuzzy Hash: 4fee15ec7da1ceb5cfc05e1858861e46d64b5c9bcb983cc1d0c5687b39940100
              • Instruction Fuzzy Hash: 3061C17155021B9BDB289F28CC82BFA77AAEF06314F184179E905C7281EF34D9D1CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 781217d3a5e987a853bb72d1d7e692ab5c74a05dc2f45d69b00546a7a43613b5
              • Instruction ID: f5cf8208e8ba16aba764fdbc85eaf119b44aa39a389fbe694e4aa03a02594973
              • Opcode Fuzzy Hash: 781217d3a5e987a853bb72d1d7e692ab5c74a05dc2f45d69b00546a7a43613b5
              • Instruction Fuzzy Hash: FA024E71E002199FDF14CFA8C9816AEBBB1FF88314F158269E919EB355D735AE01CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 35cb9b481fb92fb133a201edfaae208439ade023558bf8016386526ecaa2c207
              • Instruction ID: e92c649177c4a0ac5cb2896b581ba04ae53cc930a7c1d1cd8d940fda8d410b9c
              • Opcode Fuzzy Hash: 35cb9b481fb92fb133a201edfaae208439ade023558bf8016386526ecaa2c207
              • Instruction Fuzzy Hash: C4E1B0716043418FD724CF28E4857AABBE1FB89314F448A6DEC9D8B382D731E945DB92
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • htons.WS2_32(0000FEED), ref: 005DCDDC
              • GetCurrentProcessId.KERNEL32(?,?,005DD13B,0000FF0D,?,?,?,?,?), ref: 005DCE13
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CurrentProcesshtons
              • String ID:
              • API String ID: 2530476045-0
              • Opcode ID: 36af99b4087dbed31c7bd2c475e189606e651ed0e8c7c9c9a73de334f59baa99
              • Instruction ID: 870aa15dacdd2b2dc3042ad955075766b131881ecb64cbd06b0382ede424a7fd
              • Opcode Fuzzy Hash: 36af99b4087dbed31c7bd2c475e189606e651ed0e8c7c9c9a73de334f59baa99
              • Instruction Fuzzy Hash: A3017C795143948BCB00CF69D4806A6B7E4FF19310F05A68AEC489F357E370EA90C7A9
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: WDigest$digest_sspi: MakeSignature failed, error 0x%08lx
              • API String ID: 0-280454364
              • Opcode ID: 00d43c3546ff6b829351a50820cc2a98230a462f523509ba330515b320032af3
              • Instruction ID: a7f51f07576783f7be301fb66473f462aaf2d9eabfdbb8012289ccb92937f96b
              • Opcode Fuzzy Hash: 00d43c3546ff6b829351a50820cc2a98230a462f523509ba330515b320032af3
              • Instruction Fuzzy Hash: DB129B70A003498FDB24CFA9DC85BAEBBB5FF49305F144069E94AEB251EB35A944CF50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • recv.WS2_32(?,?,00000104,00000000), ref: 005BED7E
              • WSAGetLastError.WS2_32(?,005E32B3,00000104,?,?,?,?,?,?,?,?,00000104,00000008,?), ref: 005BED8B
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastrecv
              • String ID:
              • API String ID: 2514157807-0
              • Opcode ID: 55e35cfda303dc2846f017e25197312e0b04af4ec4a66d8593512d1a774caf51
              • Instruction ID: 60f8a63a9db867b8b94e21e9621e375860263c2b7092627b9ee24bd141036a2b
              • Opcode Fuzzy Hash: 55e35cfda303dc2846f017e25197312e0b04af4ec4a66d8593512d1a774caf51
              • Instruction Fuzzy Hash: 0EE026302082086FDF089FA0EC057AD3BA7EB85320F504178FA1ECA6E0C632DD519B00
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00608321,?,?,00000008,?,?,00617C8B,00000000), ref: 00608553
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ExceptionRaise
              • String ID:
              • API String ID: 3997070919-0
              • Opcode ID: af0c6460fd57abf6c78298e35c86de3b0b34ff970fa770a4be074dceb8f373ff
              • Instruction ID: 885aa4056d1a4dafdc52c09a544aa13545beea41735f0b5d08fa7620707e0e46
              • Opcode Fuzzy Hash: af0c6460fd57abf6c78298e35c86de3b0b34ff970fa770a4be074dceb8f373ff
              • Instruction Fuzzy Hash: 13B11831250605CFD719CF28C486AA67BE1FF45364F298658E8DACF2E1CB35E992CB40
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
                • Part of subcall function 0060AC51: _free.LIBCMT ref: 0060ACB3
                • Part of subcall function 0060AC51: _free.LIBCMT ref: 0060ACE9
              • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00614780
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast_free$InfoLocale
              • String ID:
              • API String ID: 2003897158-0
              • Opcode ID: fc02d8d914c4712736ce6c40da5ebdbd997acea1561f996bdc6646c1c56497d5
              • Instruction ID: 6a4c342ce6d926c1784c54c0c3fb56f0ed2cb3274846901e81c636107a6a040f
              • Opcode Fuzzy Hash: fc02d8d914c4712736ce6c40da5ebdbd997acea1561f996bdc6646c1c56497d5
              • Instruction Fuzzy Hash: BC21F27265520AABDB289A25DC82AFA37AEEF45310F14017EFE05D7281EF34ED818750
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
              • EnumSystemLocalesW.KERNEL32(006144D7,00000001,00000000,?,00607484,?,00614B0F,00000000,00000055,?,?), ref: 00614423
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem
              • String ID:
              • API String ID: 2417226690-0
              • Opcode ID: c0839bebdce473f57942dc36eaf08863e544060a5c5a0240ce31772b315cbb0e
              • Instruction ID: 69c6b017148d063dc4638e04a6bf70d74af4376f118f59f0ce56b31093edc557
              • Opcode Fuzzy Hash: c0839bebdce473f57942dc36eaf08863e544060a5c5a0240ce31772b315cbb0e
              • Instruction Fuzzy Hash: E611293A2007015FDB18AF39C8916FAB7A2FF80358B19442CEA4687B40D771B983C740
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
              • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,006146F3,00000000,00000000,?), ref: 00614988
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast$InfoLocale
              • String ID:
              • API String ID: 3736152602-0
              • Opcode ID: 42e75cf0b417f53053b4fa99da846842cf843818c94f190b9a8505ebeb1d4eb6
              • Instruction ID: 9544648f44d88af8473d5bbcc60da76f709e6ca625c5fbb6218bcc2796548694
              • Opcode Fuzzy Hash: 42e75cf0b417f53053b4fa99da846842cf843818c94f190b9a8505ebeb1d4eb6
              • Instruction Fuzzy Hash: A7F0F932A00115BBDB289A64C805BFB77AAEF40754F194929EC09A3280DE71FD81C6D0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
              • EnumSystemLocalesW.KERNEL32(0061472C,00000001,00000005,?,00607484,?,00614AD3,00607484,00000055,?,?,?,?,00607484,?,?), ref: 00614496
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem
              • String ID:
              • API String ID: 2417226690-0
              • Opcode ID: 03ce8fd72f653b677d60a28357a02e848e68da01cdcb11dcc766742b6c7aaf82
              • Instruction ID: ea52fe047ad41f736d5250ebc16f6a159af324ae719fcf091946acb6d134c9bf
              • Opcode Fuzzy Hash: 03ce8fd72f653b677d60a28357a02e848e68da01cdcb11dcc766742b6c7aaf82
              • Instruction Fuzzy Hash: ECF046362003045FDB24AF789885BFA7BD6EFC0368B19842CFA4A4B690CA719C82C600
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0060AC51: GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
                • Part of subcall function 0060AC51: SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
              • EnumSystemLocalesW.KERNEL32(006142BD,00000001,00000005,?,?,00614B31,00607484,00000055,?,?,?,?,00607484,?,?,?), ref: 0061439D
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast$EnumLocalesSystem
              • String ID:
              • API String ID: 2417226690-0
              • Opcode ID: dcbf281d8077aa1da13ce34697ef0f34b306e6d9d0fb23d9a937cc8ec5501ddf
              • Instruction ID: 209623419520fefcf8af81108f7187790783d8d4e86a5e21bed6859250f506ad
              • Opcode Fuzzy Hash: dcbf281d8077aa1da13ce34697ef0f34b306e6d9d0fb23d9a937cc8ec5501ddf
              • Instruction Fuzzy Hash: 59F0E53634020557CB14AF76D859AEA7F96EFC1754B0B405CFB298B290CA719983C790
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00603D1B: EnterCriticalSection.KERNEL32(-0001CE9C,?,00605B23,00000000,006512B0,0000000C,00605AEA,00521057,?,0060C238,00521057,?,0060ADF3,00000001,00000364,00000006), ref: 00603D2A
              • EnumSystemLocalesW.KERNEL32(0060C262,00000001,00651530,0000000C,0060C6C5,00000000), ref: 0060C2A7
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CriticalEnterEnumLocalesSectionSystem
              • String ID:
              • API String ID: 1272433827-0
              • Opcode ID: 8ea18561f39e116ac8534a693a19df9cf0d97803853fe082a2f014b8d0957225
              • Instruction ID: 398911c7e44096f0468524a5c04136b68709101175eb395ad46c4ea5dd8446eb
              • Opcode Fuzzy Hash: 8ea18561f39e116ac8534a693a19df9cf0d97803853fe082a2f014b8d0957225
              • Instruction Fuzzy Hash: 2BF03A71980305EFD704EFA8D806B5E7BE2FB45726F104169F5109B2E1DB744A018F44
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,?,?,006075B3,?,20001004,?,00000002,00000000,?,?), ref: 0060C856
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: InfoLocale
              • String ID:
              • API String ID: 2299586839-0
              • Opcode ID: 866cc993705ddc0604f52766e32a63988d6401f1f2daf8b5686e76d8d4dd43be
              • Instruction ID: 1859fd815d41db7416575bc14ce1ae0bfa8af3a55fcc8cf736f5c9d9893fff55
              • Opcode Fuzzy Hash: 866cc993705ddc0604f52766e32a63988d6401f1f2daf8b5686e76d8d4dd43be
              • Instruction Fuzzy Hash: CBE0DF3518061CFBCF262F24DC08AAF3F1BEF44760F008224FD05652A1CB318921AAD8
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: 0
              • API String ID: 0-4108050209
              • Opcode ID: dce2a003d242416303bf4556f46a9ca60f79195e98dac8c23b45ceef41149dab
              • Instruction ID: f10a1e460ce3e277147033a28283a2ad2c198240431e0517a1c602836f31da70
              • Opcode Fuzzy Hash: dce2a003d242416303bf4556f46a9ca60f79195e98dac8c23b45ceef41149dab
              • Instruction Fuzzy Hash: 6B518B7060464D56DF389A2885DD7BEAF9ABB52300F180C2DEB83D72C2C61DDD49D356
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: GetSystemTimePreciseAsFileTime
              • API String ID: 0-595813830
              • Opcode ID: c5e8e8913220a95675eaffc016b576c143c0e457816686295a02d9beed85a2fa
              • Instruction ID: 7df863ed2b6d733111be6e31fb92313423109749bc0cec8ab176ff9336d861e3
              • Opcode Fuzzy Hash: c5e8e8913220a95675eaffc016b576c143c0e457816686295a02d9beed85a2fa
              • Instruction Fuzzy Hash: B0E0C232AC062567C33467886C16EAA7A47D761BB2F090172FA08792D2C565189186E4
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free
              • String ID:
              • API String ID: 269201875-0
              • Opcode ID: e89f8df998ef39cda61aa4940436cb7644fb446e7947a10fc9fb3fc849b1d496
              • Instruction ID: 51b98289235c15339e5202be1fe4ba4b101e6a1bb5e61863b2c74acbb71de95d
              • Opcode Fuzzy Hash: e89f8df998ef39cda61aa4940436cb7644fb446e7947a10fc9fb3fc849b1d496
              • Instruction Fuzzy Hash: 8E524971A007059FCB25CF69C4917AEBFF1BF8A300F14896ED49A97311EB30A949CB51
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bf7f92e76aa5629ee0ca48da02a74e54bffcb2ae4fc08d953792af9e8f617537
              • Instruction ID: 2e6d561f1b101f37feca75f23b5bd88f8070012a1f77e97fdc01db7a8b579486
              • Opcode Fuzzy Hash: bf7f92e76aa5629ee0ca48da02a74e54bffcb2ae4fc08d953792af9e8f617537
              • Instruction Fuzzy Hash: F7322525D28F010DD7239634C832375A28BAFB73C4F58E737F81AB5AA6EB2984C34151
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 7bae86785045852086359f9037415ec19c04b0766b0ee89c54bcc3b1586d164c
              • Instruction ID: 759316f87f4f83ff08e7ff1bfeccf636859335245d70d9cd5820879e70151fba
              • Opcode Fuzzy Hash: 7bae86785045852086359f9037415ec19c04b0766b0ee89c54bcc3b1586d164c
              • Instruction Fuzzy Hash: BC32F431D29F014DEB639634C932379624AAFB73D4F19E727E819B5AA6EF29C4C34140
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 37911cc4e675449085dc4e44f0e56f9c8ef1f8c3548651b190c6dafd2cb2ae12
              • Instruction ID: 4f55138341ca0f2dd912d17859a7d86f8c284efbc49af4e27b2ce5697f7b0346
              • Opcode Fuzzy Hash: 37911cc4e675449085dc4e44f0e56f9c8ef1f8c3548651b190c6dafd2cb2ae12
              • Instruction Fuzzy Hash: 4B029D71B00616AFDB18CF69C4947A9FFE0FF5A300F24466AD49ADB741EB30A855CB80
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: a02c86a6f740c1c816c78fa070b0f12809949643631bff2b04aaf23b24c8b0d2
              • Instruction ID: edc1f70ccae44be48ca31f9dce1ed6b622929b553e8f90cbaa78e12e11fc4952
              • Opcode Fuzzy Hash: a02c86a6f740c1c816c78fa070b0f12809949643631bff2b04aaf23b24c8b0d2
              • Instruction Fuzzy Hash: 4B0227B1A00B02DFDB24CF69C8847AABBF1FF49301F14896ED49AC7651E734A945CB61
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: f18f3b050c1ca96af957f96a261b8b59958bd7c2c52be06a0ffffb0258353930
              • Instruction ID: dfa770840e2d841c910c779408b0c7124616e09f801bd1202492b8a9acf9b30f
              • Opcode Fuzzy Hash: f18f3b050c1ca96af957f96a261b8b59958bd7c2c52be06a0ffffb0258353930
              • Instruction Fuzzy Hash: 11F11871E002298FDB24CF58D990BACBBB1FF98310F1581EAD90DA7351DA30AE859F50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: d1529f0649473d87c9dba84ae8fff22cbdae1dfce663ebcad4ee59a2d4481a81
              • Instruction ID: ad9b986dd672e1e1e1fdfd76f6f4f9491d63eae2b7bccff1863f655ca4e86d0a
              • Opcode Fuzzy Hash: d1529f0649473d87c9dba84ae8fff22cbdae1dfce663ebcad4ee59a2d4481a81
              • Instruction Fuzzy Hash: 6DD19571E006158FDB24CF19C882A69BBF6FFD9310F24886ED09AD7752E674E9858F40
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: bc03e3b8062e616ce021f41c39d35b6c729dfda96af153250887f4cc239753ca
              • Instruction ID: 35846fa53d5d163495470690902dfe869c308d4d9b4327d01b30473a7e93688b
              • Opcode Fuzzy Hash: bc03e3b8062e616ce021f41c39d35b6c729dfda96af153250887f4cc239753ca
              • Instruction Fuzzy Hash: 03B17F71A00A058FCF28CF29C88656ABBF2FFD9310B28892ED49AD7751D774E945CB50
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 2f0975f99126439cf93ab5a7a91bd5b4179bf0e935006390bf583b87df5a66e5
              • Instruction ID: 7306e30fe0ea790d144638fe54cd22fbb599e675d0baca3a4bb53adf05f08d23
              • Opcode Fuzzy Hash: 2f0975f99126439cf93ab5a7a91bd5b4179bf0e935006390bf583b87df5a66e5
              • Instruction Fuzzy Hash: ADA18971E002198BDF24CF69C8807EEBBB5BF98314F255169E949E72D1EB30ED518B90
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
              • Instruction ID: c9405f82d3b805114e036de1e44250a0f4adf80e64ef6aeeec0c5ab70e27c78c
              • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
              • Instruction Fuzzy Hash: EB9188B62090A74ADB2D467E847803EFFE17A513A1B1A0B9DE5F2CF1C5EE2CC554D620
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
              • Instruction ID: 52178ea560b8b4a99a7effd279f14a522a2d30d302eb658362d4f8d2b129e900
              • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
              • Instruction Fuzzy Hash: E59177B21090E74ADB69427A857403EFFE17A523A1B1A079DE5F2CF1C5EE18C964D630
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 6791724bec605d0563dc2eaf52bae31e99a178788eaa9c9eec765dbde87890fd
              • Instruction ID: 7c14c8f6eaac7f4a48e8e90d082c963dcf10fb51c8e6881703b0ff9b4419621a
              • Opcode Fuzzy Hash: 6791724bec605d0563dc2eaf52bae31e99a178788eaa9c9eec765dbde87890fd
              • Instruction Fuzzy Hash: FF617AB064020E56DF38AA2898A5B7E7FA5FF45704F94092EE742FB289DB2DDD41C701
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0befea5ea1242b632676d328104bfe891dfe4a705b9c268123eb1d1380f1100e
              • Instruction ID: 8e213774a5d8d1afe38e0070c142a5c3a1eb6b6c6d93ea78b818b02ffb8247e0
              • Opcode Fuzzy Hash: 0befea5ea1242b632676d328104bfe891dfe4a705b9c268123eb1d1380f1100e
              • Instruction Fuzzy Hash: B5514C7460064D5ADF389A28899EFBF6F9EBB92304F24491ED742D7283CA1DDD48C352
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: c91887ab2d7718b14461dd593c4bd07837b908799bb3e6d6111a1b414f6945e9
              • Instruction ID: 4934a4d8c3ee35688557b63f393651e4cd669ed40511f13a6072621ff059d95a
              • Opcode Fuzzy Hash: c91887ab2d7718b14461dd593c4bd07837b908799bb3e6d6111a1b414f6945e9
              • Instruction Fuzzy Hash: C5B19D74411705AED342CF34C5987D17BE5BF5A308F6994BEC8898F222FB72A54ACB11
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9547aa6da537c62f744b59c3f1d91c173588a566f287075b76e6c18a33521964
              • Instruction ID: 001a8bf7841957a13af895151b5fc1decc1a70b33ca5e15d68ece65fedce1402
              • Opcode Fuzzy Hash: 9547aa6da537c62f744b59c3f1d91c173588a566f287075b76e6c18a33521964
              • Instruction Fuzzy Hash: 49513C71E0011DAFDB04CF99CA41ABEBFB2FF88310F1980A9E555AB201C735AE51DB94
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 921676ad2905b4fcf0a965e603ec31bf7f19d21626121235af1938c05256430a
              • Instruction ID: 9aae3c8191916435ec609f3341e01fab2ce4c4040ab044cf83d99d526f9ed00f
              • Opcode Fuzzy Hash: 921676ad2905b4fcf0a965e603ec31bf7f19d21626121235af1938c05256430a
              • Instruction Fuzzy Hash: 8B2133305240B54AC74C4B69BC21436FF95EF4621338B52ABD9CBDA4C2C529D564E7E0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 9c68a8d4a0846ebc4b09b0a145e38f1195cbc43887bcb385cbd8187a09426d5f
              • Instruction ID: 1844cd0d0d601063b7884f06718d0f414b3286fea5a757b8e819b21f40aff6c6
              • Opcode Fuzzy Hash: 9c68a8d4a0846ebc4b09b0a145e38f1195cbc43887bcb385cbd8187a09426d5f
              • Instruction Fuzzy Hash: 3AF0E22200292007EF13583E70C1AF3AB8BCFE6964BE1206194CC435D2865F780FD3E4
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 63be74787ca6cafde852f93c6401074a94fcb0620eda273b6d7aea0933a15498
              • Instruction ID: d5fbbc6e5cfd7ec1741d544403c77dd5afa795ead7daec5fe446ae0b5126d703
              • Opcode Fuzzy Hash: 63be74787ca6cafde852f93c6401074a94fcb0620eda273b6d7aea0933a15498
              • Instruction Fuzzy Hash: ACF096F1506605EBDB089F1CE589692FFF4FB01314F01C25AEA1C4B201D3716854CBE9
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32(00000000,?,?,005E3CAB,005C01F7,?,000000FF,?,?,005C01F7,?,?), ref: 005E4145
              • _strncpy.LIBCMT ref: 005E4372
              • GetLastError.KERNEL32(005C01F7,?,?,?,?,?,?,?,?,?,?,005B90AB), ref: 005E4392
              • SetLastError.KERNEL32(00000000,?,?,?,?,?,?,?,?,005B90AB), ref: 005E439D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast$_strncpy
              • String ID: Address already in use$Address family not supported$Address not available$Bad access$Bad argument$Bad file$Bad message size$Bad protocol$Bad quota$Blocking call in progress$Call interrupted$Call would block$Connection refused$Connection was aborted$Connection was reset$Descriptor is not a socket$Disconnected$Host down$Host not found$Host not found, try again$Host unreachable$Invalid arguments$Loop??$Name too long$Need destination address$Network down$Network has been reset$Network unreachable$No buffer space$No data record of requested type$Not empty$Operation not supported$Out of file descriptors$Process limit reached$Protocol family not supported$Protocol is unsupported$Protocol option is unsupported$Remote error$Socket has been shut down$Socket is already connected$Socket is not connected$Socket is unsupported$Something is stale$Timed out$Too many references$Too many users$Unrecoverable error in call to nameserver$Winsock library is not ready$Winsock library not initialised$Winsock version not supported
              • API String ID: 3397631897-3442644082
              • Opcode ID: 699b89d66a0cbdcbed353f2ce2175b9d4f1e220f596b15ab12e9fde04ea3ed16
              • Instruction ID: 606f05d2f2704bc165b7e96384d2ad6684eb2e6a58ac31977d2d83077ed06c1f
              • Opcode Fuzzy Hash: 699b89d66a0cbdcbed353f2ce2175b9d4f1e220f596b15ab12e9fde04ea3ed16
              • Instruction Fuzzy Hash: DB4196317089E287831C8D9A650493DAD97FB99B0ABA54DA675C38FF00C295CDC1EE53
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetTempPathW.KERNEL32(00000104,?,6F923D37), ref: 0053478A
              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000002,00000080,00000000,?,?,0063CEDC,00000001,?,?,SetupLogName), ref: 00534851
              • CloseHandle.KERNEL32(00000000), ref: 0053486D
              • DeleteFileW.KERNEL32(?), ref: 0053487E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: File$CloseCreateDeleteHandlePathTemp
              • String ID: %s\MobiMover$%s\MobiMover\Download\$%s\MobiMover\InstallProc\$%s\MobiMover\InstallProc\Download\$APPDATA$DOWNLOAD_VERSION$Downloading$EXEDIR$Errorinfo$Failed$Info_Youtubedll$Info_iTunesdevicedriver$ProductID$ProductName$PH'$Result$Result_Youtubedll$Result_iTunesdevicedriver$SetupLogName$Stopped$Success$_easeus.exe$trial$C:
              • API String ID: 2085881213-3646548034
              • Opcode ID: 6739ebce8d8eb8b538b3e08217bf070be59bd3f01cd02b2132e29f90c612e231
              • Instruction ID: d9563ea6e098b7158e417de1844ebd268362b0ebff402b540ded853de3fd6cde
              • Opcode Fuzzy Hash: 6739ebce8d8eb8b538b3e08217bf070be59bd3f01cd02b2132e29f90c612e231
              • Instruction Fuzzy Hash: CC51E270A00218ABDB20EF64DC4DB9EBBB6FF45704F104599F505AB2C1DB78AA45CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IntersectRect.USER32(?,?,?), ref: 0056838A
              • GetClipBox.GDI32(?,?), ref: 005683DA
              • CreateRectRgnIndirect.GDI32(?), ref: 005683EA
              • CreateRectRgnIndirect.GDI32(?), ref: 005683F6
              • ExtSelectClipRgn.GDI32(?,00000000,00000001), ref: 00568405
              • IntersectRect.USER32(?,?,?), ref: 005684C8
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Rect$ClipCreateIndirectIntersect$Select
              • String ID: IListItem
              • API String ID: 3915324890-3953988410
              • Opcode ID: c12cbc215d7d2b933653cb4ecbc68e9ecbf9dd23471875f20571ad163fe72ef2
              • Instruction ID: d2abaa469a86ad7f5f1b620a65b4a3a9d909809172535e02f53350d98b6b3604
              • Opcode Fuzzy Hash: c12cbc215d7d2b933653cb4ecbc68e9ecbf9dd23471875f20571ad163fe72ef2
              • Instruction Fuzzy Hash: A5122531A00619DFCF15DFA8CC44AEDBBB6FF99300F14426AE915AB261DB31A951CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CertOpenStore.CRYPT32(00000002,00000000,00000000,00002000,00000000), ref: 005E673D
              • GetLastError.KERNEL32 ref: 005E674C
              • CertCreateCertificateChainEngine.CRYPT32(00000030,?), ref: 005E67D9
              • GetLastError.KERNEL32 ref: 005E67E3
              • CertGetCertificateChain.CRYPT32(?,?,00000000,00000000,?,20000000,00000000,?), ref: 005E683A
              • GetLastError.KERNEL32 ref: 005E6844
              • CertFreeCertificateChainEngine.CRYPT32(?), ref: 005E698B
              • CertCloseStore.CRYPT32(?,00000000), ref: 005E699B
              • CertFreeCertificateChain.CRYPT32(?), ref: 005E69A9
              • CertFreeCertificateContext.CRYPT32(?), ref: 005E69B7
              Strings
              • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT, xrefs: 005E68BC
              • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN, xrefs: 005E68A0
              • schannel: CertGetCertificateChain error mask: 0x%08x, xrefs: 005E690A
              • schannel: failed to create certificate chain engine: %s, xrefs: 005E67F1
              • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED, xrefs: 005E6881
              • 0, xrefs: 005E67CD
              • schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN, xrefs: 005E68F4
              • schannel: Failed to read remote certificate context: %s, xrefs: 005E6970
              • schannel: failed to create certificate store: %s, xrefs: 005E675A
              • schannel: CertGetCertificateChain failed: %s, xrefs: 005E6852
              • schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID, xrefs: 005E68D8
              • schannel: this version of Windows is too old to support certificate verification via CA bundle file., xrefs: 005E6718
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Cert$Certificate$Chain$ErrorFreeLast$EngineStore$CloseContextCreateOpen
              • String ID: 0$schannel: CertGetCertificateChain error mask: 0x%08x$schannel: CertGetCertificateChain failed: %s$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_NOT_TIME_VALID$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_PARTIAL_CHAIN$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_REVOKED$schannel: CertGetCertificateChain trust error CERT_TRUST_IS_UNTRUSTED_ROOT$schannel: CertGetCertificateChain trust error CERT_TRUST_REVOCATION_STATUS_UNKNOWN$schannel: Failed to read remote certificate context: %s$schannel: failed to create certificate chain engine: %s$schannel: failed to create certificate store: %s$schannel: this version of Windows is too old to support certificate verification via CA bundle file.
              • API String ID: 713146188-2670036763
              • Opcode ID: 4c8558f9fdf4f08b44888f6a0f0a4da4d211b930b9abb91c6d85e721bb1e2d04
              • Instruction ID: 89d78dc68864ecb9fe9b45eee97b9f436ebdb08452d6dfa6cb94959a22829d20
              • Opcode Fuzzy Hash: 4c8558f9fdf4f08b44888f6a0f0a4da4d211b930b9abb91c6d85e721bb1e2d04
              • Instruction Fuzzy Hash: 83A1F870600741ABEB248F65CC99BEE7BA9FF653C4F044468F996EB282D730A941CB51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CharNext
              • String ID: checkboxattr$dotlineattr$expandable$folderattr$horizattr$itemattr$itemhottextcolor$itemtextcolor$selected$selitemhottextcolor$selitemtextcolor$text$true
              • API String ID: 3213498283-3714843181
              • Opcode ID: 1301d8ef01ceb8d9a4bff705d69af0ac41fbafd33500788564bc74fb56e5786a
              • Instruction ID: a94ccef0ae37a9b886739bd461126755fe8dde5c649d6122afb73053b27a4fa7
              • Opcode Fuzzy Hash: 1301d8ef01ceb8d9a4bff705d69af0ac41fbafd33500788564bc74fb56e5786a
              • Instruction Fuzzy Hash: 63D1AE726101029AEB10BF20D8467B67BA6FF75B68F948476DD06EF215E733DA41C710
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CertFreeCertificateContext.CRYPT32(00000000,?,?,?,?,?,?), ref: 005D0A31
              Strings
              • schannel: failed to setup replay detection, xrefs: 005D0793
              • schannel: SSL/TLS connection with %s port %hu (step 3/3), xrefs: 005D074B
              • ALPN, server did not agree to a protocol, xrefs: 005D08A7
              • schannel: ALPN, server accepted to use %.*s, xrefs: 005D086B
              • schannel: failed to store credential handle, xrefs: 005D0978
              • schannel: stored credential handle in session cache, xrefs: 005D09A3
              • schannel: failed to setup memory allocation, xrefs: 005D07CA
              • schannel: failed to setup stream orientation, xrefs: 005D07E7
              • schannel: old credential handle is stale, removing, xrefs: 005D092F
              • /1.1, xrefs: 005D0891
              • schannel: failed to retrieve remote cert context, xrefs: 005D0A4E
              • schannel: failed to setup confidentiality, xrefs: 005D07AD
              • schannel: failed to retrieve ALPN result, xrefs: 005D082F
              • schannel: failed to setup sequence detection, xrefs: 005D0779
              • http, xrefs: 005D0888
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CertCertificateContextFree
              • String ID: /1.1$ALPN, server did not agree to a protocol$http$schannel: ALPN, server accepted to use %.*s$schannel: SSL/TLS connection with %s port %hu (step 3/3)$schannel: failed to retrieve ALPN result$schannel: failed to retrieve remote cert context$schannel: failed to setup confidentiality$schannel: failed to setup memory allocation$schannel: failed to setup replay detection$schannel: failed to setup sequence detection$schannel: failed to setup stream orientation$schannel: failed to store credential handle$schannel: old credential handle is stale, removing$schannel: stored credential handle in session cache
              • API String ID: 3080675121-113316134
              • Opcode ID: e6fea2f0680be0f229ae51ab06417fb0cb3548d2cfa644b785f9a64fd5eccede
              • Instruction ID: a0261ad8bcbff155b89b495f6b1b146ca580e67946eec26d47c474eec6fb3ff5
              • Opcode Fuzzy Hash: e6fea2f0680be0f229ae51ab06417fb0cb3548d2cfa644b785f9a64fd5eccede
              • Instruction Fuzzy Hash: 18A13830A006159BDB35DB18DC56BED7BA4FF45315F0404AAF9099B2C2DB31AD85CF91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateCompatibleDC.GDI32(?), ref: 00578EFF
              • CreateDIBSection.GDI32 ref: 00578F8A
              • SelectObject.GDI32(00000000,00000000), ref: 00578FA9
              • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00CC0020), ref: 00578FD0
              • SelectObject.GDI32(00000000,?), ref: 00578FDB
              • CreateDIBSection.GDI32 ref: 00579053
              • SelectObject.GDI32(00000000,00000000), ref: 00579072
              • BitBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00200001,00000000,00CC0020), ref: 00579091
              • SelectObject.GDI32(00000000,?), ref: 0057909C
              • SelectObject.GDI32(00000000,?), ref: 005791CD
              • BitBlt.GDI32(?,00200001,00000000,?,00000000,00000000,00000000,00000000,00CC0020), ref: 005791EC
              • SelectObject.GDI32(00000000,?), ref: 005791F7
              • DeleteObject.GDI32(?), ref: 00579210
              • DeleteObject.GDI32(?), ref: 0057921F
              • DeleteDC.GDI32(00000000), ref: 00579222
              • DeleteObject.GDI32(?), ref: 00579243
              • DeleteDC.GDI32(00000000), ref: 0057924A
              • DeleteDC.GDI32(00000000), ref: 00579265
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Object$DeleteSelect$Create$Section$CompatibleStretch
              • String ID:
              • API String ID: 1473964377-0
              • Opcode ID: 5036a969bb106b8be59927820e97277da5905512dea2e46aa142c7a6f24b120f
              • Instruction ID: 8b4810e1a21b589052caffe583939475a62218b3d2ff8aba7662fdd5ec1e4fb3
              • Opcode Fuzzy Hash: 5036a969bb106b8be59927820e97277da5905512dea2e46aa142c7a6f24b120f
              • Instruction Fuzzy Hash: 3CA10E72404701AFC7128F31CC09B5BBBE9FF99340F00872AF985A6291D735E862CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00558F20: GetDC.USER32(?), ref: 00558F8C
              • GetCursorPos.USER32(?), ref: 00588CA9
              • ScreenToClient.USER32(?,?), ref: 00588CB9
              • PostMessageW.USER32(?,00000008,00000000,00000000), ref: 00588D1F
              • PostMessageW.USER32(?,00000008,00000000,00000000), ref: 00588DB1
              • GetTickCount.KERNEL32 ref: 00588E00
              • GetFocus.USER32 ref: 00588E2F
              • GetParent.USER32(00000000), ref: 00588E36
              • GetParent.USER32(00000000), ref: 00588E4A
              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00588E5D
              • GetCursorPos.USER32(?), ref: 00588E76
              • ScreenToClient.USER32(?,?), ref: 00588E86
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00588F24
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: MessagePost$ClientCursorParentScreen$CallCountFocusProcTickWindow
              • String ID: we$ScrollBar$VerticalLayout
              • API String ID: 3129551459-3414881230
              • Opcode ID: f28b8554f75fba03c6af6215aefd7fc9f364531f123a2dedb7acac963b525159
              • Instruction ID: 18a4851cb1d0a9d290f86705bb361145933af3ad1fdc1f81e2c5c2054eb37111
              • Opcode Fuzzy Hash: f28b8554f75fba03c6af6215aefd7fc9f364531f123a2dedb7acac963b525159
              • Instruction Fuzzy Hash: 9D12C370A00606DFDB14EF24C854BAABBB6FF44314F1445A8E91DAB2A1DB71BD94CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: %I64d$%s%c%s%c$TFTP file name too long$blksize$netascii$octet$tftp_send_first: internal error$timeout$tsize
              • API String ID: 48624451-1678188727
              • Opcode ID: af738d3850f64865d9ef9f363131602d5e65800de6d246ecd42125c45259c980
              • Instruction ID: ef5bc9baff877784d93ed1eaa9988a3ef1dbbb65f396cf0b21e4c807fb9bb34a
              • Opcode Fuzzy Hash: af738d3850f64865d9ef9f363131602d5e65800de6d246ecd42125c45259c980
              • Instruction Fuzzy Hash: DCA14EB26006046FDB24DF68DC46FEF7BAAFFC5304F08056AF94AD7282D631A9158B50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,dJe,6F923D37), ref: 005901F5
              • GetFileSize.KERNEL32(00000000,00000000), ref: 0059022E
              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0059025B
              • CloseHandle.KERNEL32(00000000), ref: 00590262
              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,00000002), ref: 005903DF
              • GetFileSize.KERNEL32(00000000,00000000), ref: 005903EF
              • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 0059041C
              • CloseHandle.KERNEL32(00000000), ref: 00590423
              • GlobalAlloc.KERNEL32(00000000,00000000), ref: 0059044F
              • GlobalLock.KERNEL32(00000000), ref: 00590458
              • CreateStreamOnHGlobal.OLE32(00000000,00000001,00000000), ref: 0059047D
              • GdipAlloc.GDIPLUS(00000010), ref: 00590491
              • GdipLoadImageFromStream.GDIPLUS(?,00000004), ref: 005904B3
              • GlobalUnlock.KERNEL32(00000000), ref: 005904D4
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: File$Global$Create$AllocCloseGdipHandleReadSizeStream$FromImageLoadLockUnlock
              • String ID: dJe
              • API String ID: 1553753948-2278656182
              • Opcode ID: bcd40d3800760e468f12481b92c081b428797cb1fc5e36a332a57a802dcf39d4
              • Instruction ID: eaa65e116119d7e848108a9132a0ab41a699a14e03df2fa233d165ea602d6af1
              • Opcode Fuzzy Hash: bcd40d3800760e468f12481b92c081b428797cb1fc5e36a332a57a802dcf39d4
              • Instruction Fuzzy Hash: 36910571900315AFEF309B20DC4AFAE7AB9BB44710F1459A5F90EAB2D1EB70AD44CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___swprintf_l$ErrorLastsend
              • String ID: %127[^,],%127s$%c%c$%c%c%c%c$%c%c%c%c%s%c%c$%c%s%c%s$Sending data failed (%d)
              • API String ID: 1939966535-3318542072
              • Opcode ID: cbedca7d0bb2fe821d41c8a4d282964262ad0b886ade080323449650278f44d0
              • Instruction ID: 77e4b49c3492610f80e9945118ea2e98d5c6fe052903b701b02e3f0e2d53c6f9
              • Opcode Fuzzy Hash: cbedca7d0bb2fe821d41c8a4d282964262ad0b886ade080323449650278f44d0
              • Instruction Fuzzy Hash: 9661F7B5A40209BFE730DB64CC46FFB776DBB45700F0445A6F64AAB283DA71BA448B50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateCompatibleDC.GDI32(?), ref: 0057F0F3
              • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0057F127
              • SelectObject.GDI32(00000000,00000000), ref: 0057F132
              • CreateCompatibleDC.GDI32(?), ref: 0057F19B
              • CreateDIBSection.GDI32(00000000,00000028,00000000,00000000,00000000,00000000), ref: 0057F1B7
              • SelectObject.GDI32(00000000,00000000), ref: 0057F1CE
              • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,00CC0020), ref: 0057F1EA
              • SelectObject.GDI32(00000000,00000000), ref: 0057F226
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Create$CompatibleObjectSelect$BitmapSection
              • String ID: (
              • API String ID: 3995652026-3887548279
              • Opcode ID: c799f1f5c9285ef010bde48d4891a93f7d6e3efb9bfe5937a49c779319de3f02
              • Instruction ID: 56d5b2a6230c8f69cb89cdb098c8ebf8277a282f1d98dc9a8471af58ed3423d3
              • Opcode Fuzzy Hash: c799f1f5c9285ef010bde48d4891a93f7d6e3efb9bfe5937a49c779319de3f02
              • Instruction Fuzzy Hash: C5513675E003489BDB20CFE4DC88BEEBBB6FF59304F108129E509AB251DB316995CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 005263F3
              • GetLastError.KERNEL32 ref: 005263FD
                • Part of subcall function 005A6850: MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,00000000,6F923D37,?,75922EE0), ref: 005A68EF
              • MsgWaitForMultipleObjects.USER32(00000001,00000008,00000000,000000C8,00001CFF), ref: 00526462
              • GetExitCodeProcess.KERNEL32(00000008,00000000), ref: 00526480
              • GetLastError.KERNEL32 ref: 0052648A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastProcess$ByteCharCodeCreateExitMultiMultipleObjectsWaitWide
              • String ID: Install ErrCode= %ld$Install ErrCode=%d$Install return=%ld
              • API String ID: 3171732053-3345554096
              • Opcode ID: ca08f19757632bf957ad27edd21be4926096bb14a2da1a3d4a4b8b88a7b34ae4
              • Instruction ID: ed3ca0a3751d1ceb94ee48368080f4dba8b263a0e6b13933eb5547d6e7193a69
              • Opcode Fuzzy Hash: ca08f19757632bf957ad27edd21be4926096bb14a2da1a3d4a4b8b88a7b34ae4
              • Instruction Fuzzy Hash: DE71F371A002099BDF10EFA4DD85B9D7FB6FF5A304F244258E800AB2C6D7B59A45CBE1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free
              • String ID: tAe
              • API String ID: 269201875-2013524493
              • Opcode ID: 26a2d45f9d8972fad9e6c803e9242c160dfa474adc4b4cd3b53aa46e73dd4bb7
              • Instruction ID: b9f1b543eeac71a8587d6c45a23ea7ef9856c3e6ac6b271c4f3f15b8f0e02e8a
              • Opcode Fuzzy Hash: 26a2d45f9d8972fad9e6c803e9242c160dfa474adc4b4cd3b53aa46e73dd4bb7
              • Instruction Fuzzy Hash: 0CC15376D80205ABDB60DBA8DC82FEF77F9AF08700F144169FA04FB2C6D67099409B94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CharNext
              • String ID: itemhottextcolor$itemminwidth$itemtextcolor$selitemhottextcolor$selitemtextcolor$true$visiblecheckbtn$visiblefolderbtn
              • API String ID: 3213498283-1882295018
              • Opcode ID: b2c29b11fc89b1ab581706e8d69ecbc4fdf19a7add910f97251721081bd0effa
              • Instruction ID: 9a4c598cef08e01bb47a509d54a228c7e6234d68d4134549173b11761388189b
              • Opcode Fuzzy Hash: b2c29b11fc89b1ab581706e8d69ecbc4fdf19a7add910f97251721081bd0effa
              • Instruction Fuzzy Hash: B5A1B1726001039BEB14BF64D8057BABB66FF70768F948975ED06EB214E732D981CB60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateThread.KERNEL32(00000000,00000000,005A8C00,00000000,00000000,00000000), ref: 005A8ADD
              • WaitForSingleObject.KERNEL32(00000000,00002710,?,?,?,?,?,?,?,?,00000004), ref: 005A8AEF
              • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,00000004), ref: 005A8AF6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CloseCreateHandleObjectSingleThreadWait
              • String ID: &downloader_num=$&install_finish_downloader=false$&install_finish_downloader=true$&install_start_downloader=false$&install_start_downloader=true$&url=$GUID$UpdateEventUrl$uid=
              • API String ID: 51348343-3402532700
              • Opcode ID: 703b64960f3d7d92addc5bab7d517e7446596f9a881c35618e67d20626670b6e
              • Instruction ID: 15a293ae984d75f9dfa847270b87fa30a1bbdc1acd04174778ffb9533398cd07
              • Opcode Fuzzy Hash: 703b64960f3d7d92addc5bab7d517e7446596f9a881c35618e67d20626670b6e
              • Instruction Fuzzy Hash: A7B14C71A002489FDB14DF64CC4ABAEBFB6FF86314F10425DE001AB6C1DB75AA44CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetCursorPos.USER32(?), ref: 00582318
              • ScreenToClient.USER32(?,?), ref: 0058233A
              • PtInRect.USER32(?,?,?), ref: 0058234D
              • SetFocus.USER32(?), ref: 005823B1
              • GetCaretPos.USER32(?), ref: 0058241F
              • ImmGetContext.IMM32(?), ref: 00582432
              • ImmSetCompositionWindow.IMM32(00000000,00000020), ref: 0058245E
              • GetObjectW.GDI32(00000000,0000005C,?), ref: 0058247D
              • ImmSetCompositionFontW.IMM32(00000000,?), ref: 00582489
              • ImmReleaseContext.IMM32(?,00000000), ref: 0058249D
              • ScreenToClient.USER32(?,?), ref: 005824D3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ClientCompositionContextScreen$CaretCursorFocusFontObjectRectReleaseWindow
              • String ID:
              • API String ID: 850084529-3916222277
              • Opcode ID: 5ac8187c66e1efbc036d6ecbad92c324c795df5e9bf79b24ee27c522e594e7ec
              • Instruction ID: 2622efc31236628cdc97af329e5c25c24c0cca4341769de717aaa11cfcf01734
              • Opcode Fuzzy Hash: 5ac8187c66e1efbc036d6ecbad92c324c795df5e9bf79b24ee27c522e594e7ec
              • Instruction Fuzzy Hash: A9B16E756042018FDB24EF18C998AADBFE6BF89300F040869FD99EB291DB34DD55CB52
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFileSize.KERNEL32(00000000,00000000), ref: 00562699
              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,dJe,6F923D37), ref: 0056267D
                • Part of subcall function 005F41FD: _free.LIBCMT ref: 005F4210
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: File$CreateSize_free
              • String ID: Could not find ziped file$Could not read file$Could not unzip file$Error opening file$Error opening zip file$File is empty$File too large$dJe
              • API String ID: 4284271727-1695810021
              • Opcode ID: 4d57c4895ef7f826758a6000fe41e44a76b190026b670fa2b5ba782096364be4
              • Instruction ID: dc8a3d39a5d6f85ed8ac2d8d97374c731e86c0487fab7b4800c1bd12469710b8
              • Opcode Fuzzy Hash: 4d57c4895ef7f826758a6000fe41e44a76b190026b670fa2b5ba782096364be4
              • Instruction Fuzzy Hash: 50610AB1E0070567EB319B20EC9AFAE7B6ABB94710F144469F40A672C1EF716E44CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___from_strstr_to_strchr.LIBCMT ref: 005BC26F
              • ___from_strstr_to_strchr.LIBCMT ref: 005BC2BF
              • ___swprintf_l.LIBCMT ref: 005BC349
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr$___swprintf_l
              • String ID: %s://%s%s%s:%d%s%s%s$;type=%c$IPv6 closing bracket followed by '%c'$Port number ended with '%c'$Port number out of range$[%*45[0123456789abcdefABCDEF:.]%c$]$t,b$x,b
              • API String ID: 604305841-4099080028
              • Opcode ID: e609e975d2d32ddaa520e879804c7a50d6611e79bdf877cf825623146c6182dc
              • Instruction ID: f1aac30ce8bb450f07a194f63f28554e348e3ac9b0c64f652bc04a534ca4eb07
              • Opcode Fuzzy Hash: e609e975d2d32ddaa520e879804c7a50d6611e79bdf877cf825623146c6182dc
              • Instruction Fuzzy Hash: C27179B0B04746ABEB109B74D856BFEBFE4FF85300F44046AE88986282DB3479548B91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _strncpy$___swprintf_l
              • String ID: %127[^= ]%*[ =]%255s$%hu%*[xX]%hu$BINARY$NEW_ENV$Syntax error in telnet option: %s$TTYPE$USER,%s$Unknown telnet option %s$XDISPLOC
              • API String ID: 1627702573-748038847
              • Opcode ID: 27c2c8937454c8de47af7cb51024e4a4efb15649c779e52254dff61e1250f8df
              • Instruction ID: 323254c903200fea925c35b0ecad2d83f294de40b95f853da9f967a4453ad91a
              • Opcode Fuzzy Hash: 27c2c8937454c8de47af7cb51024e4a4efb15649c779e52254dff61e1250f8df
              • Instruction Fuzzy Hash: 3671E571D00209AFEF21EF64DC46FDABBA8BF44304F8444ABF54997242EE31EA448B51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SysAllocString.OLEAUT32(errorLine), ref: 0056EC2F
              • SysAllocString.OLEAUT32(errorCharacter), ref: 0056EC39
              • SysAllocString.OLEAUT32(errorCode), ref: 0056EC43
              • SysAllocString.OLEAUT32(errorMessage), ref: 0056EC4D
              • SysAllocString.OLEAUT32(errorUrl), ref: 0056EC57
              • SysFreeString.OLEAUT32(?), ref: 0056ED13
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: String$Alloc$Free
              • String ID: ($errorCharacter$errorCode$errorLine$errorMessage$errorUrl
              • API String ID: 2383597386-2821095632
              • Opcode ID: 9f895665dc94bb7766648daa63d5f56e786ba9a8be9ecde76564d6edb3c14414
              • Instruction ID: cf1453d238b3fffcad6e9d6e8787321cb75a7b4d562a1fb145962838d0de20c9
              • Opcode Fuzzy Hash: 9f895665dc94bb7766648daa63d5f56e786ba9a8be9ecde76564d6edb3c14414
              • Instruction Fuzzy Hash: 4451B071A002199FDB10DF68CC85B9EBBB5FF49314F5080A9F509AB290DB71AE45CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 005848F0: IntersectRect.USER32(?,?,?), ref: 005849EB
              • SendMessageW.USER32(?,00000030,?,00000001), ref: 005847CA
              • SendMessageW.USER32(?,000000C5,?,00000000), ref: 005847DF
              • SendMessageW.USER32(?,000000CC,?,00000000), ref: 005847FF
              • SetWindowTextW.USER32(?,00000000), ref: 00584815
              • SendMessageW.USER32(?,000000B9,00000000,00000000), ref: 00584840
              • SendMessageW.USER32(?,000000D3,00000003,00000000), ref: 0058484E
              • EnableWindow.USER32(?,00000000), ref: 00584868
              • SendMessageW.USER32(?,000000CF,00000000,00000000), ref: 00584888
              • ShowWindow.USER32(?,00000004), ref: 0058488F
              • SetFocus.USER32(?), ref: 00584898
              • GetWindowTextLengthW.USER32(?), ref: 005848AE
              • GetWindowTextLengthW.USER32(?), ref: 005848C3
              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 005848D3
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: MessageSend$Window$Text$Length$EnableFocusIntersectRectShow
              • String ID:
              • API String ID: 2848147740-0
              • Opcode ID: eda107360847c2c345e5bbeed02afdeaa9f9f8132558f972dc8a24df8c76e987
              • Instruction ID: ff5be59877b6c1ed9d0e332a756f4a3400cd2132f4f9f7c840cf6b3b7c32a35f
              • Opcode Fuzzy Hash: eda107360847c2c345e5bbeed02afdeaa9f9f8132558f972dc8a24df8c76e987
              • Instruction Fuzzy Hash: 32513B74600215AFEB14EF24CC9AF6A7BA6BF49300F0441A9ED099F2A2DB71ED55CF50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___from_strstr_to_strchr.LIBCMT ref: 005D855F
              Strings
              • %u.%u.%u.%u, xrefs: 005D870B
              • Weirdly formatted EPSV reply, xrefs: 005D860D
              • Illegal port number in EPSV reply, xrefs: 005D85BB
              • Can't resolve new host %s:%hu, xrefs: 005D87FB
              • Bad PASV/EPSV response: %03d, xrefs: 005D891C
              • %c%c%c%u%c, xrefs: 005D8586
              • Can't resolve proxy host %s:%hu, xrefs: 005D8795
              • Couldn't interpret the 227-response, xrefs: 005D8671
              • %u,%u,%u,%u,%u,%u, xrefs: 005D8658
              • Skip %u.%u.%u.%u for data connection, re-use %s instead, xrefs: 005D86EA
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr
              • String ID: %c%c%c%u%c$%u,%u,%u,%u,%u,%u$%u.%u.%u.%u$Bad PASV/EPSV response: %03d$Can't resolve new host %s:%hu$Can't resolve proxy host %s:%hu$Couldn't interpret the 227-response$Illegal port number in EPSV reply$Skip %u.%u.%u.%u for data connection, re-use %s instead$Weirdly formatted EPSV reply
              • API String ID: 601868998-927013084
              • Opcode ID: f6a2023190bcab6c941264874a739690a98c8fd906abf7692748e1ed0187a251
              • Instruction ID: 7319afd050b77df145e1d3968c6e175921a37c82b56e79be734183380c44b3a4
              • Opcode Fuzzy Hash: f6a2023190bcab6c941264874a739690a98c8fd906abf7692748e1ed0187a251
              • Instruction Fuzzy Hash: E5C12B71900605ABDB309B68DC46FFF7BA9FF44315F54086BF90A92242EB35B950CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 00612AA0
                • Part of subcall function 0060AEA3: HeapFree.KERNEL32(00000000,00000000,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?), ref: 0060AEB9
                • Part of subcall function 0060AEA3: GetLastError.KERNEL32(?,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?,?), ref: 0060AECB
              • _free.LIBCMT ref: 00612AB2
              • _free.LIBCMT ref: 00612AC4
              • _free.LIBCMT ref: 00612AD6
              • _free.LIBCMT ref: 00612AE8
              • _free.LIBCMT ref: 00612AFA
              • _free.LIBCMT ref: 00612B0C
              • _free.LIBCMT ref: 00612B1E
              • _free.LIBCMT ref: 00612B30
              • _free.LIBCMT ref: 00612B42
              • _free.LIBCMT ref: 00612B54
              • _free.LIBCMT ref: 00612B66
              • _free.LIBCMT ref: 00612B78
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 9ad7ca21333fb794281161d15ae7b0c8827b71b0466904216fd3e23fc0801fab
              • Instruction ID: 00a0f5a4a97f80d4be7b72ec803c56e1bd5877c1d0b4e43d7a9c8a1bf5f18ced
              • Opcode Fuzzy Hash: 9ad7ca21333fb794281161d15ae7b0c8827b71b0466904216fd3e23fc0801fab
              • Instruction Fuzzy Hash: 58213072504701ABC778EFA8F895C9773FBAB74355B680848F055DB691CA30FCD09A68
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetWindow.USER32(?,00000004), ref: 005580C2
              • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?,00525386), ref: 005580CF
              • EnableWindow.USER32(00000000,00000000), ref: 005580D7
              • IsWindow.USER32(?), ref: 005580EF
              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0055810A
              • EnableWindow.USER32(00000000,00000001), ref: 00558128
              • SetFocus.USER32(00000000), ref: 0055812F
              • TranslateMessage.USER32(?), ref: 00558145
              • DispatchMessageW.USER32(?), ref: 0055814F
              • IsWindow.USER32(?), ref: 0055815E
              • EnableWindow.USER32(00000000,00000001), ref: 0055816B
              • SetFocus.USER32(00000000,?,?,?,?,?,?,?,00525386), ref: 00558172
              • PostQuitMessage.USER32(?), ref: 00558181
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Window$Message$Enable$Focus$DispatchPostQuitShowTranslate
              • String ID:
              • API String ID: 200552106-0
              • Opcode ID: deccb9458498692119ffca4084044731266901399beb2dc4e79af8818e098f4f
              • Instruction ID: bde7e618f3d1e49eb01b66db11094f6bbe75ec0228a19766841505c124ee3543
              • Opcode Fuzzy Hash: deccb9458498692119ffca4084044731266901399beb2dc4e79af8818e098f4f
              • Instruction Fuzzy Hash: 6621A331904A0AAFDF20AFA0DC49BEEBBBAFF26302F505121F505AA050DB745947CB60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 005A6850: MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,00000000,6F923D37,?,75922EE0), ref: 005A68EF
              • CreateThread.KERNEL32(00000000,00000000,00546430,00000000,00000000,00000000), ref: 0054635C
              • CloseHandle.KERNEL32(00000000), ref: 00546367
              • VariantInit.OLEAUT32(00000000), ref: 00546473
              • SysAllocString.OLEAUT32(about:blank), ref: 0054648E
              • VariantClear.OLEAUT32(?), ref: 005464BD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Variant$AllocByteCharClearCloseCreateHandleInitMultiStringThreadWide
              • String ID: DJe$DJe$about:blank$load h5 FindControl$load h5 SetWebBrowserEventHandler$load h5 end
              • API String ID: 711093020-843595317
              • Opcode ID: ec60087e64d668334c102f98a219aa9cc9946add4972159d27fa6ca2524c6333
              • Instruction ID: 00739e9c2c095d0fe3d0c95d01538f05609da4363e0f4ee6ec9caf1407406de6
              • Opcode Fuzzy Hash: ec60087e64d668334c102f98a219aa9cc9946add4972159d27fa6ca2524c6333
              • Instruction Fuzzy Hash: 0A810271A00344ABDB24DF68CC49BDE7FA6FB86708F20465CF8059B2C1DB76A945CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free
              • String ID: tAe$xAe
              • API String ID: 269201875-2979389600
              • Opcode ID: 48e274f9b18e25649c312cc9a517361182eefc729dd4fada658bf6bb6762af01
              • Instruction ID: 779e13d975df44e64842cff3eb024d228cc608f08ecf4db8d26443d58e3a1e04
              • Opcode Fuzzy Hash: 48e274f9b18e25649c312cc9a517361182eefc729dd4fada658bf6bb6762af01
              • Instruction Fuzzy Hash: 5261E671940305AFDB20DF64D842BEB77FAEF55310F284569E946DB381EB70AE818B50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              • Given file does not exist, xrefs: 005D827D
              • %04d%02d%02d %02d:%02d:%02d GMT, xrefs: 005D8318
              • Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT, xrefs: 005D83F3
              • %04d%02d%02d%02d%02d%02d, xrefs: 005D82C8
              • The requested document is not old enough, xrefs: 005D84C5
              • Skipping time comparison, xrefs: 005D84CC
              • The requested document is not new enough, xrefs: 005D847A
              • unsupported MDTM reply format, xrefs: 005D826A
              • Mb, xrefs: 005D83B5
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: Mb$%04d%02d%02d %02d:%02d:%02d GMT$%04d%02d%02d%02d%02d%02d$Given file does not exist$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT$Skipping time comparison$The requested document is not new enough$The requested document is not old enough$unsupported MDTM reply format
              • API String ID: 48624451-1366277790
              • Opcode ID: 78c9a35c413d17f969e1c7104d2b8dd6cc9e2f050f8031ae68f5fd13efc6348d
              • Instruction ID: 92777893bb852c6a477b433a7f7557a19bd68bc402d56d8e96793b2d5b150915
              • Opcode Fuzzy Hash: 78c9a35c413d17f969e1c7104d2b8dd6cc9e2f050f8031ae68f5fd13efc6348d
              • Instruction Fuzzy Hash: 41719271A0061AABEF31DB68DC46FEA7BA9FB44304F0445ABE94DD3241DE31AA44CF51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetModuleHandleW.KERNEL32(kernel32,GetNativeSystemInfo,6F923D37,?,?), ref: 0054A95D
              • GetProcAddress.KERNEL32(00000000), ref: 0054A964
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: DisplayIcon$GetNativeSystemInfo$RegistryAddress$RegistryName$kernel32
              • API String ID: 1646373207-2338805103
              • Opcode ID: d0c1998db0748fcf81e38d64c7fa90c0fa2484409714e658720aa03855c45d5c
              • Instruction ID: 60daf6a393e32a788d4a155079281dc5da0b0e4d4236471f8c1928cc27dc6fe0
              • Opcode Fuzzy Hash: d0c1998db0748fcf81e38d64c7fa90c0fa2484409714e658720aa03855c45d5c
              • Instruction Fuzzy Hash: AB021670E102499BEF24DF74CD49BDDBB72BF85308F10865CE044AB296E775AA84CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00521340: WideCharToMultiByte.KERNEL32(?,00000000,?,000000FF,?,?,00000000,00000000), ref: 00521361
              • GetWindowRect.USER32(00000000,00000000), ref: 0053C792
              • ClientToScreen.USER32(00000000,?), ref: 0053C7D8
              • PtInRect.USER32(00000000,?,?), ref: 0053C7E8
              • SendMessageW.USER32(00000000,000000A1,00000002,?), ref: 0053C80B
              • PtInRect.USER32(?,?,?), ref: 0053C822
              • SendMessageW.USER32(00000000,00000112,0000F020,00000000), ref: 0053C843
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Rect$MessageSend$ByteCharClientMultiScreenWideWindow
              • String ID: InterceptWebEventCloseX$InterceptWebEventCloseY$InterceptWebEventX$InterceptWebEventY
              • API String ID: 2162539429-2061605471
              • Opcode ID: 24ad1629fb674357db351af8ddb5bc12c84a1d8415a2276a7a73a58698282743
              • Instruction ID: d0e47e0b719e763dd7638dedcb4fc10b25d7418a4fb6276bb23e31ab672f8e60
              • Opcode Fuzzy Hash: 24ad1629fb674357db351af8ddb5bc12c84a1d8415a2276a7a73a58698282743
              • Instruction Fuzzy Hash: 41D1F771A002059BDF14DF78DC4ABAE7FB6BF89304F24461CE415BB292DB75AA41CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CharNextW.USER32(00000004,00000000,?,?), ref: 005629F7
              • CharNextW.USER32(00000000,00000000,?,?,?,005628FC,0056258D,00000000,?,?,0056258D), ref: 00562C09
              • CharNextW.USER32(00000000,00000000,?,?,?,005628FC,0056258D,00000000,?,?,0056258D), ref: 00562C4E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CharNext
              • String ID: >$Error parsing element name$Expected end-tag start$Expected start tag$Expected start-tag closing$Unmatched closing tag$gfff
              • API String ID: 3213498283-651812674
              • Opcode ID: b130480ea0abccca1d6de91eb92b3ab2322f8fb26e8d78ae9f16493ec76e48f1
              • Instruction ID: e6ff856dc2b46bfe035bfd7598de8b6e94f5c2ecdf6a5a1c97b744e453db1505
              • Opcode Fuzzy Hash: b130480ea0abccca1d6de91eb92b3ab2322f8fb26e8d78ae9f16493ec76e48f1
              • Instruction Fuzzy Hash: 32C105356006069FCB24EF69C8949BABBF6FF99340F14856EE984CB351E7709D81CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___from_strstr_to_strchr.LIBCMT ref: 005B4AA7
              • ___from_strstr_to_strchr.LIBCMT ref: 005B4B4C
              • ___from_strstr_to_strchr.LIBCMT ref: 005B4BAF
              Strings
              • Couldn't parse CURLOPT_RESOLVE removal entry '%s'!, xrefs: 005B4A0D
              • Added %s:%d:%s to DNS cache, xrefs: 005B4CCC
              • RESOLVE %s:%d is - old addresses discarded!, xrefs: 005B4C4D
              • Ignoring resolve address '%s', missing IPv6 support., xrefs: 005B4BC3
              • Couldn't parse CURLOPT_RESOLVE entry '%s'!, xrefs: 005B4D32
              • Resolve address '%s' found illegal!, xrefs: 005B4D1C
              • %255[^:]:%d, xrefs: 005B49F2
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr
              • String ID: %255[^:]:%d$Added %s:%d:%s to DNS cache$Couldn't parse CURLOPT_RESOLVE entry '%s'!$Couldn't parse CURLOPT_RESOLVE removal entry '%s'!$Ignoring resolve address '%s', missing IPv6 support.$RESOLVE %s:%d is - old addresses discarded!$Resolve address '%s' found illegal!
              • API String ID: 601868998-3873099096
              • Opcode ID: 60a0e97c653fe5e5568bfa5af0d1f41a9a6686494cff52d21a45bff59cbe196a
              • Instruction ID: a875a3b7ea49b5c230d10013d9f10bb9d591d76b4d0c989e95eec8ca824d106e
              • Opcode Fuzzy Hash: 60a0e97c653fe5e5568bfa5af0d1f41a9a6686494cff52d21a45bff59cbe196a
              • Instruction Fuzzy Hash: 78B1C4719002159BDF319F64DC49BEE7FA9FF85705F1404A8E80AAB243E635AE85CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005CA0DF
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005CA11D
              • ___swprintf_l.LIBCMT ref: 005CA175
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005CA18D
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005CA1C2
              • ___swprintf_l.LIBCMT ref: 005CA1D7
              • ___swprintf_l.LIBCMT ref: 005CA1F2
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$___swprintf_l
              • String ID: %2I64d:%02I64d:%02I64d$%3I64dd %02I64dh$%7I64dd
              • API String ID: 2070094197-564197712
              • Opcode ID: 2c9dc585ac086955f49396bc0ddcab82966a66db62f8808c602d37a1eeed58de
              • Instruction ID: 2b6a276a1da6819de8098982e9fec809370f2f22ef5cdb05bfc1697ac3b8c9b9
              • Opcode Fuzzy Hash: 2c9dc585ac086955f49396bc0ddcab82966a66db62f8808c602d37a1eeed58de
              • Instruction Fuzzy Hash: 414117B3B002597EE7205DAD9C4AFAE7F6DEBC4B50F054179FD18EB181DAB19D108290
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateThread.KERNEL32(00000000,00000000,00537520,?,00000000,00000000), ref: 00532DDB
              • CloseHandle.KERNEL32(00000000,?,?,0000001A), ref: 00532DEA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CloseCreateHandleThread
              • String ID: ...$4ye$Info_Start_Install_Program$Installing$Installing$progressTip$text
              • API String ID: 3032276028-3872197431
              • Opcode ID: b5c7499ae8b7e673f4828292d6472268633a6ad3f13635977d89711f89647c98
              • Instruction ID: 3a8f9d9703574b46735353f0848378cef5adf78a8188ac30008c0f8f575c39ef
              • Opcode Fuzzy Hash: b5c7499ae8b7e673f4828292d6472268633a6ad3f13635977d89711f89647c98
              • Instruction Fuzzy Hash: E7D1C0B0A013459BDB14DF24DD4EB9DBFB2BF85314F204298E408AB2D2D7B5AB44CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000,6F923D37,00000000,?), ref: 00534950
              • GetFileSize.KERNEL32(00000000,00000000), ref: 00534964
              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000001), ref: 00534985
              • ReadFile.KERNEL32(00000000,?,00000104,?,00000000), ref: 005349C1
              • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,?), ref: 00534A36
              • CloseHandle.KERNEL32(00000000,6F923D37,00000000,?), ref: 00534C46
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: File$ByteCharCloseCreateHandleMultiPointerReadSizeWide
              • String ID: Downloading$errInfo$error_info
              • API String ID: 20821478-1371400834
              • Opcode ID: f6dd9c557b2cb57365a6d4da3d22db976b3b874d613e0d08ae2fbc15119ea12f
              • Instruction ID: 35054e49e0504e448b18231973cf5966b9de42da88292a8bbd7ae795661fd0d5
              • Opcode Fuzzy Hash: f6dd9c557b2cb57365a6d4da3d22db976b3b874d613e0d08ae2fbc15119ea12f
              • Instruction Fuzzy Hash: 1291C4709002189BDB25DB64CC89BEEBBB6FF89704F104198E509AB2D1DB746F84CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___from_strstr_to_strchr.LIBCMT ref: 005C41D9
              • ___from_strstr_to_strchr.LIBCMT ref: 005C41EB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr
              • String ID: %s$Authorization:$Connection:$Content-Length:$Content-Type:$Host:$Transfer-Encoding:
              • API String ID: 601868998-2212639000
              • Opcode ID: bc72e40d77b4b1b9846829583e406fad53cb26a9f86de74976cbc7299dd9bfc8
              • Instruction ID: ae3c8cf30d1baa21e2ea260bf730240e750c56c4a104a4b7f83808d6128a63cc
              • Opcode Fuzzy Hash: bc72e40d77b4b1b9846829583e406fad53cb26a9f86de74976cbc7299dd9bfc8
              • Instruction Fuzzy Hash: AF810574A00651AFEF218EE49815FA97FA1BF91744F0845BCEC849F242E375C991CF91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 005886FE
              • MonitorFromWindow.USER32(?,00000001), ref: 0058872D
              • GetMonitorInfoW.USER32(00000000), ref: 00588734
              • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 0058878C
                • Part of subcall function 00557EC0: GetClassInfoExW.USER32(00000000,00000000), ref: 00557F0C
                • Part of subcall function 00557EC0: GetClassInfoExW.USER32(00520000,00000000), ref: 00557F2C
                • Part of subcall function 00557EC0: RegisterClassExW.USER32(00000030), ref: 00557F69
                • Part of subcall function 00557EC0: GetLastError.KERNEL32 ref: 00557F74
                • Part of subcall function 00557EC0: LoadCursorW.USER32 ref: 00557FE2
                • Part of subcall function 00557EC0: RegisterClassW.USER32(00000000), ref: 0055800D
                • Part of subcall function 00557EC0: GetLastError.KERNEL32(?,?,?,00000000,00007F00), ref: 00558018
              • GetParent.USER32(?), ref: 005887D7
              • GetParent.USER32(?), ref: 005887E1
              • GetParent.USER32(00000000), ref: 005887E6
              • ShowWindow.USER32(?,00000005), ref: 005887F5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ClassWindow$InfoParent$ErrorLastMonitorPointsRegister$CursorFromLoadShow
              • String ID: (
              • API String ID: 3348196917-3887548279
              • Opcode ID: 85aba16b30c0df252c353bd757f7f348d378fcfb1df1f9e0bf45bf6702a44177
              • Instruction ID: 9e04ee5c8d9922b43165b2864f31c439285ba74108af8e010d3a704319cc36aa
              • Opcode Fuzzy Hash: 85aba16b30c0df252c353bd757f7f348d378fcfb1df1f9e0bf45bf6702a44177
              • Instruction Fuzzy Hash: 318110716083019FD724DF28C945A6ABBF5FF89300F144A6DFA99D7360EB71E9008B82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 005E0232
              • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 005E02C2
              • sendto.WS2_32(?,?,00000004,00000000,?,?), ref: 005E039C
              Strings
              • tftp_rx: internal error, xrefs: 005E03AF
              • Received last DATA packet block %d again., xrefs: 005E01EA
              • Timeout waiting for block %d ACK. Retries = %d, xrefs: 005E02F4
              • Received unexpected DATA packet block %d, expecting block %d, xrefs: 005E0272
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: sendto
              • String ID: Received last DATA packet block %d again.$Received unexpected DATA packet block %d, expecting block %d$Timeout waiting for block %d ACK. Retries = %d$tftp_rx: internal error
              • API String ID: 1876886790-1785996722
              • Opcode ID: 8acdf3cd5bb361c252e396eda9ae89d51122ecb109d69cac9ee8105b48691ccf
              • Instruction ID: aef1a033dbbaefb75222ecc73beb0a650f8a4b5788cbb716a22a2016229521c6
              • Opcode Fuzzy Hash: 8acdf3cd5bb361c252e396eda9ae89d51122ecb109d69cac9ee8105b48691ccf
              • Instruction Fuzzy Hash: 3051E0B2200912BBE7145F65EC46BFAB768FF84315F000622FA59D6191E732B5A08BE1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • MultiByteToWideChar.KERNEL32(00000003,00000000,00000008,000000FF,?,0000000A), ref: 0054269D
              • MultiByteToWideChar.KERNEL32(00000003,00000000,?,000000FF,?,?,?,?,00000000,-00000002,?,Errorinfo,00000009), ref: 005427C6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ByteCharMultiWide
              • String ID: CDN$Elapsed$Errorinfo$Failed$Home_Installer$Result$Result_Download_Configurefile$Success
              • API String ID: 626452242-2874092996
              • Opcode ID: 64a19a8ed8e16262cc972ebbc3cb313be0a29e4efe2d215d5e8e535bb68e533d
              • Instruction ID: 57658920893f42736f069133c944e0f45d7af2fbe1f4470c891d1183e236ffc1
              • Opcode Fuzzy Hash: 64a19a8ed8e16262cc972ebbc3cb313be0a29e4efe2d215d5e8e535bb68e533d
              • Instruction Fuzzy Hash: 11F1D6319002699BDF24DB24CC89BDDBB76FF89318F508298F444AB295DB756F84CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CharNext$ColorText
              • String ID:
              • API String ID: 1248641432-0
              • Opcode ID: 44d0e0f7dec8751d59c0050605f4cb862262ffa67c511f3fe52172af4f306ac4
              • Instruction ID: d89ecc404c426e3282effc7fbc5527a063b8dfe526a10ba3522092dc8c608fe7
              • Opcode Fuzzy Hash: 44d0e0f7dec8751d59c0050605f4cb862262ffa67c511f3fe52172af4f306ac4
              • Instruction Fuzzy Hash: E9C15AB0D042298BDF209F24DC49BA9BBB6BF94340F0445E9E84DA7251DB369EE1DF50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetClipBox.GDI32(?,?), ref: 005788FA
              • CreateRectRgnIndirect.GDI32(?), ref: 0057890A
              • CreateRectRgnIndirect.GDI32(?), ref: 00578913
              • CreateRoundRectRgn.GDI32(00000001,00000001,00000001,?,?,?), ref: 0057894E
              • CombineRgn.GDI32(?,?,00000000,00000001), ref: 0057895E
              • ExtSelectClipRgn.GDI32(?,?,00000001), ref: 0057896A
              • DeleteObject.GDI32(00000000), ref: 00578985
              • SelectClipRgn.GDI32(?,?), ref: 005789D3
              • DeleteObject.GDI32(?), ref: 005789DC
              • DeleteObject.GDI32(?), ref: 005789DF
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ClipCreateDeleteObjectRect$IndirectSelect$CombineRound
              • String ID:
              • API String ID: 4113048980-0
              • Opcode ID: 34d2e6bc8f8f375bf8d75a2db8e77bd4afacc18207b86fcc0b9dad0295f12717
              • Instruction ID: 4bcca968f14cf2d888f1bf7f473e4acf577bc8e93aad4eea5f6231c95403bb54
              • Opcode Fuzzy Hash: 34d2e6bc8f8f375bf8d75a2db8e77bd4afacc18207b86fcc0b9dad0295f12717
              • Instruction Fuzzy Hash: 10516A35D00608EFCB11DFA8D948AEEBBF9FF5A310F144269F909A7261DB316981CB51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 0060AB4D
                • Part of subcall function 0060AEA3: HeapFree.KERNEL32(00000000,00000000,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?), ref: 0060AEB9
                • Part of subcall function 0060AEA3: GetLastError.KERNEL32(?,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?,?), ref: 0060AECB
              • _free.LIBCMT ref: 0060AB59
              • _free.LIBCMT ref: 0060AB64
              • _free.LIBCMT ref: 0060AB6F
              • _free.LIBCMT ref: 0060AB7A
              • _free.LIBCMT ref: 0060AB85
              • _free.LIBCMT ref: 0060AB90
              • _free.LIBCMT ref: 0060AB9B
              • _free.LIBCMT ref: 0060ABA6
              • _free.LIBCMT ref: 0060ABB4
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 1ba9749a48d38b5762c8eb2b4bc164d5ed8b23e1fe458f1c8df6ccdf1b0e6a54
              • Instruction ID: 9cae9fc469957deb67fd98c44f9b9ecbb09194e6dfc1fc7f05128b9eba386a74
              • Opcode Fuzzy Hash: 1ba9749a48d38b5762c8eb2b4bc164d5ed8b23e1fe458f1c8df6ccdf1b0e6a54
              • Instruction Fuzzy Hash: A5212BBA950208AFCB45EFD4C841DDE7BBABF48380F0045AAF5049F161EB71EA44DB81
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              • Accept-ranges: bytes, xrefs: 005DB063
              • Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT, xrefs: 005DB0D7
              • failed to resume file:// transfer, xrefs: 005DB3CB
              • Mb, xrefs: 005DB0AE
              • Content-Length: %I64d, xrefs: 005DB034
              • Can't get the size of file., xrefs: 005DB166
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr
              • String ID: Mb$Accept-ranges: bytes$Can't get the size of file.$Content-Length: %I64d$Last-Modified: %s, %02d %s %4d %02d:%02d:%02d GMT$failed to resume file:// transfer
              • API String ID: 601868998-3958857549
              • Opcode ID: 47af0d2cdbb81205ad768e18c60b37336c831b734499bc15a2b80af7e97de348
              • Instruction ID: d24e88e3c5a08de1a899fcbd1179dc16b08c27c1422cc700012717f6a2404f61
              • Opcode Fuzzy Hash: 47af0d2cdbb81205ad768e18c60b37336c831b734499bc15a2b80af7e97de348
              • Instruction Fuzzy Hash: 1AD1C471A04219DBEB30DB68DC45BADBBB6BF45304F0444EAE90DA7342EB715E84CB51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Rect
              • String ID: link
              • API String ID: 400858303-917281265
              • Opcode ID: 0368aaaef302c6e857ba5f77860e288ccd0d54055d40394dc5f2f8406cd5e331
              • Instruction ID: 25fe1ded090e57e3b1e38a0ad90092b1089aab4757a6a8c0eeaebbb9a6c60738
              • Opcode Fuzzy Hash: 0368aaaef302c6e857ba5f77860e288ccd0d54055d40394dc5f2f8406cd5e331
              • Instruction Fuzzy Hash: 4F818371704705DFCB30DF68E884A6ABBE5FB94325F109A2EE95DC7280CB31A851DB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • getpeername.WS2_32(?,?,?), ref: 005C0094
              • WSAGetLastError.WS2_32(?,?,?,?,?,?,?), ref: 005C009E
                • Part of subcall function 005E3C50: GetLastError.KERNEL32(00000000,?,?,?,?,005C01F7,?,?,?,?,?,?,?,?,?,?), ref: 005E3C57
                • Part of subcall function 005E3C50: _strncpy.LIBCMT ref: 005E3C95
                • Part of subcall function 005E3C50: GetLastError.KERNEL32(?,?,?,?,005C01F7,?,?,?,?,?,?,?,?,?,?,005B90AB), ref: 005E3D30
                • Part of subcall function 005E3C50: SetLastError.KERNEL32(00000000,?,?,?,?,005C01F7,?,?,?,?,?,?,?,?,?,?), ref: 005E3D3B
              • getsockname.WS2_32(?,?,00000080), ref: 005C00FD
              • WSAGetLastError.WS2_32(?,?,005B90AB), ref: 005C0107
              Strings
              • ssloc inet_ntop() failed with errno %d: %s, xrefs: 005C01FA
              • ssrem inet_ntop() failed with errno %d: %s, xrefs: 005C0170
              • getsockname() failed with errno %d: %s, xrefs: 005C0118
              • getpeername() failed with errno %d: %s, xrefs: 005C00AF
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast$_strncpygetpeernamegetsockname
              • String ID: getpeername() failed with errno %d: %s$getsockname() failed with errno %d: %s$ssloc inet_ntop() failed with errno %d: %s$ssrem inet_ntop() failed with errno %d: %s
              • API String ID: 616724167-670633250
              • Opcode ID: 0e333fe6a60d7b22b7f0dd0b2986467bb4c9a106ea4efeef95a59971f8f9196b
              • Instruction ID: c7f648f561d3544c5ead4af6d1528f83c0ef6e4cb901c4a90c33aa4d9b3eaec1
              • Opcode Fuzzy Hash: 0e333fe6a60d7b22b7f0dd0b2986467bb4c9a106ea4efeef95a59971f8f9196b
              • Instruction Fuzzy Hash: 6D519575900219ABCF10AF659C4ABEE7BA8FF55310F4401E6FD49A7142EA316A848BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CertGetNameStringA.CRYPT32(00000000,00000006,00010002,00000000,00000000,00000000), ref: 005E69EF
              • CertGetNameStringA.CRYPT32(00000000,00000006,00010002,00000000,00000000,?), ref: 005E6A2F
              Strings
              • schannel: CertGetNameString() returned no certificate name information, xrefs: 005E69F8
              • schannel: server certificate name verification failed, xrefs: 005E6AC6
              • schannel: connection hostname (%s) did not match against certificate name (%s), xrefs: 005E6A8F
              • schannel: connection hostname (%s) validated against certificate name (%s), xrefs: 005E6A7B
              • schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names, xrefs: 005E6AE2
              • schannel: CertGetNameString() returned certificate name information of unexpected size, xrefs: 005E6A38
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CertNameString
              • String ID: schannel: CertGetNameString() failed to match connection hostname (%s) against server certificate names$schannel: CertGetNameString() returned certificate name information of unexpected size$schannel: CertGetNameString() returned no certificate name information$schannel: connection hostname (%s) did not match against certificate name (%s)$schannel: connection hostname (%s) validated against certificate name (%s)$schannel: server certificate name verification failed
              • API String ID: 149855834-1713101147
              • Opcode ID: ca6cf5e2c66f5a746196562a6a1bfed8566e81a12b75501b6251a8af784ed8fd
              • Instruction ID: 2ad320e0b675bd246676064d0e4197d6149c5575f6930c64d8290f41f7f89ec8
              • Opcode Fuzzy Hash: ca6cf5e2c66f5a746196562a6a1bfed8566e81a12b75501b6251a8af784ed8fd
              • Instruction Fuzzy Hash: 7E315532E00258A7DF259E4AEC42AEE7F2AFFA13C1F094475FC49B7101D7716E1186A0
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 0e9f6d37ce502ada221523dc097de9c31e2ee6e169be23bda0dcbcba0e3ef66b
              • Instruction ID: be39599ad992dda158ab5cd765b07b48e3b2f4589bb096e5f64d9fb417dda101
              • Opcode Fuzzy Hash: 0e9f6d37ce502ada221523dc097de9c31e2ee6e169be23bda0dcbcba0e3ef66b
              • Instruction Fuzzy Hash: ACC1F070A842469FDB19CFA8D884BAFBBB7AF49314F04405CE5519B3D2C7709A42CB64
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetTimer.USER32(?,00000014,00000032,00000000), ref: 0058E8F6
              • BeginPaint.USER32(?,?), ref: 0058E919
              • EndPaint.USER32(?,?), ref: 0058E926
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 0058E95B
              • GetClientRect.USER32(?,?), ref: 0058EAF6
              • GetGUIThreadInfo.USER32(00000000,?), ref: 0058EB4E
              • ClientToScreen.USER32(?,?), ref: 0058EB79
              • ScreenToClient.USER32(?,?), ref: 0058EB99
              • PtInRect.USER32(?,?,?), ref: 0058EBB2
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Client$PaintRectScreen$BeginCallInfoProcThreadTimerWindow
              • String ID:
              • API String ID: 1857846357-0
              • Opcode ID: 11e6ece7bbdb16500be71980836120dd58fd03c953f5e23313374de40ab6e949
              • Instruction ID: 82746e7d5787be880cc7460130fd99fe56bff2fd735c64759fed3b1e66afc8aa
              • Opcode Fuzzy Hash: 11e6ece7bbdb16500be71980836120dd58fd03c953f5e23313374de40ab6e949
              • Instruction Fuzzy Hash: 9BB1C271A04605EFDB18DF64C886FA9BBB5FF49700F1445A9F909AB2A1D731ED80CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetStockObject.GDI32(00000011), ref: 0055CE5C
              • GetObjectW.GDI32(00000000), ref: 0055CE63
              • CreateFontIndirectW.GDI32(?), ref: 0055CEB6
              • SelectObject.GDI32(?,00000000), ref: 0055CF53
              • GetTextMetricsW.GDI32(?,00000090), ref: 0055CF6A
              • SelectObject.GDI32(?,00000000), ref: 0055CF7D
              • DeleteObject.GDI32(00000000), ref: 0055CFD1
              • DeleteObject.GDI32(00000000), ref: 0055D078
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Object$DeleteSelect$CreateFontIndirectMetricsStockText
              • String ID:
              • API String ID: 1902588391-0
              • Opcode ID: a56d579acb78998c90db73a67b7a16c03fd9bdc45a2a7774aa93bc451be5575b
              • Instruction ID: 56d2383371ae98c7972ebce9c60889feff4717c49f2df04a555fa102995e2a5a
              • Opcode Fuzzy Hash: a56d579acb78998c90db73a67b7a16c03fd9bdc45a2a7774aa93bc451be5575b
              • Instruction Fuzzy Hash: 1D81B671D002499BDF20DF60DC55BAE7FB5BF59301F0440AAED49EB282EA319E45CBA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateThread.KERNEL32(00000000,00000000,005ABDB0,?,00000000,00000000), ref: 005AACC1
              • CloseHandle.KERNEL32(00000000), ref: 005AACDD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CloseCreateHandleThread
              • String ID: %s %d download info code:%d$%s %d redownload info count:%d$&tmpTime_=$CHttpHelper::GetDownloadInfo
              • API String ID: 3032276028-1870634201
              • Opcode ID: aeee60c6023a04b3219d3c4e30c89e7b3416859e10eeeeca4ea2aff6f461f04b
              • Instruction ID: c339f983fdd63d88738d3f754b150a06a2742689fafadbfab1936fe237a5db00
              • Opcode Fuzzy Hash: aeee60c6023a04b3219d3c4e30c89e7b3416859e10eeeeca4ea2aff6f461f04b
              • Instruction Fuzzy Hash: 9DB1C170A002599FEB29DF64CC59BDDBBB5BF8A304F14419CE405AB282D771AE81CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00538A8E
              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00538B2A
              • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 00538BCE
                • Part of subcall function 00521300: MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,?,?), ref: 0052131E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ExecuteShell$ByteCharMultiWide
              • String ID: Click_Download_Offline$Download_Failed$OfflineDownloadUrl$open
              • API String ID: 2997808067-3584090089
              • Opcode ID: 2d91efbe21ba2ae51817a9658204bd6879879a2ea42628034147fa3e1fe70ec6
              • Instruction ID: 12e0cf5ad50a9bd767b51d1bdb60938216dc87cb09b427666f0ad70035e8a1e2
              • Opcode Fuzzy Hash: 2d91efbe21ba2ae51817a9658204bd6879879a2ea42628034147fa3e1fe70ec6
              • Instruction Fuzzy Hash: C2910571A00309ABDF18CF68DC56BAEBF76BF85714F208119F511AB2C1DB756A05CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              • %x%s, xrefs: 005C732D
              • operation aborted by callback, xrefs: 005C722E
              • Read callback asked for PAUSE when not supported!, xrefs: 005C7272
              • read function returned funny value, xrefs: 005C72D0
              • XAb, xrefs: 005C731B
              • Signaling end of chunked upload via terminating chunk., xrefs: 005C7382
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: %x%s$Read callback asked for PAUSE when not supported!$Signaling end of chunked upload via terminating chunk.$XAb$operation aborted by callback$read function returned funny value
              • API String ID: 0-2134544425
              • Opcode ID: 1a2814651b5e9895876b6774a7c73fd7151b1fda28a49986031b20d5b1c4b79d
              • Instruction ID: 10c0f0cec4217f6641b77a515482d2df2df0c401b355ce46835af48bdcef4baa
              • Opcode Fuzzy Hash: 1a2814651b5e9895876b6774a7c73fd7151b1fda28a49986031b20d5b1c4b79d
              • Instruction Fuzzy Hash: E1511831A003499FDB20DFA8D856FFEBBE5FF89310F04046DE85A97282DA756D408B90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005E07EA
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005E085D
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005E08CF
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
              • String ID: Connection time-out$gfff$gfff$set timeouts for state %d; Total %ld, retry %d maxtry %d
              • API String ID: 885266447-870032562
              • Opcode ID: 7f8e553f83653e353e46ae655eb28e641dbbeee685b1f44612f831c7a1f5261b
              • Instruction ID: 6969bd1ed9dad1f8677bf68b02c0eddb5e38be3639cd9770b1599aa2cd900ab1
              • Opcode Fuzzy Hash: 7f8e553f83653e353e46ae655eb28e641dbbeee685b1f44612f831c7a1f5261b
              • Instruction Fuzzy Hash: 8B41C5B1B00616ABD708DF6ADC85799BBA9FF88300F045529E948DB782E775ED508BC0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsWindow.USER32(?), ref: 00564422
              • PostMessageW.USER32(?,00000010,00000001,00000000), ref: 00564439
              • SendMessageW.USER32(?,00000112,0000F120,?), ref: 0056450D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Message$PostSendWindow
              • String ID: closebtn$maxbtn$minbtn$restorebtn
              • API String ID: 259590922-318950520
              • Opcode ID: a59826b901cdece0a47d4e49242466b3f04e9de18b024896232d9303bff8f8fc
              • Instruction ID: a17432119c20f34a9a1356016b74cd1f800b635f4940e7dfee42574d23f17a8c
              • Opcode Fuzzy Hash: a59826b901cdece0a47d4e49242466b3f04e9de18b024896232d9303bff8f8fc
              • Instruction Fuzzy Hash: 08418F3160010297EF24AB20CC03BB67AA2FB35759F4544B5D946DB255EF23DE81CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLasthtonssend
              • String ID: Sending data failed (%d)
              • API String ID: 2027122571-2319402659
              • Opcode ID: 56c3b679382c65eebf54624e09dde9b6f48b791671f2e5844402f838fc420235
              • Instruction ID: 531dd1f9e8707c74bdd1a9aafd1124cf740c371ce49d47e46bf81ecbf86fa117
              • Opcode Fuzzy Hash: 56c3b679382c65eebf54624e09dde9b6f48b791671f2e5844402f838fc420235
              • Instruction Fuzzy Hash: 6941F3706046019FD712DF28C886AB97FB9FF69310F2405A6F95ADF382D730A911CB61
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: Mb$%s: %s, %02d %s %4d %02d:%02d:%02d GMT$If-Modified-Since$If-Unmodified-Since$Invalid TIMEVALUE$Last-Modified
              • API String ID: 0-1618591332
              • Opcode ID: cc1709742c671771ff6042971318e3091366b13e283b58f9226793c7a807719f
              • Instruction ID: bb97bcae641e461344beeb151ee1cd79968bb353c786af862b8cf39ce19a15e1
              • Opcode Fuzzy Hash: cc1709742c671771ff6042971318e3091366b13e283b58f9226793c7a807719f
              • Instruction Fuzzy Hash: E131FA316001099FCF18DFE8EC55FBDBBBAFB85311F60056DE90A9B241DA266E158B80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • FindSITargetTypeInstance.LIBVCRUNTIME ref: 00618E2A
              • FindMITargetTypeInstance.LIBVCRUNTIME ref: 00618E43
              • FindVITargetTypeInstance.LIBVCRUNTIME ref: 00618E4A
              • PMDtoOffset.LIBCMT ref: 00618E69
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: FindInstanceTargetType$Offset
              • String ID: Bad dynamic_cast!
              • API String ID: 1467055271-2956939130
              • Opcode ID: 6726608b9ddecc640007886064c9ec303bda3045c54d13ded2092cdd6c38d6ee
              • Instruction ID: 2bf481739d72b3cb7296f479cb8606dfc5771673f2d15458adacb56a5663cf8e
              • Opcode Fuzzy Hash: 6726608b9ddecc640007886064c9ec303bda3045c54d13ded2092cdd6c38d6ee
              • Instruction Fuzzy Hash: 9321F672A003059FCB18DF68DD46AEA77B6FF95724F184619F91193280DF30ED4187A0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • select.WS2_32(?,?,00000000,?,?), ref: 005BE8BC
              • WSAGetLastError.WS2_32 ref: 005BE8C7
              • __WSAFDIsSet.WS2_32(000000FF,?), ref: 005BE982
              • __WSAFDIsSet.WS2_32(000000FF,?), ref: 005BE999
              • __WSAFDIsSet.WS2_32(000000FF,?), ref: 005BE9B5
              • __WSAFDIsSet.WS2_32(000000FF,?), ref: 005BE9C9
              • __WSAFDIsSet.WS2_32(?,00000000), ref: 005BE9E5
              • __WSAFDIsSet.WS2_32(?,?), ref: 005BE9F9
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastselect
              • String ID:
              • API String ID: 215497628-0
              • Opcode ID: d5b65cd3fe0e245a08953c882e8045e7ee3930763ccb0e51e8176c1f10de9a8e
              • Instruction ID: 30fb90c6617e2ec9ea3838eca1f8eb2302d7b80dec923f911e67f551f519fcf3
              • Opcode Fuzzy Hash: d5b65cd3fe0e245a08953c882e8045e7ee3930763ccb0e51e8176c1f10de9a8e
              • Instruction Fuzzy Hash: FAC1B671E006198BDF25CF289D866ED7B79FF58320F5846A9E859D7181DB30AEC08F90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SelectObject.GDI32(?,?), ref: 0055CDA0
              • GetTextMetricsW.GDI32(?,006576CC), ref: 0055CDAF
              • SelectObject.GDI32(?,00000000), ref: 0055CDBC
              • SelectObject.GDI32(?,00000380), ref: 0055CDEA
              • GetTextMetricsW.GDI32(?,00000410), ref: 0055CDFB
              • SelectObject.GDI32(?,00000000), ref: 0055CE08
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ObjectSelect$MetricsText
              • String ID: <ve
              • API String ID: 3697559710-2525859393
              • Opcode ID: 9e83e1393458370bd51258d40627fd36bf1271687dfa73c009bde25a86ff8141
              • Instruction ID: 741ebeadf19c20ae40204bba43c1de99db6d48d2810c778399d6f43d62f21ef9
              • Opcode Fuzzy Hash: 9e83e1393458370bd51258d40627fd36bf1271687dfa73c009bde25a86ff8141
              • Instruction Fuzzy Hash: 7B113C36504208AFCF11AF59EC84AD57FAAFB55322F4481B2EE0CCB161DA711999DBA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$___from_strstr_to_strchr
              • String ID:
              • API String ID: 3409252457-0
              • Opcode ID: 9170cb6d72e7e70a1d61d83f0b48179ed9a9bad54968518e1e840b822e0e9ee4
              • Instruction ID: 414c1aad07ea43d4e5ba7b4a6622dc7a825689688a492f46ae4a0790d7533d72
              • Opcode Fuzzy Hash: 9170cb6d72e7e70a1d61d83f0b48179ed9a9bad54968518e1e840b822e0e9ee4
              • Instruction Fuzzy Hash: A65106B0D44307AFDB24EFB498A1AEF77A7AF01310F18416EE510973C1DA3186A1CB95
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • DefWindowProcW.USER32(?,?,?,?), ref: 00590C9C
              • SendMessageW.USER32(?,00001001,00000000,?), ref: 00590CC9
              • SendMessageW.USER32(?,00000008,?,?), ref: 00590D04
              • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00590D0F
              • DefWindowProcW.USER32(?,?,?,?), ref: 00590D41
              • DefWindowProcW.USER32(?,00000101,?,?), ref: 00590D64
              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00590D8A
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00590DCF
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: MessageProcWindow$Send$CallPost
              • String ID:
              • API String ID: 2702885961-0
              • Opcode ID: a8b70e57edcff816feabeda014d017669f017b31c8c4de74f911861e89c1578b
              • Instruction ID: ebda5000e5b90e0fc852048a177b9aa7f674c18db287696f6769f954a33c9e18
              • Opcode Fuzzy Hash: a8b70e57edcff816feabeda014d017669f017b31c8c4de74f911861e89c1578b
              • Instruction Fuzzy Hash: A2418E75600715BFCB149F54CC89F69BBAAFF58311F044669F9185B6A0CB72BC60CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00576000: IsRectEmpty.USER32(?), ref: 0057608E
              • GetDC.USER32(00000000), ref: 0058EF70
              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0058EF81
              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0058EF88
              • ReleaseDC.USER32(00000000,00000000), ref: 0058EF91
              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0058EFA7
              • MulDiv.KERNEL32(000009EC,?,?), ref: 0058EFBA
              • OffsetRect.USER32(?,?,?), ref: 0058F020
              • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0058F06F
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CapsDeviceRect$EmptyMoveOffsetReleaseWindow
              • String ID:
              • API String ID: 3865870406-0
              • Opcode ID: 4be00cb14f970975e6ba75312ba34ddb3df89733dc26221c54cdfc9bb14edf9c
              • Instruction ID: 8acacc0bf9aacbe81212798a03341a77bdbaadb4ec1de46fc7feb12e8404b9e7
              • Opcode Fuzzy Hash: 4be00cb14f970975e6ba75312ba34ddb3df89733dc26221c54cdfc9bb14edf9c
              • Instruction Fuzzy Hash: 80514C71608701EFD720DF28C889BAA7BF5FB88314F044A6DFD999B251DB31A844CB91
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: valuechanged
              • API String ID: 0-4135814588
              • Opcode ID: f1b8fb24c08d1e3d1db1fdb4327ae354d677e35e8b1aa1d6a09b1ed8a509655a
              • Instruction ID: 7fb1325aab7b1bcaefbfb7936540ee50f5798ac067b2a202a036673e8dc9f335
              • Opcode Fuzzy Hash: f1b8fb24c08d1e3d1db1fdb4327ae354d677e35e8b1aa1d6a09b1ed8a509655a
              • Instruction Fuzzy Hash: 5DF17371700B018FD724EE78C585BAABFE6BFD4310F14492EE99AA7284CB71B854C790
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetModuleHandleW.KERNEL32(kernel32,GetNativeSystemInfo,?,ProductTestidSubKeyName), ref: 005282B7
              • GetProcAddress.KERNEL32(00000000), ref: 005282BE
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: GetNativeSystemInfo$ProductTestidSubKeyName$ProductVerSubKey$kernel32
              • API String ID: 1646373207-3527134549
              • Opcode ID: d81ffe12f0520759c9122a807d09d19ddd8c63d9980b8ad89a6b851396f455d7
              • Instruction ID: 39e237da76c082df55f05a7a743794cbdc9e767a431ff56b92a278a1f808d67e
              • Opcode Fuzzy Hash: d81ffe12f0520759c9122a807d09d19ddd8c63d9980b8ad89a6b851396f455d7
              • Instruction Fuzzy Hash: 47E14A71A112559BDB04DFB8DC857ADBF72FF8A304F20861CE4149B2D5EB79A684CB80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • Sleep.KERNEL32(000003E8,6F923D37), ref: 005AA485
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005AA55F
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: SleepUnothrow_t@std@@@__ehfuncinfo$??2@
              • String ID: %s %d download mini size timeout:%d$%s %d time:%d,size:%I64d$CDownloadHelper::CalcSpeedPro$list<T> too long
              • API String ID: 4141101911-161206272
              • Opcode ID: edaec422fff11e1b3b8078f85a1468841c6c538a3398c8800106e36534b53110
              • Instruction ID: 23a41245467c710563a223bf5fce1984ebb75e14328862712737520e1616cbad
              • Opcode Fuzzy Hash: edaec422fff11e1b3b8078f85a1468841c6c538a3398c8800106e36534b53110
              • Instruction Fuzzy Hash: 0EC19971E002059FCB14CFA8D885BAEBBF2FF8A314F158199E905AB391D771AD40CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Rect
              • String ID:
              • API String ID: 400858303-3916222277
              • Opcode ID: 69a688baa8080590894aeeef0994794f527f28ca952bafa0ae512c1d174cf169
              • Instruction ID: 50fb1950d10e11e98186fd7608effba5fe451262cb16cca4d6c9e230e0bc6355
              • Opcode Fuzzy Hash: 69a688baa8080590894aeeef0994794f527f28ca952bafa0ae512c1d174cf169
              • Instruction Fuzzy Hash: 02B1CE313046018FD764DF68C855BAAFBE5FF99714F04465AE989EB2A1CB30EC19CB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • DeleteObject.GDI32(?), ref: 00558C87
              • DestroyWindow.USER32(?,?,?,?,?,?,?,00000000,0061EFD0,000000FF), ref: 00558CC1
              • DeleteDC.GDI32(?), ref: 00558CEC
              • DeleteDC.GDI32(?), ref: 00558CF9
              • DeleteObject.GDI32(?), ref: 00558D06
              • DeleteObject.GDI32(?), ref: 00558D13
              • ReleaseDC.USER32(?,?), ref: 00558D26
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Delete$Object$DestroyReleaseWindow
              • String ID:
              • API String ID: 743758788-0
              • Opcode ID: 7a2a01d97d11046a818d710da7803395f73e82a1fe8a8d79b8d69950b4ec34d9
              • Instruction ID: f685026bd351f68bdd0d5be78417496f1c7b8d7e2439f3f211f98862ff705bd9
              • Opcode Fuzzy Hash: 7a2a01d97d11046a818d710da7803395f73e82a1fe8a8d79b8d69950b4ec34d9
              • Instruction Fuzzy Hash: 7B914FB06006069BDB25EB34C8A9A7B7BE9BF50741F04082DE85AD7251EF34F949CA61
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadCursorW.USER32(00000000,00007F01), ref: 00585168
              • SetCursor.USER32(00000000), ref: 0058516F
              • PtInRect.USER32(?,?,?), ref: 00585263
              • PtInRect.USER32(?,?,?), ref: 005852A5
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CursorRect$Load
              • String ID:
              • API String ID: 2751897888-0
              • Opcode ID: 30f4464961826e80871e169ad1a6f4908ac3570e6158beed1904509d33767e7e
              • Instruction ID: 8e2e602b81ea6b1dd33ddb84a4b710d315c065538d7bb1b4e98f6912d1923a27
              • Opcode Fuzzy Hash: 30f4464961826e80871e169ad1a6f4908ac3570e6158beed1904509d33767e7e
              • Instruction Fuzzy Hash: 8A91A4357006029BCF14EF68D488B69BBE2FF95311F14056AE859EB251EB71EC61CB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateThread.KERNEL32(00000000,00000000,005A9350,?,00000000,00000000), ref: 005A913C
              • CreateThread.KERNEL32(00000000,00000000,005AA410,?,00000000,00000000), ref: 005A9158
              • CloseHandle.KERNEL32(?,?,00000000,00000000,?,00000000,00000000,?,00000000), ref: 005A916A
              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00000000,?,00000000,00000000,?,00000000), ref: 005A9173
              • CloseHandle.KERNEL32(00000000,?,00000000,00000000,?,00000000,00000000,?,00000000), ref: 005A917E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CloseCreateHandleThread$ObjectSingleWait
              • String ID: .temp
              • API String ID: 272024972-2462334126
              • Opcode ID: 58683ae88ead3de7ed5a0f3484937d18235e90465fd0f13a32fb809571cbdc65
              • Instruction ID: 9e46c548d1c9a54aabf8385ac4974dba547e59523d08e19b5931767f8ea6aa2d
              • Opcode Fuzzy Hash: 58683ae88ead3de7ed5a0f3484937d18235e90465fd0f13a32fb809571cbdc65
              • Instruction Fuzzy Hash: A1911671A002559FDB18CF38DC89B5D7FA6FF8A300F108258E9149B296EB75F944CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CLSIDFromString.OLE32(?,?), ref: 0058F1CE
              • CLSIDFromProgID.OLE32(?,?), ref: 0058F1D6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: From$ProgString
              • String ID: clsid$delaycreate$modulename$true
              • API String ID: 2510552579-1263489701
              • Opcode ID: 2c23429c84147b1aa40b798982c8d8c65e2871602077f11932b807c10fec3cf4
              • Instruction ID: 9f222154bbfdd8856660c9ba32f651ec6385d186923bd72d103516d1fcaffd8a
              • Opcode Fuzzy Hash: 2c23429c84147b1aa40b798982c8d8c65e2871602077f11932b807c10fec3cf4
              • Instruction Fuzzy Hash: A8710B266142429BD724FB24D8027FBBBA2FFBD314F444979EC46A7241FB329950C391
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00562D80: CharNextW.USER32(?,00000000,0056258D,?,00562A26,0056258D), ref: 00562DA7
                • Part of subcall function 00562DC0: CharNextW.USER32(0056258D,?,0056258D,?,00562A99,0056258D,0056258D), ref: 00562DFC
              • CharNextW.USER32(?,0056258D,0056258D,?,0056258D,00000000,0056258D,0056258D), ref: 00562E95
              • CharNextW.USER32(0000002F,0056258D,0056258D,?,0056258D,00000000,0056258D,0056258D), ref: 00562EE7
              • CharNextW.USER32(0000002F,0056258D,0056258D,00000022,0056258D,0056258D,?,0056258D,00000000,0056258D,0056258D), ref: 00562F57
              Strings
              • Error while parsing attributes, xrefs: 00562FBE
              • Error while parsing attribute string, xrefs: 00562F83
              • Expected attribute value, xrefs: 00562FA7
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CharNext
              • String ID: Error while parsing attribute string$Error while parsing attributes$Expected attribute value
              • API String ID: 3213498283-2127762582
              • Opcode ID: 3c79db835fef5c28cc6b7f18033362bc7acfe91136cff8877ff7c83105bf9930
              • Instruction ID: f15f76b3cb5d035f3c0b98f077e675bb06877647a5e062226bb377b5075b7a50
              • Opcode Fuzzy Hash: 3c79db835fef5c28cc6b7f18033362bc7acfe91136cff8877ff7c83105bf9930
              • Instruction Fuzzy Hash: AC51C4356006069BC724EF1DD4519B9F7F5FF99351B54806AF984CB390EB358D82C7A0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadCursorW.USER32(00000000,00007F01), ref: 00591172
              • SetCursor.USER32(00000000), ref: 00591179
              • IsWindow.USER32(?), ref: 00591206
              • ShowWindow.USER32(?,00000001), ref: 00591219
              • ReleaseCapture.USER32 ref: 00591290
              • IsWindow.USER32(?), ref: 005912EA
              • ShowWindow.USER32(?,00000001), ref: 005912F9
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Window$CursorShow$CaptureLoadRelease
              • String ID:
              • API String ID: 3716655541-0
              • Opcode ID: d2ecb003081d91a95b9239bfbbc09161beba957c20a760d628282490c0cd26d6
              • Instruction ID: ee8d3c83ac4de5abde61089cb75b91324e237d17e2ad978a42ef539ceca0961e
              • Opcode Fuzzy Hash: d2ecb003081d91a95b9239bfbbc09161beba957c20a760d628282490c0cd26d6
              • Instruction Fuzzy Hash: 9351AF35600A139FEF24EF29D848BB8BBE2BF96300F044569E559C7252CB31EC51CB85
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_GetctypeGetcvtRegister
              • String ID:
              • API String ID: 2755674607-0
              • Opcode ID: 8e8310b43e21cb7e29f84bb3116bdd72d5ceed7223b54cd0224b55f12fa8f1dd
              • Instruction ID: 509e07b71f3e1179c5d221a0006309bcc07ef2d81c64a04250ab75bb8c9bc4ce
              • Opcode Fuzzy Hash: 8e8310b43e21cb7e29f84bb3116bdd72d5ceed7223b54cd0224b55f12fa8f1dd
              • Instruction Fuzzy Hash: 8D510471D00355CFCB11CF18D882A6ABBB4FF55314F148269E885AB292EB30FE81CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _ValidateLocalCookies.LIBCMT ref: 005F292B
              • ___except_validate_context_record.LIBVCRUNTIME ref: 005F2933
              • _ValidateLocalCookies.LIBCMT ref: 005F29C1
              • __IsNonwritableInCurrentImage.LIBCMT ref: 005F29EC
              • _ValidateLocalCookies.LIBCMT ref: 005F2A41
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
              • String ID: csm
              • API String ID: 1170836740-1018135373
              • Opcode ID: 12b36b5d263d2af3ef34b24c4f97cda3e6b26f9a3cf1ae4ca51b8c90fc9b8c47
              • Instruction ID: af9dd9b4695459edceeced7818e43157ad1b9612f104eb67a53d1a75afa2b6e1
              • Opcode Fuzzy Hash: 12b36b5d263d2af3ef34b24c4f97cda3e6b26f9a3cf1ae4ca51b8c90fc9b8c47
              • Instruction Fuzzy Hash: 7641D774A0020D9BCF10DF69C844ABEBFB5BF44324F148165EA149B392D779DA55CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __CxxThrowException@8.LIBVCRUNTIME ref: 0052475D
                • Part of subcall function 005F188D: RaiseException.KERNEL32(?,?,005ECDEB,6F923D37,6F923D37,?,?,?,?,?,?,005ECDEB,6F923D37,00650C00,?,6F923D37), ref: 005F18ED
              • __CxxThrowException@8.LIBVCRUNTIME ref: 0052479C
              • std::locale::_Init.LIBCPMT ref: 0052483A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Exception@8Throw$ExceptionInitRaisestd::locale::_
              • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
              • API String ID: 687216407-1866435925
              • Opcode ID: 561ad570b2552b9b257cc92936e70b2b317f595619a15b0ea810922b4439ab45
              • Instruction ID: d780a3e92b69a5a527f949da69077fdfba5d33a4861842ef633b7332e7e354f2
              • Opcode Fuzzy Hash: 561ad570b2552b9b257cc92936e70b2b317f595619a15b0ea810922b4439ab45
              • Instruction Fuzzy Hash: 753103B1900715ABE304DF14D90AB96BBE4FF41714F04462DE9149BAC0EBBAB818CFD1
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: api-ms-$ext-ms-
              • API String ID: 0-537541572
              • Opcode ID: fc94f55edf81448b0f9bb93c2395637ef575cbf9b949434f1dd3b9332cafb18b
              • Instruction ID: 288abd6d4bb2176f59c60a8104dfe6b68eaaade37962e6c42ffca1e54c4c12ef
              • Opcode Fuzzy Hash: fc94f55edf81448b0f9bb93c2395637ef575cbf9b949434f1dd3b9332cafb18b
              • Instruction Fuzzy Hash: DE21F331AC5625ABCB359B259C60ABB379BBB11770F160311ED0AAB3D0D630EC01C6E0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _wcsrchr
              • String ID: .bat$.cmd$.com$.exe$@&`
              • API String ID: 1752292252-1998130116
              • Opcode ID: 739cf9bbaf90d5236fdc39f831eb3fb87a267ca43dd261d528498f3e81dde2f2
              • Instruction ID: 4120111b3723cde8a8b74467478c84b340e3527ac33435884ba317960898e85f
              • Opcode Fuzzy Hash: 739cf9bbaf90d5236fdc39f831eb3fb87a267ca43dd261d528498f3e81dde2f2
              • Instruction Fuzzy Hash: 71010C27BC471B25A61C151EEC15AB7179EDFC1BB1F26002AF948F76C1DD49DC010194
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetPropW.USER32(?,WndX), ref: 00558400
              • GetPropW.USER32(?,WndX), ref: 00558428
              • CallWindowProcW.USER32(?,?,?,?,?), ref: 00558447
              • SetPropW.USER32(?,WndX,00000000), ref: 00558464
              • DefWindowProcW.USER32(?,?,?,?), ref: 0055848A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Prop$ProcWindow$Call
              • String ID: WndX
              • API String ID: 1029653574-1375107400
              • Opcode ID: 5a3e5af871dc7b918b7b4d5978fc28ff11cbde2dcb2008f0ddfdb69608348e19
              • Instruction ID: 6b236798680129bb4f4d1100b942229c6db569c2077a470b8c7f0970e0e434ce
              • Opcode Fuzzy Hash: 5a3e5af871dc7b918b7b4d5978fc28ff11cbde2dcb2008f0ddfdb69608348e19
              • Instruction Fuzzy Hash: 3F11C332200215ABDB209F44EC48E7FBFA9FF99725F048416FD09A7251CB729C119BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___from_strstr_to_strchr.LIBCMT ref: 005C6596
              • ___from_strstr_to_strchr.LIBCMT ref: 005C65B1
              • ___from_strstr_to_strchr.LIBCMT ref: 005C65C6
              Strings
              • HTTP, xrefs: 005C657B
              • The requested URL returned error: %s, xrefs: 005C65D5
              • The requested URL returned error: %d, xrefs: 005C65F6
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr
              • String ID: HTTP$The requested URL returned error: %d$The requested URL returned error: %s
              • API String ID: 601868998-4174864708
              • Opcode ID: d34a51d82a978986f3e559e0ad1560527a83be0981d2ba715a6c86cc45d43c1a
              • Instruction ID: 4e30e4441d18627b77f3fe88204870dfdaadc345c78eece5ac86fa54c95433e3
              • Opcode Fuzzy Hash: d34a51d82a978986f3e559e0ad1560527a83be0981d2ba715a6c86cc45d43c1a
              • Instruction Fuzzy Hash: 510148366813623ADB1126E46C46BDA7F886F52725F0C0075FA0C59283E688374483F3
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreatePen.GDI32(?,?), ref: 0057C108
              • SelectObject.GDI32(?,00000000), ref: 0057C118
              • GetStockObject.GDI32(00000005), ref: 0057C11E
              • SelectObject.GDI32(?,00000000), ref: 0057C128
              • RoundRect.GDI32(?,?,?,?,?,?,?), ref: 0057C141
              • SelectObject.GDI32(?,00000000), ref: 0057C14B
              • DeleteObject.GDI32(00000000), ref: 0057C14E
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Object$Select$CreateDeleteRectRoundStock
              • String ID:
              • API String ID: 1454345155-0
              • Opcode ID: 475cb618e40445fd4aa45102efe1163555554d306d73b9e38c61804817288116
              • Instruction ID: 5e23c2c03161fc6b39e62f33ce19e2188acac71050176b1b70dab078fba7005f
              • Opcode Fuzzy Hash: 475cb618e40445fd4aa45102efe1163555554d306d73b9e38c61804817288116
              • Instruction Fuzzy Hash: D5115E32C00118BFCB115FA5DC49CAABFBAEF95362B014065F909A7130C7318D61EBA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreatePen.GDI32(?,?), ref: 0057C078
              • SelectObject.GDI32(?,00000000), ref: 0057C088
              • GetStockObject.GDI32(00000005), ref: 0057C08E
              • SelectObject.GDI32(?,00000000), ref: 0057C098
              • Rectangle.GDI32(?,?,?,?,?), ref: 0057C0AB
              • SelectObject.GDI32(?,00000000), ref: 0057C0B5
              • DeleteObject.GDI32(00000000), ref: 0057C0B8
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Object$Select$CreateDeleteRectangleStock
              • String ID:
              • API String ID: 2689421921-0
              • Opcode ID: dd48d383333d5a990f7b6a56f2ff379330ac4d74e54bb8bfe65870a137fd8455
              • Instruction ID: d6623f21646d453c93efe04dcc19b7cc357805ed1daaad9e1f79d59214a76280
              • Opcode Fuzzy Hash: dd48d383333d5a990f7b6a56f2ff379330ac4d74e54bb8bfe65870a137fd8455
              • Instruction Fuzzy Hash: 95012132D00118BFDB115FA5DC49CAABFF9EF95262B014166F909D7130C7718D61DBA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • MultiByteToWideChar.KERNEL32(00000003,00000000,00000000,000000FF,?,00000002,00000000,?,?), ref: 0054ECD5
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ByteCharMultiWide
              • String ID: .ini$Click_Language$Home_Installer$Language$text
              • API String ID: 626452242-539808209
              • Opcode ID: af6322383b7698356f3dc814249e7b86ad226b3e5896170efaf753bfe8281462
              • Instruction ID: cdd40b0bb9ec9f951799085fc2420a113a963b34e238724c10b79b2512c4d5ef
              • Opcode Fuzzy Hash: af6322383b7698356f3dc814249e7b86ad226b3e5896170efaf753bfe8281462
              • Instruction Fuzzy Hash: CFE10471A00258DBDF18DF68CC8ABDEBF76BF85308F108558E405AB2C6D775AA44CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetConsoleCP.KERNEL32(005F96C3,00000000,?), ref: 0060919C
              • __fassign.LIBCMT ref: 0060937B
              • __fassign.LIBCMT ref: 00609398
              • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 006093E0
              • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00609420
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 006094CC
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: FileWrite__fassign$ConsoleErrorLast
              • String ID:
              • API String ID: 4031098158-0
              • Opcode ID: a26ebb983ee30f433448b7ca11b1eb3d87313e2f121478f63812576524397a1e
              • Instruction ID: a612e9d82fe41c6d981830d27e257001e638d685e80534299ca04ee2a310f2f3
              • Opcode Fuzzy Hash: a26ebb983ee30f433448b7ca11b1eb3d87313e2f121478f63812576524397a1e
              • Instruction Fuzzy Hash: 4DD18075D052589FCF19CFE8C8809EEBBB6FF49314F284169E855B7382D6309A46CB60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 006063F8
              • _free.LIBCMT ref: 00606413
              • _free.LIBCMT ref: 0060641E
              • _free.LIBCMT ref: 0060652D
                • Part of subcall function 0060C205: HeapAlloc.KERNEL32(00000008,00521057,00000000,?,0060ADF3,00000001,00000364,00000006,000000FF,?,0055ED42,00639F54,00639F56), ref: 0060C246
              • _free.LIBCMT ref: 00606502
                • Part of subcall function 0060AEA3: HeapFree.KERNEL32(00000000,00000000,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?), ref: 0060AEB9
                • Part of subcall function 0060AEA3: GetLastError.KERNEL32(?,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?,?), ref: 0060AECB
              • _free.LIBCMT ref: 00606523
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$Heap$AllocErrorFreeLast
              • String ID:
              • API String ID: 2104767428-0
              • Opcode ID: dbcd6205ce616250d266f96c2a9140a2b4ee359e30278b0c95fe2b1e51d80feb
              • Instruction ID: 2bb2d574b0801f5b3179dfb2a4bd365b1678ecdd225b72a73c9f354335d333ad
              • Opcode Fuzzy Hash: dbcd6205ce616250d266f96c2a9140a2b4ee359e30278b0c95fe2b1e51d80feb
              • Instruction Fuzzy Hash: 07518A7AA442115BDF1CAFA8D8516FB77E7DF85320F24409EF944DB3C1EA329E128290
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CoCreateGuid.OLE32(?), ref: 00526E82
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 00526FB1
              • WideCharToMultiByte.KERNEL32(00000003,00000000,?,000000FF,?,00000000,00000000,00000000), ref: 005270B5
              Strings
              • %08X-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X, xrefs: 00526EC8
              • GUID, xrefs: 00526FF8
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ByteCharMultiWide$CreateGuid
              • String ID: %08X-%04X-%04x-%02X%02X-%02X%02X%02X%02X%02X%02X$GUID
              • API String ID: 3151152241-3533722326
              • Opcode ID: 38adb256e244402b39410fe6baab7fd111f2fead97ab460db55adf68822f058d
              • Instruction ID: f97809850c2b79259a0f3697563402753a069af1fac64e51d2cbefefb95f2be3
              • Opcode Fuzzy Hash: 38adb256e244402b39410fe6baab7fd111f2fead97ab460db55adf68822f058d
              • Instruction Fuzzy Hash: 1AF138319002698BDF24CF74DC49BADBF76BF8A304F14468CE449AB2C6D775AA85CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___swprintf_l.LIBCMT ref: 005B44DA
                • Part of subcall function 005CD690: getaddrinfo.WS2_32(?,?,?,?), ref: 005CD6AE
                • Part of subcall function 005CD690: freeaddrinfo.WS2_32(?), ref: 005CD79F
              • WSAGetLastError.WS2_32 ref: 005B4502
              • WSAGetLastError.WS2_32 ref: 005B4508
              • EnterCriticalSection.KERNEL32(?), ref: 005B451E
              • LeaveCriticalSection.KERNEL32(00000000), ref: 005B452D
              • LeaveCriticalSection.KERNEL32(00000000), ref: 005B454C
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CriticalSection$ErrorLastLeave$Enter___swprintf_lfreeaddrinfogetaddrinfo
              • String ID:
              • API String ID: 2327269287-0
              • Opcode ID: 425fb474185b3d4374bcd63e88607abc64bc22e088abe681127c86204aa360d4
              • Instruction ID: f87af71eb358087fd13ea44cce407ff4e81bbf93e346537b20f192541f2235a0
              • Opcode Fuzzy Hash: 425fb474185b3d4374bcd63e88607abc64bc22e088abe681127c86204aa360d4
              • Instruction Fuzzy Hash: 79118C715006099BC720DFA9DC85AABBBF9FF88300F500929E94AD7251DB31E9558BA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32(?,?,005F2AFC,005EFE7F), ref: 005F2B13
              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 005F2B21
              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005F2B3A
              • SetLastError.KERNEL32(00000000,?,005F2AFC,005EFE7F), ref: 005F2B8C
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastValue___vcrt_
              • String ID:
              • API String ID: 3852720340-0
              • Opcode ID: 6fc702bf3a550bfc5573820320f265e1d26ce0021bd31120cdfed038cc1bb2fb
              • Instruction ID: b077dc4437ccf7911f0ab1f835a751565040fa33df4195825b8d8c109c03654a
              • Opcode Fuzzy Hash: 6fc702bf3a550bfc5573820320f265e1d26ce0021bd31120cdfed038cc1bb2fb
              • Instruction Fuzzy Hash: 9301B57210DB1B5EA7342B747C899772F45FB727B6B200329FB18851E0EF1948925140
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              • Trying %s..., xrefs: 005C0809
              • Immediate connect fail for %s: %s, xrefs: 005C0A28
              • sa_addr inet_ntop() failed with errno %d: %s, xrefs: 005C07D8
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast$_strncpyclosesockethtons
              • String ID: Trying %s...$Immediate connect fail for %s: %s$sa_addr inet_ntop() failed with errno %d: %s
              • API String ID: 625237673-3338264681
              • Opcode ID: f20bb35cb4a119f7f9462804639663c56081fc627aa120b8a754bb8f1376b996
              • Instruction ID: 2a4fa16e8674294f95f49ee5bb101d4984747875a7b747816251a869e1ba086b
              • Opcode Fuzzy Hash: f20bb35cb4a119f7f9462804639663c56081fc627aa120b8a754bb8f1376b996
              • Instruction Fuzzy Hash: 4491A7719011199FEF20DBA8DC49FEE7BA9FF45310F4401EAF90DA7182D6355E848BA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006030ED
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006031E8
              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006031FD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
              • String ID: %0`$%0`
              • API String ID: 885266447-511922796
              • Opcode ID: 0b2e62f49efa1106ec3f75018b8ea5b3a02f08c48ed33b019c64e2e47129ca9e
              • Instruction ID: cb795e3b8b4f6ba2b4c401be4b40928f29aaeb6a52ae0d62fbd7c46d36249fba
              • Opcode Fuzzy Hash: 0b2e62f49efa1106ec3f75018b8ea5b3a02f08c48ed33b019c64e2e47129ca9e
              • Instruction Fuzzy Hash: BD519171A40219AFCF18CF98CC91AEF7BBBEB89312F148059E955AB391D3319E41CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Getcvt
              • String ID: false$true
              • API String ID: 1921796781-2658103896
              • Opcode ID: 0a0fc3389d37e41455ab91ebd3d11b1555fffa8b785e45f4f3d217c68217eee6
              • Instruction ID: 3d26a7cf11c478eb49976aad58168e4be97b7dc3897aa4c28543069e5c8cffd7
              • Opcode Fuzzy Hash: 0a0fc3389d37e41455ab91ebd3d11b1555fffa8b785e45f4f3d217c68217eee6
              • Instruction Fuzzy Hash: F351C471D003589FDB10DFA4C845BAEFBB8FF49310F04826AE855AB281E775A949CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __CxxThrowException@8.LIBVCRUNTIME ref: 0052475D
                • Part of subcall function 005F188D: RaiseException.KERNEL32(?,?,005ECDEB,6F923D37,6F923D37,?,?,?,?,?,?,005ECDEB,6F923D37,00650C00,?,6F923D37), ref: 005F18ED
              • __CxxThrowException@8.LIBVCRUNTIME ref: 0052479C
              • std::locale::_Init.LIBCPMT ref: 0052483A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Exception@8Throw$ExceptionInitRaisestd::locale::_
              • String ID: ios_base::badbit set$ios_base::failbit set
              • API String ID: 687216407-1240500531
              • Opcode ID: 1878c78b134673434d7d74d1550cf3a64e87c5d5395e9c7816968ff82f033fc2
              • Instruction ID: bf9af2a3d3ffb396de27a43ed779b15c5ce3354f63f6dfdb63f73823de368a64
              • Opcode Fuzzy Hash: 1878c78b134673434d7d74d1550cf3a64e87c5d5395e9c7816968ff82f033fc2
              • Instruction Fuzzy Hash: 345112B1900649AFD704CF58D845BAEBFB8FF4A710F14421DE814AB6C1DB75A904CFA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IsWindow.USER32(?), ref: 005443D5
              • ShowWindow.USER32(?,00000000,?,DOWNLOAD_VERSION), ref: 005443E4
              • PostQuitMessage.USER32(00000000), ref: 005443EC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Window$MessagePostQuitShow
              • String ID: DOWNLOAD_VERSION$TrialVersionName
              • API String ID: 3974996875-515370789
              • Opcode ID: 12123b33a7d157367c990489574d2edf742370f12bf2c43b05fd197db9184ef8
              • Instruction ID: ea4be1d44a3e9e32042102e81fce53fdec7e8a420cae3a44a6099c2e56771d16
              • Opcode Fuzzy Hash: 12123b33a7d157367c990489574d2edf742370f12bf2c43b05fd197db9184ef8
              • Instruction Fuzzy Hash: 34412270A01309ABDB14EF68D90AB9EBFB5FF46B14F10455CE8056B3C2DB75AA408BD1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___from_strstr_to_strchr.LIBCMT ref: 005D808A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr
              • String ID: %s%s%s$8qb$LIST$NLST
              • API String ID: 601868998-695285723
              • Opcode ID: 26c97de7e60e94c8dcc8a9f14918aa5815e7591c1674976144f2d66049a38c4a
              • Instruction ID: 7963847685beea22c653db4b6052b09ea89eda6aecde47bd3317334cd83345b6
              • Opcode Fuzzy Hash: 26c97de7e60e94c8dcc8a9f14918aa5815e7591c1674976144f2d66049a38c4a
              • Instruction Fuzzy Hash: 343145757006156BEB249B28EC09BBB7F5AFF85795F08407AFD08C6342DB22994987E0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • getsockname.WS2_32(?,?,?), ref: 005D6DD4
              • accept.WS2_32(?,?,00000010), ref: 005D6DF0
                • Part of subcall function 005E44D0: ioctlsocket.WS2_32(?,8004667E,?), ref: 005E44EA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: acceptgetsocknameioctlsocket
              • String ID: Connection accepted from server$Error accept()ing server connect$Ij]
              • API String ID: 36920154-1476985251
              • Opcode ID: f0f79d97e232fb9e3326efea8b350d52d3a06e83f087f219b14f9d16cae1bf88
              • Instruction ID: 1814bd3272754ab06c123a6c8398890e74394149f880bd8337d678bf23c989e7
              • Opcode Fuzzy Hash: f0f79d97e232fb9e3326efea8b350d52d3a06e83f087f219b14f9d16cae1bf88
              • Instruction Fuzzy Hash: D031E671A002096BDB10EF68EC46BEEBB68FF49314F50056AFD09A72C2DA31691587E1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 005C0AD4
              • WSAIoctl.WS2_32(?,98000004,00000001,0000000C,00000000,00000000,?,00000000,00000000), ref: 005C0B4D
              • WSAGetLastError.WS2_32 ref: 005C0B57
              Strings
              • Failed to set SO_KEEPALIVE on fd %d, xrefs: 005C0ADF
              • Failed to set SIO_KEEPALIVE_VALS on fd %d: %d, xrefs: 005C0B5F
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorIoctlLastsetsockopt
              • String ID: Failed to set SIO_KEEPALIVE_VALS on fd %d: %d$Failed to set SO_KEEPALIVE on fd %d
              • API String ID: 1819429192-277924715
              • Opcode ID: a3d39205d8f87cbb1a13d6e3401f0c0a9d91ecb6a0a33c86bcd64a4cb61894be
              • Instruction ID: c840d683f3af6a7cb8efcf1e84bdbaa28efc033c0c9cee4a15a804206ecda2aa
              • Opcode Fuzzy Hash: a3d39205d8f87cbb1a13d6e3401f0c0a9d91ecb6a0a33c86bcd64a4cb61894be
              • Instruction Fuzzy Hash: 1E21B671E40209AFEB10DFA49C06FFE7BB9EB95700F10016EF905FA1C0DA746A058B91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • EnterCriticalSection.KERNEL32(00656968,?,?,00524AA9,006578D0,00620570,00000000,00000000), ref: 005EE683
              • LeaveCriticalSection.KERNEL32(00656968,?,?,00524AA9,006578D0,00620570,00000000,00000000), ref: 005EE6B6
              • SetEvent.KERNEL32(00000000,00524AA9,006578D0,00620570,00000000,00000000), ref: 005EE744
              • ResetEvent.KERNEL32 ref: 005EE750
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CriticalEventSection$EnterLeaveReset
              • String ID: hie
              • API String ID: 3553466030-811730611
              • Opcode ID: cb005d1a57fea30cbac5e339a9f4e8a67745cfb5adefce4197bb7200877e1b8b
              • Instruction ID: 7aec1a12d5637771de78cb8fa78559e7fe89d89948c8dfb252685708a1ec3d59
              • Opcode Fuzzy Hash: cb005d1a57fea30cbac5e339a9f4e8a67745cfb5adefce4197bb7200877e1b8b
              • Instruction Fuzzy Hash: 1F018F35A05B60DBCB04DF18FD589957BAAFB49303B112069F906DB370CB305981CB94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetWindowDC.USER32(00000000,?), ref: 00546724
                • Part of subcall function 005F41FD: _free.LIBCMT ref: 005F4210
              • SelectObject.GDI32(00000000,00000000), ref: 00546736
              • GetTextExtentPointW.GDI32(00000000,?,00000000,?), ref: 00546755
              • DeleteObject.GDI32(00000000), ref: 0054675C
              • ReleaseDC.USER32(00000000,00000000), ref: 00546766
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Object$DeleteExtentPointReleaseSelectTextWindow_free
              • String ID:
              • API String ID: 1134633668-0
              • Opcode ID: 351162aebbc5cdddf64e35763693ce8f0408bf1546b5c8f66217d8bb8fe50052
              • Instruction ID: efd82a24a65f83640d2719c83047836ff3f0455b83c06d40566cc3c99a1f1df2
              • Opcode Fuzzy Hash: 351162aebbc5cdddf64e35763693ce8f0408bf1546b5c8f66217d8bb8fe50052
              • Instruction Fuzzy Hash: 10814A71A002099FCB14DF68CC85BEEBBB6FF89318F144229E805D7251EB34AE54CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr$_strstr
              • String ID:
              • API String ID: 2668852316-0
              • Opcode ID: 1cae599173c279a86436aced15bb35c7bef3e475809c73cb58c53fb7be52a602
              • Instruction ID: c3479ff8ce4fcfe462215e7abdca3feefc3652b8d3d8131c70edb3328486c1ec
              • Opcode Fuzzy Hash: 1cae599173c279a86436aced15bb35c7bef3e475809c73cb58c53fb7be52a602
              • Instruction Fuzzy Hash: A8514675904386AEEB324AE89C49F763FE5BF51344F1C04BCE98846243EE759946C362
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFileType.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?,?,00602833,00000000,?), ref: 006025CC
              • GetFileInformationByHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00602833,00000000), ref: 00602626
              • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00602833,00000000,?,?,00000000,?,?), ref: 006026B4
              • __dosmaperr.LIBCMT ref: 006026BB
              • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,00602833), ref: 006026F8
                • Part of subcall function 006029AE: __dosmaperr.LIBCMT ref: 006029F2
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: File__dosmaperr$ErrorHandleInformationLastNamedPeekPipeType
              • String ID:
              • API String ID: 1206951868-0
              • Opcode ID: b07ca24825a635c5eec9eb4e66f8a6aa10c4c9567f83d49117592d0af557ae92
              • Instruction ID: 7dbbd6922f40cff5f7d136a6a3d33255024ebffc276473d6052cb1bbc1479c28
              • Opcode Fuzzy Hash: b07ca24825a635c5eec9eb4e66f8a6aa10c4c9567f83d49117592d0af557ae92
              • Instruction Fuzzy Hash: B3416D71950205AFCB29DFB5DC599ABBBFAEF88300B10492DF856D3650EB31A845CB60
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 006067AB
              • _free.LIBCMT ref: 006067CB
              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0060682C
              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0060683E
              • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 0060684B
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: __crt_fast_encode_pointer$_free
              • String ID:
              • API String ID: 366466260-0
              • Opcode ID: 82cb21e4c185ae25ebdd5cc026658db8b980b193cbd07a0985a7713f59876546
              • Instruction ID: adfe3d3006bb335383361a86177f3dbd0e6c94b4e4f861d6cf37bb4b2a01fe61
              • Opcode Fuzzy Hash: 82cb21e4c185ae25ebdd5cc026658db8b980b193cbd07a0985a7713f59876546
              • Instruction Fuzzy Hash: 2341B176A402049BCB18DF68C881A9EB7F7EF89714F1584ACE615EB381DB31ED11CB80
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 0052E404
              • std::_Lockit::_Lockit.LIBCPMT ref: 0052E424
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0052E444
              • std::_Facet_Register.LIBCPMT ref: 0052E508
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0052E520
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
              • String ID:
              • API String ID: 459529453-0
              • Opcode ID: ff27c3f237f6ecce03f64bb7c7b2fc621b28365c2e84a5ecc23e79ad96590fdf
              • Instruction ID: d9dbc8f8e8cd77eb3d5f3ac1e77118f7feba8936cf6d070df4b367efc9da2aff
              • Opcode Fuzzy Hash: ff27c3f237f6ecce03f64bb7c7b2fc621b28365c2e84a5ecc23e79ad96590fdf
              • Instruction Fuzzy Hash: 3941FE71A002248BCB14DF44E886BAEBFB5FF41714F24415DE845AB381EB71AE41CBD1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • std::_Lockit::_Lockit.LIBCPMT ref: 0052E2BD
              • std::_Lockit::_Lockit.LIBCPMT ref: 0052E2DD
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0052E2FD
              • std::_Facet_Register.LIBCPMT ref: 0052E39B
              • std::_Lockit::~_Lockit.LIBCPMT ref: 0052E3B3
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
              • String ID:
              • API String ID: 459529453-0
              • Opcode ID: d19cff7a3fd459113d1b59fa461d0d89bb798a4eaefc2d29b7d0e13821fca024
              • Instruction ID: f50cb1acfb496a1532a390f7b3d84689c236778e4d167be2e546f471e72e8629
              • Opcode Fuzzy Hash: d19cff7a3fd459113d1b59fa461d0d89bb798a4eaefc2d29b7d0e13821fca024
              • Instruction Fuzzy Hash: 2741FF31A04261DFCB15DF58E886BAABFB5FF65311F14886DE8469B281DB30BD01CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 00590AA6
              • GetLocalTime.KERNEL32(?), ref: 00590AE7
              • SendMessageW.USER32(00000000,00001002,00000000,?), ref: 00590B00
              • ShowWindow.USER32(00000000,00000004), ref: 00590B0B
              • SetFocus.USER32(00000000), ref: 00590B14
                • Part of subcall function 00590B30: IntersectRect.USER32(?,?,?), ref: 00590BAB
                • Part of subcall function 00557EC0: GetClassInfoExW.USER32(00000000,00000000), ref: 00557F0C
                • Part of subcall function 00557EC0: GetClassInfoExW.USER32(00520000,00000000), ref: 00557F2C
                • Part of subcall function 00557EC0: RegisterClassExW.USER32(00000030), ref: 00557F69
                • Part of subcall function 00557EC0: GetLastError.KERNEL32 ref: 00557F74
                • Part of subcall function 00557EC0: LoadCursorW.USER32 ref: 00557FE2
                • Part of subcall function 00557EC0: RegisterClassW.USER32(00000000), ref: 0055800D
                • Part of subcall function 00557EC0: GetLastError.KERNEL32(?,?,?,00000000,00007F00), ref: 00558018
                • Part of subcall function 0055D430: SelectObject.GDI32(?,00000000), ref: 0055D4B1
                • Part of subcall function 0055D430: GetTextMetricsW.GDI32(?,00000000), ref: 0055D4C5
                • Part of subcall function 0055D430: SelectObject.GDI32(?,00000000), ref: 0055D4D5
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Class$ErrorInfoLastMessageObjectRegisterSelectSend$CursorFocusIntersectLoadLocalMetricsRectShowTextTimeWindow
              • String ID:
              • API String ID: 190525129-0
              • Opcode ID: 00284f04dd1f35bcd1d855aad7f09547a543c9e8ec64e7749d183e9424ff640e
              • Instruction ID: f02b585a33417e01579ab90befdb9c718682a29a87042b9910389650dc8cf705
              • Opcode Fuzzy Hash: 00284f04dd1f35bcd1d855aad7f09547a543c9e8ec64e7749d183e9424ff640e
              • Instruction Fuzzy Hash: 6F31AC75600205AFDB24DF64CD49F69BBB6FF99300F0041A8F509AB6A1CB71ACA1CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 0055E350: _wcschr.LIBVCRUNTIME ref: 0055E36B
              • SetBkMode.GDI32(00000000,00000001), ref: 0057C1DC
              • SetTextColor.GDI32(?,00000000), ref: 0057C206
              • SelectObject.GDI32(?,00000000), ref: 0057C221
              • DrawTextW.USER32(?,?,000000FF,?,?), ref: 0057C23F
              • SelectObject.GDI32(?,00000000), ref: 0057C247
                • Part of subcall function 005F41FD: _free.LIBCMT ref: 005F4210
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ObjectSelectText$ColorDrawMode_free_wcschr
              • String ID:
              • API String ID: 667260486-0
              • Opcode ID: ef2e0890050a94800d6e60ed2cae84f1a08f6f99000da9e404a4410b51f77630
              • Instruction ID: 6c43c7665fd057e9767edb635fc2ff5fb3cb54ad830db063805f4f5f977df63c
              • Opcode Fuzzy Hash: ef2e0890050a94800d6e60ed2cae84f1a08f6f99000da9e404a4410b51f77630
              • Instruction Fuzzy Hash: AD317F769001299BDF24DF64CC85AEEB7B9BF58210F00819AF949E3281DE305E858FA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateThread.KERNEL32(00000000,00000000,00528910,00000000,00000000,00000000), ref: 00528994
              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005289CC
                • Part of subcall function 0055E740: GetWindowLongW.USER32(?,000000F0), ref: 0055E752
                • Part of subcall function 0055E740: GetParent.USER32(?), ref: 0055E765
                • Part of subcall function 0055E740: GetParent.USER32(?), ref: 0055E7F5
              • TranslateMessage.USER32(?), ref: 005289E2
              • DispatchMessageW.USER32(?), ref: 005289E8
              • CloseHandle.KERNEL32(00000000), ref: 005289FD
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Message$Parent$CloseCreateDispatchHandleLongPeekThreadTranslateWindow
              • String ID:
              • API String ID: 3191479290-0
              • Opcode ID: 2cf5166da0e516f27b738a5fcb5a9d2e29749cb5fa54b6826fac07e6a209cd4e
              • Instruction ID: 7135a2b7b7ddc69165ec2ecce13dc5ee6fe7314e43f47356b5b5c8dc1740d65a
              • Opcode Fuzzy Hash: 2cf5166da0e516f27b738a5fcb5a9d2e29749cb5fa54b6826fac07e6a209cd4e
              • Instruction Fuzzy Hash: 5011E771A45318AADF20DBA0AC56FF97BE9BB1A700F041055E904BB1D1DE60E844CB64
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • _free.LIBCMT ref: 00612F52
                • Part of subcall function 0060AEA3: HeapFree.KERNEL32(00000000,00000000,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?), ref: 0060AEB9
                • Part of subcall function 0060AEA3: GetLastError.KERNEL32(?,?,006131DE,?,00000000,?,00654B9C,?,00613483,?,00000007,?,?,0061383A,?,?), ref: 0060AECB
              • _free.LIBCMT ref: 00612F64
              • _free.LIBCMT ref: 00612F76
              • _free.LIBCMT ref: 00612F88
              • _free.LIBCMT ref: 00612F9A
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _free$ErrorFreeHeapLast
              • String ID:
              • API String ID: 776569668-0
              • Opcode ID: 85c03b12f3a6b728511756bf2fca6193dd1cb07a48bc5a9a0008f10b40eae71a
              • Instruction ID: 779d40474f3bd91d0da6930674df0c9599d7efc4465cbd496dd4dda4ae62d125
              • Opcode Fuzzy Hash: 85c03b12f3a6b728511756bf2fca6193dd1cb07a48bc5a9a0008f10b40eae71a
              • Instruction Fuzzy Hash: 90F0AF72188702ABC764EBA5F885DD777FBAA64351B580848F058DB240CF30FCC09A94
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • CreateMutexW.KERNEL32(00000000,00000001,00000008,?,?,?), ref: 00554D22
              • GetLastError.KERNEL32(?,00000021,00000000), ref: 00554D66
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CreateErrorLastMutex
              • String ID: InstallerName$list<T> too long
              • API String ID: 1925916568-3642140868
              • Opcode ID: 9ce73828e9954910fd61a229e5d672c5f5ebd30dcab06c03c797ed43dcf2af16
              • Instruction ID: 3b5d6e6552663a89a35220e009990eadbfa17bb96f5a3538ef8b4fe4cebbceeb
              • Opcode Fuzzy Hash: 9ce73828e9954910fd61a229e5d672c5f5ebd30dcab06c03c797ed43dcf2af16
              • Instruction Fuzzy Hash: 39A1CF71A102049FCB24DF68D89ABADBBBAFF49305F144519E845EB791D730A988CF90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SendMessageW.USER32(?,00000112,0000F020,00000000), ref: 00538077
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: MessageSend
              • String ID: Click_Min$Downloading$Installing
              • API String ID: 3850602802-1326491023
              • Opcode ID: 7a3632708471c83b8e2035332f2b6ffb5b8d25bec05e401c6982efae05707cc5
              • Instruction ID: 66583c4a05b6bf78d266b6c303b16bf5cef655ef3ea2cea3986f8f66c964b2b3
              • Opcode Fuzzy Hash: 7a3632708471c83b8e2035332f2b6ffb5b8d25bec05e401c6982efae05707cc5
              • Instruction Fuzzy Hash: D671B371E002499FDF08DFA4D98AB9EBFB5BF85300F208519F515AB396DB74AA04CB50
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___swprintf_l
              • String ID: %ld$.%ld
              • API String ID: 48624451-3262811310
              • Opcode ID: 1ac6fea46c9b80fcaeae2e0b52df8184dd2429680e8d0d83f7314e069d48b96c
              • Instruction ID: 933451befc4fecb29b8499015341040f9f28cc3744e2a3142c1463fb36c8dc70
              • Opcode Fuzzy Hash: 1ac6fea46c9b80fcaeae2e0b52df8184dd2429680e8d0d83f7314e069d48b96c
              • Instruction Fuzzy Hash: 2E71E27090465E8EEB21CAA8C845BF8BFB1FF49344F1041EAD84DA7281DB349E82DF51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___from_strstr_to_strchr.LIBCMT ref: 005C0E8D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr
              • String ID: %.*s$%sAuthorization: Digest %s$Proxy-
              • API String ID: 601868998-541442569
              • Opcode ID: db0ab5af509bebc1cd77b994a23f80d6a3fdcce27ea43149eab5cac281024860
              • Instruction ID: 04b9d62de44e1678890f3d8326678722b632df994ee7a917023f17e83529beb1
              • Opcode Fuzzy Hash: db0ab5af509bebc1cd77b994a23f80d6a3fdcce27ea43149eab5cac281024860
              • Instruction Fuzzy Hash: D9418471A00209EFDB14DF98DC45BAA7FA9FF48310F1484B9E908D7381E7359D508B91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • LoadCursorW.USER32(00000000,00007F00), ref: 00576F7B
              • SetCursor.USER32(00000000,?,?,00592236,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00576F82
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Cursor$Load
              • String ID: menu$timer
              • API String ID: 1675784387-2593718399
              • Opcode ID: 6f4ee927989751a4b2e3ba470369ef5492b825843087232686be7274b730717e
              • Instruction ID: 383f5310773f13c69cd6189674eb765611f8062465a2551bd30413862b0007dd
              • Opcode Fuzzy Hash: 6f4ee927989751a4b2e3ba470369ef5492b825843087232686be7274b730717e
              • Instruction Fuzzy Hash: 342107323146055BCA20DA9CBC05FADBB95FBA9321F00426BFA49C7181CA62A86197E5
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              • insufficient winsock version to support telnet, xrefs: 005DE3B5
              • WSAStartup failed (%d), xrefs: 005DE36B
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CleanupStartup
              • String ID: WSAStartup failed (%d)$insufficient winsock version to support telnet
              • API String ID: 915672949-1763879679
              • Opcode ID: 4ef9614b44f70ade5f80de618d975ded2602ec41100210acfc5f1dec46612ec4
              • Instruction ID: dea106786acd6a07f18178fa6f6953a3b4afc7fec37939cf28eea6841cb09e91
              • Opcode Fuzzy Hash: 4ef9614b44f70ade5f80de618d975ded2602ec41100210acfc5f1dec46612ec4
              • Instruction Fuzzy Hash: BD01B931A0011C5BDF20EB5CAC17BFD775AEB45305F4004D6EC0A9B281DD346E168795
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • send.WS2_32(?,?,00000003,00000000), ref: 005DEC49
              • WSAGetLastError.WS2_32(?,005DEB2F,?,000000FE,?,?,?,005DF3DA,?,?,?,RCVD,000000FB,?), ref: 005DEC53
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastsend
              • String ID: SENT$Sending data failed (%d)
              • API String ID: 1802528911-3459338696
              • Opcode ID: 4650b81f8d84eb214a8d50b2b1163720d90978701d8ba6303eb7eff3c3d52f7f
              • Instruction ID: 01bf48c23d708bbb92a11769386bdafa93bf690dd90fa5a9408dc3d8552305bc
              • Opcode Fuzzy Hash: 4650b81f8d84eb214a8d50b2b1163720d90978701d8ba6303eb7eff3c3d52f7f
              • Instruction Fuzzy Hash: 96F04632200348BFDB21AF5CEC42DEA3F6DFF55720F048019FD589B252C230A5108BA1
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 005CDD50: GetModuleHandleA.KERNEL32(kernel32,?,00000002,005AC7EF), ref: 005CDD5E
              • GetProcAddress.KERNEL32(00000000,InitSecurityInterfaceA), ref: 005B70B3
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: AddressHandleModuleProc
              • String ID: InitSecurityInterfaceA$secur32.dll$security.dll
              • API String ID: 1646373207-3788156360
              • Opcode ID: 9fe9b0d1139e3107af6643c24e3cd610148bca5a743fa735c8ca667b7eb71052
              • Instruction ID: 10aa455663fd02507158f4a70395b7b9feed7ac38f19babb34398c3f1d8e3068
              • Opcode Fuzzy Hash: 9fe9b0d1139e3107af6643c24e3cd610148bca5a743fa735c8ca667b7eb71052
              • Instruction Fuzzy Hash: 39F065A0745B0B69EB24AB745C1AF562E57B7D4741FC06439B511DA1C2EA78C800CA20
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • EnterCriticalSection.KERNEL32(00656968,?,?,?,005249F6,006578D0,6F923D37,?,?,00619FAA,000000FF), ref: 005EE6CE
              • LeaveCriticalSection.KERNEL32(00656968,?,?,?,005249F6,006578D0,6F923D37,?,?,00619FAA,000000FF), ref: 005EE70B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CriticalSection$EnterLeave
              • String ID: hie
              • API String ID: 3168844106-811730611
              • Opcode ID: 4f21f847882aefff505150034010940334ecbfa8e8fa06c05ff401b5c9f93d8d
              • Instruction ID: 686fe59f097ea2dcccd47a1ff4838a4fbb240a6e0a2c7db3869f7a90d55ec7f0
              • Opcode Fuzzy Hash: 4f21f847882aefff505150034010940334ecbfa8e8fa06c05ff401b5c9f93d8d
              • Instruction Fuzzy Hash: 4FF0A731510281DFC328AF19E845A657FB9FB55732F24022DF9D98B2E0DB301982CB51
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 005EE506
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: __scrt_initialize_thread_safe_statics_platform_specific
              • String ID: csm$hhie
              • API String ID: 3781127973-1032493083
              • Opcode ID: c31ddc3751cde153752b4e1ecff7fa043f408584eeb5f0c4316d49b421a70e0d
              • Instruction ID: 19bf6c592fc15a3380d51e5d770c72e0105b9bb8b9920d34822ea08d01185942
              • Opcode Fuzzy Hash: c31ddc3751cde153752b4e1ecff7fa043f408584eeb5f0c4316d49b421a70e0d
              • Instruction Fuzzy Hash: B7F01C7591028A8FDF08EF99C44AB9D7BB1BF48301F140455F180BB281EB255D009B21
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • PtInRect.USER32(?,?,?), ref: 00586A34
                • Part of subcall function 0055B850: InvalidateRect.USER32(?,00576E25,00000000,00000000,?,00576E25,?), ref: 0055B899
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Rect$Invalidate
              • String ID:
              • API String ID: 2327632943-0
              • Opcode ID: 7fb5a947c2e463eb00896743848d3be3ebe78af1cbaf72a3b086d147252894b0
              • Instruction ID: 148229dbb1447a0e2bc7c9ec72483c3049435313217d4977b6800be0cf7b15c5
              • Opcode Fuzzy Hash: 7fb5a947c2e463eb00896743848d3be3ebe78af1cbaf72a3b086d147252894b0
              • Instruction Fuzzy Hash: AFE13770704B019FD758EF38C595AAABBE6BFD9300F40492DE99AE7250DB31A850CB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___from_strstr_to_strchr.LIBCMT ref: 005BA294
              • ___from_strstr_to_strchr.LIBCMT ref: 005BA2EE
              • ___from_strstr_to_strchr.LIBCMT ref: 005BA31D
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ___from_strstr_to_strchr
              • String ID:
              • API String ID: 601868998-0
              • Opcode ID: ea146facbf076219e5fccf9123546bf07c2d7b2e27f7232ffc10e2a1d72d4212
              • Instruction ID: 3334f32443e7a8c360065ac47e3e8596e6e271abf066c7860d05f9c4e6571053
              • Opcode Fuzzy Hash: ea146facbf076219e5fccf9123546bf07c2d7b2e27f7232ffc10e2a1d72d4212
              • Instruction Fuzzy Hash: 92419F7AE042166BCF259E5898406FDFFE5BF81301F18406DDC4567202E632BE41C7D2
              Uniqueness

              Uniqueness Score: -1.00%

              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID:
              • API String ID:
              • Opcode ID: 11a8abb020b70a73a1c16405bcd6d254553d3c1be30c79a6dbdea9dde916b6d8
              • Instruction ID: 6122c9f48e54a83d7fa5546564dda293ad68d634d60cb1e09391df941c7429a2
              • Opcode Fuzzy Hash: 11a8abb020b70a73a1c16405bcd6d254553d3c1be30c79a6dbdea9dde916b6d8
              • Instruction Fuzzy Hash: B241C772A00749AFD7149F78D846B6EBFEAFF88710F10492AF255DB291D275E9408780
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32(?,00000000,?,005F5049,00000000,?,?,?,005F46C8,?,?,00000000), ref: 0060AC56
              • _free.LIBCMT ref: 0060ACB3
              • _free.LIBCMT ref: 0060ACE9
              • SetLastError.KERNEL32(00000000,00000006,000000FF,?,005F46C8,?,?,00000000), ref: 0060ACF4
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast_free
              • String ID:
              • API String ID: 2283115069-0
              • Opcode ID: d612aaf0da199a6ba28821b25c0409fb6bf844da0c57bd17f9927bf090d8868e
              • Instruction ID: 37244c54c3719865edf9dc856d97e565082ecb6bcc337f599b298b8af259181e
              • Opcode Fuzzy Hash: d612aaf0da199a6ba28821b25c0409fb6bf844da0c57bd17f9927bf090d8868e
              • Instruction Fuzzy Hash: BA1136322C47012BE75D63F49C81DBB332B8BC17F5B2A032CF630862E1DE618C429116
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetLastError.KERNEL32(00639F54,00521057,00654B9C,00602292,0060E7D5,?,0055ED42,00639F54,00639F56,?,?,?,00654B98,?,00521057,00639F54), ref: 0060ADAD
              • _free.LIBCMT ref: 0060AE0A
              • _free.LIBCMT ref: 0060AE40
              • SetLastError.KERNEL32(00000000,00000006,000000FF,?,0055ED42,00639F54,00639F56,?,?,?,00654B98,?,00521057,00639F54,000000FF), ref: 0060AE4B
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast_free
              • String ID:
              • API String ID: 2283115069-0
              • Opcode ID: 5cc0c326a7aa85e1c1d4f53784b1e6f2973e9c9ff2d009193cddb84a3704b145
              • Instruction ID: 4e73286c1859db195c993556760c011abdef679dfdf11371f557b39f80b7f359
              • Opcode Fuzzy Hash: 5cc0c326a7aa85e1c1d4f53784b1e6f2973e9c9ff2d009193cddb84a3704b145
              • Instruction Fuzzy Hash: F71125322C03012AC75C63F59C81EBB335B9BC17F6B2A0338F220C62E1DE608C46A526
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ___BuildCatchObject.LIBVCRUNTIME ref: 005F2E0E
                • Part of subcall function 005F2D5B: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 005F2D8A
                • Part of subcall function 005F2D5B: ___AdjustPointer.LIBCMT ref: 005F2DA5
              • _UnwindNestedFrames.LIBCMT ref: 005F2E23
              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 005F2E34
              • CallCatchBlock.LIBVCRUNTIME ref: 005F2E5C
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
              • String ID:
              • API String ID: 737400349-0
              • Opcode ID: da910bc2c580f10b13586449ddaa19d0b77a4dd07c623ddc97968c1e416a8e4f
              • Instruction ID: d0c22d0447d1a432eac5d19edd6f0f3861896932886a4dc71482728adb58c50e
              • Opcode Fuzzy Hash: da910bc2c580f10b13586449ddaa19d0b77a4dd07c623ddc97968c1e416a8e4f
              • Instruction Fuzzy Hash: E501057210014ABBDF126E96CC4AEEB3F6EFF88754F144018FB1896121C636E9619BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetFullPathNameW.KERNEL32(?,?,00000000,00000000,0060F36A,00000000,?,006175DF,00000000,00000000,0060F36A,?,?,00000000,00000000,00000001), ref: 0060F284
              • GetLastError.KERNEL32(?,006175DF,00000000,00000000,0060F36A,?,?,00000000,00000000,00000001,00000000,00000000,?,0060F36A,00000000,00000104), ref: 0060F28E
              • __dosmaperr.LIBCMT ref: 0060F295
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorFullLastNamePath__dosmaperr
              • String ID:
              • API String ID: 2398240785-0
              • Opcode ID: e5ac046ac961ae070e019dfa661f81c6012f9264de461d92fa91771b368d95b1
              • Instruction ID: d2de54621aef9cf4a49f869f5a06639f7b597e3e89a445fffa7cb39929aab525
              • Opcode Fuzzy Hash: e5ac046ac961ae070e019dfa661f81c6012f9264de461d92fa91771b368d95b1
              • Instruction Fuzzy Hash: C4F06D36244516BBDB345BE2CC0888BFF6BFF453A03118525F918CB9A0C731E9228BD0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetClipBox.GDI32(?,?), ref: 00578EAA
              • CreateRectRgnIndirect.GDI32(?), ref: 00578EB4
              • CreateRectRgnIndirect.GDI32(?), ref: 00578EC1
              • ExtSelectClipRgn.GDI32(?,00000000,00000001), ref: 00578ECE
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ClipCreateIndirectRect$Select
              • String ID:
              • API String ID: 4223180713-0
              • Opcode ID: cdcb1cbeacfb00157bd260feb7eb6bd38b8d9130329f54033a8141178d819185
              • Instruction ID: 25e657ab759c64a7b426e27ee34691c22e8f622348c0c0d07778d8d86b832750
              • Opcode Fuzzy Hash: cdcb1cbeacfb00157bd260feb7eb6bd38b8d9130329f54033a8141178d819185
              • Instruction Fuzzy Hash: DE017171D0434C9BDB00CFA4D9859EEBBBAEF6A300F106256F905AA111EF70ABD48761
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000,?,FFFFFFFF,?,00574C78,?,?), ref: 0057430B
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: FilePointer
              • String ID: xLW$xLW
              • API String ID: 973152223-1815305505
              • Opcode ID: 96b95736e4f9ebb0d123da4745a4f1d2aba59ce70f2452e5a5a937bfd2c668f0
              • Instruction ID: 7b524360c9e01f15de16680ec7b1c1235130294cc2f3f60a36c588072f096f85
              • Opcode Fuzzy Hash: 96b95736e4f9ebb0d123da4745a4f1d2aba59ce70f2452e5a5a937bfd2c668f0
              • Instruction Fuzzy Hash: 2B815470A00616DBCF24DE68D98466DBBF6BF85364B108B69D829973D4E770DE00BF80
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              • select/poll on SSL socket, errno: %d, xrefs: 005D13D1
              • schannel: timed out sending data (bytes sent: %zd), xrefs: 005D13EF
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: schannel: timed out sending data (bytes sent: %zd)$select/poll on SSL socket, errno: %d
              • API String ID: 0-3891197721
              • Opcode ID: 51230e6f78ffa9c328c88600b5f053433a0766ed89e44896748d091925556f6c
              • Instruction ID: 2c6306ef626f10548d50496e0deba3369ebfb05f441b7fd7c67cce7bb135d7dc
              • Opcode Fuzzy Hash: 51230e6f78ffa9c328c88600b5f053433a0766ed89e44896748d091925556f6c
              • Instruction Fuzzy Hash: D5818B71A00208AFDB10DF98DC86B9DBBB5FF88314F140566F915EB392D731A851CB54
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • __startOneArgErrorHandling.LIBCMT ref: 006043BD
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorHandling__start
              • String ID: pow
              • API String ID: 3213639722-2276729525
              • Opcode ID: 820f15d0c65afe371d8f18f27860676d02b2aa9a11b97ba4b800680e89cee62f
              • Instruction ID: 3c93675cdc584da984eef512e4536f7a30f20270dce2b748e215f1f9a5f831e0
              • Opcode Fuzzy Hash: 820f15d0c65afe371d8f18f27860676d02b2aa9a11b97ba4b800680e89cee62f
              • Instruction Fuzzy Hash: 1451CFA0A4910296CB2D7714C9523FB67D3EF42740F289D5DE3D1893E8EF308DD19A86
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: %s$Connection #%ld to host %s left intact
              • API String ID: 0-118628944
              • Opcode ID: 5e6612d03bb8a4601a5ef74264617729ec653033417362728ea3baaf3f0d2585
              • Instruction ID: a94bd646da314b1bf3a820903677a2168edaf51e13791b9bf9ab341bd75afe52
              • Opcode Fuzzy Hash: 5e6612d03bb8a4601a5ef74264617729ec653033417362728ea3baaf3f0d2585
              • Instruction Fuzzy Hash: FC71E170A00705AFEB24DF24D889BEFBFE4BF05308F045569E95A52192DB747D98CB81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Rect
              • String ID: itemclick
              • API String ID: 400858303-803468992
              • Opcode ID: d22c1a552d65847a8ac3caa95fe5ecd238ec3e277c893cbcbd97de37b2c227ee
              • Instruction ID: 3ad9b808800c4a9f194285119e1125d072fb06b8a75f28ad3125631a044a4785
              • Opcode Fuzzy Hash: d22c1a552d65847a8ac3caa95fe5ecd238ec3e277c893cbcbd97de37b2c227ee
              • Instruction Fuzzy Hash: DA518F713006024BCE24EF2CC858BB97BA5FF95712F04496AE58ADB351DF62AC11CB95
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _wcschr
              • String ID: ,we
              • API String ID: 2691759472-2477792368
              • Opcode ID: 0003343b5bab886f1ca22bc98c6ca9509514fa99544825574bde8f6ac86123e2
              • Instruction ID: 41d238b2ae7efd8760a42e3685c852ddb557bff003a9d05a5e643672682c0171
              • Opcode Fuzzy Hash: 0003343b5bab886f1ca22bc98c6ca9509514fa99544825574bde8f6ac86123e2
              • Instruction Fuzzy Hash: 1251F435A003158BCF28DF28C856BBA7BB4BF45301F4505AAED4997240FB30EF498B81
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 00611D96: GetOEMCP.KERNEL32(00000000,0061200C,00000000,?,005F46C8,005F46C8,?,?,00000000), ref: 00611DC1
              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00612053,?,00000000,00000000,?,?,?,?,?,005F46C8), ref: 0061225B
              • GetCPInfo.KERNEL32(00000000,S a,?,?,00612053,?,00000000,00000000,?,?,?,?,?,005F46C8,?,?), ref: 0061229D
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CodeInfoPageValid
              • String ID: S a
              • API String ID: 546120528-1049246871
              • Opcode ID: 5a4310bf2a1775c523407dc8a2b64e0c62c0a687a2403e82de09fb9ad2f82665
              • Instruction ID: 77a8a2e54739d3201dbeadea53c452f12d35fd021f642df25bd7b4a99c4dc64e
              • Opcode Fuzzy Hash: 5a4310bf2a1775c523407dc8a2b64e0c62c0a687a2403e82de09fb9ad2f82665
              • Instruction Fuzzy Hash: 24512770A003469EDB21CF75C8616FFBBE6EF52300F1C456ED0A68B251D6789AD6CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • IntersectRect.USER32(?,?,?), ref: 0056A13E
              • IntersectRect.USER32(?,?,?), ref: 0056A18E
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: IntersectRect
              • String ID: Container
              • API String ID: 481094312-1163095736
              • Opcode ID: 29729919d61c7be3b0e8a971a1720d0a01cb4236be0ea89ab9c022cc73a8ac7e
              • Instruction ID: b49d342a1f4d1a0a81a9c0564c0f2badc981cf54a127a827f9999538dec2a5e4
              • Opcode Fuzzy Hash: 29729919d61c7be3b0e8a971a1720d0a01cb4236be0ea89ab9c022cc73a8ac7e
              • Instruction Fuzzy Hash: 465149317046028FC754DF6CD890AAAB7E5BF9D300F144669E999DB361EB30ED44CB82
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetParent.USER32(0000000B), ref: 00524E9A
              • DestroyWindow.USER32(00000000), ref: 00524EA1
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: DestroyParentWindow
              • String ID: UILoginFrame
              • API String ID: 2708952246-833703720
              • Opcode ID: 062efa5cc5151d2ea6f403c98eda3436fd39167dab12f752b6c47f3d5e927016
              • Instruction ID: cc1e8351b9e41cc581e222dd19040d92425fe0066a4cab750b352bc2b1012e96
              • Opcode Fuzzy Hash: 062efa5cc5151d2ea6f403c98eda3436fd39167dab12f752b6c47f3d5e927016
              • Instruction Fuzzy Hash: 81519FB1120A408BD7288B34DC9D7AABB96FF85305F544A0CE1AAC76E1E779B5448F44
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,005D72B0,?,?,?,?), ref: 005D708F
              Strings
              • FTP response aborted due to select/poll error: %d, xrefs: 005D7096
              • FTP response timeout, xrefs: 005D70B2
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLast
              • String ID: FTP response aborted due to select/poll error: %d$FTP response timeout
              • API String ID: 1452528299-4057338436
              • Opcode ID: b6736ef5ac141f7d30a248133da16acb962ae879efb0e3cb95770083249c6cfe
              • Instruction ID: 65c8ba88b8e9f41adaf68166d00f65493e32ef8f943143b8de7aca597de84c94
              • Opcode Fuzzy Hash: b6736ef5ac141f7d30a248133da16acb962ae879efb0e3cb95770083249c6cfe
              • Instruction Fuzzy Hash: 8C41F271A0420A9BDF309F5DEC49AAEBFA5FB88315F0001BBE81897391E7318D11CB91
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: Rect
              • String ID: itemclick
              • API String ID: 400858303-803468992
              • Opcode ID: 515dfafcb685c8a0268bee5ff87f0cb0173d652aafa99f118f678a373f618567
              • Instruction ID: 4dfcc448aeaf4913a77433d499854eab7e9d3f1d3bf3ffbb5a5ed20f762ba5ab
              • Opcode Fuzzy Hash: 515dfafcb685c8a0268bee5ff87f0cb0173d652aafa99f118f678a373f618567
              • Instruction Fuzzy Hash: 6941F4313006028FCA30DF68C854FA9BBE5FF95711F14462AE556EB290DB62FC11CB96
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetTimeZoneInformation.KERNEL32(?,00639F54,00000000,6F923D37), ref: 00528AB6
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: InformationTimeZone
              • String ID: %02d:%02d$GMT
              • API String ID: 565725191-3921161529
              • Opcode ID: 8dacff215522a012b0f86e9fa287faa81c53544c444935a7729294d3f28adb06
              • Instruction ID: 294e2a8a5e453377156789fb9f01a5f15490ae2f70df3411b3b2200bcc1087a0
              • Opcode Fuzzy Hash: 8dacff215522a012b0f86e9fa287faa81c53544c444935a7729294d3f28adb06
              • Instruction Fuzzy Hash: 9941D875A002189FDB14DF58DD457AEBBF9FF89310F44425AE805B7280DB746E448BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 005441BA
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ExecuteShell
              • String ID: LinkBuyNow$open
              • API String ID: 587946157-4084998229
              • Opcode ID: 2f7c0b3daaa0e0649f721f8b54b1975b0eaf40fba7aec3fc897140c677a09161
              • Instruction ID: 06038cad29399050abc26077dfd68408b682197755d0a209fb56b21c72bac976
              • Opcode Fuzzy Hash: 2f7c0b3daaa0e0649f721f8b54b1975b0eaf40fba7aec3fc897140c677a09161
              • Instruction Fuzzy Hash: BD313971A40348AFDB14DF64DC46BAEBBB5FB49B14F108229F815AB7C0DB74A940CB90
              Uniqueness

              Uniqueness Score: -1.00%

              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID:
              • String ID: %02x$APOP %s %s
              • API String ID: 0-177642706
              • Opcode ID: bb71da095de298a7168fb43d6b7f0361f4440eedc75e5b1dfb508959e260628f
              • Instruction ID: f92d7bcfb8d7af10e794f0a266e94a8bdb04d881dd3757fb816c45041aa076d7
              • Opcode Fuzzy Hash: bb71da095de298a7168fb43d6b7f0361f4440eedc75e5b1dfb508959e260628f
              • Instruction Fuzzy Hash: 39312B31A002056BDB24EFA89C46BFE7B69FF85304F8405A6FC495B243DA315A0547A0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: _strstr
              • String ID: ;type=
              • API String ID: 2882301372-3507045495
              • Opcode ID: 819f02be0fc0f6b27b9289d0169c416914f72778d163a0d5cafe8c0f44c4b1ba
              • Instruction ID: acce9c86052a1f4e98f158fd4760ca1b928efc00cf56972029c0f6a1a0598735
              • Opcode Fuzzy Hash: 819f02be0fc0f6b27b9289d0169c416914f72778d163a0d5cafe8c0f44c4b1ba
              • Instruction Fuzzy Hash: C931E5B16006469EDB209F2CF854792BFE1BF46328F04057BD89D4B382D376A5568BA2
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: CountFocusTick
              • String ID: killfocus
              • API String ID: 3897604831-1616503811
              • Opcode ID: d72e58526fd2e5dedcc5171f6531342c85c108c07c8d64889dfb78075101bdde
              • Instruction ID: 6fa06bf9924ffe6c262d203bfcc431ca90d0b86c981c602103a51342bb012962
              • Opcode Fuzzy Hash: d72e58526fd2e5dedcc5171f6531342c85c108c07c8d64889dfb78075101bdde
              • Instruction Fuzzy Hash: CE317130A007459FD721CB74C854BEEBFF1BF99704F14455EE85A6B291D7B16888CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetWindowLongW.USER32(?,000000F4), ref: 005804E7
              • SendMessageW.USER32(?,0000004E,00000000,?), ref: 0058051A
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: LongMessageSendWindow
              • String ID: textchanged
              • API String ID: 3360111000-1330398090
              • Opcode ID: d5349fa24cbe77abcea4406c868f61cfc1b2042a85336dd31e4b68cf6abc3712
              • Instruction ID: 65a128aa884bb8ed0addf4ead3f8ceefd6243415a7576a8b0d8a9c3cf2d7cc93
              • Opcode Fuzzy Hash: d5349fa24cbe77abcea4406c868f61cfc1b2042a85336dd31e4b68cf6abc3712
              • Instruction Fuzzy Hash: CE11A2327001109FDB10AB58D888F59BFE6FF84321F118272FA0C9B2E1C674E845CB10
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastrecv
              • String ID: Recv failure: %s
              • API String ID: 2514157807-4276829032
              • Opcode ID: 43b34796f4e667234edc794fad7e2cbcf9f221fa663967cb2c37e0eb17fe3fd0
              • Instruction ID: e58692d73330070d5890da8889f15f467fedab3810741eb96843b9b2c66d3b3b
              • Opcode Fuzzy Hash: 43b34796f4e667234edc794fad7e2cbcf9f221fa663967cb2c37e0eb17fe3fd0
              • Instruction Fuzzy Hash: FC119176200209AFDB109F59EC85AEABBACFF89364F104066F908C7250D371E9518BA0
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
              • GetWindowTextLengthW.USER32(?), ref: 00584ED2
              • GetWindowTextW.USER32(?,?,00000001), ref: 00584EEE
                • Part of subcall function 00576D90: IntersectRect.USER32(?,?,?), ref: 00576DFB
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: TextWindow$IntersectLengthRect
              • String ID: textchanged
              • API String ID: 1984522761-1330398090
              • Opcode ID: 0529d50986195a698495ba421fd43bb85c18e69f69bb5deb4d5f5c95decc90d4
              • Instruction ID: 52a2887e90866be9422bbcc7c0b14bfa8f3ecdccd7cd00f16940512dc307bca2
              • Opcode Fuzzy Hash: 0529d50986195a698495ba421fd43bb85c18e69f69bb5deb4d5f5c95decc90d4
              • Instruction Fuzzy Hash: 9E115E30610705AFD724EF64D85AF6A7BF5FB44305F04096DA9465B2A1CB71AD08CB90
              Uniqueness

              Uniqueness Score: -1.00%

              APIs
                • Part of subcall function 005BF3D0: recv.WS2_32(00000104,?,?,00000000), ref: 005BF47F
              • send.WS2_32(?,?,?,00000000), ref: 005BEEC6
              • WSAGetLastError.WS2_32(?,?,?,?,?,?,?,?,?), ref: 005BEEDC
              Strings
              Memory Dump Source
              • Source File: 00000000.00000002.2042894457.0000000000521000.00000020.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
              • Associated: 00000000.00000002.2042877249.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2042995932.0000000000621000.00000002.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043036398.0000000000654000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043186087.0000000000655000.00000008.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043225202.0000000000656000.00000004.00000001.01000000.00000003.sdmpDownload File
              • Associated: 00000000.00000002.2043255365.0000000000658000.00000002.00000001.01000000.00000003.sdmpDownload File
              Joe Sandbox IDA Plugin
              • Snapshot File: hcaresult_0_2_520000_EDownloader.jbxd
              Similarity
              • API ID: ErrorLastrecvsend
              • String ID: Send failure: %s
              • API String ID: 3418755260-857917747
              • Opcode ID: 8ca995dd5fefcea160f9483244eb02ebfeab18f36c4d24b2d8f6ac906388e8d9
              • Instruction ID: acc97a16eb5283dbdf05a71b99b2e43a8c5ad58fd8903408cb15604ead0b7fd8
              • Opcode Fuzzy Hash: 8ca995dd5fefcea160f9483244eb02ebfeab18f36c4d24b2d8f6ac906388e8d9
              • Instruction Fuzzy Hash: AD019E76600115AFDB119F5CEC49ADA7BA8FF59330F050062F90897250C771BC208BE0
              Uniqueness

              Uniqueness Score: -1.00%