Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
GB72405.exe

Overview

General Information

Sample name:GB72405.exe
Analysis ID:1438236
MD5:b13e8f3d2779aa2102e2c3db3b2957d2
SHA1:c15973faef8acbbf35b5b8361d3282bc4f2aaa23
SHA256:c96632658ed3356d4a3615740999a04f70f77a7cf60263be59b3f2ac28e0eec7
Infos:

Detection

Score:29
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

PE file has a writeable .text section
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Entry point lies outside standard sections
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

Analysis Advice

Sample has a GUI, but Joe Sandbox has not found any clickable buttons, likely more UI automation may extend behavior
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64_ra
  • GB72405.exe (PID: 5948 cmdline: "C:\Users\user\Desktop\GB72405.exe" MD5: B13E8F3D2779AA2102E2C3DB3B2957D2)
    • HDFloppyWrite.exe (PID: 7020 cmdline: "C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe" GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN MD5: D0509B5E9ECFB035B20942C012DE19EC)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448850 CryptAcquireContextW,0_2_00448850
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448B40 CryptCreateHash,0_2_00448B40
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00426C76 __EH_prolog3,__CxxThrowException@8,CryptDeriveKey,CryptGenKey,CryptSetKeyParam,0_2_00426C76
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00449150 CryptHashPublicKeyInfo,0_2_00449150
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00449130 CryptGetUserKey,0_2_00449130
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0042721E __EH_prolog3,__CxxThrowException@8,CryptGetKeyParam,CryptSetKeyParam,0_2_0042721E
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0042742C __EH_prolog3,__CxxThrowException@8,CryptSetKeyParam,0_2_0042742C
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0042754F CryptGetKeyParam,__CxxThrowException@8,0_2_0042754F
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004487F0 CryptGenRandom,0_2_004487F0
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448870 CryptReleaseContext,0_2_00448870
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448930 CryptVerifyCertificateSignature,__time64,0_2_00448930
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448AF0 CryptDestroyHash,0_2_00448AF0
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448B60 CryptHashData,0_2_00448B60
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448B00 CryptSetHashParam,0_2_00448B00
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448B20 CryptGetHashParam,0_2_00448B20
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448B80 CryptDestroyKey,0_2_00448B80
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448D60 CryptImportPublicKeyInfo,0_2_00448D60
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448D30 CryptVerifySignatureW,0_2_00448D30
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00448D80 _calloc,_calloc,CryptAcquireContextA,CertSetCRLContextProperty,CryptAcquireCertificatePrivateKey,CertSetCRLContextProperty,0_2_00448D80
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00426F0A __CxxThrowException@8,CryptImportKey,CryptSetKeyParam,0_2_00426F0A
Source: GB72405.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Binary string: d:\DistributionUtility\HDFloppyWrite\HDFloppyWrite\Debug\HDFloppyWrite.pdb( source: HDFloppyWrite.exe
Source: Binary string: d:\DistributionUtility\HDFloppyWrite\HDFloppyWrite\Debug\HDFloppyWrite.pdb source: HDFloppyWrite.exe
Source: GB72405.exeString found in binary or memory: http://www.openssl.org/support/faq.html
Source: GB72405.exeString found in binary or memory: http://www.openssl.org/support/faq.html....................
Source: GB72405.exe, 00000000.00000003.1039843785.00000000007B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pkware.com/
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00426F0A __CxxThrowException@8,CryptImportKey,CryptSetKeyParam,0_2_00426F0A

System Summary

barindex
Source: GB72405.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00418A8E: __CxxThrowException@8,SetFileAttributesW,CreateFileW,DeviceIoControl,CloseHandle,0_2_00418A8E
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004410000_2_00441000
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004224400_2_00422440
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0043F8800_2_0043F880
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004810610_2_00481061
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0043A1D00_2_0043A1D0
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004751E00_2_004751E0
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004461900_2_00446190
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004744200_2_00474420
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004434800_2_00443480
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0047A58E0_2_0047A58E
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004815A30_2_004815A3
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004439700_2_00443970
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00438A760_2_00438A76
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00481AE50_2_00481AE5
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00475B7F0_2_00475B7F
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0046EC870_2_0046EC87
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00482E9C0_2_00482E9C
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00441F400_2_00441F40
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0047BF0F0_2_0047BF0F
Source: C:\Users\user\Desktop\GB72405.exeCode function: String function: 004733A0 appears 32 times
Source: C:\Users\user\Desktop\GB72405.exeCode function: String function: 0047F7CB appears 67 times
Source: C:\Users\user\Desktop\GB72405.exeCode function: String function: 0041B0F2 appears 31 times
Source: C:\Users\user\Desktop\GB72405.exeCode function: String function: 00475180 appears 39 times
Source: C:\Users\user\Desktop\GB72405.exeCode function: String function: 0047F798 appears 235 times
Source: GB72405.exeStatic PE information: Resource name: PKTEXT type: Zip archive data, at least v5.0 to extract, compression method=deflate
Source: GB72405.exe, 00000000.00000002.1615835731.00000000004D2000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePKSFX.exeN vs GB72405.exe
Source: GB72405.exe, 00000000.00000000.1036649689.00000000004CD000.00000008.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePKSFX.exeN vs GB72405.exe
Source: GB72405.exeBinary or memory string: OriginalFilenamePKSFX.exeN vs GB72405.exe
Source: GB72405.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus29.winEXE@3/22@0/0
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004488F0 CertOpenSystemStoreW,0_2_004488F0
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00419044 GetModuleHandleW,GetProcAddress,GetDiskFreeSpaceW,GetProcAddress,GetDiskFreeSpaceA,0_2_00419044
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0043EAB0 FindResourceW,__CxxThrowException@8,SizeofResource,__CxxThrowException@8,LoadResource,__CxxThrowException@8,LockResource,__CxxThrowException@8,__CxxThrowException@8,_wcscat_s,_wcscat_s,_wcsncpy,_wcsncpy,_malloc,_wcsncpy,_malloc,_wcsrchr,0_2_0043EAB0
Source: C:\Users\user\Desktop\GB72405.exeFile created: C:\Users\user\Desktop\GB72405Jump to behavior
Source: C:\Users\user\Desktop\GB72405.exeMutant created: \Sessions\1\BaseNamedObjects\/tmp/..PKText.PKSFX.en_US.MUTEX
Source: C:\Users\user\Desktop\GB72405.exeMutant created: \Sessions\1\BaseNamedObjects\/tmp/..PKText.PKSFX.en_GB.MUTEX
Source: C:\Users\user\Desktop\GB72405.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: GB72405.exeString found in binary or memory: set-addPolicy
Source: GB72405.exeString found in binary or memory: id-cmc-addExtensions
Source: C:\Users\user\Desktop\GB72405.exeFile read: C:\Users\user\Desktop\GB72405.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\GB72405.exe "C:\Users\user\Desktop\GB72405.exe"
Source: C:\Users\user\Desktop\GB72405.exeProcess created: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe "C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe" GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN
Source: C:\Users\user\Desktop\GB72405.exeProcess created: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe "C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe" GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGNJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
Source: GB72405.exeStatic file information: File size 3110227 > 1048576
Source: Binary string: d:\DistributionUtility\HDFloppyWrite\HDFloppyWrite\Debug\HDFloppyWrite.pdb( source: HDFloppyWrite.exe
Source: Binary string: d:\DistributionUtility\HDFloppyWrite\HDFloppyWrite\Debug\HDFloppyWrite.pdb source: HDFloppyWrite.exe
Source: initial sampleStatic PE information: section where entry point is pointing to: .pklstb
Source: HDFloppyWrite.exe.0.drStatic PE information: real checksum: 0x0 should be: 0xa3370
Source: GB72405.exeStatic PE information: real checksum: 0x8e316 should be: 0x2fe4dc
Source: GB72405.exeStatic PE information: section name: .pklstb
Source: GB72405.exeStatic PE information: section name: .relo2
Source: HDFloppyWrite.exe.0.drStatic PE information: section name: .textbss
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_3_007AFA47 push es; iretd 0_3_007AFA52
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_3_007AFA45 push es; retf 0_3_007AFA46
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_3_007B742B push es; ret 0_3_007B742E
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_3_007AF611 push es; ret 0_3_007AFA32
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_3_007BFCB7 pushfd ; ret 0_3_007BFD35
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_3_007BFDCD pushfd ; ret 0_3_007BFE9D
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_3_007B4DC4 pushad ; retf 0_3_007B4EED
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_3_007B719C push es; retf 0_3_007B7286
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_004751C5 push ecx; ret 0_2_004751D8
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0047F870 push ecx; ret 0_2_0047F883
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00416E0B push eax; ret 0_2_00416E12
Source: GB72405.exeStatic PE information: section name: .pklstb entropy: 7.991138007494125
Source: C:\Users\user\Desktop\GB72405.exeFile created: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exeJump to dropped file
Source: C:\Users\user\Desktop\GB72405.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-44669
Source: C:\Users\user\Desktop\GB72405.exeAPI call chain: ExitProcess graph end nodegraph_0-44670
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0046E052 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0046E052
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0048332F GetProcessHeap,RtlAllocateHeap,RtlInterlockedPopEntrySList,VirtualAlloc,RtlInterlockedPopEntrySList,VirtualFree,RtlInterlockedPushEntrySList,0_2_0048332F
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0046E052 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0046E052
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00474302 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00474302
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00471A99 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00471A99
Source: C:\Users\user\Desktop\GB72405.exeProcess created: C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe "C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe" GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGNJump to behavior
Source: GB72405.exeBinary or memory string: %A[open("%1")]open$.^.%0shell\%sshell\%s\commandPROGMAN\/
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_0047E922 cpuid 0_2_0047E922
Source: C:\Users\user\Desktop\GB72405.exeCode function: GetLocaleInfoW,_wcsncpy,_wcsncpy,_wcsncpy,_malloc,_malloc,CreateMutexW,WaitForSingleObject,_malloc,ReleaseMutex,CloseHandle,_memset,WideCharToMultiByte,ReleaseMutex,CloseHandle,_malloc,_wcsrchr,ReleaseMutex,CloseHandle,CreateFileMappingW,GetLastError,ReleaseMutex,CloseHandle,MapViewOfFile,__CxxThrowException@8,_malloc,_wcsrchr,ReleaseMutex,CloseHandle,0_2_0043F880
Source: C:\Users\user\Desktop\GB72405.exeCode function: GetThreadLocale,GetLocaleInfoA,GetACP,0_2_004830DA
Source: C:\Users\user\Desktop\GB72405.exeCode function: GetLocaleInfoA,0_2_0047F0AA
Source: C:\Users\user\Desktop\GB72405.exeQueries volume information: C:\Users\user\Desktop\GB72405.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeQueries volume information: C:\Users\user\Desktop\GB72405.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeQueries volume information: C:\Users\user\Desktop\GB72405.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeQueries volume information: C:\Users\user\Desktop\GB72405.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00473B6B GetSystemTimeAsFileTime,__aulldiv,0_2_00473B6B
Source: C:\Users\user\Desktop\GB72405.exeCode function: 0_2_00483143 GetVersionExA,InterlockedExchange,0_2_00483143
Source: C:\Users\user\Desktop\GB72405.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
12
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network Medium1
Data Encrypted for Impact
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization Scripts1
DLL Side-Loading
12
Process Injection
LSASS Memory2
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
Obfuscated Files or Information
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Install Root Certificate
LSA Secrets35
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1438236 Sample: GB72405.exe Startdate: 08/05/2024 Architecture: WINDOWS Score: 29 13 PE file has a writeable .text section 2->13 6 GB72405.exe 30 2->6         started        process3 file4 11 C:\Users\user\Desktop\...\HDFloppyWrite.exe, PE32 6->11 dropped 9 HDFloppyWrite.exe 6->9         started        process5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
SourceDetectionScannerLabelLink
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe3%ReversingLabs
C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe1%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.pkware.com/GB72405.exe, 00000000.00000003.1039843785.00000000007B2000.00000004.00000020.00020000.00000000.sdmpfalse
    high
    http://www.openssl.org/support/faq.html....................GB72405.exefalse
      high
      http://www.openssl.org/support/faq.htmlGB72405.exefalse
        high
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1438236
        Start date and time:2024-05-08 13:57:30 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 22s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:defaultwindowsinteractivecookbook.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:18
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:GB72405.exe
        Detection:SUS
        Classification:sus29.winEXE@3/22@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 98%
        • Number of executed functions: 105
        • Number of non-executed functions: 139
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, evoke-windowsservices-tas.msedge.net, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
        Category:dropped
        Size (bytes):617472
        Entropy (8bit):5.509625178383621
        Encrypted:false
        SSDEEP:12288:r8gFmR013n1UD3EPPSh5Cr+e+7IumriVDkN:AgFuOn1UDAQIr+tkzGa
        MD5:D0509B5E9ECFB035B20942C012DE19EC
        SHA1:22316B5EFD436411AE0B45E9708953C6D035D622
        SHA-256:1B8649568030B93C83B07DBE8991F3465361ED67EFCCA9D9C6FAA4FF8E2A0D05
        SHA-512:F5FFEDB1476238EFE591B4086F593C9460E96E5859372F0F998E6E6FCE5AD56CDFC8C9206644DBD419C9752B6DE15BB49A9FC38B665556DE53116CE5A204D8F2
        Malicious:false
        Antivirus:
        • Antivirus: ReversingLabs, Detection: 3%
        • Antivirus: Virustotal, Detection: 1%, Browse
        Reputation:low
        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........<.eV].6V].6V].6H.h6E].6H.~6.].6q..6Q].6V].6-].6H.y6.].6H.i6W].6V]j6W].6H.l6W].6RichV].6................PE..L...G..K..........................................@..........................p..................................................P....0..|1...........................^.............................................. ................................textbss.................................text...t........................... ..`.rdata...k...P...l..................@..@.data...<@..........................@....idata...............(..............@....rsrc...|1...0...2...:..............@..@........................................................................................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):1053000
        Entropy (8bit):7.6028349696282715
        Encrypted:false
        SSDEEP:24576:ZJOazTtnZZiN4zcjChQejR+Sl/F2CCxQ9ZuxqEsJG3wh8gX4Q8:ZMmTRS6zcjpejR+CiQ9ZuxqEsJGb
        MD5:81BB9709B9AB1D05A4BF5EECBB4984F1
        SHA1:402B7346E5BCCF96945918FBDD0863D005E0059F
        SHA-256:8AD7AF09DCD186A22A33ECD1BE4CA34386BB557CF1A04931B09D939BE83D5A5C
        SHA-512:0F8C7FA270D8475FA67ECC8481836A91FCB7CD23BC8B703100EDFE1E6A085E979D5699C9CBB711D7CF19ADC0EC302D506ECA08A4C8A508E896C5388EA962165E
        Malicious:false
        Reputation:low
        Preview:H240501#V.... 0202HONEYWELL GB7-2405-001.BIN.....?B.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................D...........]...^.'9'H'H.V .....1.....%..#..}q............g...............................................................z.......".................................................................................................................... .......$..&.............................................................................................................................................................................................................................
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):178
        Entropy (8bit):4.432825491043181
        Encrypted:false
        SSDEEP:3:yjIxnlNkVM8/ShkQll/lv2El+pmstl:yjIxlyVM8/SmQlX3s
        MD5:EE249DE76B373A5AF8865CEC7731F864
        SHA1:2B74DD8B44C27975E62F2AD3787BDAABA7E5B679
        SHA-256:C9CA0C0B7D39702F922AE17603A41F982E306788924683AD87161B9505EA8214
        SHA-512:FB33275DC35623E81613EDC029C286314730D7227F5F82BD7BB9F5A9F366F867111564793E5C11AF04EEC487792D08FCCD9D6B48B109F6D5ABB4F8FD020C57FA
        Malicious:false
        Reputation:low
        Preview:.Y GB7-2405-001.....F.$.......001GB7240500100001.....001GB7240500100002.+}...001GB7240500100003......001GB7240500100004 ......................./t.......... ..................
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):151
        Entropy (8bit):4.060205518188182
        Encrypted:false
        SSDEEP:3:bqxhFUoc7Nt/JxZ+2RIVlLYxT8yHjYvbVWvwvyHSYVJVWvWYwvHmVbVWvCVyn:GhuNNVJxIPu8KYpWvwaHSwbWvWFHmbWf
        MD5:FD5BEA6091D9ABDE5906291263EDFBC2
        SHA1:9DEA0239BA8B4146F0A2BCF6289EBA22B8F854B7
        SHA-256:805FF040C0E70E9C7ADB35D8FFA2B153B344BC28ECA49B28D92FD28C4E3D0FCF
        SHA-512:18FAAEEE4548792C6BE8C36091075B2C6007DFE28CCC35DFEF029FC7CB4ADD78AAD7E209213FAE1964E938BBE3F6A2BD727AB9F888BB06F5720C19264BDAAF93
        Malicious:false
        Reputation:low
        Preview:lbl=300..TDO = 1..B1D=1h,1L,300,1..T1F=12405001.001,t,520..dsn=1..dtn=4..b2d = 0h,0h,000..b2p = 0..b3d = 0h,0h,000..b3p = 0..b4d = 0h,0h,000..b4p = 0..
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):42
        Entropy (8bit):4.382641900003363
        Encrypted:false
        SSDEEP:3:vwRFRPhLM/Gb3n:oR1LsGTn
        MD5:5435A7D48F1F3F7D9B0D8B5D3CA84121
        SHA1:C291E62FBE13B8898FC6180DCE0077040BB7F2AB
        SHA-256:FA807CD27C073523B7277C442CA2E426FCA07B8780DD71C5E0D21029FB39CE1B
        SHA-512:F219EA6E513F96B01A6F446D757AB18C41F6C11670DBCB969165860C2F2466E8D77A85EC4E5A15F5E70E0835FCCEC0047BF840266F168D1BD4D93DB7E4ADA828
        Malicious:false
        Reputation:low
        Preview:..16 May 2024 to ...ni GB7-2405-001.....
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1118
        Entropy (8bit):4.447300075378675
        Encrypted:false
        SSDEEP:24:6NInTWWNiEECIxWP3L0zVFI8JVUzwVpIwsS:6UyeiEEwP70zVvywVyS
        MD5:BF58798DC34E50D6F47906FB5D34C25A
        SHA1:6463E202FB889722A7964E93E46160D40E57426B
        SHA-256:D6881ED64244C1C45A49CAE767DE55299D54137FBEBFE2AC90F7788357126976
        SHA-512:45C6E08DDE0BFE000CFBBEC95391CE1FAFF46286318A905B123D4CC866C124A96E82CF66ED0076E412D54BFAD7FD29DD12E4645C27649A0EAB08435CE92A5D31
        Malicious:false
        Reputation:low
        Preview:GB7-2405-001 DISK_1 16 May 2024 to 13 Jun 2024 copy : 0.. -------------------------------Proprietary Notice--------------------------.. This document and the information disclosed herein are the proprietary data.. of Honeywell Inc. Neither this document nor the information contained herin.. shall be reproduced, used, or disclosed to others without the written.. authorization of Honeywell Inc... ----------------------------------------------------------------------------.. ......................NOTICE - FREEDOM OF INFORMATION ACT..................... ..................(5 USC 552) AND DISCLOSURE OF CONFIDENTIAL................... ......................INFORMATION GENERALLY (18 USC 1905)..................... ----------------------------------------------------------------------------.. This document is being furnished in confidence by Honeywell Inc. The Information.. disclosed herein falls within exemption(b)(4) of 5 USC 552 and the prohibitions.. of 18 USC 1905... -----------------------
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):26654
        Entropy (8bit):7.992122471898091
        Encrypted:true
        SSDEEP:768:AF2I7d6OAl5NAPkF37LT1wBm1ZaDPO6dWMBBE:AF16/l5OPktpKD2iK
        MD5:2C479C23A59ECD32BDFDEF985F03FD4B
        SHA1:8CB78D6F6C2FF64C7606F0FA1BB5DC210A8AC7EE
        SHA-256:5501C761C5820FCE997648FBCE84E6D2C0BB16CF1E0255E641FBBB60C69D03CB
        SHA-512:89FD552B6C3E040F2552B12E063F0A8A1E8E5F47C1D43717BF68F99A1DCAFD75C1392BC723E1E4509972BBB260D88CAA8E75237E377E3F331D85F160324084F4
        Malicious:false
        Reputation:low
        Preview:2.0.0............................U..w.j.....WD<7..xB.GRzz..!.A...L....&...u..=..(fc..Uk$Z..d|..7.m>8.X....J..E.y*G../.p#gl=).`.~U....ub.W........k..M....v.U...=...J.....t...c.h.6...X..x.\.w.p....S.5C..[..j%....... .`....6.....FL..]NF.e.q..0.;ApuI._*d..9..{&..X....Q.R<....T..3i[AI...|,YJ.p|.......&...]...5.q....e...fC..............|.....f....c.s...N.y.B.."..#d..].1.)..."....ZjUMUY).\..(......../.&.v.u.......ro.Mh.1A..X.,YU.$W....a......C...w8.). .l..z..Q.g.bQ.)14.3. JQ.RgR4.x..~..szD.u...f..).........Hs..D}b.5.&q7dT...N6~.Z|............L.....Y.|...G.R.71U..i..$.&p.F..nS.q/.....&A...S.|.!\?w.$.Jb&.....T...~a..................................+.my.....H.1..}F.w:.P.v.d..;BF..S..?.O0nXjYv.O.'P.[..p$*..&........#).....D.X.M.W...g..b.5s. N.i..s......S.1...g4...,..B.@..J.J]../)..j..o.8.e.CM..R.Kp..ZbXn.g. .....BeG.|.-..A..............O.U..Bg...=...x...#...].m....D...O`...f:r82... E..IO..A.Ra....#.m....j;.$..\'ox?.[i...:4i.m.1&Q.Fdh....eM.o.}z.....=..4
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):1053000
        Entropy (8bit):6.439671074685941
        Encrypted:false
        SSDEEP:12288:m7WYot2ahbMb4891fORjil76yds8i1kCCkbmz5+r9r:f3d89xOYhds8i1kCCz+5
        MD5:647CF8DF0311F92492FF3A45D4ED99E7
        SHA1:7A0FEBBAA39056199CC48A56379C31D3A74BEEAA
        SHA-256:C3387F142AE26E9250AA39D000195C3CC8B125EF4F2328C3A8A8DBF387D89194
        SHA-512:B461943AEC9B3CCE7963C7689B2CD4351480E44CCC8D475D71B92BD42DFCB18536B204A16CFD245E03A8422E2E6C07294014E1620EB54DB002243402A7DD368A
        Malicious:false
        Reputation:low
        Preview:D..........5.0.,.5.0B..5.0.'.5......y.....5.@..<..7.0...1.0Tz.5.0...5.0.,.5.0B..5.0.'.5.......y.....5.@?.<..7.0?..1.0Tz.5.0...5.0.,.5.0B..5.0.'.5...........2.0...5..>7...>.L...2.0...5..Rp...y.....5.@..<..7.0...1.0...5.0...5.0!..5..!...y.....5.@..<..7.0...1.0...5.0...5.0!..5..!....y.....5.@?.<..7.0?..1.0...5.0...5.0!..5..!...y.....5.@..<..7.0...1.0...5.0...5.0!..5..!...y.....5.@..<..7.0...1.0...5.0...5.0!..5..!....y.....5.@?.<..7.0?..1.0...5.0...5.0!..5..!...d.(#...2.0!..5...5...._...2.0!..5.......y...5.@..D.......<..7.0...1.0...5..=.....y...5.@..<..7.0...1.0...5..=.....y...5.@?.<..7.0?..1.0...5..=.....y...5.@..<..7.0...1.0...5..=.....y...5.@..<..7.0...1.0...5..=.....y...5.@?.<..7.0?..1.0...5..=....-.%...2.0=..5.0. .5...Y..rQxF...2.0=..5.0.z.5......g.....02.`E6......05.P.b.... 5.Pb..... 5.P.. ... 5.... C.... ......2.03. 5.@.q.005.`5.... ..05..E6.........e.W...2.0.. 5.@LF.005.`.... ..05..E6........Zz.....2.0.. 5.@LF.005.`.... ..05..E6........]......2.0.9...0...7.........
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):151
        Entropy (8bit):4.0673599252176915
        Encrypted:false
        SSDEEP:3:bqxhFUoc7Nt/JxZ+2RIVlLY4IyHjYvbVWvwvyHSYVJVWvWYwvHmVbVWvCVyn:GhuNNVJxIPDIKYpWvwaHSwbWvWFHmbWf
        MD5:843A2A40BA4AEB30857EB61FEB7FC7B4
        SHA1:DACC5EE7552912E7BA3E27A01A9A9A92D250EFEB
        SHA-256:086A7AA1804FFFFBECA7B28D87AFB9DE394B31AF459529F3D31DBC8BCFF77347
        SHA-512:C18F994636D83430CFA78C6A6F2AC5D6628D957A3754F5ED319CA6BB55B6A069AB3CA13D34DCA90E35526428928FDE42589A87C759E2AFC9D4C02A4CA33DD668
        Malicious:false
        Reputation:low
        Preview:lbl=300..TDO = 1..B1D=1h,1L,300,1..T1F=12405001.001,t,520..dsn=2..dtn=4..b2d = 0h,0h,000..b2p = 0..b3d = 0h,0h,000..b3p = 0..b4d = 0h,0h,000..b4p = 0..
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):42
        Entropy (8bit):4.3350228523843155
        Encrypted:false
        SSDEEP:3:vwRFRMh9D7b3n:oRorD7Tn
        MD5:6E1F5D3DF48356738C1AF805427932B2
        SHA1:91FB3AF2B2D6132918251022A4E18D0161ED3148
        SHA-256:BA4E1FD61753E624B0DE8CEF28567439841F92665B8EB4D1D7D09AC8C1F2C6FE
        SHA-512:60531EB32DEEB98E515904DF43089A64F7227C89B87DBECD6E999B5473D148338AE2765056BCAB321CA225E17F61DBEE3B15DB4FC314EEF94DC36813B62C48FD
        Malicious:false
        Reputation:low
        Preview:..16 May 2024 to ..... GB7-2405-001.....
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1118
        Entropy (8bit):4.4469946725251
        Encrypted:false
        SSDEEP:24:TNInTWWNiEECIxWP3L0zVFI8JVUzwVpIwsS:TUyeiEEwP70zVvywVyS
        MD5:F81C607922D69450A42C79C5186C066E
        SHA1:CDAEB1CEA7EA1E5101575DB9E48526AA3347E79B
        SHA-256:A2C2C8B266F3463C0A97A489E368276017288843FE6E67B7B9B7DCC4519360F8
        SHA-512:3593851BA200C6EC5A2571D4140202860F4D28AD159D0170E2382E7388CFE2A5A7AE26FF6C858B1129FC059A6F156A97B02966A0E24789FE08FEECEA8D81F322
        Malicious:false
        Reputation:low
        Preview:GB7-2405-001 DISK_2 16 May 2024 to 13 Jun 2024 copy : 0.. -------------------------------Proprietary Notice--------------------------.. This document and the information disclosed herein are the proprietary data.. of Honeywell Inc. Neither this document nor the information contained herin.. shall be reproduced, used, or disclosed to others without the written.. authorization of Honeywell Inc... ----------------------------------------------------------------------------.. ......................NOTICE - FREEDOM OF INFORMATION ACT..................... ..................(5 USC 552) AND DISCLOSURE OF CONFIDENTIAL................... ......................INFORMATION GENERALLY (18 USC 1905)..................... ----------------------------------------------------------------------------.. This document is being furnished in confidence by Honeywell Inc. The Information.. disclosed herein falls within exemption(b)(4) of 5 USC 552 and the prohibitions.. of 18 USC 1905... -----------------------
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):26296
        Entropy (8bit):7.992987192648561
        Encrypted:true
        SSDEEP:768:/IMKiCBWQDP2kqIXrGs2pnGtg37MgpsKL4U20A:/IJb2WaHpnUA1pdW
        MD5:09AA58F1E2BD3B1C78C3F60B05F1537A
        SHA1:7408DFC7C4299876EFF9D739AD16A74466D4C60B
        SHA-256:17FDF943E96EA2B4AB14A458375F29C428B1A3A44E58157972A9BBB84F2EA55D
        SHA-512:5126DAD53324B54ACC3FD48FC9713C63843349BA3A4ACC85EF1344E6E392E8E577367249B3C7FA8589AC8CDE5794F6D0F5B7226AE86BD78D2FDD52A9AFC11A67
        Malicious:false
        Reputation:low
        Preview:2.0.0...................................#d.f.."...3q.....a~.9.. .#l...._....-..2Q.7:..u.0.....6...Z.W.]...{..,.~Fh...7../.n.v.R......._'.....[!2...B...%\o..V.U....~AH.|.8R=...H......+{./.[|.m..-..D*6(.sN.....{I}.PZ.l.II}.[..R.....;..R..6..{o..*#.C.f~g..]...\o{..p...._f.[).;............&._.........r..C&).Y..xG..1...%ir/...UxI.6.....y|.....&.H.iv._...Yo.....[n...gs.c....A.H.....1.*...mu.}....!..!.fw> SE...g.....J/a....(h=.....7V.P.2...=.}...U.u#.v...:B.....ow.da@.H..6....Z...q..^........o..'B...N..q3.dcE.~.a. $.8[.H.;.J.0.....Y....t.}I........kb.SG.Lw~.5..b......9....P0{...j.k.0,..q.O.......Uw.}.Y.o.:..`...............................E.. .V"....\...'...@.....?.p...+....o.W.Bg.A.`.f.J....Ad.9F.....[..(`.....L^...U.X..Ym.A.....5&...y.7.(A.9%.V.(./|..Mp...H.UPO..%C/...,w...d}....Xv_.i..I...1...h.qL.....:\.a....{.7x...a9&..o@.P...XF.y.t.R.s.v.5.T.Z..oZ@..)@....-/J..P.A.d..<.iB.w...H..... .bCk.+l.H.0...M|...Ee...6...&Wg..a.._is.i[J.1.t.ux^c}...VG.=+..?.
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):1053000
        Entropy (8bit):7.007585228940397
        Encrypted:false
        SSDEEP:12288:x/+cbPvcaNKJqhS43pYhfsFr3Xs9P+bywjuSDs+54xN7gU8V9PP0xQs+fhZ5kTHb:x/+9a3hS432kyw3ENXO10iVcH7epw
        MD5:24FDB638895EE77CEF1273A27F628C82
        SHA1:60C91CB6F705A40F848CA3BFE58C31E8024391B3
        SHA-256:0B133A35E5A0B79B862533BFB2CAF70FCA5C98275F70D123ADA408CF877DBB02
        SHA-512:1B9FB9BB06ABE1C2227A113B5F257848EA42C311820D3F79B5638CE0B51163C0B0E51C5A92BDADCD94A708DA17D9E71E3D63A001F8C466ADCBC06DC3B2915FF6
        Malicious:false
        Reputation:low
        Preview:D........5.@.....5.@..}$...@..>.2......D.AZ.H0m:d*...02.p..q.......05.`........ 5.`....D...5.@.....5.@..}$...@..>.2......D.BZ.H0m:d*...02.p..q.......05.`........ 5.`....D...5.@.....5.@..}$...@..>.2......D..X.8P<4M.....2.@..H..5.@...'05.p.....0J!.. 5....0.0...X.8 ..}.....2.@..]..5.@.....5.@....05.p.....0J!.. 5....0.0...X.8H.4.....02.p.....0J!.. 5....0.0......1m:d.... 2.`..0.... 5....q.. ..#..H1m:d.... 2.`..q.. .. 5.`..'.LD...5.@.......@...".2........!..H1m:d.... 2.`..q.. .. 5.`..'.LD...5.@.......@...".2....D..........."..H1m:d.... 2.`..q.. .. 5.`..'.LD...5.@.......@...".2........C..H1m:d)... 2.`..q.. ..05.`........ 5.`....D...5.@.....5.@..}$...@..>.2......D.A..H1m:d)... 2.`..q.. ..05.`........ 5.`....D...5.@.....5.@..}$...@..>.2......D.B..H1m:d)... 2.`..q.. ..05.`........ 5.`....D...5.@.....5.@..}$...@..>.2......D....8P<4M.....2.@..H..5.@...' 5.`.....0.. 5....0.......8 ..}.....2.@..]..5.@.....5.@.... 5.`.....0.. 5....0.......8H.4..... 2.`.....0.. 5....0.....X.....y....
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):151
        Entropy (8bit):4.0673599252176915
        Encrypted:false
        SSDEEP:3:bqxhFUoc7Nt/JxZ+2RIVlLYvvBRwyHjYvbVWvwvyHSYVJVWvWYwvHmVbVWvCVyn:GhuNNVJxIPOBqKYpWvwaHSwbWvWFHmbu
        MD5:55295A6DECEECF4C2F82E6AF89EA160F
        SHA1:29424290877DFFDCD1ADBF733D4269019CEAF9D0
        SHA-256:6B7D1BC9065F694630304F7171E5F5CB6359B6FA86D14B6F47A764D0A2C00695
        SHA-512:B6CD096C394FFBA633C2C10DD28C389AE4BA3D672066265DBDE18C658D9C976BB78FD3CEFE9C8C3B1F03CD4854323899561B3A59F7ACA1AC51E504E2C4B4F767
        Malicious:false
        Reputation:low
        Preview:lbl=300..TDO = 1..B1D=1h,1L,300,1..T1F=12405001.001,t,520..dsn=3..dtn=4..b2d = 0h,0h,000..b2p = 0..b3d = 0h,0h,000..b3p = 0..b4d = 0h,0h,000..b4p = 0..
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):42
        Entropy (8bit):4.43026094762241
        Encrypted:false
        SSDEEP:3:vwRFRNhrFGb3n:oRPr0Tn
        MD5:AC293C6DC875131E0A719D066712F977
        SHA1:69B2C4A67C91FAC3EDBF92F011176897F6D2AC07
        SHA-256:303BFDFD243758937052615A8C02B2963BF21024A770DEDD2965021CABFC8308
        SHA-512:C4C46E1DC1D3018E72379416587C6E17282F4A739809E0E0F3D51720CEA6B321D9F0D1C3E22CC39C1B7C3774E67185030C05122FCB65421D83102190F742FEEB
        Malicious:false
        Reputation:low
        Preview:..16 May 2024 to ..... GB7-2405-001.....
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1118
        Entropy (8bit):4.449400715401569
        Encrypted:false
        SSDEEP:24:0NInTWWNiEECIxWP3L0zVFI8JVUzwVpIwsS:0UyeiEEwP70zVvywVyS
        MD5:332F0079BD0E0AC086D0A2AFFB8C1C14
        SHA1:D86D8F45D411855F78C8C80BA1D1CF40D14D8665
        SHA-256:5A6D7C2FBC164E2AD470E94D94D5257B70783CA674792AD5524C2AB11FBD6AFE
        SHA-512:D3DAC137A302D6539CE1E31FB6483910929258160B55F03ED0F338BEDEE201F5E90024C6E2E1375B0FD8E0857263149E5584B1A5EF5958C4A637C7AC49185CC7
        Malicious:false
        Preview:GB7-2405-001 DISK_3 16 May 2024 to 13 Jun 2024 copy : 0.. -------------------------------Proprietary Notice--------------------------.. This document and the information disclosed herein are the proprietary data.. of Honeywell Inc. Neither this document nor the information contained herin.. shall be reproduced, used, or disclosed to others without the written.. authorization of Honeywell Inc... ----------------------------------------------------------------------------.. ......................NOTICE - FREEDOM OF INFORMATION ACT..................... ..................(5 USC 552) AND DISCLOSURE OF CONFIDENTIAL................... ......................INFORMATION GENERALLY (18 USC 1905)..................... ----------------------------------------------------------------------------.. This document is being furnished in confidence by Honeywell Inc. The Information.. disclosed herein falls within exemption(b)(4) of 5 USC 552 and the prohibitions.. of 18 USC 1905... -----------------------
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):26296
        Entropy (8bit):7.991145685839193
        Encrypted:true
        SSDEEP:768:hViQLn2D4zRRYdkDBOHyrLZrFVQWFsUfKjrwnHM9QxO:mQT2D4zzYwLL9jQWF9fKjcHM9GO
        MD5:613390EF593C9486963AD231268D4721
        SHA1:D748BBFE5C6C57149061808D737B97CDE15EC94D
        SHA-256:784D516AF910DE387DE64225D290C3608DC353BADA5D252325048D8C81097784
        SHA-512:180689DDD9B3D5C893890F3B09C27A63EC6D3F64E4AF7C73DA61082100837D8AB3AAA682BAA9B57705993A8A4EE3A655839126F0E9C6A45B7B7AC4D85E271350
        Malicious:false
        Preview:2.0.0...........................L...........\..|.1.M.X..$.G""Sx.h-`.........l....6#.=..........U......*..XA8F...eJ..nO,.W....G.x...-)..f-.k...-|W....2.%G;.....:8.`....L6..2.2.>...H.q1.Ul.l..............`...?$..Kr...I...~...Tk2k_."E....]`.....Z....8....K.....x...........T.^..De..?...yl....a..8...=..m............N......]...8.fG...$..$.N6.qf".8....p....-P...=..t-....h...3Vx<...}I...?...."...".LN.....y..e..a."#..S.......yR...%.....lD.Q.O.....*....a4..*5.......).!4..[5......Q.'TmQ.... .8.mjW.<o..s.cd`.....W.W}.i.4(...'..".U..8......A........{....hc].zH...Y1G.Y...4..,....P6.E..H3.[...Q.4.Ekm....$..P{ndu.@.,.7l.fv..`..............................;.o@&.u....m...}.Y81....M....7....F..;.4...-..k......BM...Qw.lo.D...U+.w..6.rYuS.j.n.1..p..T81.....~?......iJ^.l).......j<.(.J..8>Aw..{....(.R..jf...~...C......~.9.}.\2.m.t.s..T..U).N..*N..s-i......z....(&>....@j.)h...0`.:.+,0..@~l0.w@..`.^........1...N......7P@.~sx.M3..e..UO.u,...u.=.q..k....B..o.).....\K
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):1052480
        Entropy (8bit):6.90960363208856
        Encrypted:false
        SSDEEP:24576:Cz3BPm1xEd1TF0cV9CH1qTkvimvpAf+A3an4414t+Z:aItckqQKQm+ka4I40
        MD5:0E493DC717260A752C115A46DC35D6B6
        SHA1:8806DA76BF88D673643BB41DC70FF0CB83458B41
        SHA-256:7D0E451E76833009CF0FA2112F493B81B4CEA9A9D462415BB167B21C87FFF7FB
        SHA-512:0840990ED23868BBC72B794205C7E5D2E7586FB28BB4341B21F99426FC95E87EF04CD62021F1EE39C4BB2914787EE97274D55A85CEB7E83169AC53D6713C39D2
        Malicious:false
        Preview:D........,..r......,........-....[...C$.6.[.....dk.!....-.......-........-.......-..9.E...-...qF...-.......}.(..j...t .a ......-.........-...^....-..UU.....-....^....-...8.....-...^....-..r......-..9.^....-.........-...q^....-.......-..r......-........I&........8.....[...<&....[......:..[.........[...!./`4w...I&.........!........8.......8...-....8...ww....8...l.....8...a.....8...UU....8...J.....8...?....8...33....8...(}....8.........8.........8....[....8.........8.........8....8....8........8.D...............8.........8...`....8.......8........8...>....8.......8...}.....8...r.....8...ff....8...[.....8...P.....8...DD....8...9.....8.........8..."" ...8....l!...8....."...8.....#...8....I$...8....%...8.....&...8....'E...8....qF...8.....#......j.&.?%..H.jR&.!...0j.&.[.U.....-.8.........8....^...8...UU../.8.....^./.8....8..0.8...^.0.8...r...1.8...9.^.1.8.......2.8....q^.2.8.....3.8...UU..3.8...J...3.8...?.6.3.8...(}^.3.8......3.8.......3.8....[..3.8...
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):151
        Entropy (8bit):4.080604958330274
        Encrypted:false
        SSDEEP:3:bqxhFUoc7Nt/JxZ+2DeSoLYOTYRyHjYvbVWvwvyHSYVJVWvWYwvHmVbVWvCVyn:GhuNNVJxI135IKYpWvwaHSwbWvWFHmbu
        MD5:F27FC8D933A5F89B09D65046EFF240F5
        SHA1:002AF94078AC5E84801010D7DCB13506321924C3
        SHA-256:EBF15C7B0D86F63AF5984DB68F5219EA1DC4496CF7A211D48F85B3D21FE620F9
        SHA-512:5A468896DDCF25440617C196956FDB0A9AF42D7E8CD6EFAD8EA973F9C76EAC81800B97BF64902E31E65DC5F24B6C9DF9D3076EA25657321D36F49823E695A6ED
        Malicious:false
        Preview:lbl=300..TDO = 1..B1D=1h,1L,300,1..T1F=12405001.001,f,520..dsn=4..dtn=4..b2d = 0h,0h,000..b2p = 0..b3d = 0h,0h,000..b3p = 0..b4d = 0h,0h,000..b4p = 0..
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):42
        Entropy (8bit):4.382641900003363
        Encrypted:false
        SSDEEP:3:vwRFRKh0SIb3n:oRuySITn
        MD5:4FC3011D49E59DED3A1C4E1B6D55568C
        SHA1:C1FF0312A33BA489A9ADE6FA32B468848F011334
        SHA-256:E3C85227E54B8A695D64C0EB547322DF0C25BA7B48BA3D1AB068FFE6BB2542F0
        SHA-512:BA0D62CC983A0137A24AC573B76F10A4FA6340FA728F6DE7A583A92C02CD76FED667AA480FF92322A624560177D96D0D48D5E767941ADADAB650BD63BD3B7282
        Malicious:false
        Preview:..16 May 2024 to ..... GB7-2405-001.....
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1118
        Entropy (8bit):4.44770113174335
        Encrypted:false
        SSDEEP:24:NNInTWWNiEECIxWP3L0zVFI8JVUzwVpIwsS:NUyeiEEwP70zVvywVyS
        MD5:4DEA28C12D74C13C12D1173F30C3487B
        SHA1:B6BFA31854135E2826C5F35BFFE9C7E4C7DFE71E
        SHA-256:E017D37DAB8DCD1C6AFBDEE76DD74F36B47B53C5E228BDAB66DD537B329F9516
        SHA-512:D9F61175834E55C7CB2C06559C3AB37AE2B330EFDAC443FE4CC20CCD7614F73882F1AB513E96F40EB3A7FFD48D7B88E259ADED997A84F18B54423D93831FDD8D
        Malicious:false
        Preview:GB7-2405-001 DISK_4 16 May 2024 to 13 Jun 2024 copy : 0.. -------------------------------Proprietary Notice--------------------------.. This document and the information disclosed herein are the proprietary data.. of Honeywell Inc. Neither this document nor the information contained herin.. shall be reproduced, used, or disclosed to others without the written.. authorization of Honeywell Inc... ----------------------------------------------------------------------------.. ......................NOTICE - FREEDOM OF INFORMATION ACT..................... ..................(5 USC 552) AND DISCLOSURE OF CONFIDENTIAL................... ......................INFORMATION GENERALLY (18 USC 1905)..................... ----------------------------------------------------------------------------.. This document is being furnished in confidence by Honeywell Inc. The Information.. disclosed herein falls within exemption(b)(4) of 5 USC 552 and the prohibitions.. of 18 USC 1905... -----------------------
        Process:C:\Users\user\Desktop\GB72405.exe
        File Type:data
        Category:dropped
        Size (bytes):26296
        Entropy (8bit):7.9929993592679
        Encrypted:true
        SSDEEP:768:xyyOWT+t9x5bFRvTIFXgQEbDiGMV0Jsfde:xy5WT+t9F5TIVGmGMBde
        MD5:021AB084A95561E884AEBB9E8EE5A5E2
        SHA1:88B91114B5E0D5B418F3DFA949BE47DC1ACC4DE1
        SHA-256:9A1D7F71834CDEDF146547E6A31715A5DF2FBA682ED50E947707630FC14E066D
        SHA-512:B1EF4D200D3439C7D46E5499585B9F710BD2B8757FFA83F4C9E23EFCB8D9FBAA5D9FD2CCECAC96B6157C8C42F7A5A929C7D2B08968C5CE05A9D261549D2BD478
        Malicious:false
        Preview:2.0.0...........................J....7..]@.Q......;....aY.g...QY...o.....$..).g..Q2D..a,AG...s.z=/..q".....xukR]...;g....]~Sz%.~....;.0+.OP.1.'..]...u.AX.e&...;..1.W....X.:CK...H+....)....M.D...)t..v..v...%t..-..\.b......c..UhOj.>..a.....E.U..a..0>.F).[.a.y.PAb^hjk.....0..J"..X..Ey......1...+\..z".v. .[!noRb.v...V.:..<.5..c..\..J.r.M..*c.:tz-.D..y..\./......K.w......`.i.V@...x..n.Kmd+...!g.....*!._...X..P.HD8......^..w.."...27h.=..+.2{\a Ju.3]..... ..........`..q.~....6.A.<^.D.^:h...eb'pUT.+!.:.?)...I;.;..../.(ci..H.......?.|...........q$.]|.....H>}Vn. ....G-!H..J.......<.`Bfa.&q,![.?....57 .g.y..`...............................u..&......7.[J$V..6..1....U.@D&k..a.3Y]..,.P....I...6......Py|."....N+.nj+.d..Z.;b.F....;.RUQ..$.....w.v.O."+.Yz.L&...E.k.B....$.".jf..!.r..Ac..|w.T.f.PB#\./.i.:...b.^..P..y.....]f%r-.K.....[...>.N.u..|^..IO..q.>NSq.[.`...+.. .........QU........vh.....8....M.L..l...{.2......h.!@..j..6.9IF.6.HY.....Y..8....
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):7.946658322764787
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:GB72405.exe
        File size:3'110'227 bytes
        MD5:b13e8f3d2779aa2102e2c3db3b2957d2
        SHA1:c15973faef8acbbf35b5b8361d3282bc4f2aaa23
        SHA256:c96632658ed3356d4a3615740999a04f70f77a7cf60263be59b3f2ac28e0eec7
        SHA512:34a0e812c1055444db8c744346b290ae8a972cad8f2112ac44889794ddb318f1001f395cf8f4337260544c82a4349fa14ce53a866c4bdce3c6f422eea05391d7
        SSDEEP:49152:JTYaVuY9Rrux2tTbcKdHili63l+1czHlpTLXaOPmYlvpzY9uZouyNDLS939:bVa2tTbc4Cli61Nrz3t7UCK6N9
        TLSH:72E523253B90F5ABD279043288E6F6EC1123B5383FDA41FBB6A7930EDD255E01E39590
        File Content Preview:MZ......................@.......PK00....................................!..L.!This program cannot be run in DOS mode....$.........Vk..88..88..88..F8..88..E8..88..C8..88..98..88..U8..88..V8..88..J8..88..D8..88..@8..88Rich..88........PE..L.....$I...........
        Icon Hash:6c171670b2f63706
        Entrypoint:0x4d4000
        Entrypoint Section:.pklstb
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x4924DF97 [Thu Nov 20 03:55:03 2008 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:d48e0557e81f1974982e52a9aab79b46
        Instruction
        push 004D4080h
        push 0052624Dh
        push 00000000h
        call 00007F5DE884A2AEh
        jmp 00007F5DE879500Dh
        inc eax
        sub byte ptr [ebx], ah
        sub dword ptr [eax+4Bh], edx
        dec esp
        dec ecx
        push esp
        inc ebp
        xor esi, dword ptr [edx]
        and byte ptr [ebx+6Fh], al
        jo 00007F5DE87F80EBh
        jc 00007F5DE87F80DBh
        push 39312074h
        cmp dword ptr [eax], edi
        and byte ptr [eax+4Bh], dl
        push edi
        inc ecx
        push edx
        inc ebp
        and byte ptr [ecx+6Eh], cl
        arpl word ptr [esi], bp
        sub al, 20h
        inc ecx
        insb
        insb
        and byte ptr [edx+69h], dl
        push 52207374h
        jnc 00007F5DE87F80D8h
        jc 00007F5DE87F80E8h
        and byte ptr fs:[eax], ch
        and al, 52h
        jbe 00007F5DE87F80DCh
        jnc 00007F5DE87F80DBh
        outsd
        outsb
        cmp ah, byte ptr [eax]
        and al, 29h
        add byte ptr [eax+4Bh], dl
        dec esp
        push esp
        xor esi, dword ptr [edx]
        add byte ptr [eax], al
        adc byte ptr [ecx], al
        add byte ptr [eax], al
        cmp eax, CC4E53E5h
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        inc esp
        xor esp, dword ptr [edx]
        adc dword ptr [eax], eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax+00h], al
        add eax, dword ptr [eax]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        inc esp
        xor esp, dword ptr [edx]
        adc dword ptr [edi+ecx], esi
        add byte ptr [eax], al
        sbb byte ptr [ecx], bl
        add byte ptr [eax], al
        call 00007F5DDF7F8D9Bh
        add al, 00h
        add byte ptr [ebp+1C685B57h], bh
        push ebp
        sbb dh, bh
        jbe 00008046h
        pop ecx
        xlatb
        sbb byte ptr [ebx-2Dh], ah
        stosb
        mov ch, 5Eh
        push esi
        stosb
        bound ecx, dword ptr [ecx]
        pop esi
        dec eax
        adc dword ptr [ecx-13644B4Bh], ecx
        Programming Language:
        • [ASM] VS2005 build 50727
        • [IMP] VS2005 build 50727
        • [ C ] VS2005 build 50727
        • [C++] VS2005 build 50727
        • [RES] VS2005 build 50727
        • [LNK] VS2005 build 50727
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xb51f00xc8.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xcd0000x661c.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x12b0000x3c.relo2
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x5a8.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x8b7330x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rdata0x8d0000x2a1c20x2b00066289573eda3292ab9772c8f6b413c88False0.4083621002906977data5.515523844107394IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0xb80000x14e080x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0xcd0000x661c0x60005a3adee0c83718d01de281dfb0f8a2c4False0.5048828125data5.2904653302795825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pklstb0xd40000x570000x530001034945e66373f90783860c013b839c7False0.9877488469503012data7.991138007494125IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .relo20x12b0000x3c0x1000d1c60badcb3f2be38f15e735e0bb65fcFalse0.0224609375data0.14178970673358426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        PKTEXT0xcd3b40x1b9aZip archive data, at least v5.0 to extract, compression method=deflateEnglishUnited States0.95810925559015
        RT_ICON0xcef500x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.45564516129032256
        RT_ICON0xcf2380x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishUnited States0.5743243243243243
        RT_ICON0xcf3600xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.22174840085287847
        RT_ICON0xd02080x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5938628158844765
        RT_ICON0xd0ab00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.4421965317919075
        RT_ICON0xd10180x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152, 16 important colorsEnglishUnited States0.36341463414634145
        RT_ICON0xd16800x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.3602150537634409
        RT_ICON0xd19680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.24193548387096775
        RT_ICON0xd1c500x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512, 16 important colorsEnglishUnited States0.23521505376344087
        RT_DIALOG0xd26e80x11adataEnglishUnited States0.04609929078014184
        RT_DIALOG0xd28040x5c0dataEnglishUnited States0.01358695652173913
        RT_DIALOG0xd2dc40x20edataEnglishUnited States0.026615969581749048
        RT_DIALOG0xd2fd40x14cdataEnglishUnited States0.2727272727272727
        RT_DIALOG0xd31200x26aemptyEnglishUnited States0
        RT_DIALOG0xd338c0x18aemptyEnglishUnited States0
        RT_DIALOG0xd35180xd8emptyEnglishUnited States0
        RT_STRING0xd35f00x2cemptyEnglishUnited States0
        RT_GROUP_ICON0xd1f380x5adataEnglishUnited States0.7777777777777778
        RT_GROUP_ICON0xd1f940x14dataEnglishUnited States1.25
        RT_GROUP_ICON0xd1fa80x14dataEnglishUnited States1.25
        RT_GROUP_ICON0xd1fbc0x14dataEnglishUnited States1.25
        RT_VERSION0xd1fd00x410dataEnglishUnited States0.43653846153846154
        RT_MANIFEST0xd23e00x168ASCII text, with CRLF line terminatorsEnglishUnited States0.6444444444444445
        DLLImport
        CRYPT32.dllCertGetNameStringW, CertGetCertificateContextProperty, CertGetIntendedKeyUsage, CertNameToStrW, CryptImportPublicKeyInfo, CryptVerifyCertificateSignature, CertEnumCertificatesInStore, CertOpenSystemStoreW, CertDeleteCertificateFromStore, CertDuplicateCertificateContext, CertOpenStore, CryptAcquireCertificatePrivateKey, CertSetCertificateContextProperty, CryptHashPublicKeyInfo, CertFreeCertificateContext, CertCloseStore
        KERNEL32.dllGetDriveTypeW, GetTempFileNameA, MoveFileExA, GetDiskFreeSpaceW, GetFullPathNameW, GetShortPathNameW, GetFullPathNameA, GetVolumeInformationA, LoadLibraryA, GetTempPathW, MoveFileExW, GetShortPathNameA, GetTempFileNameW, MoveFileA, DeleteFileW, Sleep, CreateDirectoryW, CreateDirectoryA, GetTempPathA, SetFileAttributesW, CreateFileA, GetDiskFreeSpaceA, DeleteFileA, GetVolumeInformationW, GetVersionExW, GetCurrentDirectoryW, DeviceIoControl, GetFileAttributesA, GetFileAttributesExA, GetFileAttributesW, MoveFileW, SetFileTime, GetCurrentDirectoryA, GetFileInformationByHandle, SetFilePointer, GetFileType, SetEndOfFile, ReadFile, FlushFileBuffers, GetStringTypeExA, UnmapViewOfFile, GetLocaleInfoW, GetUserDefaultUILanguage, MapViewOfFile, CreateFileMappingW, ReleaseMutex, CreateMutexW, GetLocaleInfoA, GetDateFormatA, GetDateFormatW, FileTimeToSystemTime, GetProcAddress, GetNumberFormatW, CompareFileTime, GetVersion, GetStdHandle, QueryPerformanceCounter, GetCurrentProcessId, GlobalMemoryStatus, GetVersionExA, VirtualFree, VirtualAlloc, CompareStringW, CompareStringA, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetStartupInfoA, SetHandleCount, GetCommandLineW, GetCommandLineA, SetFileAttributesA, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, GetModuleFileNameA, HeapSize, HeapCreate, HeapDestroy, ExitProcess, GetModuleHandleA, RtlUnwind, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, GetProcessHeap, CreateThread, ExitThread, HeapAlloc, HeapReAlloc, HeapFree, LoadLibraryExW, SizeofResource, GetStringTypeA, GetModuleHandleW, GetTickCount, GetStringTypeW, SetCurrentDirectoryA, LCMapStringA, LCMapStringW, GetConsoleCP, GetConsoleMode, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetEnvironmentVariableA, GetThreadLocale, InterlockedCompareExchange, IsProcessorFeaturePresent, lstrcmpiW, SetCurrentDirectoryW, FreeLibrary, MultiByteToWideChar, WideCharToMultiByte, GlobalUnlock, GetCurrentThreadId, GlobalLock, LeaveCriticalSection, GlobalAlloc, EnterCriticalSection, lstrlenW, GetModuleFileNameW, SetLastError, LockResource, InitializeCriticalSection, LoadResource, FindResourceW, InterlockedIncrement, DeleteCriticalSection, MulDiv, lstrcmpW, GetLastError, GlobalFree, GlobalHandle, InterlockedDecrement, CloseHandle, CreateFileW, WriteFile, GetFileAttributesExW, GetDriveTypeA, LocalFileTimeToFileTime, FileTimeToLocalFileTime, DosDateTimeToFileTime, FileTimeToDosDateTime, GetSystemTimeAsFileTime, SetThreadPriority, WaitForSingleObject, SetEvent, ResetEvent, CreateEventW, GetEnvironmentStringsW, InterlockedExchange, RaiseException, FlushInstructionCache, GetCurrentProcess, GetNumberFormatA
        USER32.dllDestroyMenu, TrackPopupMenu, CreatePopupMenu, CreateAcceleratorTableW, GetActiveWindow, DialogBoxParamW, IsWindowVisible, LoadImageW, GetWindowTextA, GetCursorPos, MsgWaitForMultipleObjects, PeekMessageW, DdeCreateStringHandleW, IsDialogMessageW, TranslateMessage, DispatchMessageW, DestroyIcon, IsDlgButtonChecked, GetClassInfoExW, ReleaseDC, GetDlgItemTextW, RegisterClassExW, LoadCursorW, ClientToScreen, MessageBoxW, CharNextW, MoveWindow, InsertMenuW, GetSystemMenu, DestroyAcceleratorTable, EnableWindow, GetDesktopWindow, GetSysColor, DdeConnect, DdeDisconnect, DdeFreeStringHandle, DdeUninitialize, DdeClientTransaction, DdeGetLastError, GetUserObjectInformationW, GetProcessWindowStation, MessageBoxA, DdeInitializeW, CheckDlgButton, DialogBoxIndirectParamW, SetCapture, RegisterWindowMessageW, ReleaseCapture, IsChild, GetFocus, GetWindowTextLengthW, SetWindowContextHelpId, ShowWindow, PostMessageW, InvalidateRect, LoadStringW, RedrawWindow, FillRect, InvalidateRgn, SetCursor, GetDC, MapDialogRect, SetWindowPos, DrawTextW, SetDlgItemTextW, GetSystemMetrics, GetWindow, GetWindowTextW, SetWindowTextW, SetForegroundWindow, EndDialog, SetWindowLongW, SystemParametersInfoW, DestroyWindow, GetWindowRect, GetClientRect, GetWindowLongW, SendMessageW, ScreenToClient, DefWindowProcW, GetParent, CallWindowProcW, EndPaint, DrawIcon, BeginPaint, MapWindowPoints, CreateWindowExW, GetDlgItem, IsWindow, SetFocus, GetClassNameW, UnregisterClassA
        GDI32.dllDeleteDC, DeleteObject, GetStockObject, GetDeviceCaps, GetTextExtentPoint32W, GetObjectW, CreateCompatibleBitmap, CreateCompatibleDC, CreateSolidBrush, BitBlt, SelectObject
        ADVAPI32.dllRegSetValueExW, RegisterEventSourceA, ReportEventA, DeregisterEventSource, CryptGetUserKey, CryptAcquireContextA, CryptVerifySignatureW, CryptDestroyKey, CryptHashData, CryptCreateHash, CryptGetHashParam, CryptSetHashParam, CryptDestroyHash, CryptReleaseContext, CryptAcquireContextW, CryptGenRandom, CryptDecrypt, RegDeleteValueW, RegCreateKeyExW, RegOpenKeyExW, RegDeleteKeyW, RegCloseKey, RegQueryInfoKeyW, RegEnumKeyExW, RegCreateKeyW, RegSetValueW, CryptGetProvParam, CryptImportKey, CryptGetKeyParam, CryptGenKey, CryptDeriveKey, CryptSetKeyParam
        SHELL32.dllSHGetFolderPathW, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetMalloc, SHGetPathFromIDListW, SHBrowseForFolderW, ShellExecuteW, SHGetFileInfoW
        ole32.dllCoCreateGuid, CoTaskMemRealloc, CoUninitialize, CoInitialize, CoTaskMemFree, OleUninitialize, CoGetClassObject, StringFromGUID2, CoCreateInstance, CoTaskMemAlloc, OleLockRunning, OleInitialize, CLSIDFromString, CLSIDFromProgID, CreateStreamOnHGlobal
        OLEAUT32.dllVariantInit, VarUI4FromStr, SysStringLen, SysAllocString, SysStringByteLen, LoadTypeLib, LoadRegTypeLib, OleCreateFontIndirect, VariantClear, SysAllocStringLen, SysFreeString
        COMCTL32.dllImageList_ReplaceIcon, ImageList_Create, ImageList_Destroy, InitCommonControlsEx
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:13:58:03
        Start date:08/05/2024
        Path:C:\Users\user\Desktop\GB72405.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\GB72405.exe"
        Imagebase:0x400000
        File size:3'110'227 bytes
        MD5 hash:B13E8F3D2779AA2102E2C3DB3B2957D2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:15
        Start time:13:59:01
        Start date:08/05/2024
        Path:C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\GB72405\GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN\HDFloppyWrite.exe" GB72405_AHDF.001\OM_LOCAL_FLOPPY_1.44MB_S520_v1_1_DBSIGN
        Imagebase:0x400000
        File size:617'472 bytes
        MD5 hash:D0509B5E9ECFB035B20942C012DE19EC
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Antivirus matches:
        • Detection: 3%, ReversingLabs
        • Detection: 1%, Virustotal, Browse
        Reputation:low
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:7.5%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:8.9%
          Total number of Nodes:2000
          Total number of Limit Nodes:45
          execution_graph 45663 42fa92 45664 42faa1 __EH_prolog3_catch 45663->45664 45665 42fac2 45664->45665 45712 4143fb 65 API calls 3 library calls 45664->45712 45667 42fad4 45665->45667 45670 42fb2e 45665->45670 45713 472749 RaiseException 45665->45713 45715 4143fb 65 API calls 3 library calls 45665->45715 45714 42fc17 116 API calls 4 library calls 45667->45714 45672 41b0f2 ctype 65 API calls 45670->45672 45675 42fb4c 45670->45675 45673 42fb41 45672->45673 45678 428501 45673->45678 45716 42fc17 116 API calls 4 library calls 45675->45716 45677 42fae8 std::_String_base::_Xlen 45679 428510 __EH_prolog3_catch 45678->45679 45690 42852d 45679->45690 45727 4143fb 65 API calls 3 library calls 45679->45727 45682 41b0f2 65 API calls ctype 45682->45690 45683 4285ad 45684 41b0f2 ctype 65 API calls 45683->45684 45685 4285bb 45684->45685 45729 425e2a 91 API calls 45685->45729 45687 42862b 45717 427e02 45687->45717 45690->45682 45690->45683 45690->45687 45728 472749 RaiseException 45690->45728 45730 4143fb 65 API calls 3 library calls 45690->45730 45692 428643 45732 448b40 CryptCreateHash 45692->45732 45695 42866e 45696 428683 45695->45696 45733 4143fb 65 API calls 3 library calls 45695->45733 45734 448b00 CryptSetHashParam 45696->45734 45699 4286a0 45700 4286c5 45699->45700 45735 448af0 CryptDestroyHash 45699->45735 45701 41b0f2 ctype 65 API calls 45700->45701 45703 4286e1 45701->45703 45705 4286ed 45703->45705 45737 42679e 65 API calls 2 library calls 45703->45737 45704 4286b2 45736 4143fb 65 API calls 3 library calls 45704->45736 45738 448d30 CryptVerifySignatureW 45705->45738 45709 428701 45739 448af0 CryptDestroyHash 45709->45739 45711 4285c5 std::_String_base::_Xlen ctype 45711->45675 45712->45665 45713->45665 45714->45677 45715->45665 45716->45677 45718 427e12 45717->45718 45724 427e48 45717->45724 45719 427e33 45718->45719 45745 4143fb 65 API calls 3 library calls 45718->45745 45740 448d80 51 API calls 3 library calls 45719->45740 45722 427e25 45746 472749 RaiseException 45722->45746 45723 427e41 45723->45724 45741 41b7e8 45723->45741 45724->45692 45731 4143fb 65 API calls 3 library calls 45724->45731 45727->45690 45728->45690 45729->45711 45730->45690 45731->45692 45732->45695 45733->45696 45734->45699 45735->45704 45736->45700 45738->45709 45739->45711 45740->45723 45742 41b800 45741->45742 45743 41b7f2 45741->45743 45742->45724 45747 41b74d 45743->45747 45745->45722 45746->45719 45748 41b7a8 45747->45748 45750 41b761 45747->45750 45749 41b7e0 45748->45749 45756 4143fb 65 API calls 3 library calls 45748->45756 45749->45742 45750->45748 45755 448850 CryptAcquireContextW 45750->45755 45753 41b7d1 45757 472749 RaiseException 45753->45757 45755->45750 45756->45753 45757->45749 44431 421a03 44432 421a10 44431->44432 44453 42cd25 44432->44453 44433 421abe 44471 423dd1 72 API calls 2 library calls 44433->44471 44435 421a64 44463 42e854 44435->44463 44438 421ad3 44440 421afb ctype 44438->44440 44472 422440 44438->44472 44447 421b4b ctype 44440->44447 44555 42ecf8 72 API calls 4 library calls 44440->44555 44449 421d0d 44447->44449 44451 421a70 std::_String_base::_Xlen 44447->44451 44556 4143fb 65 API calls 3 library calls 44447->44556 44557 472749 RaiseException 44447->44557 44558 423d8c 44447->44558 44566 42e4fc 72 API calls 4 library calls 44447->44566 44567 436c6d 72 API calls 4 library calls 44447->44567 44568 41b0f2 44447->44568 44574 4233e1 44449->44574 44454 42cd39 44453->44454 44455 42cd5c 44454->44455 44602 4143fb 65 API calls 3 library calls 44454->44602 44457 4233e1 65 API calls 44455->44457 44459 42cd64 44457->44459 44458 42cd4d 44603 472749 RaiseException 44458->44603 44580 41a838 44459->44580 44468 42e860 __EH_prolog3 44463->44468 44467 42e8d5 44627 413299 44467->44627 44468->44467 44619 46e4c8 44468->44619 44633 4143fb 65 API calls 3 library calls 44468->44633 44634 472749 RaiseException 44468->44634 44470 42e8f4 std::_String_base::_Xlen 44470->44451 44471->44438 44473 42244f __EH_prolog3_catch 44472->44473 44474 423142 44473->44474 44476 42246e 44473->44476 44800 4143fb 65 API calls 3 library calls 44474->44800 44747 40f7f9 44476->44747 44477 423150 44479 42248e 44483 4224b9 44479->44483 44781 4143fb 65 API calls 3 library calls 44479->44781 44481 4224a8 44782 472749 RaiseException 44481->44782 44751 423a45 44483->44751 44485 422522 44488 422540 44485->44488 44783 4203e7 72 API calls 4 library calls 44485->44783 44486 41b0f2 ctype 65 API calls 44490 42258b 44486->44490 44488->44486 44489 4225de 44492 422641 44489->44492 44493 413299 ctype 65 API calls 44489->44493 44490->44489 44784 4143fb 65 API calls 3 library calls 44490->44784 44494 422666 44492->44494 44786 4143fb 65 API calls 3 library calls 44492->44786 44496 422621 44493->44496 44495 413299 ctype 65 API calls 44494->44495 44499 422686 44495->44499 44496->44499 44785 4143fb 65 API calls 3 library calls 44496->44785 44500 4226d1 44499->44500 44787 4143fb 65 API calls 3 library calls 44499->44787 44502 422716 44500->44502 44788 4143fb 65 API calls 3 library calls 44500->44788 44504 413299 ctype 65 API calls 44502->44504 44505 42273a 44504->44505 44506 42275a 44505->44506 44789 4143fb 65 API calls 3 library calls 44505->44789 44755 41505d 44506->44755 44509 422778 44510 41b0f2 ctype 65 API calls 44509->44510 44511 42278e 44510->44511 44512 41b0f2 ctype 65 API calls 44511->44512 44513 4227c0 44512->44513 44514 41b0f2 ctype 65 API calls 44513->44514 44515 4227d6 44514->44515 44516 41b0f2 ctype 65 API calls 44515->44516 44517 4227ed 44516->44517 44518 41b0f2 ctype 65 API calls 44517->44518 44519 422802 44518->44519 44520 423a45 65 API calls 44519->44520 44533 422915 ctype 44519->44533 44521 422843 44520->44521 44522 46e4c8 std::_String_base::_Xlen 54 API calls 44521->44522 44530 4228b5 44521->44530 44524 422863 44522->44524 44523 41b0f2 ctype 65 API calls 44525 4228e7 44523->44525 44524->44530 44790 4143fb 65 API calls 3 library calls 44524->44790 44526 41b0f2 ctype 65 API calls 44525->44526 44525->44533 44528 422910 44526->44528 44791 420274 54 API calls 2 library calls 44528->44791 44530->44523 44531 423a45 65 API calls 44531->44533 44533->44531 44534 41b0f2 65 API calls ctype 44533->44534 44537 4143fb 65 API calls ctype 44533->44537 44539 422c1c 44533->44539 44542 423004 44533->44542 44552 413299 ctype 65 API calls 44533->44552 44759 4243d6 44533->44759 44792 4204be 65 API calls ctype 44533->44792 44793 41bc7e 72 API calls 2 library calls 44533->44793 44794 415307 65 API calls 3 library calls 44533->44794 44796 420274 54 API calls 2 library calls 44533->44796 44534->44533 44537->44533 44795 4143fb 65 API calls 3 library calls 44539->44795 44540 423026 44544 42304d ctype 44540->44544 44546 41b0f2 ctype 65 API calls 44540->44546 44542->44540 44542->44544 44545 41b0f2 ctype 65 API calls 44542->44545 44543 422c2b 44543->44440 44799 42fee4 72 API calls 4 library calls 44544->44799 44548 42301d 44545->44548 44549 423047 44546->44549 44797 420503 72 API calls ctype 44548->44797 44798 420386 72 API calls 2 library calls 44549->44798 44552->44533 44553 42307a std::_String_base::_Xlen ctype 44553->44440 44555->44447 44556->44447 44557->44447 44559 423da1 44558->44559 44560 423dbc 44558->44560 44963 4143fb 65 API calls 3 library calls 44559->44963 44957 4374a4 44560->44957 44563 423dc7 44563->44447 44564 423dad 44964 472749 RaiseException 44564->44964 44566->44447 44567->44447 44569 41b101 44568->44569 44570 41b11c 44568->44570 44967 4143fb 65 API calls 3 library calls 44569->44967 44570->44447 44572 41b10d 44968 472749 RaiseException 44572->44968 44575 4233f0 44574->44575 44576 42340b 44574->44576 44969 4143fb 65 API calls 3 library calls 44575->44969 44576->44451 44578 4233fc 44970 472749 RaiseException 44578->44970 44581 41a851 44580->44581 44599 41a861 44580->44599 44604 4143fb 65 API calls 3 library calls 44581->44604 44583 41aaaf 44583->44433 44583->44435 44584 41aa1b 44593 41a986 44584->44593 44615 4143fb 65 API calls 3 library calls 44584->44615 44586 4143fb 65 API calls ctype 44586->44599 44587 41aa54 SetFilePointer 44587->44583 44595 41aa7b 44587->44595 44588 41a8e9 SetFilePointer 44591 41a94b 44588->44591 44588->44599 44590 41a9b3 44590->44583 44590->44593 44614 4143fb 65 API calls 3 library calls 44590->44614 44591->44593 44613 4143fb 65 API calls 3 library calls 44591->44613 44593->44587 44595->44583 44596 414b6e ctype 65 API calls 44595->44596 44598 41aa9b 44596->44598 44616 423bb6 65 API calls 3 library calls 44598->44616 44599->44583 44599->44584 44599->44586 44599->44587 44599->44588 44599->44590 44599->44591 44605 472749 RaiseException 44599->44605 44606 414b6e 44599->44606 44612 423bb6 65 API calls 3 library calls 44599->44612 44602->44458 44603->44455 44604->44599 44605->44599 44607 414b80 44606->44607 44608 414b9b 44606->44608 44617 4143fb 65 API calls 3 library calls 44607->44617 44608->44599 44610 414b8c 44618 472749 RaiseException 44610->44618 44612->44599 44613->44593 44614->44593 44615->44593 44616->44583 44617->44610 44618->44608 44626 46e4d0 std::_String_base::_Xlen 44619->44626 44621 46e4ea 44621->44468 44626->44619 44626->44621 44635 47614b 46 API calls __freeptd 44626->44635 44636 46eb5f 44626->44636 44655 47093e 53 API calls std::_String_base::_Xlen 44626->44655 44656 471c40 46 API calls 3 library calls 44626->44656 44657 472749 RaiseException 44626->44657 44629 4132a8 ctype 44627->44629 44630 4132e2 ctype 44629->44630 44673 48363e 44629->44673 44697 4143fb 65 API calls 3 library calls 44629->44697 44698 472749 RaiseException 44629->44698 44630->44470 44633->44468 44634->44468 44635->44626 44637 46ec0c 44636->44637 44649 46eb6d 44636->44649 44667 47614b 46 API calls __freeptd 44637->44667 44639 46ec12 44668 474d50 46 API calls __endthreadex 44639->44668 44642 46ec18 44642->44626 44645 46ebd0 RtlAllocateHeap 44645->44649 44646 46eb82 44646->44649 44658 4764aa 46 API calls 2 library calls 44646->44658 44659 47630a 46 API calls 7 library calls 44646->44659 44660 473415 44646->44660 44648 46ec03 44648->44626 44649->44645 44649->44646 44649->44648 44650 46ebf7 44649->44650 44653 46ebf5 44649->44653 44663 46eb10 46 API calls 4 library calls 44649->44663 44664 47614b 46 API calls __freeptd 44649->44664 44665 474d50 46 API calls __endthreadex 44650->44665 44666 474d50 46 API calls __endthreadex 44653->44666 44655->44626 44656->44626 44657->44626 44658->44646 44659->44646 44669 4733ef GetModuleHandleA 44660->44669 44663->44649 44664->44649 44665->44653 44666->44648 44667->44639 44668->44642 44670 473414 ExitProcess 44669->44670 44671 4733fe GetProcAddress 44669->44671 44671->44670 44672 47340e 44671->44672 44672->44670 44674 483698 SetCurrentDirectoryA 44673->44674 44675 483671 44673->44675 44676 4836a8 GetCurrentDirectoryA 44674->44676 44677 48372d GetLastError 44674->44677 44707 474d63 46 API calls __endthreadex 44675->44707 44681 4836c1 44676->44681 44687 4836eb 44676->44687 44717 474d76 46 API calls 3 library calls 44677->44717 44679 483676 44708 474d50 46 API calls __endthreadex 44679->44708 44710 476cf0 44681->44710 44683 483726 44689 48368d 44683->44689 44718 46e18d 46 API calls 7 library calls 44683->44718 44685 48367d 44709 471b95 46 API calls 2 library calls 44685->44709 44687->44677 44687->44683 44716 483f77 59 API calls __mbctoupper_l 44687->44716 44699 46e052 44689->44699 44690 48372b 44690->44677 44693 4836df GetCurrentDirectoryA 44693->44687 44694 48370b SetEnvironmentVariableA 44694->44677 44694->44683 44696 483759 44696->44629 44697->44629 44698->44629 44700 46e05c IsDebuggerPresent 44699->44700 44701 46e05a 44699->44701 44719 479de0 44700->44719 44701->44696 44704 4750b3 SetUnhandledExceptionFilter UnhandledExceptionFilter 44705 4750d0 __invoke_watson 44704->44705 44706 4750d8 GetCurrentProcess TerminateProcess 44704->44706 44705->44706 44706->44696 44707->44679 44708->44685 44711 476cf4 44710->44711 44713 476d33 44711->44713 44714 476d14 Sleep 44711->44714 44720 46e9b3 44711->44720 44713->44690 44713->44693 44715 476d29 44714->44715 44715->44711 44715->44713 44716->44694 44717->44683 44718->44689 44719->44704 44721 46e9bf _fprintf 44720->44721 44722 46e9d7 44721->44722 44727 46e9f6 _memset 44721->44727 44733 474d50 46 API calls __endthreadex 44722->44733 44724 46e9dc 44734 471b95 46 API calls 2 library calls 44724->44734 44726 46ea68 RtlAllocateHeap 44726->44727 44727->44726 44728 46e9ec _fprintf 44727->44728 44735 475611 44727->44735 44742 475e5e 5 API calls 2 library calls 44727->44742 44743 46eaaf RtlLeaveCriticalSection __calloc_impl 44727->44743 44744 47614b 46 API calls __freeptd 44727->44744 44728->44711 44733->44724 44736 475637 RtlEnterCriticalSection 44735->44736 44737 475624 44735->44737 44736->44727 44745 47554e 46 API calls 7 library calls 44737->44745 44739 47562a 44739->44736 44746 4733cb 46 API calls 3 library calls 44739->44746 44741 475636 44741->44736 44742->44727 44743->44727 44744->44727 44745->44739 44746->44741 44748 40f805 __EH_prolog3 44747->44748 44749 41b0f2 ctype 65 API calls 44748->44749 44750 40f810 std::_String_base::_Xlen 44748->44750 44749->44750 44750->44479 44752 423a51 __EH_prolog3 44751->44752 44753 41b0f2 ctype 65 API calls 44752->44753 44754 423a5c std::_String_base::_Xlen 44752->44754 44753->44754 44754->44485 44756 415069 __EH_prolog3 44755->44756 44758 415080 std::_String_base::_Xlen ctype 44756->44758 44801 41b02f 44756->44801 44758->44509 44760 4243e0 44759->44760 44763 4243e6 44759->44763 44761 424577 44760->44761 44760->44763 44856 4143fb 65 API calls 3 library calls 44761->44856 44765 42442e ctype 44763->44765 44768 424404 ctype 44763->44768 44855 425965 123 API calls 5 library calls 44763->44855 44764 424583 44765->44533 44767 41b0f2 ctype 65 API calls 44769 4244c1 44767->44769 44768->44765 44768->44767 44839 41b649 44769->44839 44771 4244c8 ctype 44772 41b0f2 ctype 65 API calls 44771->44772 44773 4244f1 44772->44773 44774 41b0f2 ctype 65 API calls 44773->44774 44781->44481 44782->44483 44783->44488 44784->44489 44785->44492 44786->44494 44787->44500 44788->44502 44789->44506 44790->44530 44791->44533 44792->44533 44793->44533 44794->44533 44795->44543 44796->44533 44797->44540 44798->44544 44799->44553 44800->44477 44802 41b03b __EH_prolog3 44801->44802 44819 448740 44802->44819 44805 46e4c8 std::_String_base::_Xlen 54 API calls 44806 41b053 44805->44806 44809 41b06d 44806->44809 44826 41b492 91 API calls 2 library calls 44806->44826 44808 41b0b6 44811 41b0f2 ctype 65 API calls 44808->44811 44809->44808 44827 4143fb 65 API calls 3 library calls 44809->44827 44813 41b0be 44811->44813 44812 41b0a8 44828 472749 RaiseException 44812->44828 44822 41ba48 44813->44822 44818 41b0d0 std::_String_base::_Xlen 44818->44758 44830 46ead1 44819->44830 44823 41ba76 44822->44823 44824 46e052 ___ansicp 5 API calls 44823->44824 44825 41b0c8 44824->44825 44829 4487c0 46 API calls __mtinitlocknum 44825->44829 44826->44809 44827->44812 44828->44808 44829->44818 44831 46e9b3 __calloc_impl 46 API calls 44830->44831 44833 46eae9 44831->44833 44832 41b049 44832->44805 44833->44832 44837 474d50 46 API calls __endthreadex 44833->44837 44835 46eaff 44835->44832 44838 474d50 46 API calls __endthreadex 44835->44838 44837->44835 44838->44832 44840 41b655 __EH_prolog3 44839->44840 44857 425fed 44840->44857 44842 41b67b std::_String_base::_Xlen 44842->44771 44855->44768 44856->44764 44858 425ff9 __EH_prolog3 44857->44858 44859 46e4c8 std::_String_base::_Xlen 54 API calls 44858->44859 44860 426008 44859->44860 44861 42605b 44860->44861 44903 4143fb 65 API calls 3 library calls 44860->44903 44862 41b0f2 ctype 65 API calls 44861->44862 44864 426062 44862->44864 44869 426072 44864->44869 44865 42604d 44904 472749 RaiseException 44865->44904 44868 426069 std::_String_base::_Xlen 44868->44842 44870 4261c2 44869->44870 44871 426088 44869->44871 44912 4143fb 65 API calls 3 library calls 44870->44912 44871->44870 44873 41b0f2 ctype 65 API calls 44871->44873 44875 42609a 44873->44875 44874 42611b 44908 472749 RaiseException 44874->44908 44875->44870 44878 4260b1 44875->44878 44877 42612a 44877->44868 44879 41b0f2 ctype 65 API calls 44878->44879 44880 4260b8 44879->44880 44881 42613b 44880->44881 44887 4260c3 44880->44887 44883 426155 44881->44883 44884 41b0f2 ctype 65 API calls 44881->44884 44882 4260e3 44885 41b0f2 ctype 65 API calls 44882->44885 44886 41b0f2 ctype 65 API calls 44883->44886 44888 42614b 44884->44888 44889 4260f5 44885->44889 44890 426161 44886->44890 44887->44882 44905 425d35 91 API calls 2 library calls 44887->44905 44909 448af0 CryptDestroyHash 44888->44909 44903->44865 44904->44861 44905->44882 44908->44877 44909->44883 44912->44874 44958 4374b0 __EH_prolog3 44957->44958 44959 46e4c8 std::_String_base::_Xlen 54 API calls 44958->44959 44962 437545 std::_String_base::_Xlen 44958->44962 44965 4143fb 65 API calls 3 library calls 44958->44965 44966 472749 RaiseException 44958->44966 44959->44958 44962->44563 44963->44564 44964->44560 44965->44958 44966->44958 44967->44572 44968->44570 44969->44578 44970->44576 44971 40e941 44972 40e965 __EH_prolog3_catch 44971->44972 44973 40e96b CoInitialize 44972->44973 44974 40e97e 44973->44974 45054 411517 44974->45054 44976 40e99c 45059 43f840 44976->45059 44980 40e9b6 OleInitialize 44981 40e9e5 44980->44981 45071 43e620 44981->45071 44987 40ea20 45104 41549a 44987->45104 44989 40ea4d 44990 40ea6c GetModuleFileNameW 44989->44990 45111 413423 44990->45111 44992 40ea97 45115 414bf2 44992->45115 45055 411523 __EH_prolog3_catch 45054->45055 45056 411549 GetCurrentThreadId 45055->45056 45057 46e4c8 std::_String_base::_Xlen 54 API calls 45056->45057 45058 411564 std::_String_base::_Xlen 45057->45058 45058->44976 45060 43f84c ctype 45059->45060 45199 43ebb0 45060->45199 45063 43dcc0 45064 43dcf8 45063->45064 45065 46e4c8 std::_String_base::_Xlen 54 API calls 45064->45065 45066 43dd16 45065->45066 45067 43dd25 45066->45067 45068 43dd3c 45066->45068 45516 440530 66 API calls 3 library calls 45067->45516 45068->44980 45070 43dd2a 45070->44980 45072 43e674 ctype 45071->45072 45075 43e65e 45071->45075 45073 46e052 ___ansicp 5 API calls 45072->45073 45074 40e9f6 45073->45074 45091 46e537 45074->45091 45075->45072 45076 43e6bc 45075->45076 45077 43e620 91 API calls 45075->45077 45076->45072 45078 46eb5f _malloc 46 API calls 45076->45078 45077->45076 45079 43e6d4 45078->45079 45079->45072 45080 413423 65 API calls 45079->45080 45081 43e6eb 45080->45081 45517 4726b3 74 API calls 3 library calls 45081->45517 45083 43e701 45084 4134a3 ctype 65 API calls 45083->45084 45085 43e713 45084->45085 45086 4134a3 ctype 65 API calls 45085->45086 45087 43e721 ctype 45086->45087 45088 46eb5f _malloc 46 API calls 45087->45088 45089 43e737 45088->45089 45089->45072 45518 46e18d 46 API calls 7 library calls 45089->45518 45092 46e544 45091->45092 45093 46e54c 45091->45093 45092->45093 45098 46e574 45092->45098 45519 474d50 46 API calls __endthreadex 45093->45519 45095 46e551 45520 471b95 46 API calls 2 library calls 45095->45520 45097 40ea07 45100 414c9f 45097->45100 45098->45097 45521 474d50 46 API calls __endthreadex 45098->45521 45101 414cb0 45100->45101 45522 414e00 45101->45522 45103 414ccc 45103->44987 45106 4154a6 __EH_prolog3 45104->45106 45108 4154db 45106->45108 45544 4143fb 65 API calls 3 library calls 45106->45544 45545 472749 RaiseException 45106->45545 45537 415657 45108->45537 45110 4154e5 std::_String_base::_Xlen 45110->44989 45112 41342f __EH_prolog3_catch 45111->45112 45113 4134a3 ctype 65 API calls 45112->45113 45114 41344c std::_String_base::_Xlen 45113->45114 45114->44992 45116 414c21 45115->45116 45117 414c07 45115->45117 45549 41a31d 45116->45549 45562 4143fb 65 API calls 3 library calls 45117->45562 45120 40eaa7 45123 416e3a 45120->45123 45121 414c12 45563 472749 RaiseException 45121->45563 45577 416f24 45123->45577 45223 43f880 45199->45223 45201 43eebc 45202 46e052 ___ansicp 5 API calls 45201->45202 45203 40e9a9 45202->45203 45203->45063 45205 46e537 _wcslwr_s_l_stat 46 API calls 45206 43ed0f 45205->45206 45320 46e89e 46 API calls _memmove_s 45206->45320 45208 43ed22 45321 46e89e 46 API calls _memmove_s 45208->45321 45210 43ed37 _wcsncpy 45211 46eb5f _malloc 46 API calls 45210->45211 45212 43eeb2 45211->45212 45212->45201 45212->45212 45322 43dfe0 46 API calls _malloc 45212->45322 45214 43ef74 45215 43f06c 45214->45215 45218 43efa1 _wcsncpy 45214->45218 45216 46eb5f _malloc 46 API calls 45215->45216 45217 43f08b _wcsrchr 45216->45217 45217->45201 45220 43ebb0 153 API calls 45217->45220 45218->45201 45218->45218 45219 43ebb0 153 API calls 45218->45219 45219->45201 45221 43f0d7 45220->45221 45323 46e18d 46 API calls 7 library calls 45221->45323 45225 43f909 45223->45225 45224 43f9bc GetLocaleInfoW 45226 43f9d0 _wcsncpy 45224->45226 45225->45224 45225->45226 45227 46eb5f _malloc 46 API calls 45226->45227 45230 43fc7b 45227->45230 45228 46e052 ___ansicp 5 API calls 45229 43ec24 45228->45229 45229->45201 45229->45205 45229->45210 45231 46eb5f _malloc 46 API calls 45230->45231 45309 43fe41 45230->45309 45232 43fd4c 45231->45232 45232->45232 45233 43fd82 CreateMutexW 45232->45233 45234 43fdbb 45233->45234 45235 43fdc4 45234->45235 45236 43fdfc WaitForSingleObject 45234->45236 45354 46e18d 46 API calls 7 library calls 45235->45354 45237 46eb5f _malloc 46 API calls 45236->45237 45239 43fe12 45237->45239 45241 43fe1e 45239->45241 45248 43fe49 _memset 45239->45248 45240 43fdca 45355 46e18d 46 API calls 7 library calls 45240->45355 45356 46e18d 46 API calls 7 library calls 45241->45356 45244 4404a1 ReleaseMutex CloseHandle 45249 4404f5 45244->45249 45250 43fe3e 45244->45250 45245 43fe24 ReleaseMutex CloseHandle 45357 46e18d 46 API calls 7 library calls 45245->45357 45251 414c9f 72 API calls 45248->45251 45254 440011 45248->45254 45371 46e18d 46 API calls 7 library calls 45249->45371 45250->45309 45252 43fe88 45251->45252 45255 41549a 72 API calls 45252->45255 45256 413423 65 API calls 45254->45256 45257 43fec1 WideCharToMultiByte 45255->45257 45258 440045 45256->45258 45262 46e4c8 std::_String_base::_Xlen 54 API calls 45257->45262 45260 440066 45258->45260 45261 4401aa CreateFileMappingW GetLastError 45258->45261 45362 46e18d 46 API calls 7 library calls 45260->45362 45269 4401e2 45261->45269 45263 43ff1a 45262->45263 45278 43ff36 45263->45278 45324 43f110 45263->45324 45265 44006c 45363 46e18d 46 API calls 7 library calls 45265->45363 45271 440216 MapViewOfFile 45269->45271 45272 4401ed 45269->45272 45270 440072 45274 4400b8 45270->45274 45277 440081 45270->45277 45275 440234 45271->45275 45304 4402bb 45271->45304 45366 46e18d 46 API calls 7 library calls 45272->45366 45287 46eb5f _malloc 46 API calls 45274->45287 45285 423d8c 72 API calls 45275->45285 45276 4401f3 45367 46e18d 46 API calls 7 library calls 45276->45367 45280 440131 ReleaseMutex CloseHandle 45277->45280 45281 44008b 45277->45281 45358 43f4b0 153 API calls 2 library calls 45278->45358 45286 440146 45280->45286 45284 43f880 136 API calls 45281->45284 45283 4401f9 ReleaseMutex CloseHandle 45283->45286 45289 4400ad 45284->45289 45290 44027c 45285->45290 45365 46e18d 46 API calls 7 library calls 45286->45365 45299 4400d9 _wcsrchr 45287->45299 45288 43ff72 45288->45254 45293 43ffa9 45288->45293 45289->45280 45292 4402aa 45290->45292 45368 4143fb 65 API calls 3 library calls 45290->45368 45348 41ffee 45292->45348 45359 46e18d 46 API calls 7 library calls 45293->45359 45294 43f880 136 API calls 45297 44011e 45294->45297 45297->45280 45301 440128 45297->45301 45298 440299 45369 472749 RaiseException 45298->45369 45299->45294 45303 4400ff 45299->45303 45300 43ffaf 45360 46e18d 46 API calls 7 library calls 45300->45360 45364 46e18d 46 API calls 7 library calls 45301->45364 45303->45299 45305 4403dc 45304->45305 45308 4403a7 45304->45308 45313 46eb5f _malloc 46 API calls 45305->45313 45312 43ebb0 136 API calls 45308->45312 45314 43fdd0 45308->45314 45309->45228 45310 43ffb8 ReleaseMutex CloseHandle 45361 46e18d 46 API calls 7 library calls 45310->45361 45312->45314 45315 4403fb _wcsrchr 45313->45315 45314->45244 45315->45314 45316 43ebb0 136 API calls 45315->45316 45317 440442 45316->45317 45370 46e18d 46 API calls 7 library calls 45317->45370 45320->45208 45321->45210 45322->45214 45323->45201 45325 43f182 45324->45325 45372 438209 45325->45372 45327 43f1bf 45327->45327 45330 43f22a 45327->45330 45385 4143fb 65 API calls 3 library calls 45327->45385 45329 43f21b 45386 472749 RaiseException 45329->45386 45332 413299 ctype 65 API calls 45330->45332 45333 43f24e 45332->45333 45334 413299 ctype 65 API calls 45333->45334 45335 43f25b _memset 45334->45335 45387 43e860 45335->45387 45339 43f2dd 45340 43e860 117 API calls 45339->45340 45341 43f300 45340->45341 45424 413380 65 API calls 2 library calls 45341->45424 45343 43f311 45344 43e860 117 API calls 45343->45344 45345 43f334 45344->45345 45346 46e052 ___ansicp 5 API calls 45345->45346 45347 43f38a 45346->45347 45347->45278 45349 4233e1 65 API calls 45348->45349 45350 41fffc 45349->45350 45445 436d2c 45350->45445 45454 41ae4f 45350->45454 45351 420012 45351->45304 45354->45240 45355->45314 45356->45245 45357->45250 45358->45288 45359->45300 45360->45310 45361->45250 45362->45265 45363->45270 45364->45289 45365->45309 45366->45276 45367->45283 45368->45298 45369->45292 45370->45314 45371->45250 45373 438215 __EH_prolog3 45372->45373 45374 43823a 45373->45374 45429 47093e 53 API calls std::_String_base::_Xlen 45373->45429 45376 4382f6 45374->45376 45377 43825b 45374->45377 45430 4398f9 72 API calls 4 library calls 45376->45430 45379 41b02f 115 API calls 45377->45379 45381 43826c ctype 45377->45381 45379->45381 45425 4152c1 45381->45425 45382 4382ae 45383 4382c2 std::_String_base::_Xlen ctype 45382->45383 45384 41b649 117 API calls 45382->45384 45383->45327 45384->45383 45385->45329 45386->45330 45388 43e8ae 45387->45388 45389 438209 117 API calls 45388->45389 45390 43e8e0 45389->45390 45391 438209 117 API calls 45390->45391 45392 43e8f4 45391->45392 45397 43e91f 45392->45397 45431 4143fb 65 API calls 3 library calls 45392->45431 45394 43e910 45432 472749 RaiseException 45394->45432 45396 43e954 45398 43e983 45396->45398 45435 4143fb 65 API calls 3 library calls 45396->45435 45397->45396 45433 4143fb 65 API calls 3 library calls 45397->45433 45405 43e9b4 45398->45405 45437 4143fb 65 API calls 3 library calls 45398->45437 45401 43e945 45434 472749 RaiseException 45401->45434 45402 43e974 45436 472749 RaiseException 45402->45436 45409 43e9e3 45405->45409 45439 4143fb 65 API calls 3 library calls 45405->45439 45407 43e9a5 45438 472749 RaiseException 45407->45438 45413 43ea10 45409->45413 45441 4143fb 65 API calls 3 library calls 45409->45441 45411 43e9d4 45440 472749 RaiseException 45411->45440 45420 43ea41 45413->45420 45443 4143fb 65 API calls 3 library calls 45413->45443 45415 43ea01 45442 472749 RaiseException 45415->45442 45418 43ea32 45444 472749 RaiseException 45418->45444 45421 46e052 ___ansicp 5 API calls 45420->45421 45422 43eaa0 45421->45422 45423 413380 65 API calls 2 library calls 45422->45423 45423->45339 45424->45343 45426 4152cd __EH_prolog3 45425->45426 45427 41b0f2 ctype 65 API calls 45426->45427 45428 4152d8 std::_String_base::_Xlen 45426->45428 45427->45428 45428->45382 45429->45374 45430->45383 45431->45394 45432->45397 45433->45401 45434->45396 45435->45402 45436->45398 45437->45407 45438->45405 45439->45411 45440->45409 45441->45415 45442->45413 45443->45418 45444->45420 45446 436d48 45445->45446 45447 413299 ctype 65 API calls 45446->45447 45448 436d54 45447->45448 45451 436d97 45448->45451 45457 4143fb 65 API calls 3 library calls 45448->45457 45453 436de3 45451->45453 45458 472749 RaiseException 45451->45458 45459 4143fb 65 API calls 3 library calls 45451->45459 45453->45351 45460 423c01 45454->45460 45456 41ae6a 45456->45351 45457->45451 45458->45451 45459->45451 45461 423c0d __EH_prolog3 45460->45461 45462 423c40 45461->45462 45481 4143fb 65 API calls 3 library calls 45461->45481 45466 413299 ctype 65 API calls 45462->45466 45467 423c4a std::_String_base::_Xlen ctype 45462->45467 45464 423c32 45482 472749 RaiseException 45464->45482 45468 423c8d 45466->45468 45467->45456 45468->45467 45470 437093 45468->45470 45471 4370a7 45470->45471 45472 4370b7 45470->45472 45494 4143fb 65 API calls 3 library calls 45471->45494 45473 4370e7 45472->45473 45495 472749 RaiseException 45472->45495 45496 4143fb 65 API calls 3 library calls 45472->45496 45476 4233e1 65 API calls 45473->45476 45477 4370ec 45476->45477 45483 4362c7 45477->45483 45481->45464 45482->45462 45484 4362de 45483->45484 45488 4362ed 45483->45488 45502 4143fb 65 API calls 3 library calls 45484->45502 45485 436318 45490 4233e1 65 API calls 45485->45490 45492 43633b 45485->45492 45488->45485 45503 472749 RaiseException 45488->45503 45504 4143fb 65 API calls 3 library calls 45488->45504 45491 436344 45490->45491 45497 42cba3 45491->45497 45492->45468 45494->45472 45495->45472 45496->45472 45500 42cbb9 45497->45500 45498 42cc0e 45498->45492 45499 4233e1 65 API calls 45499->45500 45500->45498 45500->45499 45505 41a47f 45500->45505 45502->45488 45503->45488 45504->45488 45506 41a493 45505->45506 45514 41a4a3 45505->45514 45507 4143fb ctype 65 API calls 45506->45507 45507->45514 45508 4143fb ctype 65 API calls 45508->45514 45509 41a4e1 ReadFile 45510 41a505 GetLastError 45509->45510 45509->45514 45510->45514 45511 472749 __CxxThrowException@8 RaiseException 45511->45514 45512 41a53e 45512->45500 45513 414b6e ctype 65 API calls 45513->45514 45514->45508 45514->45509 45514->45511 45514->45512 45514->45513 45515 423bb6 65 API calls 45514->45515 45515->45514 45516->45070 45517->45083 45518->45072 45519->45095 45521->45095 45523 414e0c __EH_prolog3 45522->45523 45524 46e4c8 std::_String_base::_Xlen 54 API calls 45523->45524 45525 414e17 45524->45525 45526 414e2e 45525->45526 45534 414cd3 65 API calls 3 library calls 45525->45534 45528 414e69 45526->45528 45535 4143fb 65 API calls 3 library calls 45526->45535 45530 41b0f2 ctype 65 API calls 45528->45530 45533 414e71 std::_String_base::_Xlen 45530->45533 45531 414e5b 45536 472749 RaiseException 45531->45536 45533->45103 45534->45526 45535->45531 45536->45528 45539 415663 __EH_prolog3 45537->45539 45538 46e4c8 std::_String_base::_Xlen 54 API calls 45538->45539 45539->45538 45543 4156cc std::_String_base::_Xlen 45539->45543 45546 4143fb 65 API calls 3 library calls 45539->45546 45547 472749 RaiseException 45539->45547 45548 415514 54 API calls 2 library calls 45539->45548 45543->45110 45544->45106 45545->45106 45546->45539 45547->45539 45548->45539 45550 41a329 __EH_prolog3 45549->45550 45551 46e4c8 std::_String_base::_Xlen 54 API calls 45550->45551 45554 41a34c 45550->45554 45551->45554 45557 41a374 _wcsrchr 45554->45557 45568 4143fb 65 API calls 3 library calls 45554->45568 45556 41a448 std::_String_base::_Xlen 45556->45120 45557->45556 45558 41a425 GetLastError 45557->45558 45560 414b6e 65 API calls ctype 45557->45560 45561 41ae73 71 API calls 45557->45561 45564 418046 45557->45564 45569 472749 RaiseException 45557->45569 45570 423bb6 65 API calls 3 library calls 45558->45570 45560->45557 45561->45557 45562->45121 45563->45116 45565 418050 ctype 45564->45565 45571 417e63 45565->45571 45568->45557 45569->45557 45570->45557 45572 417e72 ctype 45571->45572 45573 4134a3 ctype 65 API calls 45572->45573 45574 417ea7 45572->45574 45573->45574 45575 4134a3 ctype 65 API calls 45574->45575 45578 46e4c8 std::_String_base::_Xlen 54 API calls 45577->45578 45579 416f30 45578->45579 45758 40cf11 45765 40e726 45758->45765 45760 40cf21 45761 40cf1c 45761->45760 45762 40cf39 GetTickCount 45761->45762 45763 40cf50 PostMessageW 45762->45763 45764 40cf49 45762->45764 45763->45760 45764->45760 45764->45763 45766 40e732 RtlEnterCriticalSection 45765->45766 45775 47f798 45765->45775 45768 40e7ab RtlLeaveCriticalSection 45766->45768 45769 40e74e 45766->45769 45770 40e7c5 std::_String_base::_Xlen 45768->45770 45769->45768 45771 43e620 91 API calls 45769->45771 45770->45761 45772 40e767 45771->45772 45773 40c7de 3 API calls 45772->45773 45774 40e791 45773->45774 45774->45768 45775->45766 45776 41a575 45777 41a58e 45776->45777 45782 41a59e 45776->45782 45799 4143fb 65 API calls 3 library calls 45777->45799 45779 41a5d7 WriteFile 45781 41a601 GetLastError 45779->45781 45784 41a5b4 45779->45784 45781->45782 45798 41a6fb 45781->45798 45782->45779 45782->45784 45785 414b6e 65 API calls ctype 45782->45785 45786 41a67a 45782->45786 45789 423bb6 65 API calls 45782->45789 45800 472749 RaiseException 45782->45800 45801 4143fb 65 API calls 3 library calls 45782->45801 45785->45782 45786->45784 45788 41a6b3 GetLastError 45786->45788 45787 41a74a GetLastError 45790 414b6e ctype 65 API calls 45787->45790 45788->45786 45791 41a6dd 45788->45791 45789->45782 45792 41a75a 45790->45792 45793 414b6e ctype 65 API calls 45791->45793 45803 423bb6 65 API calls 3 library calls 45792->45803 45794 41a6e5 45793->45794 45802 423bb6 65 API calls 3 library calls 45794->45802 45796 41a771 45798->45784 45798->45787 45799->45782 45800->45782 45801->45782 45802->45798 45803->45796 45804 4210d4 45805 4210e4 __EH_prolog3_catch 45804->45805 45830 4239ff 45805->45830 45807 42111e 45808 42114a 45807->45808 45809 421128 45807->45809 45953 42c48a 70 API calls 2 library calls 45808->45953 45834 41f3a3 45809->45834 45812 42112f 45813 421133 45812->45813 45814 421184 45812->45814 45817 421192 45812->45817 45954 415c18 65 API calls ctype 45812->45954 45955 4143fb 65 API calls 3 library calls 45814->45955 45820 41b0f2 65 API calls ctype 45817->45820 45821 421209 45817->45821 45853 402669 45817->45853 45857 415b89 45817->45857 45956 472749 RaiseException 45817->45956 45957 4143fb 65 API calls 3 library calls 45817->45957 45820->45817 45864 4212f4 45821->45864 45824 421213 45825 421238 45824->45825 45827 41b0f2 ctype 65 API calls 45824->45827 45828 42122b 45827->45828 45910 40cfd6 45828->45910 45831 423a0b __EH_prolog3 45830->45831 45832 4233e1 65 API calls 45831->45832 45833 423a16 std::_String_base::_Xlen 45831->45833 45832->45833 45833->45807 45958 42d0ad 45834->45958 45836 41f3e2 ctype 45840 41f45d 45836->45840 45972 42c399 45836->45972 45839 41f417 45839->45840 45842 41f41d 45839->45842 45841 41f48b 45840->45841 45851 41f456 45840->45851 46020 42c48a 70 API calls 2 library calls 45840->46020 46021 41f598 65 API calls 2 library calls 45840->46021 45845 41f4b2 98 API calls 45841->45845 45843 4233e1 65 API calls 45842->45843 45844 41f424 45843->45844 45852 41a838 67 API calls 45844->45852 45845->45851 45847 41f437 45986 42c502 45847->45986 45849 41f447 46008 41f4b2 45849->46008 45851->45812 45852->45847 45854 402674 ctype 45853->45854 45855 4134a3 ctype 65 API calls 45854->45855 45856 402681 45855->45856 45856->45817 45858 415bb8 45857->45858 45859 415b98 45857->45859 45858->45817 45860 41b0f2 ctype 65 API calls 45859->45860 45861 415b9f 45860->45861 46078 40cc7c 45861->46078 46113 40cc82 45861->46113 45865 421358 45864->45865 46215 42d66a 45865->46215 45867 4213cc 46233 42efce 65 API calls 2 library calls 45867->46233 45868 42136e 45868->45867 45870 421398 45868->45870 45872 4239ff 65 API calls 45870->45872 45871 4213e3 45873 41b0f2 ctype 65 API calls 45871->45873 45874 4213b8 45871->45874 45872->45874 45873->45874 45880 40695c 65 API calls 45874->45880 45881 42180a 45874->45881 45883 4316ec 71 API calls 45874->45883 45887 42185f 45874->45887 45889 421872 45874->45889 45894 402669 ctype 65 API calls 45874->45894 45895 41b0f2 65 API calls ctype 45874->45895 45896 4218a5 45874->45896 45897 4233e1 65 API calls 45874->45897 45900 4218c6 45874->45900 45906 4218f9 45874->45906 45907 4218e1 45874->45907 46219 430402 45874->46219 46234 42f1d1 72 API calls 4 library calls 45874->46234 46235 42efce 65 API calls 2 library calls 45874->46235 46236 4368aa 65 API calls 2 library calls 45874->46236 46237 42f397 72 API calls 4 library calls 45874->46237 46238 433385 72 API calls 3 library calls 45874->46238 46239 415c18 65 API calls ctype 45874->46239 46240 415bbe 65 API calls ctype 45874->46240 45876 421857 45877 41b0f2 ctype 65 API calls 45876->45877 45879 42193a 45876->45879 45877->45879 45878 421962 46227 435515 45878->46227 45879->45878 46248 42f55b 143 API calls 3 library calls 45879->46248 45880->45874 45881->45876 45884 41b0f2 ctype 65 API calls 45881->45884 45883->45874 45884->45876 46241 4143fb 65 API calls 3 library calls 45887->46241 46242 472749 RaiseException 45889->46242 46243 4143fb 65 API calls 3 library calls 45889->46243 45892 42196d ctype 45892->45824 45894->45874 45895->45874 46244 4143fb 65 API calls 3 library calls 45896->46244 45897->45874 46245 4143fb 65 API calls 3 library calls 45900->46245 46247 4143fb 65 API calls 3 library calls 45906->46247 46246 4143fb 65 API calls 3 library calls 45907->46246 45911 40d225 45910->45911 45912 40cff5 45910->45912 45952 41abcc 67 API calls 45911->45952 45912->45911 45913 40cffd 45912->45913 45914 40d004 45913->45914 45915 40d105 45913->45915 45916 40d2dd 45914->45916 45917 40d00d 45914->45917 45918 40d126 45915->45918 45919 40d10f 45915->45919 45927 40e395 96 API calls 45916->45927 45921 40d02b 45917->45921 45924 40d019 PostMessageW 45917->45924 45926 40e395 96 API calls 45918->45926 45922 40e395 96 API calls 45919->45922 45920 40d244 45923 40e395 96 API calls 45920->45923 45925 46e052 ___ansicp 5 API calls 45921->45925 45946 40d120 ctype 45922->45946 45929 40d258 45923->45929 45924->45921 45928 40d04d 45925->45928 45926->45946 45933 40d2f5 45927->45933 45928->45825 45929->45921 45931 40d27b 45929->45931 45932 40d2ac 45929->45932 45930 40d207 45930->45921 45934 40d213 PostMessageW 45930->45934 45940 46e537 _wcslwr_s_l_stat 46 API calls 45931->45940 45932->45921 46263 40e814 98 API calls 4 library calls 45932->46263 45933->45921 45935 40d341 45933->45935 45936 40d311 45933->45936 45934->45921 45935->45921 46264 40e814 98 API calls 4 library calls 45935->46264 45942 46e537 _wcslwr_s_l_stat 46 API calls 45936->45942 45938 40d2c3 45938->45921 45951 40d1ee 45938->45951 45941 40d298 PostMessageW 45940->45941 45941->45932 45944 40d32e PostMessageW 45942->45944 45943 40d1c5 45943->45930 46261 40e814 98 API calls 4 library calls 45943->46261 45944->45935 45946->45930 45946->45943 45949 46e537 _wcslwr_s_l_stat 46 API calls 45946->45949 45948 40d1ff 45948->45825 45949->45943 45950 40d1e8 45950->45930 45950->45951 46262 40e7c6 RtlEnterCriticalSection RtlLeaveCriticalSection 45951->46262 45952->45920 45953->45812 45954->45814 45955->45817 45956->45817 45957->45817 45959 42d0b9 __EH_prolog3 ctype 45958->45959 45960 42d0df 45959->45960 45961 4134a3 ctype 65 API calls 45959->45961 45962 42d0f0 45960->45962 45963 4134a3 ctype 65 API calls 45960->45963 45961->45960 45964 42d101 45962->45964 45965 4134a3 ctype 65 API calls 45962->45965 45963->45962 45966 41a31d 79 API calls 45964->45966 45965->45964 45967 42d12b 45966->45967 45970 42d156 std::_String_base::_Xlen 45967->45970 46022 4143fb 65 API calls 3 library calls 45967->46022 45969 42d148 46023 472749 RaiseException 45969->46023 45970->45836 45973 42c3a5 __EH_prolog3 45972->45973 45974 42c3c4 45973->45974 46024 4143fb 65 API calls 3 library calls 45973->46024 45985 41a838 67 API calls 45974->45985 45976 42c3b6 46025 472749 RaiseException 45976->46025 45978 42c3d1 45979 413299 ctype 65 API calls 45978->45979 45982 42c3df std::_String_base::_Xlen ctype 45978->45982 45980 42c41c 45979->45980 45983 41a838 67 API calls 45980->45983 45981 42c42a 45984 41a47f 67 API calls 45981->45984 45982->45839 45983->45981 45984->45982 45985->45978 45987 42c511 __EH_prolog3_catch_GS 45986->45987 45991 42c52c 45987->45991 46026 4143fb 65 API calls 3 library calls 45987->46026 45990 413299 65 API calls ctype 45990->45991 45991->45990 45992 42c5bf 45991->45992 45994 42c79d 45991->45994 45996 4143fb 65 API calls ctype 45991->45996 46006 41a47f 67 API calls 45991->46006 46007 41a838 67 API calls 45991->46007 46027 472749 RaiseException 45991->46027 46028 42c7ad 66 API calls 2 library calls 45992->46028 46032 42c7ad 66 API calls 2 library calls 45994->46032 45996->45991 45997 42c6f4 ctype 45997->45849 45998 42c5d1 45998->45997 46000 42c663 45998->46000 46029 4143fb 65 API calls 3 library calls 45998->46029 46000->45997 46001 413299 ctype 65 API calls 46000->46001 46002 42c6a1 46001->46002 46003 42c6c2 46002->46003 46030 4143fb 65 API calls 3 library calls 46002->46030 46031 42c919 65 API calls ctype 46003->46031 46006->45991 46007->45991 46009 41f4be __EH_prolog3_GS ctype 46008->46009 46010 414b6e ctype 65 API calls 46009->46010 46012 41f549 ctype 46009->46012 46011 41f500 46010->46011 46033 419a0f 46011->46033 46012->45851 46015 41f527 46049 4133e4 66 API calls 2 library calls 46015->46049 46017 41f537 46018 414b6e ctype 65 API calls 46017->46018 46018->46012 46020->45840 46021->45840 46022->45969 46023->45970 46024->45976 46025->45974 46026->45991 46027->45991 46028->45998 46029->46000 46030->46003 46031->45997 46032->45997 46034 419a51 46033->46034 46042 419a5d 46033->46042 46058 4143fb 65 API calls 3 library calls 46034->46058 46038 419ab6 GetDriveTypeW 46038->46042 46040 419b3e GetLastError 46041 419a8d ctype 46040->46041 46040->46042 46043 46e052 ___ansicp 5 API calls 46041->46043 46042->46038 46042->46040 46042->46041 46044 419b08 ctype 46042->46044 46045 419b0e GetDriveTypeA 46042->46045 46050 4199ba 46042->46050 46059 472749 RaiseException 46042->46059 46060 413967 46042->46060 46071 423bb6 65 API calls 3 library calls 46042->46071 46046 419b93 46043->46046 46044->46042 46044->46045 46045->46044 46046->46012 46048 472271 74 API calls 3 library calls 46046->46048 46048->46015 46049->46017 46051 4199c4 46050->46051 46052 4199dd 46050->46052 46072 4143fb 65 API calls 3 library calls 46051->46072 46055 4199ec 46052->46055 46074 47157a 56 API calls 46052->46074 46054 4199cf 46073 472749 RaiseException 46054->46073 46055->46042 46058->46042 46059->46042 46062 413978 46060->46062 46061 41397f 46061->46042 46062->46061 46063 4139e4 GetLastError 46062->46063 46064 4139af 46062->46064 46065 4139f2 46063->46065 46069 4139fc 46063->46069 46066 413299 ctype 65 API calls 46064->46066 46075 4143fb 65 API calls 3 library calls 46065->46075 46066->46061 46076 472749 RaiseException 46069->46076 46077 4143fb 65 API calls 3 library calls 46069->46077 46071->46042 46072->46054 46073->46052 46074->46055 46075->46069 46076->46069 46077->46069 46079 40e726 96 API calls 46078->46079 46084 40ccdd 46079->46084 46080 40cce2 ctype 46081 46e052 ___ansicp 5 API calls 46080->46081 46082 40cf0b 46081->46082 46082->45858 46083 40cdeb 46085 40cdf8 46083->46085 46086 40ce1b 46083->46086 46084->46080 46084->46083 46087 40cd07 46084->46087 46089 46e4c8 std::_String_base::_Xlen 54 API calls 46085->46089 46088 46e4c8 std::_String_base::_Xlen 54 API calls 46086->46088 46090 40cd9c 46087->46090 46093 40cd20 46087->46093 46091 40ce20 46088->46091 46092 40cdfd 46089->46092 46148 41abcc 46090->46148 46091->46092 46094 413423 65 API calls 46091->46094 46098 40ce53 PostMessageW 46092->46098 46099 40ce7b 46092->46099 46093->46080 46095 40e395 96 API calls 46093->46095 46094->46092 46104 40cd3e 46095->46104 46097 40e395 96 API calls 46097->46080 46098->46099 46100 40ce6b PostMessageW 46098->46100 46101 40ce84 46099->46101 46102 40ce9e 46099->46102 46100->46099 46103 40e395 96 API calls 46101->46103 46151 40e395 46102->46151 46103->46080 46104->46080 46106 46e4c8 std::_String_base::_Xlen 54 API calls 46104->46106 46107 40cd5a 46106->46107 46108 40cd70 46107->46108 46109 40cd7b PostMessageW 46107->46109 46110 413423 65 API calls 46108->46110 46109->46080 46110->46109 46114 40e726 96 API calls 46113->46114 46118 40ccdd 46113->46118 46114->46118 46115 46e052 ___ansicp 5 API calls 46116 40cf0b 46115->46116 46116->45858 46117 40cdeb 46119 40cdf8 46117->46119 46120 40ce1b 46117->46120 46118->46117 46121 40cd07 46118->46121 46141 40cce2 ctype 46118->46141 46123 46e4c8 std::_String_base::_Xlen 54 API calls 46119->46123 46122 46e4c8 std::_String_base::_Xlen 54 API calls 46120->46122 46124 40cd9c 46121->46124 46126 40cd20 46121->46126 46125 40ce20 46122->46125 46133 40cdfd 46123->46133 46147 41abcc 67 API calls 46124->46147 46127 413423 65 API calls 46125->46127 46125->46133 46128 40e395 96 API calls 46126->46128 46126->46141 46127->46133 46138 40cd3e 46128->46138 46129 40cdbc 46130 40e395 96 API calls 46129->46130 46130->46141 46131 40ce53 PostMessageW 46132 40ce7b 46131->46132 46134 40ce6b PostMessageW 46131->46134 46135 40ce84 46132->46135 46136 40ce9e 46132->46136 46133->46131 46133->46132 46134->46132 46137 40e395 96 API calls 46135->46137 46139 40e395 96 API calls 46136->46139 46137->46141 46140 46e4c8 std::_String_base::_Xlen 54 API calls 46138->46140 46138->46141 46139->46141 46142 40cd5a 46140->46142 46141->46115 46143 40cd70 46142->46143 46144 40cd7b PostMessageW 46142->46144 46145 413423 65 API calls 46143->46145 46144->46141 46145->46144 46147->46129 46162 41abdd 46148->46162 46149 40cdbc 46149->46097 46152 40e3a1 __EH_prolog3 46151->46152 46153 40e617 46152->46153 46156 40e3be 46152->46156 46180 43e7b0 46153->46180 46158 43e7b0 96 API calls 46156->46158 46159 40e666 std::_String_base::_Xlen ctype 46156->46159 46157 46e537 _wcslwr_s_l_stat 46 API calls 46157->46159 46160 40e6dc 46158->46160 46159->46080 46161 46e537 _wcslwr_s_l_stat 46 API calls 46160->46161 46161->46159 46163 41abf1 46162->46163 46167 41ac10 ctype 46162->46167 46177 4143fb 65 API calls 3 library calls 46163->46177 46165 41ac01 46178 472749 RaiseException 46165->46178 46168 41ac8b 46167->46168 46169 414b6e ctype 65 API calls 46167->46169 46171 41acc7 46167->46171 46170 41acb1 GetFileInformationByHandle 46168->46170 46168->46171 46169->46168 46170->46171 46172 41ad7b GetLastError 46170->46172 46171->46149 46173 414b6e ctype 65 API calls 46172->46173 46174 41ad8b 46173->46174 46179 423bb6 65 API calls 3 library calls 46174->46179 46176 41ad9f 46177->46165 46178->46167 46179->46176 46181 43e620 91 API calls 46180->46181 46182 43e7f4 46181->46182 46183 40e656 46182->46183 46185 441000 46182->46185 46183->46157 46186 44119a ctype 46185->46186 46187 4135ad ctype 65 API calls 46186->46187 46195 4411c0 46187->46195 46188 441482 46189 441489 ctype 46188->46189 46205 4414a8 ctype 46188->46205 46190 4134a3 ctype 65 API calls 46189->46190 46191 4414a1 46190->46191 46192 46e052 ___ansicp 5 API calls 46191->46192 46193 441cf0 46192->46193 46193->46183 46195->46188 46195->46191 46207 47158b 56 API calls 46195->46207 46208 472b7b 56 API calls wcstoxl 46195->46208 46202 440be0 92 API calls 46202->46205 46204 4134a3 65 API calls ctype 46204->46205 46205->46191 46205->46202 46205->46204 46206 4135ad 65 API calls ctype 46205->46206 46209 440c40 92 API calls 3 library calls 46205->46209 46210 440cc0 92 API calls 3 library calls 46205->46210 46211 440d30 92 API calls 3 library calls 46205->46211 46212 440a60 94 API calls 4 library calls 46205->46212 46213 472271 74 API calls 3 library calls 46205->46213 46214 41350d 66 API calls ctype 46205->46214 46206->46205 46207->46195 46208->46195 46209->46205 46210->46205 46211->46205 46212->46205 46213->46205 46214->46205 46216 42d676 __EH_prolog3 46215->46216 46249 42d776 46216->46249 46218 42d689 std::_String_base::_Xlen 46218->45868 46220 43040e __EH_prolog3 46219->46220 46221 46e4c8 std::_String_base::_Xlen 54 API calls 46220->46221 46223 430423 46221->46223 46222 430464 std::_String_base::_Xlen 46222->45874 46223->46222 46259 4143fb 65 API calls 3 library calls 46223->46259 46225 430456 46260 472749 RaiseException 46225->46260 46229 435521 __EH_prolog3 46227->46229 46228 4355d2 std::_String_base::_Xlen 46228->45892 46229->46228 46230 41b0f2 ctype 65 API calls 46229->46230 46232 435549 46230->46232 46231 41b0f2 ctype 65 API calls 46231->46232 46232->46228 46232->46231 46233->45871 46234->45874 46235->45874 46236->45874 46237->45874 46238->45874 46239->45874 46240->45874 46241->45889 46242->45889 46243->45889 46244->45889 46245->45889 46246->45889 46247->45889 46248->45878 46250 42d782 __EH_prolog3 46249->46250 46251 46e4c8 std::_String_base::_Xlen 54 API calls 46250->46251 46252 42d791 46251->46252 46253 42d7e1 std::_String_base::_Xlen 46252->46253 46257 4143fb 65 API calls 3 library calls 46252->46257 46253->46218 46255 42d7d3 46258 472749 RaiseException 46255->46258 46257->46255 46258->46253 46259->46225 46260->46222 46261->45950 46262->45948 46263->45938 46264->45938 46265 420d3b 46267 420d4b __EH_prolog3_catch 46265->46267 46272 420da0 46267->46272 46290 4143fb 65 API calls 3 library calls 46267->46290 46268 420d92 46291 472749 RaiseException 46268->46291 46270 420dfb 46271 42d776 72 API calls 46270->46271 46275 420df2 46271->46275 46272->46270 46273 420dea 46272->46273 46274 41b0f2 ctype 65 API calls 46273->46274 46274->46275 46276 41b0f2 ctype 65 API calls 46275->46276 46288 420e4f 46275->46288 46276->46288 46277 42100d 46278 420f2e 46280 420fa0 46278->46280 46289 41ffee 67 API calls 46278->46289 46279 420fd1 46294 415c18 65 API calls ctype 46279->46294 46280->46277 46280->46279 46283 41b0f2 ctype 65 API calls 46280->46283 46282 420ff5 46282->46277 46295 42f7f9 143 API calls 2 library calls 46282->46295 46283->46279 46287 41b0f2 ctype 65 API calls 46287->46288 46288->46278 46288->46287 46292 435cdb 65 API calls 2 library calls 46288->46292 46293 42efce 65 API calls 2 library calls 46288->46293 46289->46280 46290->46268 46291->46272 46292->46288 46293->46288 46294->46282 46295->46277 46296 41a2bb 46299 41a2d7 46296->46299 46298 41a2c3 46300 41a2e3 __EH_prolog3 46299->46300 46303 41a78c 46300->46303 46302 41a308 std::_String_base::_Xlen ctype 46302->46298 46304 41a79e 46303->46304 46305 41a7c3 46303->46305 46304->46305 46306 414b6e ctype 65 API calls 46304->46306 46305->46302 46307 41a7b1 FindCloseChangeNotification 46306->46307 46307->46305 46308 41a7be 46307->46308 46309 414b6e ctype 65 API calls 46308->46309 46309->46305 46310 436e5f 46311 436e6b __EH_prolog3_catch 46310->46311 46312 436e7c std::_String_base::_Xlen 46311->46312 46313 4233e1 65 API calls 46311->46313 46314 436e95 46313->46314 46315 4362c7 67 API calls 46314->46315 46315->46312 46316 40751c 46317 407556 46316->46317 46318 40752d 46316->46318 46323 407579 46317->46323 46318->46317 46321 40753f SetLastError 46318->46321 46320 407565 46321->46320 46324 40759a 46323->46324 46330 404c31 46324->46330 46340 40dfcf 46324->46340 46402 4056da 46324->46402 46410 404695 46324->46410 46325 4075b9 46325->46320 46331 404c5e 46330->46331 46332 404c3e GetDlgItem IsWindowVisible 46330->46332 46418 404d00 46331->46418 46332->46331 46333 404c57 46332->46333 46534 4054d6 116 API calls 46333->46534 46336 404c6f 46338 404c7f 46336->46338 46339 4056da 95 API calls 46336->46339 46337 404c5c 46337->46338 46338->46325 46339->46338 46341 40dfe6 46340->46341 46370 40dfee 46340->46370 46342 40e025 46341->46342 46343 40e017 46341->46343 46341->46370 46345 40e02a 46342->46345 46346 40e04d 46342->46346 46892 403c16 46343->46892 46347 40e034 GetDlgItem SendMessageW 46345->46347 46345->46370 46348 40e0c9 46346->46348 46349 40e089 46346->46349 46346->46370 46347->46370 46350 40e0e0 46348->46350 46351 40e0d1 46348->46351 46352 40e09a 46349->46352 47052 40493b 23 API calls 3 library calls 46349->47052 46355 40e125 46350->46355 46356 40e115 46350->46356 46350->46370 47044 404582 46351->47044 46359 40e0bb 46352->46359 46352->46370 46357 40e13a 46355->46357 46358 40e12d 46355->46358 46360 404695 97 API calls 46356->46360 46363 40e172 46357->46363 46364 40e142 46357->46364 47054 404752 97 API calls __cftoa_l 46358->47054 47053 40713b 22 API calls 46359->47053 46360->46370 46366 40e17a 46363->46366 46367 40e18c 46363->46367 46364->46370 47055 40481a 94 API calls 3 library calls 46364->47055 46365 40e0c4 46365->46370 47056 4048c2 46 API calls _calloc 46366->47056 46367->46352 46367->46370 46371 40e1e5 46367->46371 46372 40e1da 46367->46372 46370->46325 46374 40e1ec 46371->46374 46375 40e1fe 46371->46375 47057 40493b 23 API calls 3 library calls 46372->47057 47058 405825 120 API calls ctype 46374->47058 46377 40e211 46375->46377 46378 40e205 46375->46378 46380 40e228 46377->46380 46381 40e21b 46377->46381 47059 4049ed 97 API calls 4 library calls 46378->47059 46383 40e232 46380->46383 46384 40e23f 46380->46384 46382 404b22 99 API calls 46381->46382 46382->46370 47060 404bd5 288 API calls 46383->47060 46386 40e247 46384->46386 46387 40e25b 46384->46387 46388 404c31 299 API calls 46386->46388 46389 40e261 46387->46389 46390 40e287 46387->46390 46388->46370 46391 40e278 46389->46391 46392 40e26a 46389->46392 46393 40e28d 46390->46393 46394 40e2cf 46390->46394 46396 4056da 95 API calls 46391->46396 47061 40e7c6 RtlEnterCriticalSection RtlLeaveCriticalSection 46392->47061 46393->46370 46399 40e2b6 SetCurrentDirectoryW 46393->46399 46394->46352 46398 40e2d9 46394->46398 46396->46370 46397 40e307 SetCurrentDirectoryW 47063 405733 96 API calls 3 library calls 46397->47063 46398->46370 46398->46397 47062 405733 96 API calls 3 library calls 46399->47062 46403 4056e2 46402->46403 46409 405712 46402->46409 46406 43e620 91 API calls 46403->46406 46404 40572a KiUserCallbackDispatcher 46405 405730 46404->46405 46405->46325 46407 4056f7 46406->46407 46408 40c7de 3 API calls 46407->46408 46408->46409 46409->46404 46409->46405 46411 404715 GetDlgItem 46410->46411 46412 4046d6 46410->46412 47444 473bb0 46411->47444 47446 43de80 94 API calls 46412->47446 46416 40474c 46416->46325 46417 4046fc SetDlgItemTextW 46417->46416 46535 47f7cb 46418->46535 46420 404d0c LoadCursorW SetCursor 46421 404d37 46420->46421 46536 402b9c 46421->46536 46424 404d70 46427 404d81 GetDlgItem KiUserCallbackDispatcher 46424->46427 46428 404d98 46424->46428 46425 404d46 GetDlgItem 46426 404d5e GetDlgItem 46425->46426 46426->46424 46540 404b22 46427->46540 46430 404ec6 RtlEnterCriticalSection RtlLeaveCriticalSection 46428->46430 46431 404eb2 46428->46431 46432 404db4 46428->46432 46433 404ef2 46430->46433 46434 404eed 46430->46434 46436 4233e1 65 API calls 46431->46436 46437 4233e1 65 API calls 46432->46437 46435 402669 ctype 65 API calls 46433->46435 46627 40695c 65 API calls 2 library calls 46434->46627 46439 404efb 46435->46439 46440 404e34 ctype 46436->46440 46441 404dbc 46437->46441 46442 404f07 46439->46442 46628 40695c 65 API calls 2 library calls 46439->46628 46440->46430 46551 4189b0 46441->46551 46444 41b0f2 ctype 65 API calls 46442->46444 46446 404f15 46444->46446 46445 404dce 46445->46430 46447 43e7b0 96 API calls 46445->46447 46450 405046 46446->46450 46479 404f3a GetDlgItem SendMessageW 46446->46479 46448 404dfd 46447->46448 46449 40c7de 3 API calls 46448->46449 46452 404e21 46449->46452 46451 40504e IsDlgButtonChecked 46450->46451 46457 405061 46450->46457 46451->46457 46453 404e50 46452->46453 46454 404e29 46452->46454 46456 404e87 GetDlgItem 46453->46456 46459 404e61 GetDlgItem 46453->46459 46460 404e74 GetDlgItem 46453->46460 46455 4233e1 65 API calls 46454->46455 46455->46440 46463 404e97 ctype 46456->46463 46458 4050ad 46457->46458 46629 40695c 65 API calls 2 library calls 46457->46629 46462 41b0f2 ctype 65 API calls 46458->46462 46459->46460 46460->46456 46466 4050c0 46462->46466 46464 404e9f SetCursor 46463->46464 46465 404eaf std::_String_base::_Xlen 46464->46465 46465->46336 46467 43e620 91 API calls 46466->46467 46468 4050ec SetDlgItemTextW 46467->46468 46469 4051b0 ctype 46468->46469 46470 405149 46468->46470 46472 46e4c8 std::_String_base::_Xlen 54 API calls 46469->46472 46630 43de80 94 API calls 46470->46630 46476 4051bb 46472->46476 46473 405165 SetDlgItemTextW 46631 43de00 94 API calls 46473->46631 46475 405194 SetDlgItemTextW 46475->46469 46477 40520a 46476->46477 46632 40695c 65 API calls 2 library calls 46476->46632 46480 40521f 46477->46480 46633 40695c 65 API calls 2 library calls 46477->46633 46487 40502c 46479->46487 46565 402835 46480->46565 46486 405233 46570 41237c 46486->46570 46487->46457 46491 405252 46492 40e726 96 API calls 46491->46492 46493 4052a0 46492->46493 46494 40543c SetDlgItemTextW SetDlgItemTextW 46493->46494 46495 4052b5 46493->46495 46496 4052f6 46493->46496 46497 405468 46494->46497 46498 40549e 46494->46498 46508 43e620 91 API calls 46495->46508 46503 40535a 46496->46503 46505 405307 46496->46505 46499 405470 GetDlgItem EnableWindow 46497->46499 46500 405487 GetDlgItem EnableWindow 46497->46500 46501 4054a7 GetDlgItem KiUserCallbackDispatcher 46498->46501 46502 4054bb 46498->46502 46499->46500 46500->46498 46501->46502 46504 40e726 96 API calls 46502->46504 46506 43e620 91 API calls 46503->46506 46507 4054c3 46504->46507 46509 43e620 91 API calls 46505->46509 46510 40536b 46506->46510 46511 4054cf 46507->46511 46640 404c86 69 API calls 3 library calls 46507->46640 46512 4052ce 46508->46512 46513 405314 46509->46513 46514 40c7de 3 API calls 46510->46514 46511->46336 46516 40c7de 3 API calls 46512->46516 46517 40c7de 3 API calls 46513->46517 46518 40538b 46514->46518 46530 4052ee ctype 46516->46530 46519 405335 46517->46519 46521 4053a2 46518->46521 46522 4053bb 46518->46522 46519->46518 46520 40533d ShellExecuteW 46519->46520 46520->46518 46523 4233e1 65 API calls 46521->46523 46636 40c7bb 46522->46636 46525 4053a7 46523->46525 46576 418445 46525->46576 46526 4053e8 46599 412ae6 46526->46599 46527 4053b9 46527->46526 46528 4134a3 ctype 65 API calls 46527->46528 46528->46526 46530->46494 46534->46337 46535->46420 46537 402bab ctype 46536->46537 46539 402bfa 46536->46539 46538 46e18d 46 API calls __mtinitlocknum 46537->46538 46537->46539 46538->46537 46539->46424 46539->46425 46541 404b40 GetDlgItemTextW 46540->46541 46542 404b65 46541->46542 46550 404bb8 46541->46550 46544 4233e1 65 API calls 46542->46544 46543 46e052 ___ansicp 5 API calls 46545 404bd1 46543->46545 46546 404b70 46544->46546 46545->46428 46546->46550 46641 405733 96 API calls 3 library calls 46546->46641 46548 404b96 46642 41206a 48 API calls 2 library calls 46548->46642 46550->46543 46552 4189e3 46551->46552 46553 4189fe 46551->46553 46643 4143fb 65 API calls 3 library calls 46552->46643 46555 418a10 46553->46555 46556 418a2d 46553->46556 46558 418046 65 API calls 46555->46558 46559 413967 66 API calls 46556->46559 46557 4189ef 46644 472749 RaiseException 46557->46644 46562 418a21 GetFileAttributesW 46558->46562 46560 418a44 46559->46560 46563 418a50 GetFileAttributesA 46560->46563 46564 418a5a ctype 46562->46564 46563->46564 46564->46445 46566 41b0f2 ctype 65 API calls 46565->46566 46567 402841 46566->46567 46645 41244c 46567->46645 46571 4123cf PeekMessageW 46570->46571 46572 412391 46571->46572 46572->46571 46573 405246 46572->46573 46574 4123bb TranslateMessage DispatchMessageW 46572->46574 46575 4123aa IsDialogMessageW 46572->46575 46573->46491 46635 40695c 65 API calls 2 library calls 46573->46635 46574->46571 46575->46571 46575->46574 46577 418456 46576->46577 46578 4184e8 GetShortPathNameW 46577->46578 46579 41845e 46577->46579 46581 418506 46578->46581 46582 41851d 46578->46582 46580 417e63 65 API calls 46579->46580 46583 41847e 46580->46583 46584 4134a3 ctype 65 API calls 46581->46584 46585 4185fc GetLastError 46582->46585 46587 4135ad ctype 65 API calls 46582->46587 46591 4184b2 46583->46591 46592 41849e 46583->46592 46593 4184b0 ctype 46584->46593 46586 41860c 46585->46586 46807 423bb6 65 API calls 3 library calls 46586->46807 46588 418531 GetShortPathNameW 46587->46588 46588->46593 46589 418625 ctype 46597 46e052 ___ansicp 5 API calls 46589->46597 46591->46593 46596 4135ad ctype 65 API calls 46591->46596 46595 4134a3 ctype 65 API calls 46592->46595 46593->46585 46593->46589 46594 418617 46594->46527 46595->46593 46596->46593 46598 41864e 46597->46598 46598->46527 46600 412af2 __EH_prolog3_catch 46599->46600 46601 413299 ctype 65 API calls 46600->46601 46622 412c5b std::_String_base::_Xlen ctype 46600->46622 46602 412b29 46601->46602 46808 47210b 46602->46808 46622->46530 46630->46473 46631->46475 46634 40695c 65 API calls 2 library calls 46637 40c7c7 ctype 46636->46637 46638 4134a3 ctype 65 API calls 46637->46638 46639 40c7da 46638->46639 46639->46527 46640->46511 46641->46548 46642->46550 46643->46557 46644->46553 46646 40286c 46645->46646 46647 41245e 46645->46647 46646->46486 46646->46634 46660 4122d3 InterlockedIncrement 46647->46660 46652 412490 46684 4122f6 InterlockedDecrement SetEvent 46652->46684 46653 4124b9 SetThreadPriority 46653->46646 46655 4124c6 46653->46655 46685 4124db WaitForSingleObject GetLastError 46655->46685 46656 412497 GetLastError 46656->46646 46658 4124cd 46686 41242f CloseHandle 46658->46686 46661 4122f1 46660->46661 46662 4122e8 ResetEvent 46660->46662 46663 470b05 46661->46663 46662->46661 46664 470b17 46663->46664 46665 470b33 46663->46665 46708 474d50 46 API calls __endthreadex 46664->46708 46687 476658 TlsGetValue 46665->46687 46668 470b1c 46709 471b95 46 API calls 2 library calls 46668->46709 46670 476cf0 __calloc_crt 46 API calls 46672 470b45 46670->46672 46673 470b97 46672->46673 46692 476816 46672->46692 46710 46e18d 46 API calls 7 library calls 46673->46710 46677 470b9d 46679 412486 46677->46679 46711 474d76 46 API calls 3 library calls 46677->46711 46679->46652 46679->46653 46680 470b5b CreateThread 46680->46679 46683 470b8e GetLastError 46680->46683 46737 470a85 46680->46737 46683->46673 46684->46656 46685->46658 46686->46646 46688 470b39 46687->46688 46689 47666b 46687->46689 46688->46670 46712 4765c6 46 API calls __freeptd 46689->46712 46691 476676 TlsSetValue 46691->46688 46713 47679f GetLastError 46692->46713 46694 47681c 46695 470b52 46694->46695 46728 4733cb 46 API calls 3 library calls 46694->46728 46697 4766e0 46695->46697 46731 475180 46697->46731 46699 4766ec GetModuleHandleA 46700 47670e 46699->46700 46701 47673d InterlockedIncrement 46699->46701 46735 4764e3 46 API calls 2 library calls 46700->46735 46702 475611 __lock 44 API calls 46701->46702 46705 476764 ___addlocaleref 46702->46705 46704 476713 46704->46701 46732 476796 46705->46732 46707 476790 _fprintf 46707->46680 46708->46668 46710->46677 46711->46679 46712->46691 46714 476658 __threadstartex@4 43 API calls 46713->46714 46715 4767b4 46714->46715 46716 47680a SetLastError 46715->46716 46717 476cf0 __calloc_crt 43 API calls 46715->46717 46716->46694 46718 4767c8 46717->46718 46718->46716 46719 4767d0 46718->46719 46729 4765c6 46 API calls __freeptd 46719->46729 46721 4767e2 46722 476801 46721->46722 46723 4767e9 46721->46723 46730 46e18d 46 API calls 7 library calls 46722->46730 46724 4766e0 __endthreadex 43 API calls 46723->46724 46726 4767f1 GetCurrentThreadId 46724->46726 46726->46716 46727 476807 46727->46716 46728->46695 46729->46721 46730->46727 46731->46699 46736 475539 RtlLeaveCriticalSection 46732->46736 46734 47679d 46734->46707 46735->46704 46736->46734 46738 476658 __threadstartex@4 46 API calls 46737->46738 46739 470a8b __threadstartex@4 46738->46739 46752 47663d TlsGetValue 46739->46752 46742 470ac5 46765 47682e 47 API calls 6 library calls 46742->46765 46743 470a9a __threadstartex@4 46764 47668a 46 API calls __freeptd 46743->46764 46745 470ae1 __endthreadex 46754 470a44 46745->46754 46748 470aaa 46749 470aae GetLastError RtlExitUserThread 46748->46749 46750 470abb GetCurrentThreadId 46748->46750 46749->46750 46750->46745 46753 470a96 46752->46753 46753->46742 46753->46743 46755 470a50 _fprintf 46754->46755 46756 476816 ___FrameUnwindToState 46 API calls 46755->46756 46757 470a55 46756->46757 46766 41252a 46757->46766 46764->46748 46765->46745 46807->46594 46809 472117 _fprintf 46808->46809 46810 475611 __lock 46 API calls 46809->46810 46811 47211e 46810->46811 46831 471fd6 46811->46831 46832 471fe3 46831->46832 46833 47201a 46831->46833 46867 471f9f GetDriveTypeA 46832->46867 46871 479f52 59 API calls 5 library calls 46833->46871 46836 47201f 46841 472033 46836->46841 46851 472052 46836->46851 46837 471feb 46838 472021 46837->46838 46839 471ff0 46837->46839 46838->46836 46868 474d63 46 API calls __endthreadex 46839->46868 46872 474d50 46 API calls __endthreadex 46841->46872 46842 471ff5 46869 474d50 46 API calls __endthreadex 46842->46869 46845 472038 46873 471b95 46 API calls 2 library calls 46845->46873 46846 472000 46870 471b95 46 API calls 2 library calls 46846->46870 46850 4720f7 GetLastError 46877 474d76 46 API calls 3 library calls 46850->46877 46851->46850 46852 472096 46851->46852 46853 4720aa 46851->46853 46855 472048 46852->46855 46874 474d50 46 API calls __endthreadex 46852->46874 46857 46ead1 _calloc 46 API calls 46853->46857 46864 47214b 46855->46864 46858 4720bc 46857->46858 46859 4720c4 46858->46859 46860 4720dc 46858->46860 46875 474d50 46 API calls __endthreadex 46859->46875 46860->46850 46860->46855 46878 475539 RtlLeaveCriticalSection 46864->46878 46866 472152 46867->46837 46868->46842 46869->46846 46871->46836 46872->46845 46874->46855 46877->46855 46878->46866 46893 403c22 __EH_prolog3_catch_GS 46892->46893 46896 403c39 46893->46896 47282 40695c 65 API calls 2 library calls 46893->47282 46895 403ca5 46897 41b0f2 ctype 65 API calls 46895->46897 46896->46895 46898 403c88 GetDlgItem SendMessageW 46896->46898 46900 403c81 46896->46900 46899 403caf 46897->46899 46898->46895 46901 413423 65 API calls 46899->46901 46900->46898 46902 403cbf 46901->46902 46903 403ce3 SetWindowTextW 46902->46903 46906 46e537 _wcslwr_s_l_stat 46 API calls 46902->46906 46904 403d00 46903->46904 46905 403f2f 46903->46905 46907 41b0f2 ctype 65 API calls 46904->46907 46908 4043a0 46905->46908 46909 403f42 46905->46909 46910 403ce0 46906->46910 46911 403d0b 46907->46911 46912 4043f0 46908->46912 46914 43e620 91 API calls 46908->46914 46913 43e620 91 API calls 46909->46913 46910->46903 46920 402669 ctype 65 API calls 46911->46920 46916 404420 46912->46916 46919 43e620 91 API calls 46912->46919 46915 403f51 46913->46915 46917 4043b8 SetDlgItemTextW 46914->46917 46925 4135ad ctype 65 API calls 46915->46925 46918 43e620 91 API calls 46916->46918 46923 4043d4 46917->46923 46921 404454 SetDlgItemTextW 46918->46921 46922 404408 46919->46922 46939 403d1b ctype 46920->46939 46924 43e620 91 API calls 46921->46924 46935 4233e1 65 API calls 46922->46935 46927 43e620 91 API calls 46923->46927 46928 404470 SetDlgItemTextW 46924->46928 46930 403f6b 46925->46930 46926 403d63 47064 402d76 46926->47064 46931 4043e3 SetDlgItemTextW 46927->46931 47091 40e8e3 46928->47091 46934 43e620 91 API calls 46930->46934 46931->46912 46933 403d71 ctype 46942 403dbe 46933->46942 46954 403d7e ctype 46933->46954 46937 403f7a GetDlgItem 46934->46937 46935->46916 46936 404481 GetSystemMenu 46938 43e620 91 API calls 46936->46938 46946 403fb9 46937->46946 46941 40449d InsertMenuW GetWindowRect 46938->46941 46939->46926 46940 403da7 46939->46940 46949 4233e1 65 API calls 46940->46949 46951 403dd9 ctype 46940->46951 46945 4044ca 46941->46945 46944 40c7bb 65 API calls 46942->46944 46944->46951 47096 405a61 GetClientRect 46945->47096 46947 43e620 91 API calls 46946->46947 46948 403fcf SendMessageW 46947->46948 46948->46946 46963 403fec SendMessageW 46948->46963 46949->46942 46953 40c7bb 65 API calls 46951->46953 46960 403e5e 46953->46960 47283 413f97 65 API calls ctype 46954->47283 46955 4044e9 46958 4044ff 46955->46958 47289 402621 SetWindowPos 46955->47289 46964 405a61 52 API calls 46958->46964 46966 43e620 91 API calls 46960->46966 46961 403dfc 46967 4134a3 ctype 65 API calls 46961->46967 46965 43e620 91 API calls 46963->46965 46968 404507 46964->46968 46976 40403a CheckDlgButton 46965->46976 46969 403e6d 46966->46969 46970 403e0b 46967->46970 47245 40663b 46968->47245 46974 41b0f2 ctype 65 API calls 46969->46974 46972 4233e1 65 API calls 46970->46972 46972->46951 46978 403e8b CheckDlgButton 46974->46978 46980 43e620 91 API calls 46976->46980 46983 41b0f2 ctype 65 API calls 46978->46983 46979 404517 46984 404551 GetDlgItem SetFocus 46979->46984 46985 40452e GetDlgItem SetFocus PostMessageW 46979->46985 46981 404072 CheckDlgButton 46980->46981 46989 43e620 91 API calls 46981->46989 46992 403eb0 ctype 46983->46992 46986 404562 46984->46986 46985->46986 46990 404572 ctype 46986->46990 47290 405825 120 API calls ctype 46986->47290 46991 4040ad 46989->46991 46990->46370 46997 4040c6 46991->46997 47284 40695c 65 API calls 2 library calls 46991->47284 46993 403ec5 46992->46993 46994 403edf GetDlgItem EnableWindow 46992->46994 46995 403f05 46993->46995 46996 403ece CheckDlgButton 46993->46996 46994->46995 46998 43e7b0 96 API calls 46995->46998 46996->46995 47001 4040f3 GetDlgItem EnableWindow 46997->47001 47002 4040d5 CheckDlgButton 46997->47002 46999 403f1e SetDlgItemTextW 46998->46999 46999->46905 47003 404112 CheckDlgButton 47001->47003 47002->47003 47005 41b0f2 ctype 65 API calls 47003->47005 47006 404129 ctype 47005->47006 47007 40415a GetDlgItem EnableWindow 47006->47007 47008 40413e 47006->47008 47009 404180 47007->47009 47008->47009 47010 404149 CheckDlgButton 47008->47010 47011 43e7b0 96 API calls 47009->47011 47010->47009 47012 404199 CheckDlgButton 47011->47012 47014 41b0f2 ctype 65 API calls 47012->47014 47015 4041bf ctype 47014->47015 47016 4041f0 GetDlgItem EnableWindow 47015->47016 47017 4041d4 47015->47017 47018 404216 47016->47018 47017->47018 47019 4041df CheckDlgButton 47017->47019 47020 43e7b0 96 API calls 47018->47020 47019->47018 47021 40422f 47020->47021 47022 43e620 91 API calls 47021->47022 47023 40424d 47022->47023 47024 43e620 91 API calls 47023->47024 47025 404269 47024->47025 47026 43e620 91 API calls 47025->47026 47027 404285 47026->47027 47285 43de80 94 API calls 47027->47285 47029 4042af 47030 43e620 91 API calls 47029->47030 47031 4042cd 47030->47031 47286 43de80 94 API calls 47031->47286 47033 4042f7 47034 43e620 91 API calls 47033->47034 47035 404315 47034->47035 47287 43de00 94 API calls 47035->47287 47037 40433d 47038 43e620 91 API calls 47037->47038 47039 40435b 47038->47039 47040 43e620 91 API calls 47039->47040 47041 404377 47040->47041 47042 43e620 91 API calls 47041->47042 47043 404393 47042->47043 47043->46908 47045 46ead1 _calloc 46 API calls 47044->47045 47046 4045ad 47045->47046 47047 404671 47046->47047 47048 4045e2 GetDlgItem GetClientRect GetTextExtentPoint32W MapDialogRect 47046->47048 47047->46370 47049 404647 47048->47049 47414 40359a lstrlenW 47049->47414 47052->46352 47053->46365 47054->46365 47055->46370 47056->46370 47057->46370 47058->46370 47059->46370 47060->46370 47061->46370 47062->46370 47063->46370 47065 402d85 __EH_prolog3_catch_GS ctype 47064->47065 47291 402c12 47065->47291 47067 402da8 47068 402ebe ctype 47067->47068 47070 402dbc ctype 47067->47070 47090 402eae ctype 47067->47090 47314 414012 65 API calls ctype 47068->47314 47307 414012 65 API calls ctype 47070->47307 47072 402669 ctype 65 API calls 47074 402eeb 47072->47074 47073 402e13 47308 413e55 65 API calls 2 library calls 47073->47308 47074->47072 47078 46e99f 48 API calls 47074->47078 47080 4134a3 ctype 65 API calls 47074->47080 47074->47090 47315 46e72f 46 API calls _xtow_s@20 47074->47315 47076 402e22 47079 413423 65 API calls 47076->47079 47078->47074 47081 402e36 47079->47081 47080->47074 47082 402e5e 47081->47082 47309 41350d 66 API calls ctype 47081->47309 47084 4134a3 ctype 65 API calls 47082->47084 47088 402e6c 47084->47088 47085 402669 ctype 65 API calls 47085->47088 47088->47085 47089 4134a3 ctype 65 API calls 47088->47089 47088->47090 47310 46e72f 46 API calls _xtow_s@20 47088->47310 47311 46e99f 47088->47311 47089->47088 47090->46933 47092 40e8f2 LoadImageW SendMessageW 47091->47092 47094 40e920 SendMessageW 47092->47094 47094->46936 47097 405cb6 47096->47097 47098 405acb 47096->47098 47099 405f01 GetWindowRect 47097->47099 47100 405cc2 47097->47100 47101 412f06 12 API calls 47098->47101 47105 405f26 47099->47105 47364 412f06 GetSystemMetrics SendMessageW 47100->47364 47115 405ae5 47101->47115 47107 405f4e GetWindowRect 47105->47107 47384 402621 SetWindowPos 47105->47384 47106 412f06 12 API calls 47131 405cfc 47106->47131 47110 405f6d 47107->47110 47111 405f90 GetWindowRect 47110->47111 47385 402621 SetWindowPos 47110->47385 47114 405faf 47111->47114 47117 412f06 12 API calls 47114->47117 47118 405b38 GetWindowRect 47115->47118 47373 402621 SetWindowPos 47115->47373 47120 405fd2 GetWindowRect 47117->47120 47124 405ba6 47118->47124 47119 405b6b 47374 402621 SetWindowPos 47119->47374 47129 405ff7 47120->47129 47125 405bc9 47124->47125 47375 402621 SetWindowPos 47124->47375 47127 412f06 12 API calls 47125->47127 47130 405be3 GetWindowRect 47127->47130 47128 40600b GetWindowRect 47140 406076 47128->47140 47129->47128 47386 402621 SetWindowPos 47129->47386 47139 405c08 47130->47139 47133 405d81 GetWindowRect 47131->47133 47378 402621 SetWindowPos 47131->47378 47148 405e0e 47133->47148 47134 40604a 47387 402621 SetWindowPos 47134->47387 47143 405c0e 47139->47143 47376 402621 SetWindowPos 47139->47376 47146 406099 47140->47146 47388 402621 SetWindowPos 47140->47388 47141 405db6 47379 402621 SetWindowPos 47141->47379 47151 412f06 12 API calls 47143->47151 47145 405dd1 47380 402621 SetWindowPos 47145->47380 47152 412f06 12 API calls 47146->47152 47155 405e31 GetWindowRect 47148->47155 47381 402621 SetWindowPos 47148->47381 47153 405c55 GetWindowRect 47151->47153 47154 4060b3 GetWindowRect 47152->47154 47167 405c77 47153->47167 47160 4060d8 47154->47160 47161 405e50 47155->47161 47165 4060e1 GetWindowRect 47160->47165 47162 405e73 47161->47162 47382 402621 SetWindowPos 47161->47382 47164 412f06 12 API calls 47162->47164 47168 405e8d GetWindowRect 47164->47168 47170 4060f7 47165->47170 47166 405cb1 47169 46e052 ___ansicp 5 API calls 47166->47169 47167->47166 47377 402621 SetWindowPos 47167->47377 47176 405eb2 47168->47176 47172 4044d3 47169->47172 47173 412f06 12 API calls 47170->47173 47172->46955 47288 402621 SetWindowPos 47172->47288 47175 406130 47173->47175 47177 406232 47175->47177 47389 402621 SetWindowPos 47175->47389 47185 405eb8 47176->47185 47383 402621 SetWindowPos 47176->47383 47179 412f06 12 API calls 47177->47179 47182 40625e 47179->47182 47181 406163 47390 402621 SetWindowPos 47181->47390 47182->47185 47187 406290 GetWindowRect 47182->47187 47406 413164 22 API calls 47185->47406 47186 406181 GetWindowRect 47190 4061a0 47186->47190 47188 4062a6 47187->47188 47394 402621 SetWindowPos 47188->47394 47391 402621 SetWindowPos 47190->47391 47192 4062c8 GetWindowRect 47197 4062e7 47192->47197 47194 4061c0 GetWindowRect 47198 4061df 47194->47198 47395 402621 SetWindowPos 47197->47395 47392 402621 SetWindowPos 47198->47392 47201 406305 GetWindowRect 47205 406324 47201->47205 47202 4061f9 GetWindowRect 47206 406218 47202->47206 47396 402621 SetWindowPos 47205->47396 47393 402621 SetWindowPos 47206->47393 47209 40633d GetWindowRect 47211 40635c 47209->47211 47397 402621 SetWindowPos 47211->47397 47213 406375 GetWindowRect 47215 406394 47213->47215 47398 402621 SetWindowPos 47215->47398 47217 4063ad GetWindowRect 47219 4063cc 47217->47219 47399 402621 SetWindowPos 47219->47399 47221 4063e8 GetWindowRect 47223 406407 47221->47223 47400 402621 SetWindowPos 47223->47400 47225 406420 GetWindowRect 47249 40665e 47245->47249 47246 4066d5 47247 4066d7 GetDlgItem IsWindow 47246->47247 47248 4066f3 47247->47248 47251 40671c GetClientRect GetDlgItem 47248->47251 47410 46e18d 46 API calls 7 library calls 47248->47410 47249->47246 47250 4066b0 SendMessageW 47249->47250 47250->47247 47252 4066c3 SendMessageW 47250->47252 47254 40676f 47251->47254 47252->47247 47256 406809 47254->47256 47407 402467 47254->47407 47255 406719 47255->47251 47258 406816 GetClientRect 47256->47258 47259 406828 GetWindowRect 47256->47259 47265 40683a 47258->47265 47259->47265 47260 4067a3 47260->47256 47261 4067ac GetWindowRect MapWindowPoints 47260->47261 47411 4070a0 53 API calls 47261->47411 47262 4068d3 GetDlgItem GetWindowRect MapWindowPoints 47262->47265 47264 40450f 47268 4024d4 47264->47268 47265->47262 47265->47264 47412 40711a RaiseException 47265->47412 47413 4070a0 53 API calls 47265->47413 47269 4024ee 47268->47269 47270 402512 GetWindowRect 47269->47270 47271 402506 GetWindow 47269->47271 47272 4024fc GetParent 47269->47272 47273 402527 SystemParametersInfoW 47270->47273 47274 40256d GetParent 47270->47274 47275 402510 47271->47275 47272->47275 47277 402560 GetWindowRect 47273->47277 47278 402554 SetWindowPos 47273->47278 47279 402584 MapWindowPoints 47274->47279 47275->47270 47277->47278 47278->46979 47279->47278 47283->46961 47285->47029 47286->47033 47287->47037 47288->46955 47289->46958 47290->46990 47292 402c21 __EH_prolog3_catch_GS 47291->47292 47293 413423 65 API calls 47292->47293 47294 402c4d SHGetFolderPathW 47293->47294 47316 414ba7 47294->47316 47296 402c6f 47297 4233e1 65 API calls 47296->47297 47298 402c7f 47297->47298 47306 419a0f 71 API calls 47298->47306 47299 402c87 47302 402d25 ctype 47299->47302 47320 41383f 58 API calls 2 library calls 47299->47320 47301 4233e1 65 API calls 47304 402cf9 ctype 47301->47304 47302->47067 47303 402cb8 ctype 47303->47301 47303->47302 47321 41383f 58 API calls 2 library calls 47304->47321 47306->47299 47307->47073 47308->47076 47309->47082 47310->47088 47337 46e918 47311->47337 47313 46e9ac 47313->47088 47314->47074 47315->47074 47317 414bb3 __EH_prolog3 47316->47317 47322 417da0 47317->47322 47319 414bc0 std::_String_base::_Xlen 47319->47296 47320->47303 47321->47302 47323 417dac __EH_prolog3 47322->47323 47324 46e4c8 std::_String_base::_Xlen 54 API calls 47323->47324 47325 417dbe 47324->47325 47326 417dc3 47325->47326 47327 417dcc 47325->47327 47334 417cac 7 API calls ___ansicp 47326->47334 47330 417e01 std::_String_base::_Xlen 47327->47330 47335 4143fb 65 API calls 3 library calls 47327->47335 47329 417dca 47329->47327 47330->47319 47332 417df3 47336 472749 RaiseException 47332->47336 47334->47329 47335->47332 47336->47330 47338 46e945 47337->47338 47339 46e921 47337->47339 47338->47339 47341 46e94f GetFileAttributesW 47338->47341 47357 474d63 46 API calls __endthreadex 47339->47357 47343 46e95e GetLastError 47341->47343 47349 46e974 47341->47349 47342 46e926 47358 474d50 46 API calls __endthreadex 47342->47358 47360 474d76 46 API calls 3 library calls 47343->47360 47344 46e99b 47344->47313 47347 46e92d 47359 471b95 46 API calls 2 library calls 47347->47359 47348 46e96a 47361 474d50 46 API calls __endthreadex 47348->47361 47349->47344 47362 474d63 46 API calls __endthreadex 47349->47362 47354 46e970 47354->47313 47355 46e988 47363 474d50 46 API calls __endthreadex 47355->47363 47357->47342 47358->47347 47360->47348 47361->47354 47362->47355 47363->47348 47365 412f64 SelectObject 47364->47365 47366 413083 47365->47366 47367 412f7c 47365->47367 47370 46e052 ___ansicp 5 API calls 47366->47370 47367->47366 47368 412fa1 GetDlgItem 47367->47368 47371 41302d GetWindowRect 47367->47371 47368->47367 47369 412fc5 GetWindowTextW DrawTextW 47368->47369 47369->47367 47369->47371 47372 405cdc 47370->47372 47371->47367 47372->47106 47373->47119 47374->47118 47375->47125 47376->47143 47377->47166 47378->47141 47379->47145 47380->47133 47381->47155 47382->47162 47383->47185 47384->47107 47385->47111 47386->47134 47387->47128 47388->47146 47389->47181 47390->47186 47391->47194 47392->47202 47393->47177 47394->47192 47395->47201 47396->47209 47397->47213 47398->47217 47399->47221 47400->47225 47406->47166 47408 402471 47407->47408 47409 402476 CreateWindowExW 47407->47409 47408->47409 47409->47260 47410->47255 47411->47256 47412->47265 47413->47265 47415 4035ae 47414->47415 47417 4035c6 47414->47417 47416 46e537 _wcslwr_s_l_stat 46 API calls 47415->47416 47419 4035b6 47416->47419 47421 4035f0 CharNextW 47417->47421 47422 4035ff 47417->47422 47418 40364a lstrlenW 47423 40365b 47418->47423 47437 40bd64 RaiseException 47419->47437 47421->47417 47421->47422 47422->47418 47424 40363b CharNextW 47422->47424 47431 4035bc SetDlgItemTextW 47423->47431 47435 403660 47423->47435 47438 40c781 47 API calls 47423->47438 47424->47418 47424->47422 47427 4036b5 47427->47431 47439 40c7a0 47 API calls _wcscat_s 47427->47439 47430 4036d2 47440 46e89e 46 API calls _memmove_s 47430->47440 47431->47047 47433 4036ea 47441 40bd64 RaiseException 47433->47441 47436 4036fd 47435->47436 47442 40c781 47 API calls 47435->47442 47436->47431 47443 40c7a0 47 API calls _wcscat_s 47436->47443 47437->47431 47438->47427 47439->47430 47440->47433 47441->47435 47442->47436 47443->47431 47445 40473f SendMessageW 47444->47445 47445->46416 47446->46417
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: InfoLocale_wcsncpy
          • String ID: -RSA$-SECURE$.MUTEX$/tmp/..PKText.$RSA$SECURE$en_US
          • API String ID: 940669412-3505281648
          • Opcode ID: 4a1024305c15e102c8b9219a2ef01b3e1ddde0e36b69676182df8cd09f271724
          • Instruction ID: 5acca7fe00b406a7f80ea77396577d8f33f98f7d67d292d92bac8947ca1b5112
          • Opcode Fuzzy Hash: 4a1024305c15e102c8b9219a2ef01b3e1ddde0e36b69676182df8cd09f271724
          • Instruction Fuzzy Hash: 6A82F371E002059FDB24DFA8CC51BAFB7B1AF98304F18816EE9059B391E738AE45CB55

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1543 426c76-426c8c call 47f798 1546 426ca7-426cd5 call 41b0f2 call 425c1e 1543->1546 1547 426c8e 1543->1547 1558 426cd7 1546->1558 1559 426cdc-426cf0 call 41b0f2 1546->1559 1548 426c8f 1547->1548 1550 426c91-426ca2 call 4143fb call 472749 1548->1550 1550->1546 1558->1559 1563 426cf2-426d10 call 427600 call 44a270 call 46e532 1559->1563 1564 426d68-426d6f 1559->1564 1579 426d12-426d15 1563->1579 1580 426d1a-426d1f 1563->1580 1565 426d71-426d72 1564->1565 1566 426d77-426d80 1564->1566 1565->1548 1568 426d92-426d98 1566->1568 1569 426d82-426d88 1566->1569 1572 426d9b-426db3 call 41b0f2 1568->1572 1569->1568 1571 426d8a-426d90 1569->1571 1571->1568 1571->1572 1584 426dc2 1572->1584 1585 426db5-426dba 1572->1585 1579->1550 1582 426d21-426d32 call 41b0f2 1580->1582 1583 426d34-426d46 call 426920 1580->1583 1595 426d49-426d63 call 413380 call 46e066 1582->1595 1583->1595 1588 426dc4-426dd0 1584->1588 1585->1588 1589 426dbc 1585->1589 1592 426dd2-426ddb CryptDeriveKey 1588->1592 1593 426ddd-426ddf CryptGenKey 1588->1593 1589->1584 1594 426de5-426de7 1592->1594 1593->1594 1596 426df4-426e0d call 41b0f2 1594->1596 1597 426de9-426dea 1594->1597 1606 426ea6-426eab call 47f870 1595->1606 1608 426e28-426e3c call 41b0f2 1596->1608 1609 426e0f-426e26 call 41b0f2 1596->1609 1597->1596 1617 426e55 1608->1617 1618 426e3e-426e53 call 41b0f2 1608->1618 1609->1608 1619 426ea2 1609->1619 1621 426e5c-426e6f CryptSetKeyParam 1617->1621 1618->1621 1619->1606 1621->1619 1623 426e71-426e9a call 41b0f2 call 448b80 call 4143fb 1621->1623 1623->1619
          APIs
          • __EH_prolog3.LIBCMT ref: 00426C7D
          • __CxxThrowException@8.LIBCMT ref: 00426CA2
            • Part of subcall function 00426920: __EH_prolog3_GS.LIBCMT ref: 0042692A
          • CryptDeriveKey.ADVAPI32(00000000,?,00000000,00000011,00000010), ref: 00426DD5
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
          • CryptGenKey.ADVAPI32(00000000,?,00000011,00000010), ref: 00426DDF
          • CryptSetKeyParam.ADVAPI32(00000010,00000013,00000028,00000000), ref: 00426E67
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Crypt$Exception@8Throw$DeriveH_prolog3H_prolog3_Param
          • String ID: (
          • API String ID: 1982271541-3887548279
          • Opcode ID: 24b363fc8a1e6a64c8c4c151047eaaeb8951b23d619a2c26852ac00ac805031b
          • Instruction ID: 99f36b1f62fc716bf29f26525d508c159c8386659eb6f7c449594aa5302ae4c9
          • Opcode Fuzzy Hash: 24b363fc8a1e6a64c8c4c151047eaaeb8951b23d619a2c26852ac00ac805031b
          • Instruction Fuzzy Hash: 6A61F2703003199FDB14EF61D885AAF77A9FF44304F51882EF4528B251DB38EE458B69

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1702 48332f 1704 483299-4832a0 call 4831cd 1702->1704 1705 4832a2-4832aa 1702->1705 1704->1705 1713 4832e5-4832e8 1704->1713 1707 4832ac-4832bf GetProcessHeap RtlAllocateHeap 1705->1707 1708 4832c3-4832cc RtlInterlockedPopEntrySList 1705->1708 1712 4832c1-4832c2 1707->1712 1707->1713 1709 48332d-48332e 1708->1709 1710 4832ce-4832e3 VirtualAlloc 1708->1710 1710->1713 1714 4832e9-4832fc RtlInterlockedPopEntrySList 1710->1714 1715 4832fe-48330e VirtualFree 1714->1715 1716 483310 1714->1716 1717 48332c 1715->1717 1718 483316-483328 RtlInterlockedPushEntrySList 1716->1718 1717->1709 1718->1718 1719 48332a 1718->1719 1719->1717
          APIs
          • GetProcessHeap.KERNEL32(00000000,0000000D,00402304,0040242D,?,004022E3,?,?,004017F3), ref: 004832B0
          • RtlAllocateHeap.NTDLL(00000000), ref: 004832B7
            • Part of subcall function 004831CD: IsProcessorFeaturePresent.KERNEL32(0000000C,00000000,0048329E,00402304,0040242D,?,004022E3,?,?,004017F3), ref: 004831D0
          • RtlInterlockedPopEntrySList.NTDLL(004C86F4), ref: 004832C4
          • VirtualAlloc.KERNELBASE(00000000,00001000,00001000,00000040), ref: 004832D9
          • RtlInterlockedPopEntrySList.NTDLL(?), ref: 004832F2
          • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 00483306
          • RtlInterlockedPushEntrySList.NTDLL(00000000), ref: 0048331D
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: EntryInterlockedList$HeapVirtual$AllocAllocateFeatureFreePresentProcessProcessorPush
          • String ID:
          • API String ID: 1137860932-0
          • Opcode ID: 8d5bff0c96ff1517d682cc256b2dff928bd53f1f8e5f39fbbe3eed62ad44fdf2
          • Instruction ID: fcf170cc3a69c753ddc6a3f7aeb580dbc219c92687fd0bb244c5d784c1580884
          • Opcode Fuzzy Hash: 8d5bff0c96ff1517d682cc256b2dff928bd53f1f8e5f39fbbe3eed62ad44fdf2
          • Instruction Fuzzy Hash: 01118E31700222A7DBA12F68BC09F6F2759AB40B52F11087AF901D6291CE69CD01979C
          APIs
          • SetFileAttributesW.KERNELBASE(?,?), ref: 00418AC2
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 00418AB3
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 00418AF8
          • DeviceIoControl.KERNEL32(00000000,0009C040,00000001,00000002,00000000,00000000,?,00000000), ref: 00418B1B
          • CloseHandle.KERNEL32(00000000,?,C0000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 00418B22
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: File$AttributesCloseControlCreateDeviceExceptionException@8H_prolog3_catchHandleRaiseThrow
          • String ID:
          • API String ID: 1009827949-0
          • Opcode ID: f71cb0975ed40d78350e2c4f455491f2fd756bbffade5c202e61384598a5ff62
          • Instruction ID: 50a448b9711fae2cfeba7cc515209b954b7f8bbcc18326bed44ac68616f8a36d
          • Opcode Fuzzy Hash: f71cb0975ed40d78350e2c4f455491f2fd756bbffade5c202e61384598a5ff62
          • Instruction Fuzzy Hash: 9811B4B15002087BEB109BA9CC89FEF77ACDF05354F04842BF911A6190DA7C9D858769
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0042244A
          • __CxxThrowException@8.LIBCMT ref: 004224B4
            • Part of subcall function 00413299: __CxxThrowException@8.LIBCMT ref: 004132C8
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3_catchThrow
          • String ID: `lJ
          • API String ID: 1118002619-3906444823
          • Opcode ID: 59a6d72704918c19faeed85af14b94b9c92b5c598a64a22546094777aa3411c0
          • Instruction ID: c35e26a00393e5b2e2c59434b8311ea082406818776b7c1d045db45c09da61d8
          • Opcode Fuzzy Hash: 59a6d72704918c19faeed85af14b94b9c92b5c598a64a22546094777aa3411c0
          • Instruction Fuzzy Hash: E9925D30B00229DFCF14DFA5D998AEEBBB1BF44304F5440AEE406AB291DB789E45CB55
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _strtol
          • String ID: tJJ
          • API String ID: 4256861632-807802527
          • Opcode ID: fc4399413733df451c08193ba6b54023f5fb80ef45a88cb499f4aabe45ee2039
          • Instruction ID: f4f1d69f7e46b4a95c8140b364bcd7da591f30c1aca902dca42a9d2a105dfec9
          • Opcode Fuzzy Hash: fc4399413733df451c08193ba6b54023f5fb80ef45a88cb499f4aabe45ee2039
          • Instruction Fuzzy Hash: DD927070D04259CBEB24CF99C8806EDB7F1BF54314F24452BD84AAB360E779A9C1CB59
          APIs
          • CryptAcquireContextW.ADVAPI32(00000018,00000018,00000018,004A64E8,?,0041B79D,?,?,?,004A64E8,00000018,?), ref: 00448869
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: AcquireContextCrypt
          • String ID:
          • API String ID: 3951991833-0
          • Opcode ID: 537166bf61c26e19ad15ea249327eedf0e3ddff59d2f59a484c545b55d54971e
          • Instruction ID: 8dde9eaa2dea11f858e6fe3bbc794718fdc2df540c0962b3956480ff6c93141a
          • Opcode Fuzzy Hash: 537166bf61c26e19ad15ea249327eedf0e3ddff59d2f59a484c545b55d54971e
          • Instruction Fuzzy Hash: BED0C5B5618342AF9B08CF58D994D3BB7E9BBC8750F044D4CB59583250C720E849CB66
          APIs
          • CryptCreateHash.ADVAPI32(004C1E84,004C1E84,004C1E84,?,?,0042866E,?,00000000,?,?,?,?,00000000,?,?,?), ref: 00448B59
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CreateCryptHash
          • String ID:
          • API String ID: 4184778727-0
          • Opcode ID: 0dc450ab19c6d24eac68c715404478ac477747c1c57092f1fbd937f4f75f0f0d
          • Instruction ID: 1f3e2a125cdd6bddad7707eab018d9df9611b54367dc21938e6e3d5120c85b57
          • Opcode Fuzzy Hash: 0dc450ab19c6d24eac68c715404478ac477747c1c57092f1fbd937f4f75f0f0d
          • Instruction Fuzzy Hash: D2D0C5B5A19342AF9B08CF58D994C3BB7E9BBD8700F044D0CBA9583250C720E809CB66

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 403c16-403c32 call 47f837 4 403c34 call 40695c 0->4 5 403c39-403c53 0->5 4->5 8 403ca5-403cc8 call 41b0f2 call 413423 5->8 9 403c55-403c5b 5->9 22 403ce3-403cfa SetWindowTextW 8->22 23 403cca-403cce 8->23 10 403c65 9->10 11 403c5d-403c63 9->11 14 403c6c-403c75 10->14 11->10 13 403c88-403c9f GetDlgItem SendMessageW 11->13 13->8 14->14 16 403c77 14->16 17 403c81 16->17 18 403c79-403c7f 16->18 17->13 18->14 18->17 25 403d00-403d2c call 41b0f2 call 402669 22->25 26 403f2f 22->26 23->22 24 403cd0-403ce0 call 46e537 23->24 24->22 53 403d63-403d6c call 402d76 25->53 54 403d2e-403d31 25->54 27 403f35-403f3c 26->27 30 4043a0-4043a7 27->30 31 403f42-403fb6 call 43e620 call 4135ad call 43e620 GetDlgItem 27->31 34 4043f0-4043f7 30->34 35 4043a9-4043ee call 43e620 SetDlgItemTextW call 43e620 SetDlgItemTextW 30->35 89 403fb9-403fea call 43e620 SendMessageW 31->89 39 404442-4044d6 call 43e620 SetDlgItemTextW call 43e620 SetDlgItemTextW call 40e8e3 GetSystemMenu call 43e620 InsertMenuW GetWindowRect call 40264b call 405a61 34->39 40 4043f9-40443e call 43e620 call 4233e1 34->40 35->34 113 4044d8-4044e4 call 402621 39->113 114 4044e9-4044ec 39->114 40->39 64 403d71-403d7c call 41389f 53->64 54->53 60 403d33-403d3d call 41389f 54->60 72 403d59-403d61 60->72 73 403d3f-403d57 call 471599 60->73 80 403dcc-403dd4 call 40c7bb 64->80 81 403d7e-403d93 call 41389f 64->81 72->53 78 403daa-403dac 72->78 73->72 91 403da7 73->91 83 403dd9-403ec3 call 413309 call 40c7bb call 43e620 call 41b0f2 CheckDlgButton call 41b0f2 call 41389f 78->83 84 403dae-403db1 78->84 80->83 100 403d95-403da1 81->100 101 403de6-403def call 413edf 81->101 178 403ec5-403ecc 83->178 179 403edf-403efc GetDlgItem EnableWindow 83->179 84->83 90 403db3-403dc7 call 4233e1 84->90 102 403fec-403ffd 89->102 90->80 91->78 100->101 107 403da3-403da5 100->107 108 403df0-403e32 call 413f97 call 4134a3 call 4233e1 call 413309 101->108 109 40401b 102->109 110 403fff-404001 102->110 107->108 108->83 121 40401d-40404e SendMessageW call 43e620 109->121 119 404003-404005 110->119 120 404017-404019 110->120 113->114 117 4044ee-4044fa call 402621 114->117 118 4044ff-404512 call 405a61 call 40663b call 4024d4 114->118 117->118 149 404517-40452c 118->149 125 404013-404015 119->125 126 404007-404009 119->126 120->121 145 404050-404052 121->145 146 404054 121->146 125->121 131 40400b-40400d 126->131 132 40400f-404011 126->132 131->121 132->121 147 404056-404086 CheckDlgButton call 43e620 145->147 146->147 165 404088-40408a 147->165 166 40408c 147->166 158 404551-40455c GetDlgItem SetFocus 149->158 159 40452e-40454f GetDlgItem SetFocus PostMessageW 149->159 162 404562-404569 158->162 159->162 163 404572-404581 call 413309 call 47f893 162->163 164 40456b-40456d call 405825 162->164 164->163 169 40408e-4040bf CheckDlgButton call 43e620 165->169 166->169 183 4040c1 call 40695c 169->183 184 4040c6-4040d3 169->184 181 403f05-403f2d call 43e7b0 SetDlgItemTextW 178->181 182 403ece-403edd CheckDlgButton 178->182 179->181 181->27 182->181 183->184 189 4040f3-404109 GetDlgItem EnableWindow 184->189 190 4040d5-4040dc 184->190 193 404112-40413c CheckDlgButton call 41b0f2 call 41389f 189->193 191 4040e2 190->191 192 4040de-4040e0 190->192 194 4040e4-4040f1 CheckDlgButton 191->194 192->194 200 40415a-404177 GetDlgItem EnableWindow 193->200 201 40413e-404147 193->201 194->193 202 404180-4041d2 call 43e7b0 CheckDlgButton call 41b0f2 call 41389f 200->202 201->202 203 404149-404158 CheckDlgButton 201->203 212 4041f0-404210 GetDlgItem EnableWindow 202->212 213 4041d4-4041dd 202->213 203->202 214 404216-40439c call 43e7b0 call 43e620 * 3 call 43de80 call 43e620 call 43de80 call 43e620 call 43de00 call 43e620 * 3 212->214 213->214 215 4041df-4041ee CheckDlgButton 213->215 214->30 215->214
          APIs
          • __EH_prolog3_catch_GS.LIBCMT ref: 00403C1D
          • GetDlgItem.USER32(?,000003F6), ref: 00403C90
          • SendMessageW.USER32(00000000,00000406,00000000,00000000), ref: 00403C9F
          • CheckDlgButton.USER32(00000002,000003F7,00000000), ref: 00403EA2
          • CheckDlgButton.USER32(00000002,000003F7,00000001), ref: 00403ED7
          • SetDlgItemTextW.USER32(00000002,000003F7,?,?,?,?,00000002,000003F7), ref: 00403F2B
          • SetWindowTextW.USER32(00000000,004C87B8), ref: 00403CED
            • Part of subcall function 0040695C: __CxxThrowException@8.LIBCMT ref: 00406977
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ButtonCheckItemText$Exception@8H_prolog3_catch_MessageSendThrowWindow
          • String ID: $AJ
          • API String ID: 645776859-3211715044
          • Opcode ID: ecc380cf9a27106fbfef7a67af6f0ae335075b5fc88e495500b1016c2f6cebf3
          • Instruction ID: 5bd5780b562722fce59a59976ad0dbf48ca961e02b0d0c2e106d9794dd83aeea
          • Opcode Fuzzy Hash: ecc380cf9a27106fbfef7a67af6f0ae335075b5fc88e495500b1016c2f6cebf3
          • Instruction Fuzzy Hash: 2D429270A40205BFEB116F61DC4AFAE7B79FF08709F10443AF601B61E2DBB669509B58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 545 404d00-404d44 call 47f7cb LoadCursorW SetCursor call 402b9c 551 404d72 545->551 552 404d46-404d70 GetDlgItem * 2 545->552 553 404d78-404d7f 551->553 552->553 555 404d81-404d93 GetDlgItem KiUserCallbackDispatcher call 404b22 553->555 556 404d98-404d9b 553->556 555->556 558 404da1-404dae 556->558 559 404ec6-404eeb RtlEnterCriticalSection RtlLeaveCriticalSection 556->559 561 404eb2-404ec1 call 4233e1 558->561 562 404db4-404dd0 call 4233e1 call 4189b0 558->562 563 404ef2-404f00 call 402669 559->563 564 404eed call 40695c 559->564 561->559 562->559 577 404dd6-404e1c call 43e7b0 call 40c7de 562->577 572 404f02 call 40695c 563->572 573 404f07-404f34 call 41b0f2 563->573 564->563 572->573 583 405046-40504c 573->583 584 404f3a-404f4d 573->584 587 404e21-404e27 577->587 585 40504e-40505f IsDlgButtonChecked 583->585 586 40507f-405083 583->586 599 404f59 584->599 600 404f4f-404f57 584->600 588 405061-405069 585->588 589 40506b 585->589 592 40508a 586->592 590 404e50-404e57 587->590 591 404e29-404e4e call 4233e1 call 413309 587->591 594 405074-40507d 588->594 589->594 597 404e87-404eaf GetDlgItem call 413309 SetCursor call 47f870 590->597 598 404e59-404e5f 590->598 591->559 596 40508c-4050a6 592->596 594->596 602 4050a8 call 40695c 596->602 603 4050ad-4050d9 call 41b0f2 596->603 604 404e61-404e71 GetDlgItem 598->604 605 404e74-404e84 GetDlgItem 598->605 606 404f62-404f6f 599->606 600->606 602->603 622 4050db-4050dd 603->622 623 4050df 603->623 604->605 605->597 614 404f71-404f79 606->614 615 404f7b 606->615 618 404f84-404f91 614->618 615->618 628 404f93-404f9a 618->628 629 404f9c 618->629 625 4050e1-405147 call 43e620 SetDlgItemTextW 622->625 623->625 632 4051b0-4051be call 46e4c8 625->632 633 405149-4051ab call 43de80 SetDlgItemTextW call 43de00 SetDlgItemTextW call 413309 625->633 631 404fa5-404fb2 628->631 629->631 638 404fb4-404fbc 631->638 639 404fbe 631->639 643 4051c0-4051e6 632->643 644 4051e8-4051ea 632->644 633->632 642 404fc7-404fd4 638->642 639->642 651 404fe1 642->651 652 404fd6-404fdf 642->652 645 4051ed-4051f2 643->645 644->645 648 4051f4-4051f6 645->648 649 4051fa-405203 645->649 648->649 653 405205 call 40695c 649->653 654 40520a-405218 649->654 655 404fea-404ff7 651->655 652->655 653->654 659 40521a call 40695c 654->659 660 40521f-40522c call 402835 654->660 661 405004 655->661 662 404ff9-405002 655->662 659->660 669 405233-40524b call 41237c 660->669 670 40522e call 40695c 660->670 665 40500d-40502a GetDlgItem SendMessageW 661->665 662->665 667 405041 665->667 668 40502c-40502d 665->668 671 405043-405044 667->671 672 40503d-40503f 668->672 673 40502f-405030 668->673 678 405252-405264 669->678 679 40524d call 40695c 669->679 670->669 671->596 672->671 676 405032-405033 673->676 677 405039-40503b 673->677 676->592 680 405035-405037 676->680 677->671 683 405266 678->683 684 40526b-4052a3 call 40e726 678->684 679->678 680->671 683->684 688 4052a9-4052b3 684->688 689 40543c-405466 SetDlgItemTextW * 2 684->689 690 4052b5-4052bb 688->690 691 4052f6-4052fc 688->691 692 405468-40546e 689->692 693 40549e-4054a5 689->693 698 4052c1 690->698 699 4052bd-4052bf 690->699 700 40535e 691->700 701 4052fe-405305 691->701 694 405470-405481 GetDlgItem EnableWindow 692->694 695 405487-405498 GetDlgItem EnableWindow 692->695 696 4054a7-4054b5 GetDlgItem KiUserCallbackDispatcher 693->696 697 4054bb-4054c6 call 40e726 693->697 694->695 695->693 696->697 712 4054c8-4054ca call 404c86 697->712 713 4054cf-4054d1 697->713 703 4052c3-4052f1 call 43e620 call 40c7de 698->703 699->703 702 405360-405386 call 43e620 call 40c7de 700->702 705 405307-40533b call 43e620 call 40c7de 701->705 706 40535a-40535c 701->706 720 40538b 702->720 703->689 723 40538e-4053a0 705->723 724 40533d-405358 ShellExecuteW 705->724 706->702 712->713 720->723 725 4053a2-4053b6 call 4233e1 call 418445 723->725 726 4053bb-4053c6 call 40c7bb 723->726 724->723 733 4053b9 725->733 730 4053cb-4053d7 call 41365f 726->730 734 4053e8-4053f4 730->734 735 4053d9-4053e3 call 4134a3 730->735 733->730 737 4053f6-4053f8 734->737 738 4053fa 734->738 735->734 739 4053fc-405406 call 412ae6 737->739 738->739 741 40540b-405419 call 413309 739->741 741->689
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 00404D07
          • LoadCursorW.USER32(00000000,00007F02), ref: 00404D17
          • SetCursor.USER32(00000000,?,00000000,00000001,?,?,?,?,?,?,?,?,?,?,0040E24F,00000001), ref: 00404D21
          • GetDlgItem.USER32(?,000003E8), ref: 00404D4E
          • GetDlgItem.USER32(?,00000408), ref: 00404D66
          • GetDlgItem.USER32(?,00000001), ref: 00404D86
          • KiUserCallbackDispatcher.NTDLL(00000000,00000000,?,00000000,00000001,?,?,?,?,?,?,?,?,?,?,0040E24F), ref: 00404D8E
          • GetDlgItem.USER32(00000001,000003E8), ref: 00404E69
          • GetDlgItem.USER32(00000001,00000408), ref: 00404E7C
          • GetDlgItem.USER32(00000001,00000001), ref: 00404E8C
          • SetCursor.USER32(?), ref: 00404EA2
          • RtlEnterCriticalSection.NTDLL(004CBA3C), ref: 00404ECC
          • RtlLeaveCriticalSection.NTDLL(004CBA3C), ref: 00404EDA
          • GetDlgItem.USER32(?,000003EC), ref: 00405015
          • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00405023
          • IsDlgButtonChecked.USER32(?,000003F7), ref: 00405056
          • SetDlgItemTextW.USER32(?,0000040D,00000000), ref: 004050FE
          • SetDlgItemTextW.USER32(00000002,00000402,?), ref: 00405173
          • SetDlgItemTextW.USER32(00000002,00000403,?), ref: 004051A2
          • SetDlgItemTextW.USER32(00000003,0000040D,004A4124), ref: 0040544A
          • SetDlgItemTextW.USER32(00000003,0000040E,004A4124), ref: 00405459
          • GetDlgItem.USER32(00000003,000003E8), ref: 00405478
          • EnableWindow.USER32(00000000,00000001), ref: 00405481
          • GetDlgItem.USER32(00000003,00000408), ref: 0040548F
          • EnableWindow.USER32(00000000,00000001), ref: 00405498
          • GetDlgItem.USER32(00000003,00000001), ref: 004054AC
          • KiUserCallbackDispatcher.NTDLL(00000000,00000001), ref: 004054B5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Item$Text$Cursor$CallbackCriticalDispatcherEnableSectionUserWindow$ButtonCheckedEnterH_prolog3_catchLeaveLoadMessageSend
          • String ID: AJ$$AJ$PMJ
          • API String ID: 2824313723-3613703201
          • Opcode ID: c1194afb56763b27e3c0913e7928a4600311631e291c06c6fe45b60898154e75
          • Instruction ID: 396c25243df7174e6f7b2191e46bd83bc840df2e0e16bfe39eed935e81bc7eae
          • Opcode Fuzzy Hash: c1194afb56763b27e3c0913e7928a4600311631e291c06c6fe45b60898154e75
          • Instruction Fuzzy Hash: DF2282B0A00606FBDB15AF64CC89EAEBB75FF04304F10423EF519A62E1D7796950CB99

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 747 405a61-405ac5 GetClientRect 748 405cb6-405cbc 747->748 749 405acb-405b36 call 412f06 call 40264b * 2 747->749 750 405f01-405f2f GetWindowRect call 40264b 748->750 751 405cc2-405cd7 call 412f06 748->751 786 405b38-405b47 749->786 787 405b4e-405b82 call 402621 * 2 749->787 762 405f31-405f49 call 402621 750->762 763 405f4e-405f71 GetWindowRect call 40264b 750->763 755 405cdc-405d71 call 412f06 call 40264b * 3 751->755 819 405d73 755->819 820 405d76-405d7f 755->820 762->763 775 405f90-406000 GetWindowRect call 40264b call 412f06 GetWindowRect call 40264b 763->775 776 405f73-405f8b call 402621 763->776 808 406002 775->808 809 406005-406009 775->809 776->775 792 405b87-405baa GetWindowRect call 40264b 786->792 793 405b49-405b4c 786->793 787->792 806 405bc9-405c0c call 412f06 GetWindowRect call 40264b 792->806 807 405bac-405bc4 call 402621 792->807 793->792 836 405c1e-405c36 call 402621 806->836 837 405c0e-405c17 806->837 807->806 808->809 813 40600b-406017 809->813 814 40601e-406052 call 402621 * 2 809->814 817 406057-40607a GetWindowRect call 40264b 813->817 818 406019-40601c 813->818 814->817 843 406099-40613b call 412f06 GetWindowRect call 40264b GetWindowRect call 40264b call 412f06 817->843 844 40607c-406094 call 402621 817->844 818->817 819->820 822 405d81-405d92 820->822 823 405d99-405dea call 402621 * 3 820->823 827 405d94-405d97 822->827 828 405def-405e12 GetWindowRect call 40264b 822->828 823->828 827->828 854 405e31-405e54 GetWindowRect call 40264b 828->854 855 405e14-405e2c call 402621 828->855 842 405c3b-405c80 call 412f06 GetWindowRect call 40264b 836->842 841 405c19-405c1c 837->841 837->842 841->842 866 405c82 842->866 867 405c85-405c89 842->867 886 406140-406144 843->886 887 40613d 843->887 844->843 868 405e73-405eb6 call 412f06 GetWindowRect call 40264b 854->868 869 405e56-405e6e call 402621 854->869 855->854 866->867 873 406571-406585 call 46e052 867->873 874 405c8f-405cb1 call 402621 867->874 891 405ec8-405ee0 call 402621 868->891 892 405eb8-405ec1 868->892 869->868 874->873 889 406232-406281 call 412f06 886->889 890 40614a-40622d call 402621 * 2 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 886->890 887->886 903 406287-406536 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 GetWindowRect call 40264b call 402621 889->903 904 40653b-406562 889->904 890->889 895 405ee5-405efc 891->895 894 405ec3-405ec6 892->894 892->895 894->895 900 406564-40656e call 413164 895->900 900->873 903->904 904->900
          APIs
          • GetClientRect.USER32(?,?), ref: 00405AA7
          • GetWindowRect.USER32(00000000,00000010), ref: 00405B98
          • GetWindowRect.USER32(00000000,00000010), ref: 00405BFA
          • GetWindowRect.USER32(00000000,00000010), ref: 00405E42
          • GetWindowRect.USER32(00000000,00000010), ref: 00405EA4
          • GetWindowRect.USER32(00000000,?), ref: 00405F18
          • GetWindowRect.USER32(00000000,?), ref: 00405F5F
          • GetWindowRect.USER32(00000000,?), ref: 00405FA1
          • GetWindowRect.USER32(00000000,?), ref: 00405FE9
          • GetWindowRect.USER32(00000000,?), ref: 00405C69
            • Part of subcall function 00402621: SetWindowPos.USER32(00401BF7,00000000,?,?,?,?,00401BF7,0048D550,00401BF7,?,00000204), ref: 00402641
          • GetWindowRect.USER32(00000000,00000010), ref: 00405E00
            • Part of subcall function 00412F06: GetSystemMetrics.USER32(0000002D), ref: 00412F38
            • Part of subcall function 00412F06: SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00412F50
            • Part of subcall function 00412F06: SelectObject.GDI32(00000000,00000000), ref: 00412F6C
            • Part of subcall function 00412F06: GetDlgItem.USER32(?,?), ref: 00412FB1
            • Part of subcall function 00412F06: GetWindowTextW.USER32(00000000,?,00000104), ref: 00412FD2
            • Part of subcall function 00412F06: DrawTextW.USER32(?,?,000000FF,?,00000400), ref: 0041300B
            • Part of subcall function 00412F06: GetWindowRect.USER32(?,?), ref: 0041303A
          • GetWindowRect.USER32(00000000,?), ref: 00406068
          • GetWindowRect.USER32(00000000,?), ref: 004060CA
          • GetWindowRect.USER32(00000000,?), ref: 004060E9
          • GetWindowRect.USER32(00000000,?), ref: 00406192
          • GetWindowRect.USER32(00000000,00000010), ref: 004061D1
          • GetWindowRect.USER32(00000000,00000010), ref: 0040620A
          • GetWindowRect.USER32(00000000,?), ref: 00406298
          • GetWindowRect.USER32(00000000,?), ref: 004062D9
          • GetWindowRect.USER32(00000000,?), ref: 00406316
          • GetWindowRect.USER32(00000000,?), ref: 0040634E
          • GetWindowRect.USER32(00000000,?), ref: 00406386
          • GetWindowRect.USER32(00000000,?), ref: 004063BE
          • GetWindowRect.USER32(00000000,?), ref: 004063F9
          • GetWindowRect.USER32(00000000,?), ref: 00406431
          • GetWindowRect.USER32(00000000,?), ref: 00406469
          • GetWindowRect.USER32(00000000,?), ref: 004064A1
          • GetWindowRect.USER32(00000000,00000010), ref: 004064DA
          • GetWindowRect.USER32(00000000,00000010), ref: 00406513
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$Rect$Text$ClientDrawItemMessageMetricsObjectSelectSendSystem
          • String ID: @
          • API String ID: 1058199426-3462622714
          • Opcode ID: 0074e38aea86320cb437e2c5dcea833835fb11b1c2508931ec4a8516e385ebaf
          • Instruction ID: fe2b512ab4957cdd5fd6f8fe6799f06a52e5b0e2ec557918b26a83687bda9168
          • Opcode Fuzzy Hash: 0074e38aea86320cb437e2c5dcea833835fb11b1c2508931ec4a8516e385ebaf
          • Instruction Fuzzy Hash: 2582C5B1C10219AFDF01DFE4DD85AEEBBB8FF08308F10452AE505B6291EB759A458B58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 980 403e4b-403ec3 call 40c7bb call 43e620 call 41b0f2 CheckDlgButton call 41b0f2 call 41389f 995 403ec5-403ecc 980->995 996 403edf-403efc GetDlgItem EnableWindow 980->996 997 403f05-403f3c call 43e7b0 SetDlgItemTextW 995->997 998 403ece-403edd CheckDlgButton 995->998 996->997 1002 4043a0-4043a7 997->1002 1003 403f42-403fb6 call 43e620 call 4135ad call 43e620 GetDlgItem 997->1003 998->997 1004 4043f0-4043f7 1002->1004 1005 4043a9-4043ee call 43e620 SetDlgItemTextW call 43e620 SetDlgItemTextW 1002->1005 1036 403fb9-403fea call 43e620 SendMessageW 1003->1036 1009 404442-4044d6 call 43e620 SetDlgItemTextW call 43e620 SetDlgItemTextW call 40e8e3 GetSystemMenu call 43e620 InsertMenuW GetWindowRect call 40264b call 405a61 1004->1009 1010 4043f9-40443e call 43e620 call 4233e1 1004->1010 1005->1004 1045 4044d8-4044e4 call 402621 1009->1045 1046 4044e9-4044ec 1009->1046 1010->1009 1041 403fec-403ffd 1036->1041 1043 40401b 1041->1043 1044 403fff-404001 1041->1044 1052 40401d-40404e SendMessageW call 43e620 1043->1052 1050 404003-404005 1044->1050 1051 404017-404019 1044->1051 1045->1046 1048 4044ee-4044fa call 402621 1046->1048 1049 4044ff-40452c call 405a61 call 40663b call 4024d4 1046->1049 1048->1049 1073 404551-40455c GetDlgItem SetFocus 1049->1073 1074 40452e-40454f GetDlgItem SetFocus PostMessageW 1049->1074 1054 404013-404015 1050->1054 1055 404007-404009 1050->1055 1051->1052 1066 404050-404052 1052->1066 1067 404054 1052->1067 1054->1052 1058 40400b-40400d 1055->1058 1059 40400f-404011 1055->1059 1058->1052 1059->1052 1068 404056-404086 CheckDlgButton call 43e620 1066->1068 1067->1068 1079 404088-40408a 1068->1079 1080 40408c 1068->1080 1076 404562-404569 1073->1076 1074->1076 1077 404572-404581 call 413309 call 47f893 1076->1077 1078 40456b-40456d call 405825 1076->1078 1078->1077 1083 40408e-4040bf CheckDlgButton call 43e620 1079->1083 1080->1083 1090 4040c1 call 40695c 1083->1090 1091 4040c6-4040d3 1083->1091 1090->1091 1094 4040f3-404109 GetDlgItem EnableWindow 1091->1094 1095 4040d5-4040dc 1091->1095 1098 404112-40413c CheckDlgButton call 41b0f2 call 41389f 1094->1098 1096 4040e2 1095->1096 1097 4040de-4040e0 1095->1097 1099 4040e4-4040f1 CheckDlgButton 1096->1099 1097->1099 1105 40415a-404177 GetDlgItem EnableWindow 1098->1105 1106 40413e-404147 1098->1106 1099->1098 1107 404180-4041d2 call 43e7b0 CheckDlgButton call 41b0f2 call 41389f 1105->1107 1106->1107 1108 404149-404158 CheckDlgButton 1106->1108 1117 4041f0-404210 GetDlgItem EnableWindow 1107->1117 1118 4041d4-4041dd 1107->1118 1108->1107 1119 404216-40439c call 43e7b0 call 43e620 * 3 call 43de80 call 43e620 call 43de80 call 43e620 call 43de00 call 43e620 * 3 1117->1119 1118->1119 1120 4041df-4041ee CheckDlgButton 1118->1120 1119->1002 1120->1119
          APIs
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
          • CheckDlgButton.USER32(00000002,000003F7,00000000), ref: 00403EA2
          • CheckDlgButton.USER32(00000002,000003F7,00000001), ref: 00403ED7
          • GetDlgItem.USER32 ref: 00403EED
          • EnableWindow.USER32(00000000,00000000), ref: 00403EF6
          • SetDlgItemTextW.USER32(00000002,000003F7,?,?,?,?,00000002,000003F7), ref: 00403F2B
          • GetDlgItem.USER32(00000002,000003EC), ref: 00403FAC
          • SendMessageW.USER32(00000000,00000143,00000000,00000000), ref: 00403FDD
          • SendMessageW.USER32(?,0000014E,00000001,00000000), ref: 00404025
          • CheckDlgButton.USER32(00000000,000003ED,00000000), ref: 0040405D
          • CheckDlgButton.USER32(00000000,000003EE,00000000), ref: 00404095
          • CheckDlgButton.USER32(00000000,000003EF,00000000), ref: 004040EB
          • CheckDlgButton.USER32(00000000,000003F0,00000000), ref: 0040411B
          • CheckDlgButton.USER32(00000000,000003F0,00000001), ref: 00404152
          • CheckDlgButton.USER32(00000000,000003F1,00000000), ref: 004041B1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ButtonCheck$Item$MessageSend$EnableException@8TextThrowWindow
          • String ID: $AJ
          • API String ID: 4055839377-3211715044
          • Opcode ID: e50aef4fae1687a96313e5c1810a88aa849b0d5749f5d8890ef535e2def92831
          • Instruction ID: 567c9efb15b6208acf5a416f099e7898b6aed22a4861f4b3882e7cc027a6fa8d
          • Opcode Fuzzy Hash: e50aef4fae1687a96313e5c1810a88aa849b0d5749f5d8890ef535e2def92831
          • Instruction Fuzzy Hash: A10260B0A41206BFEB116B61DC4BFAA7B79EF08708F104439F705750F2DBB669209B48

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1156 40663b-406666 1158 406687-406692 1156->1158 1159 406668-406679 1156->1159 1160 406694-4066a2 1158->1160 1161 4066d5 1158->1161 1159->1158 1166 40667b-40667e 1159->1166 1168 4066b0-4066c1 SendMessageW 1160->1168 1169 4066a4-4066a7 1160->1169 1162 4066d7-4066f1 GetDlgItem IsWindow 1161->1162 1164 4066f3-4066f8 1162->1164 1165 40670d-406711 1162->1165 1164->1165 1170 4066fa-406702 1164->1170 1171 406713-40671a call 46e18d 1165->1171 1172 40671c-406771 GetClientRect GetDlgItem 1165->1172 1166->1158 1168->1162 1173 4066c3-4066d3 SendMessageW 1168->1173 1169->1168 1170->1165 1174 406704 1170->1174 1171->1172 1178 406777-40679e call 402467 1172->1178 1179 406809-406814 1172->1179 1173->1162 1174->1165 1183 4067a3-4067aa 1178->1183 1181 406816-406826 GetClientRect 1179->1181 1182 406828-406834 GetWindowRect 1179->1182 1184 40683a-406854 1181->1184 1182->1184 1183->1179 1191 4067ac-406804 GetWindowRect MapWindowPoints call 4070a0 1183->1191 1185 406856-40685d 1184->1185 1186 40685f-40686b 1184->1186 1188 406874 1185->1188 1186->1188 1189 40686d 1186->1189 1190 406878-406880 1188->1190 1189->1188 1192 406882-406887 1190->1192 1193 4068d3-40690d GetDlgItem GetWindowRect MapWindowPoints 1190->1193 1191->1179 1195 406957-40695b 1192->1195 1196 40688d-406892 1192->1196 1197 40691b 1193->1197 1198 40690f-406912 1193->1198 1199 406894-406899 1196->1199 1200 4068cb-4068d1 1196->1200 1202 40691d-406949 call 4070a0 1197->1202 1198->1197 1201 406914-406919 1198->1201 1203 40694e-406952 1199->1203 1204 40689f-4068c6 call 40711a 1199->1204 1200->1203 1201->1202 1202->1203 1203->1190 1204->1203
          APIs
          • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 004066B9
          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004066CD
          • GetDlgItem.USER32(?,0000E801), ref: 004066DF
          • IsWindow.USER32(00000000), ref: 004066E9
          • GetClientRect.USER32(?,?), ref: 00406742
          • GetDlgItem.USER32(?,0000E801), ref: 00406760
          • GetWindowRect.USER32(?,00000000), ref: 004067C3
          • MapWindowPoints.USER32(00000000,?,00000001,00000002), ref: 004067D4
          • GetClientRect.USER32(?,00000000), ref: 00406820
          • GetWindowRect.USER32(?,00000000), ref: 00406834
          • GetDlgItem.USER32(004A3ED8,?), ref: 004068D7
          • GetWindowRect.USER32(00000000,00000000), ref: 004068F0
          • MapWindowPoints.USER32(00000000,004A3ED8,00000000,00000002), ref: 00406901
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$Rect$Item$ClientMessagePointsSend
          • String ID:
          • API String ID: 460500065-0
          • Opcode ID: e03cd42a0ad12a8fb2044d6ad8a3fc72757034612023ac55f33c47fb891111e0
          • Instruction ID: 063f54cab224d1604ff4cff24add58beac2080b174d32fddc3656c35009e6039
          • Opcode Fuzzy Hash: e03cd42a0ad12a8fb2044d6ad8a3fc72757034612023ac55f33c47fb891111e0
          • Instruction Fuzzy Hash: 22B15B71D01208EFDB10DFA8C885AAEBBF5FF48314F10896AE516E72A0D734A915CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1208 418de5-418de7 1209 418e73-418e8b call 413967 1208->1209 1210 418de8-418df2 1208->1210 1220 418e91-418e9b call 413be3 1209->1220 1221 418f89 1209->1221 1212 418df3-418e02 call 413be3 1210->1212 1213 418f8c-418f91 1210->1213 1226 418e04-418e21 CreateFileW 1212->1226 1227 418e2c-418e45 CreateFileW 1212->1227 1214 418f97-418fa5 call 413be3 1213->1214 1215 41901a-419041 call 413309 * 2 1213->1215 1228 418fa7-418fad call 418a8e 1214->1228 1229 418fde-418ff0 SetFileAttributesA 1214->1229 1220->1221 1239 418ea1-418ebb CreateFileA 1220->1239 1221->1213 1226->1213 1232 418e27 1226->1232 1233 418ee8-418f0a call 417c81 * 3 1227->1233 1234 418e4b-418e6e GetLastError call 419fb9 call 423bb6 1227->1234 1243 418fb2-418fb4 1228->1243 1229->1215 1240 418ff2-419011 GetLastError call 419fb9 call 423bb6 1229->1240 1232->1233 1263 418f0f-418f4b SetFileTime 1233->1263 1258 418da3-418de4 call 472749 call 418046 1234->1258 1244 418ee5 1239->1244 1245 418ebd-418ee0 GetLastError call 419fb9 call 423bb6 1239->1245 1240->1215 1243->1215 1250 418fb6-418fd5 GetLastError call 419fb9 call 423bb6 1243->1250 1244->1233 1245->1258 1250->1229 1258->1208 1267 418f80-418f87 CloseHandle 1263->1267 1268 418f4d-418f77 GetLastError CloseHandle call 419fb9 call 423bb6 1263->1268 1267->1213 1268->1267
          APIs
          • __CxxThrowException@8.LIBCMT ref: 00418DA4
          • CreateFileW.KERNEL32(?,C0000000,?,?,00000003,02000000), ref: 00418E16
          • CreateFileW.KERNELBASE(?,C0000000,?,?,00000003), ref: 00418E3A
          • GetLastError.KERNEL32(?,?,00000003), ref: 00418E4B
          • CreateFileA.KERNEL32(?,C0000000,?,?,00000003), ref: 00418EB0
          • CloseHandle.KERNEL32(00000000,?,?,00000003), ref: 00418F81
          • GetLastError.KERNEL32(?,?,00000003), ref: 00418EBD
            • Part of subcall function 00423BB6: __EH_prolog3.LIBCMT ref: 00423BBD
          • SetFileTime.KERNELBASE(00000000,?,?,?,?,?,?,?,?,00000003), ref: 00418F43
          • GetLastError.KERNEL32(?,?,00000003), ref: 00418F4D
          • CloseHandle.KERNEL32(00000000,?,?,00000003), ref: 00418F56
          • GetLastError.KERNEL32 ref: 00418FB6
          • SetFileAttributesA.KERNEL32(?,00000000), ref: 00418FE8
          • GetLastError.KERNEL32 ref: 00418FF2
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorFileLast$Create$CloseHandle$AttributesException@8H_prolog3ThrowTime
          • String ID:
          • API String ID: 2515593622-0
          • Opcode ID: 2fa891edb10b705373014e6233f2a26ef0def1d2a46c2f7ea401291a813f639e
          • Instruction ID: 9a45595e3e7a9c8c0cd253e2721d571ded31bcd1aacbdc17babf5d531431bde0
          • Opcode Fuzzy Hash: 2fa891edb10b705373014e6233f2a26ef0def1d2a46c2f7ea401291a813f639e
          • Instruction Fuzzy Hash: 0371D171508304AFD700AF65DC45FEFBBE8AF95358F04092EF88592191DB38DE868B5A

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1276 405293-4052a3 call 40e726 1280 4052a9-4052b3 1276->1280 1281 40543c-405466 SetDlgItemTextW * 2 1276->1281 1282 4052b5-4052bb 1280->1282 1283 4052f6-4052fc 1280->1283 1284 405468-40546e 1281->1284 1285 40549e-4054a5 1281->1285 1290 4052c1 1282->1290 1291 4052bd-4052bf 1282->1291 1292 40535e 1283->1292 1293 4052fe-405305 1283->1293 1286 405470-405481 GetDlgItem EnableWindow 1284->1286 1287 405487-405498 GetDlgItem EnableWindow 1284->1287 1288 4054a7-4054b5 GetDlgItem KiUserCallbackDispatcher 1285->1288 1289 4054bb-4054c6 call 40e726 1285->1289 1286->1287 1287->1285 1288->1289 1304 4054c8-4054ca call 404c86 1289->1304 1305 4054cf-4054d1 1289->1305 1295 4052c3-4052f1 call 43e620 call 40c7de 1290->1295 1291->1295 1294 405360-40538b call 43e620 call 40c7de 1292->1294 1297 405307-40533b call 43e620 call 40c7de 1293->1297 1298 40535a-40535c 1293->1298 1315 40538e-4053a0 1294->1315 1295->1281 1297->1315 1316 40533d-405358 ShellExecuteW 1297->1316 1298->1294 1304->1305 1317 4053a2-4053b9 call 4233e1 call 418445 1315->1317 1318 4053bb-4053c6 call 40c7bb 1315->1318 1316->1315 1322 4053cb-4053d7 call 41365f 1317->1322 1318->1322 1326 4053e8-4053f4 1322->1326 1327 4053d9-4053e3 call 4134a3 1322->1327 1329 4053f6-4053f8 1326->1329 1330 4053fa 1326->1330 1327->1326 1331 4053fc-405419 call 412ae6 call 413309 1329->1331 1330->1331 1331->1281
          APIs
            • Part of subcall function 0040E726: __EH_prolog3.LIBCMT ref: 0040E72D
            • Part of subcall function 0040E726: RtlEnterCriticalSection.NTDLL(004CBA3C), ref: 0040E73B
            • Part of subcall function 0040E726: RtlLeaveCriticalSection.NTDLL(004CBA3C), ref: 0040E7B8
          • ShellExecuteW.SHELL32(00000000,004A40B8,004A3D5C,00000000,?,00000001), ref: 00405352
          • SetDlgItemTextW.USER32(00000003,0000040D,004A4124), ref: 0040544A
          • SetDlgItemTextW.USER32(00000003,0000040E,004A4124), ref: 00405459
          • GetDlgItem.USER32(00000003,000003E8), ref: 00405478
          • EnableWindow.USER32(00000000,00000001), ref: 00405481
          • GetDlgItem.USER32(00000003,00000408), ref: 0040548F
          • EnableWindow.USER32(00000000,00000001), ref: 00405498
          • GetDlgItem.USER32(00000003,00000001), ref: 004054AC
          • KiUserCallbackDispatcher.NTDLL(00000000,00000001), ref: 004054B5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Item$CriticalEnableSectionTextWindow$CallbackDispatcherEnterExecuteH_prolog3LeaveShellUser
          • String ID: $AJ
          • API String ID: 1360408901-3211715044
          • Opcode ID: 6465061a009a0ec1f165e10c720493b0376893c269b7a3d717db58596d669d88
          • Instruction ID: d54f6ab5fe4abb7b99c39a706a31713da796bb708a617f0d7d6b80e7058d8424
          • Opcode Fuzzy Hash: 6465061a009a0ec1f165e10c720493b0376893c269b7a3d717db58596d669d88
          • Instruction Fuzzy Hash: 5521A1B1A42A01BBEB116B60DC4AE9E7F26FF00315F00853EF619765E1C7796860CF88

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1337 405437-40543a 1338 40543c-405466 SetDlgItemTextW * 2 1337->1338 1339 405468-40546e 1338->1339 1340 40549e-4054a5 1338->1340 1341 405470-405481 GetDlgItem EnableWindow 1339->1341 1342 405487-405498 GetDlgItem EnableWindow 1339->1342 1343 4054a7-4054b5 GetDlgItem KiUserCallbackDispatcher 1340->1343 1344 4054bb-4054c6 call 40e726 1340->1344 1341->1342 1342->1340 1343->1344 1347 4054c8-4054ca call 404c86 1344->1347 1348 4054cf-4054d1 1344->1348 1347->1348
          APIs
          • SetDlgItemTextW.USER32(00000003,0000040D,004A4124), ref: 0040544A
          • SetDlgItemTextW.USER32(00000003,0000040E,004A4124), ref: 00405459
          • GetDlgItem.USER32(00000003,000003E8), ref: 00405478
          • EnableWindow.USER32(00000000,00000001), ref: 00405481
          • GetDlgItem.USER32(00000003,00000408), ref: 0040548F
          • EnableWindow.USER32(00000000,00000001), ref: 00405498
          • GetDlgItem.USER32(00000003,00000001), ref: 004054AC
          • KiUserCallbackDispatcher.NTDLL(00000000,00000001), ref: 004054B5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Item$EnableTextWindow$CallbackDispatcherUser
          • String ID: $AJ
          • API String ID: 2696626827-3211715044
          • Opcode ID: cc26c0cbd20857cd62b4d6e7ac42fd54c6dc4b8969927003568e648502c8600e
          • Instruction ID: 8b872ead0b00ffba9c830c78e4dfac1d9e036f15556611f0be09068e564ba389
          • Opcode Fuzzy Hash: cc26c0cbd20857cd62b4d6e7ac42fd54c6dc4b8969927003568e648502c8600e
          • Instruction Fuzzy Hash: AC0144B1941611BBEB111BA0DD0EF5ABB26FB04706F044539F715B64E0C7756864CB88

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1350 419a0f-419a4f 1351 419a51-419a62 call 4143fb 1350->1351 1352 419a6c-419a88 call 4199ba 1350->1352 1359 419a66-419a67 call 472749 1351->1359 1357 419aa1-419aad 1352->1357 1358 419a8a-419a8b 1352->1358 1360 419ab1-419ab4 1357->1360 1358->1360 1361 419a8d-419a8e 1358->1361 1359->1352 1366 419ae0-419b06 call 413967 1360->1366 1367 419ab6-419ade GetDriveTypeW 1360->1367 1363 419a94-419a9c 1361->1363 1364 419b6c-419b96 call 413309 call 46e052 1361->1364 1363->1364 1377 419b08-419b0c 1366->1377 1378 419b0e-419b35 GetDriveTypeA call 413309 1366->1378 1369 419b3a-419b3c 1367->1369 1371 419b68 1369->1371 1372 419b3e-419b46 GetLastError 1369->1372 1371->1364 1372->1371 1375 419b48-419b63 call 419fb9 call 423bb6 1372->1375 1375->1359 1377->1378 1378->1369
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 00419A67
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • GetDriveTypeW.KERNELBASE ref: 00419AD6
          • GetDriveTypeA.KERNEL32(?,?,?,?,?,?), ref: 00419B25
          • GetLastError.KERNEL32(?,?,?,?,?,?), ref: 00419B3E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: DriveType$ErrorExceptionException@8H_prolog3_catchLastRaiseThrow
          • String ID: :$:$\$\
          • API String ID: 3854800999-1058066849
          • Opcode ID: 4c760bba74eb229388ae64d7cf50427bf50217fc9c7441f1965a68369dfcc430
          • Instruction ID: 53bf8c9af4326a236e710e979cbfb1824660317f15b7df1c7c16a8be661f2931
          • Opcode Fuzzy Hash: 4c760bba74eb229388ae64d7cf50427bf50217fc9c7441f1965a68369dfcc430
          • Instruction Fuzzy Hash: 1841687190C3859BC710DF298890AABBBE8FF95744F00092EF5A583351D778AD48CB9B

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1385 40e941-40ea39 call 47f7cb CoInitialize call 411517 call 43f840 call 43dcc0 OleInitialize call 43e620 call 46e537 call 414c9f call 417b23 1406 40ea40-40ea65 call 41549a call 417b23 1385->1406 1407 40ea3b 1385->1407 1412 40ea67 1406->1412 1413 40ea6c-40ead0 GetModuleFileNameW call 413423 call 414bf2 call 416e3a call 41b0f2 call 416f69 1406->1413 1407->1406 1412->1413 1423 40ead2-40ead5 1413->1423 1424 40eada-40eaee call 41b0f2 1413->1424 1423->1424 1428 40eaf0-40eaff 1424->1428 1429 40eb17-40eb5b call 413423 call 4134a3 * 2 call 46e537 call 46e4c8 1424->1429 1430 40eb01-40eb03 1428->1430 1431 40eb07-40eb12 call 40f7f9 1428->1431 1444 40eb78-40eb7b 1429->1444 1445 40eb5d-40eb76 1429->1445 1430->1431 1431->1429 1446 40eb7d-40eb82 1444->1446 1445->1446 1447 40eb84-40eb86 1446->1447 1448 40eb8a-40eb98 call 46e4c8 1446->1448 1447->1448 1451 40ebb4-40ebb6 1448->1451 1452 40eb9a-40ebb2 1448->1452 1453 40ebb9-40ebbe 1451->1453 1452->1453 1454 40ebc0-40ebc2 1453->1454 1455 40ebc6-40ebf6 call 41b0f2 * 2 call 46e4c8 1453->1455 1454->1455 1464 40ec25-40ec27 1455->1464 1465 40ebf8-40ec23 1455->1465 1466 40ec2a-40ec2f 1464->1466 1465->1466 1467 40ec31-40ec33 1466->1467 1468 40ec37-40ec84 call 41b0f2 * 3 call 4179e3 1466->1468 1467->1468 1478 40ec86 1468->1478 1479 40ec8a-40ec98 1468->1479 1478->1479 1480 40ec9a 1479->1480 1481 40ec9f-40ecb6 call 41b0f2 1479->1481 1480->1481 1485 40ed51-40ed77 call 41b0f2 * 2 1481->1485 1486 40ecbc-40ecd1 call 46e4c8 1481->1486 1504 40ed80-40ed89 1485->1504 1505 40ed79-40ed7b 1485->1505 1491 40ecd3-40ece6 call 4026cf 1486->1491 1492 40ece8 1486->1492 1493 40ecea-40ed0d call 40dce8 GetActiveWindow call 40f1f5 1491->1493 1492->1493 1503 40ed12-40ed4f call 40df0a 1493->1503 1503->1485 1507 40ed90-40ed99 1504->1507 1508 40ed8b 1504->1508 1505->1504 1510 40eda0-40edb1 call 413309 1507->1510 1511 40ed9b 1507->1511 1508->1507 1515 40edb3 1510->1515 1516 40edb8-40edc1 1510->1516 1511->1510 1515->1516 1517 40edc3 1516->1517 1518 40edc8-40ee51 call 413309 1516->1518 1517->1518 1523 40ee72-40ee95 OleUninitialize call 43e4f0 call 43df00 call 411399 1518->1523 1524 40ee53-40ee6f call 40c7de 1518->1524 1533 40ee9b-40eea4 1523->1533 1524->1523 1534 40eea6 1533->1534 1535 40eeab-40eeb3 1533->1535 1534->1535 1536 40eeb5 1535->1536 1537 40eeba-40eec3 1535->1537 1536->1537 1538 40eec5 1537->1538 1539 40eeca-40eeef call 46e052 1537->1539 1538->1539
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0040E960
          • CoInitialize.OLE32(00000000), ref: 0040E96E
            • Part of subcall function 00411517: __EH_prolog3_catch.LIBCMT ref: 0041151E
            • Part of subcall function 00411517: GetCurrentThreadId.KERNEL32 ref: 00411549
          • OleInitialize.OLE32(00000000), ref: 0040E9CF
          • GetModuleFileNameW.KERNEL32(?,00000208,00000000,00000000), ref: 0040EA82
          • OleUninitialize.OLE32 ref: 0040EE72
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          • GetActiveWindow.USER32 ref: 0040ED03
            • Part of subcall function 004026CF: __EH_prolog3.LIBCMT ref: 004026D6
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catchInitialize$ActiveCurrentFileH_prolog3ModuleNameThreadUninitializeWindow_malloc
          • String ID: pKJ
          • API String ID: 3283072954-775196418
          • Opcode ID: d5f3f34658e0a2fd40fddb22d6404a12f8d072bccd3267c70a5c854cba997be7
          • Instruction ID: cea124af61918145e0805589546f5ad82bf60f539c4fc55fd5412af6ac70ee2d
          • Opcode Fuzzy Hash: d5f3f34658e0a2fd40fddb22d6404a12f8d072bccd3267c70a5c854cba997be7
          • Instruction Fuzzy Hash: 1B029270901249DFDB04DFA9C889ADDBBF5FF09304F24846EE105AB2A1DB789E44CB65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1631 43e860-43e8db call 4133da call 438209 1635 43e8e0-43e902 call 438209 1631->1635 1638 43e904-43e91a call 4143fb call 472749 1635->1638 1639 43e91f-43e92f 1635->1639 1638->1639 1644 43e931-43e937 1639->1644 1645 43e960-43e966 1639->1645 1646 43e954-43e95d 1644->1646 1647 43e939-43e94f call 4143fb call 472749 1644->1647 1648 43e983-43e997 1645->1648 1649 43e968-43e97e call 4143fb call 472749 1645->1649 1646->1645 1647->1646 1657 43e9b4-43e9c6 1648->1657 1658 43e999-43e9af call 4143fb call 472749 1648->1658 1649->1648 1663 43e9e3-43e9f3 1657->1663 1664 43e9c8-43e9de call 4143fb call 472749 1657->1664 1658->1657 1669 43ea10-43ea24 1663->1669 1670 43e9f5-43ea0b call 4143fb call 472749 1663->1670 1664->1663 1674 43ea41-43ea58 1669->1674 1675 43ea26-43ea3c call 4143fb call 472749 1669->1675 1670->1669 1681 43ea61-43ea6c 1674->1681 1682 43ea5a-43ea5c 1674->1682 1675->1674 1683 43ea75-43eaa3 call 413268 call 46e052 1681->1683 1684 43ea6e-43ea70 1681->1684 1682->1681 1684->1683
          APIs
            • Part of subcall function 00438209: __EH_prolog3.LIBCMT ref: 00438210
          • __CxxThrowException@8.LIBCMT ref: 0043E91A
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • __CxxThrowException@8.LIBCMT ref: 0043E94F
          • __CxxThrowException@8.LIBCMT ref: 0043E97E
          • __CxxThrowException@8.LIBCMT ref: 0043E9AF
          • __CxxThrowException@8.LIBCMT ref: 0043E9DE
          • __CxxThrowException@8.LIBCMT ref: 0043EA0B
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0043EA3C
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$ExceptionH_prolog3H_prolog3_catchRaise
          • String ID:
          • API String ID: 2801973587-0
          • Opcode ID: 7a441900a4b0b971e52ff753fce674d7a770bca8e64521d368561511d821d5f9
          • Instruction ID: 90f48602222dcfe3679d74dc5af3a4b94a7bd68a35e94539c2c1691fc6e34ba7
          • Opcode Fuzzy Hash: 7a441900a4b0b971e52ff753fce674d7a770bca8e64521d368561511d821d5f9
          • Instruction Fuzzy Hash: 1F61B1712083019FD308EF66C881FABB7E5BF98704F104A1EF195972A1DB78E908CB56

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1689 412f06-412f76 GetSystemMetrics SendMessageW SelectObject 1691 413083-4130a9 call 46e052 1689->1691 1692 412f7c-412fa0 1689->1692 1693 412fa1-412fbf GetDlgItem 1692->1693 1695 413061-413067 1693->1695 1696 412fc5-413025 GetWindowTextW DrawTextW 1693->1696 1700 413069-41307d 1695->1700 1698 413027 1696->1698 1699 41302d-41305f GetWindowRect 1696->1699 1698->1699 1699->1700 1700->1691 1700->1693
          APIs
          • GetSystemMetrics.USER32(0000002D), ref: 00412F38
          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00412F50
          • SelectObject.GDI32(00000000,00000000), ref: 00412F6C
          • GetDlgItem.USER32(?,?), ref: 00412FB1
          • GetWindowTextW.USER32(00000000,?,00000104), ref: 00412FD2
          • DrawTextW.USER32(?,?,000000FF,?,00000400), ref: 0041300B
          • GetWindowRect.USER32(?,?), ref: 0041303A
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: TextWindow$DrawItemMessageMetricsObjectRectSelectSendSystem
          • String ID:
          • API String ID: 2923810944-0
          • Opcode ID: a2dcba06c28804b7c8fb79d498b85bdce8ce725cdba0ff15885e23aec943cb85
          • Instruction ID: 890aeb46277cf9fd0c59b883598e8b5ed34d3efea8ee03d74ad14775f27a34db
          • Opcode Fuzzy Hash: a2dcba06c28804b7c8fb79d498b85bdce8ce725cdba0ff15885e23aec943cb85
          • Instruction Fuzzy Hash: 9C41B7B1D01228AFCB609FA9DC88ADDBBB4FB48715F1001EAE509E6260D7749EC0CF14

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 1720 404582-4045c0 call 46ead1 1723 4045c2-4045c8 1720->1723 1724 4045ca 1720->1724 1725 4045cd-4045d6 1723->1725 1724->1725 1726 4045dc-40466f GetDlgItem GetClientRect GetTextExtentPoint32W MapDialogRect call 46e532 call 40359a SetDlgItemTextW 1725->1726 1727 40468d-404692 1725->1727 1733 404671-404681 1726->1733 1734 404684-40468c call 46e061 1726->1734 1733->1734 1734->1727
          APIs
          • _calloc.LIBCMT ref: 004045A8
            • Part of subcall function 0046EAD1: __calloc_impl.LIBCMT ref: 0046EAE4
          • GetDlgItem.USER32(?,0000040E), ref: 004045EF
          • GetClientRect.USER32(00000000,?), ref: 004045FA
          • GetTextExtentPoint32W.GDI32(?,004A40B0,00000001,?), ref: 00404611
          • MapDialogRect.USER32(?,?), ref: 0040461E
          • SetDlgItemTextW.USER32(?,0000040E,?,?), ref: 00404664
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ItemRectText$ClientDialogExtentPoint32__calloc_impl_calloc
          • String ID:
          • API String ID: 2218667647-0
          • Opcode ID: d355e2f4535ea7005b6b435d79862b31c6e448c7c8c3b4b00229b1119ec2458e
          • Instruction ID: fa428ca1f354786f4970aa55eec2edfa3586de264a2abbba1d2837a5c566276f
          • Opcode Fuzzy Hash: d355e2f4535ea7005b6b435d79862b31c6e448c7c8c3b4b00229b1119ec2458e
          • Instruction Fuzzy Hash: C631B072900205EFDB119F65CC85A9DBBF9FF44310F14807AEE09AF1A6D775A841CB64
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0041A5A8
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • WriteFile.KERNELBASE(?,?,?,?,00000000), ref: 0041A5ED
          • GetLastError.KERNEL32 ref: 0041A605
          • GetLastError.KERNEL32 ref: 0041A6B3
          • GetLastError.KERNEL32 ref: 0041A74A
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorLast$ExceptionException@8FileH_prolog3_catchRaiseThrowWrite
          • String ID:
          • API String ID: 2278084019-0
          • Opcode ID: 4709282939f679912a13f822686c6b40476ab88d03355a9ffe5f9f12efd9ce0c
          • Instruction ID: dcb6842e009b9fd6157710ffdc78ce2bdb119982a935604beb239f85be5bcd37
          • Opcode Fuzzy Hash: 4709282939f679912a13f822686c6b40476ab88d03355a9ffe5f9f12efd9ce0c
          • Instruction Fuzzy Hash: 1B518D31509304AFD710EF60C8819AFB7E9AF90354F10092FF89696691D738EE99CB5B
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 004129B7
            • Part of subcall function 00413423: __EH_prolog3_catch.LIBCMT ref: 0041342A
            • Part of subcall function 0041368B: __EH_prolog3.LIBCMT ref: 00413692
          • _wcschr.LIBCMT ref: 00412A25
          • _wcschr.LIBCMT ref: 00412A3B
          • _wcschr.LIBCMT ref: 00412A76
          • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,004A4124,00000001), ref: 00412AA0
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _wcschr$H_prolog3_catch$ExecuteH_prolog3Shell
          • String ID:
          • API String ID: 2785434109-0
          • Opcode ID: d5722f9bd5115906ba0d106bd0108e895e06dcfc5c98233c6cb354cacf2ddec3
          • Instruction ID: 3729c90b1ea7e110c5177ab14da75043370f1d71ab658095aa1277d58ab6a922
          • Opcode Fuzzy Hash: d5722f9bd5115906ba0d106bd0108e895e06dcfc5c98233c6cb354cacf2ddec3
          • Instruction Fuzzy Hash: 3231B432D017169ACF309F918A817EF6260EF50B55F28402BE904E6281E7FC99E18399
          APIs
          • __EH_prolog3.LIBCMT ref: 00417F60
          • CreateFileW.KERNELBASE(?,0041A3AE,?,00000000,FFFF7FFF,00000080,00000000,00000008,0041AEAE,00000000,?,?,?,?), ref: 00417F9F
          • DeviceIoControl.KERNEL32(00000000,0009C040,FFFF7FFF,00000002,00000000,00000000,00000800,00000000), ref: 00417FE0
          • CreateFileA.KERNEL32(00000000,00000000,?,00000000,?,?,00000000,?,00000000,?), ref: 0041801B
          • GetLastError.KERNEL32 ref: 0041802F
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CreateFile$ControlDeviceErrorH_prolog3Last
          • String ID:
          • API String ID: 2214164888-0
          • Opcode ID: 986b343a0a71acedcbcf38880e5fbe3e85a3038258cea0092275c93a37953772
          • Instruction ID: 15dfaf5dbb29a395e17e2ddd84dce7610fb2c92da1d7c4ae14c6765335d090eb
          • Opcode Fuzzy Hash: 986b343a0a71acedcbcf38880e5fbe3e85a3038258cea0092275c93a37953772
          • Instruction Fuzzy Hash: 95316B7150020AEFCF009FA5CC858EF3BB5FF18359F10452EF911912A1DB388AA6DB99
          APIs
          • GetFileInformationByHandle.KERNELBASE(000000FF,?), ref: 0041ACB9
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0041AC0B
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8FileH_prolog3_catchHandleInformationRaiseThrow
          • String ID:
          • API String ID: 618899945-3916222277
          • Opcode ID: c3f5a41f59c9788cab057b6e8e59073dff5a5218b94f2fad81bca5e5ad666a9a
          • Instruction ID: 19391ad17a79fe40d044eb091133a4a1fea4d49a57a2a42173d2ecb32d9b7755
          • Opcode Fuzzy Hash: c3f5a41f59c9788cab057b6e8e59073dff5a5218b94f2fad81bca5e5ad666a9a
          • Instruction Fuzzy Hash: 5F5101715097449BD321DF65C449BCBB7E8BF40318F044A2FF89182691E7BCE898CB9A
          APIs
          • GetDlgItem.USER32(?,000003EB), ref: 0040E038
          • SendMessageW.USER32(00000000,0000004E,000003EB,?), ref: 0040E045
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0040E2B7
          • SetCurrentDirectoryW.KERNEL32(?), ref: 0040E308
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CurrentDirectory$ItemMessageSend
          • String ID:
          • API String ID: 1716510259-0
          • Opcode ID: 5fb1af1cf1d4054b933ce20860c49b36836c0f19f32cde997d71b0d55fa31e64
          • Instruction ID: 25529834b9ce85092d5ca32059093937ccff041e1d4f09fbaadc1c3b48572fd3
          • Opcode Fuzzy Hash: 5fb1af1cf1d4054b933ce20860c49b36836c0f19f32cde997d71b0d55fa31e64
          • Instruction Fuzzy Hash: 2291C070600211CBDB359F22C845A6B77A5AB90314F140C7FEA56B72E1C7BCAC629B5E
          APIs
          • __EH_prolog3_GS.LIBCMT ref: 004316F6
          • __CxxThrowException@8.LIBCMT ref: 0043172D
          • DosDateTimeToFileTime.KERNEL32(?,?,?), ref: 004318A1
          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 004318B9
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Time$File$DateException@8H_prolog3_LocalThrow
          • String ID:
          • API String ID: 1027347510-0
          • Opcode ID: 9a4948e6dab8fbd8911730a87df8ed46847bc7b3d74e848c81abf99d85ba2ced
          • Instruction ID: 747fae880f3af45b3f3ac8203462707f5ab069ba106f4edfb0ba5721a91e5f4d
          • Opcode Fuzzy Hash: 9a4948e6dab8fbd8911730a87df8ed46847bc7b3d74e848c81abf99d85ba2ced
          • Instruction Fuzzy Hash: E4B1BFB4D0427A9BCB20AF25CC547E9BBB0FF09301F0401DAE499A7691D7389B95DF94
          APIs
          • PostMessageW.USER32(?,00000407,?,?), ref: 0040D025
          • PostMessageW.USER32(?,00000402,00000000,?), ref: 0040D21E
          • PostMessageW.USER32(000000FF,00000405,00000000,00000000), ref: 0040D2A6
          • PostMessageW.USER32(000000FF,00000405,00000000,00000000), ref: 0040D33B
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 7ef9103c2a33b67720c6a539dc46c5008c65773f498c75f6abd4b842f8f26930
          • Instruction ID: b85a8cc4a2728fd7a3df72168a934cb4cd85e721a26b9e6699c4fdf503820afc
          • Opcode Fuzzy Hash: 7ef9103c2a33b67720c6a539dc46c5008c65773f498c75f6abd4b842f8f26930
          • Instruction Fuzzy Hash: 6F815531504701AFC724AFA1C885E6B7BA4EF44324F10472FF525A31E1EB39E859CB9A
          APIs
          • __EH_prolog3.LIBCMT ref: 0041A324
          • __CxxThrowException@8.LIBCMT ref: 0041A37D
          • _wcsrchr.LIBCMT ref: 0041A3C6
          • GetLastError.KERNEL32(?,00000000,?), ref: 0041A425
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorException@8H_prolog3LastThrow_malloc_wcsrchr
          • String ID:
          • API String ID: 1305422554-0
          • Opcode ID: 666d4f0a2411d13ab90b722b83f37e771a17d503a3af2f513f7d3de07e5cb1a8
          • Instruction ID: 4155375336981527f0855876f272c2dfbf065001d37791404ff87fd28dabcaf0
          • Opcode Fuzzy Hash: 666d4f0a2411d13ab90b722b83f37e771a17d503a3af2f513f7d3de07e5cb1a8
          • Instruction Fuzzy Hash: 1241A07190120A9FDF10AFA4C885AEEB7B5FF44308B10442EF905A7251CB789DA0CB9A
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0040C7E5
          • LoadStringW.USER32(FFFF0000,00000000,00000100,00000010), ref: 0040C84B
          • LoadStringW.USER32(?,00000000,00000100,00000010), ref: 0040C8D0
          • MessageBoxW.USER32(?,FFFF0000,?,00000000), ref: 0040C8E9
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: LoadString$H_prolog3_catchMessage_malloc
          • String ID:
          • API String ID: 1361368681-0
          • Opcode ID: 22bb444a03d39b7c0ee066ae92295d7513bea9f40bdb2c0e9ab221b49b584d90
          • Instruction ID: 9be3febe98fb7fb77b741aca86aebf61eb27a0c0c060aac534c7846279f0970d
          • Opcode Fuzzy Hash: 22bb444a03d39b7c0ee066ae92295d7513bea9f40bdb2c0e9ab221b49b584d90
          • Instruction Fuzzy Hash: EC313872900115EBDB14AF569C45BBE77B4EF04725F20812FF815B62D0EB788A01DB9D
          APIs
          • __calloc_crt.LIBCMT ref: 00470B40
          • CreateThread.KERNELBASE(?,?,00470A85,00000000,?,?), ref: 00470B84
          • GetLastError.KERNEL32(?,?,?,?,?,?,00000000), ref: 00470B8E
          • __dosmaperr.LIBCMT ref: 00470BA6
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CreateErrorLastThread__calloc_crt__dosmaperr
          • String ID:
          • API String ID: 84609068-0
          • Opcode ID: 7090922797ff008642ac43f4d93457999a5854a682840e9b33b91c2012be7d92
          • Instruction ID: 50393bd67de6869381daddfdeb40aa4cc8a92a70972f5a31fdedcb647c88b131
          • Opcode Fuzzy Hash: 7090922797ff008642ac43f4d93457999a5854a682840e9b33b91c2012be7d92
          • Instruction Fuzzy Hash: E611E772502305EFDB21BFE5DC428DF77A5EF00368B20853FF549A2191E739AA018B69
          APIs
          • IsDialogMessageW.USER32(?,?), ref: 004123B1
          • TranslateMessage.USER32(?), ref: 004123BF
          • DispatchMessageW.USER32(?), ref: 004123C9
          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004123D8
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Message$DialogDispatchPeekTranslate
          • String ID:
          • API String ID: 1266772231-0
          • Opcode ID: b35ae216d1b9e23c56625099fbd878101384a3ee5b2998eceb53f95eb43c5f79
          • Instruction ID: f09366d009cfa1f446d30a27da72d4cec1a49fff74f943752758d316882c2c3f
          • Opcode Fuzzy Hash: b35ae216d1b9e23c56625099fbd878101384a3ee5b2998eceb53f95eb43c5f79
          • Instruction Fuzzy Hash: 5F010C7290121DEFDF109FF48D84DEE77ACEB09344B14442BE911E2250E67DD9A0DB69
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 004294C6
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8H_prolog3_catchRaiseThrow
          • String ID: $IA
          • API String ID: 10698533-2342638154
          • Opcode ID: e38794d406b2eddb291373c5ffc5134c7ffc202fab973c57931850196f100d08
          • Instruction ID: f40d085412eb65a231bb9e1e14745c7a7fda35d41b6b2ab9c6a47184a0afe9e5
          • Opcode Fuzzy Hash: e38794d406b2eddb291373c5ffc5134c7ffc202fab973c57931850196f100d08
          • Instruction Fuzzy Hash: DC229A312083518BC725DF25D484B6FBBE4AF84704F44491EF88A9B2A1DB78DD44CB9A
          APIs
          • __EH_prolog3.LIBCMT ref: 0042AA6C
          • __CxxThrowException@8.LIBCMT ref: 0042AAF9
            • Part of subcall function 0040695C: __CxxThrowException@8.LIBCMT ref: 00406977
            • Part of subcall function 0041A31D: __EH_prolog3.LIBCMT ref: 0041A324
            • Part of subcall function 0041A31D: __CxxThrowException@8.LIBCMT ref: 0041A37D
            • Part of subcall function 0041A31D: _wcsrchr.LIBCMT ref: 0041A3C6
            • Part of subcall function 0041A31D: GetLastError.KERNEL32(?,00000000,?), ref: 0041A425
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3$ErrorH_prolog3_catchLast_wcsrchr
          • String ID: IA
          • API String ID: 477051573-2205123733
          • Opcode ID: 52c4e53ff887eff544127104373643a3a0096c0d36fc2b173680036ed763b9b1
          • Instruction ID: 012109d81497d45fe9d621877cc67c39a4e5a19494660486c862d02993b1ffd2
          • Opcode Fuzzy Hash: 52c4e53ff887eff544127104373643a3a0096c0d36fc2b173680036ed763b9b1
          • Instruction Fuzzy Hash: 23F19C70A00219EFDB24EF90D949FEEB7B5EF44304F64805EE805AB250D778AE54CB66
          APIs
          • __CxxThrowException@8.LIBCMT ref: 0042A675
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • __EH_prolog3_catch.LIBCMT ref: 0042A64E
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch$ExceptionException@8RaiseThrow
          • String ID: IA
          • API String ID: 1279188806-2205123733
          • Opcode ID: b9bbdf0e9c3f880a628d15602da91aaf5a0186a68fa4e950379ad425d20bdecb
          • Instruction ID: 2b323d0e73ded7a06de12cc6d1cee396ca1806feeb76f9d93ba5c94edb95cc0a
          • Opcode Fuzzy Hash: b9bbdf0e9c3f880a628d15602da91aaf5a0186a68fa4e950379ad425d20bdecb
          • Instruction Fuzzy Hash: EDB1AB70B00219AFDF14EFA5D848BAEBBB5AF44304F14805EF845AB291D738DD91CB69
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 00429DBE
          • __CxxThrowException@8.LIBCMT ref: 00429DE0
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
            • Part of subcall function 00429B4E: __EH_prolog3.LIBCMT ref: 00429B58
            • Part of subcall function 0040695C: __CxxThrowException@8.LIBCMT ref: 00406977
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3_catch$H_prolog3
          • String ID: IA
          • API String ID: 3361668480-2205123733
          • Opcode ID: 92795cb2d6040e38ee05e90ac78aaeced2d394780de6b57cebd0fbc511d1fa64
          • Instruction ID: 670281e41e37c3c63f277be8103ae209c679b44b4545ac7f2b44740383e93e06
          • Opcode Fuzzy Hash: 92795cb2d6040e38ee05e90ac78aaeced2d394780de6b57cebd0fbc511d1fa64
          • Instruction Fuzzy Hash: 88A16A70A00219DFCF04DF65C585AAEBBB1BF48304F15809AF806AB391DB39DD41CBA4
          APIs
          • __EH_prolog3.LIBCMT ref: 0041B036
            • Part of subcall function 00448740: _calloc.LIBCMT ref: 00448744
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          • __CxxThrowException@8.LIBCMT ref: 0041B0B1
            • Part of subcall function 0041B492: _memset.LIBCMT ref: 0041B4B8
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw_calloc_malloc_memset
          • String ID: TcJ
          • API String ID: 2270223088-1278070676
          • Opcode ID: e6c441af22b186494026a3dd25901817265d02348140e93569bc2a26913ec0e3
          • Instruction ID: d7927bbaea9c64b1a6f6e38c53727ad18b9790175f88bda44534bb8695ac18ab
          • Opcode Fuzzy Hash: e6c441af22b186494026a3dd25901817265d02348140e93569bc2a26913ec0e3
          • Instruction Fuzzy Hash: 4621C070E002069FCB10EFA5C8816EEBBA5EF08704F25842EF55567381DB7D9E418BD9
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorLast
          • String ID: PMJ
          • API String ID: 1452528299-1076063844
          • Opcode ID: 0a4b789971eb61b4087ad8969b835b3e9b9eac5c541c2cad44e6052a217bd4b7
          • Instruction ID: 2ccd80dcb499d4d23e67b02b0c567398850f1eb0e34ce8282daaf7e67e6afb1e
          • Opcode Fuzzy Hash: 0a4b789971eb61b4087ad8969b835b3e9b9eac5c541c2cad44e6052a217bd4b7
          • Instruction Fuzzy Hash: BA014570701604AF8330AF695A808BFBBE8AF14314304487FF047C7742CAACCD9887AA
          APIs
          • __EH_prolog3.LIBCMT ref: 0041294C
          • MessageBoxW.USER32(?,00000000,004C87B8,?), ref: 00412994
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3Message
          • String ID: $AJ
          • API String ID: 2898835920-3211715044
          • Opcode ID: d1df3f5d84ddd0707963270fe337b755905e55c3b9368e71b4a26880082bbac7
          • Instruction ID: 6ed40c58867c246328745ceb5b3a8f6ef175dc1dfb090ac58cae5dbfe2746f98
          • Opcode Fuzzy Hash: d1df3f5d84ddd0707963270fe337b755905e55c3b9368e71b4a26880082bbac7
          • Instruction Fuzzy Hash: 6CF062B090010AAFCF44EFA4DD059EE3BB5FF08305F50442EF415E6161EB789A14CB65
          APIs
          • CreateWindowExW.USER32(?,?,00000000,?,?,?,?,?,?,9!@,00000000,?), ref: 004024A3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CreateWindow
          • String ID: 9!@$@6L
          • API String ID: 716092398-2636683330
          • Opcode ID: da5cc8270a66887f14ef0a5282fcab83851fd5b264a040756d0169632323746a
          • Instruction ID: 0565b7b5fa63ccecfa25acdb5100231b8cfc8b1d1906464ebef507b631db2d4f
          • Opcode Fuzzy Hash: da5cc8270a66887f14ef0a5282fcab83851fd5b264a040756d0169632323746a
          • Instruction Fuzzy Hash: 8BF0DA76200119AFDB11CF98DD09EAB7BAAEB88750F158169FD049B260D771EC20DB94
          APIs
            • Part of subcall function 0040241F: GetCurrentProcess.KERNEL32(00000000,0000000D,?,004022E3,?,?,004017F3), ref: 00402453
            • Part of subcall function 0040241F: FlushInstructionCache.KERNEL32(00000000), ref: 0040245A
          • SetLastError.KERNEL32(0000000E,00000000,?,00000000,0040ED12,00000000), ref: 0040F20B
          • DialogBoxParamW.USER32(?,00000000,VA,00000000,00000000), ref: 0040F233
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CacheCurrentDialogErrorFlushInstructionLastParamProcess
          • String ID: VA
          • API String ID: 2229644096-1642038470
          • Opcode ID: a45dda8d53333fe66f0568ebb043e916602d31057ef07022ed8f0c4da8a0e3d5
          • Instruction ID: 9559283ad2d04dfaca2de445fe73d6985b466a1ba89c1f88deefba8f1c5ac094
          • Opcode Fuzzy Hash: a45dda8d53333fe66f0568ebb043e916602d31057ef07022ed8f0c4da8a0e3d5
          • Instruction Fuzzy Hash: D3E09236240120E6D6202FA5AD45B6A3694AB44B20F10053BFB01F50D1DB758846C36A
          APIs
          • __CxxThrowException@8.LIBCMT ref: 0041A86B
          • SetFilePointer.KERNELBASE(?,00000000,?,00000002), ref: 0041A8FA
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 0041AA6C
            • Part of subcall function 00414B6E: __CxxThrowException@8.LIBCMT ref: 00414B96
            • Part of subcall function 00423BB6: __EH_prolog3.LIBCMT ref: 00423BBD
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8FilePointerThrow$H_prolog3H_prolog3_catch
          • String ID:
          • API String ID: 564545149-0
          • Opcode ID: ae018a6e080c2f1472f2c1b71d2f2bb4bbe3e90be679bd278c14870b44380469
          • Instruction ID: faf76b4dc3451e06f8b59066a96079757423da0957bd58858a060bd6dca9a4f9
          • Opcode Fuzzy Hash: ae018a6e080c2f1472f2c1b71d2f2bb4bbe3e90be679bd278c14870b44380469
          • Instruction Fuzzy Hash: 1471D37060A7009BC724DF15CA81AEBB3E5BF80720F540A1FF4A693690D738E995CB5B
          APIs
            • Part of subcall function 0040E726: __EH_prolog3.LIBCMT ref: 0040E72D
            • Part of subcall function 0040E726: RtlEnterCriticalSection.NTDLL(004CBA3C), ref: 0040E73B
            • Part of subcall function 0040E726: RtlLeaveCriticalSection.NTDLL(004CBA3C), ref: 0040E7B8
          • PostMessageW.USER32(000000FF,00000406,00000000,00000000), ref: 0040CD91
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CriticalSection$EnterH_prolog3LeaveMessagePost
          • String ID:
          • API String ID: 3175935150-0
          • Opcode ID: d7cb4ce009ef32d75ba312334faea9ec910638784ad1f1917426f9c52efe2799
          • Instruction ID: 3d272078be0d4ce3293dfff81503de6a0bc9bd03953f91bf1b1e9b966b9915c4
          • Opcode Fuzzy Hash: d7cb4ce009ef32d75ba312334faea9ec910638784ad1f1917426f9c52efe2799
          • Instruction Fuzzy Hash: 93718D71108345DFC724DF25D881A9BBBE5FB88314F204A2FF495E32D1DB3899948B9A
          APIs
            • Part of subcall function 00438209: __EH_prolog3.LIBCMT ref: 00438210
          • __CxxThrowException@8.LIBCMT ref: 0043F225
          • _memset.LIBCMT ref: 0043F267
          • _memset.LIBCMT ref: 0043F275
            • Part of subcall function 0043E860: __CxxThrowException@8.LIBCMT ref: 0043E91A
            • Part of subcall function 0043E860: __CxxThrowException@8.LIBCMT ref: 0043E94F
            • Part of subcall function 0043E860: __CxxThrowException@8.LIBCMT ref: 0043E97E
            • Part of subcall function 00413380: __CxxThrowException@8.LIBCMT ref: 004133B2
            • Part of subcall function 0043E860: __CxxThrowException@8.LIBCMT ref: 0043E9AF
            • Part of subcall function 0043E860: __CxxThrowException@8.LIBCMT ref: 0043E9DE
            • Part of subcall function 0043E860: __CxxThrowException@8.LIBCMT ref: 0043EA0B
            • Part of subcall function 0043E860: __CxxThrowException@8.LIBCMT ref: 0043EA3C
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$_memset$H_prolog3
          • String ID:
          • API String ID: 207774560-0
          • Opcode ID: 4e56ef19818853e72e2f5ea7bca8464686239c5c3be10aec92a7e4a0cb42781c
          • Instruction ID: 368b8b33959c909da0f9c6cf1e581ba302ff01b66a9dfc3135aa430fd509b45c
          • Opcode Fuzzy Hash: 4e56ef19818853e72e2f5ea7bca8464686239c5c3be10aec92a7e4a0cb42781c
          • Instruction Fuzzy Hash: 1E71A5712083419FD324DF55C891FABB7E9AFC8704F00491EF68997281DBB4A908CB66
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 004028EF
          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00402995
          • CloseHandle.KERNEL32(?), ref: 00402ADF
            • Part of subcall function 0040695C: __CxxThrowException@8.LIBCMT ref: 00406977
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CloseCreateException@8FileH_prolog3_catchHandleThrow
          • String ID:
          • API String ID: 2346817456-0
          • Opcode ID: c245294e2bcda2f12943e785d1547e892bcb5fecdb033e02fb15f7d0a211dadb
          • Instruction ID: acedb010e216129685f30b46a229072d1c308362973a27a2ebf8ceaf5b333c07
          • Opcode Fuzzy Hash: c245294e2bcda2f12943e785d1547e892bcb5fecdb033e02fb15f7d0a211dadb
          • Instruction Fuzzy Hash: 0F51E4707003059FDB24EB65C659B7EBBA5BF04318F10452EF452A76E2DBB8AD40CB58
          APIs
          • __EH_prolog3_catch_GS.LIBCMT ref: 00402D80
            • Part of subcall function 00402C12: __EH_prolog3_catch_GS.LIBCMT ref: 00402C1C
            • Part of subcall function 00402C12: SHGetFolderPathW.SHELL32(00000000,00000020,00000000,00000000,?), ref: 00402C5D
          • __itow_s.LIBCMT ref: 00402E88
          • __itow_s.LIBCMT ref: 00402F08
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch___itow_s$FolderPath
          • String ID:
          • API String ID: 277952429-0
          • Opcode ID: 5fa32c8e2db902f3d7b9d52cc579dda7f2185d70c2c00d741beb866ab4ca7ae5
          • Instruction ID: ccc4dd78bc4ef78c24c744b31f5c47ca2a94bc3493f41e908b813847148bf41b
          • Opcode Fuzzy Hash: 5fa32c8e2db902f3d7b9d52cc579dda7f2185d70c2c00d741beb866ab4ca7ae5
          • Instruction Fuzzy Hash: CD41C4319001286ACB20FB5ACD49FEEB7B8DF84315F1001AFB91DB21D1DAB84F848A59
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 00412AED
            • Part of subcall function 00413299: __CxxThrowException@8.LIBCMT ref: 004132C8
            • Part of subcall function 0047210B: __lock.LIBCMT ref: 00472119
            • Part of subcall function 0047210B: __getdcwd_nolock.LIBCMT ref: 0047212B
          • __chdir.LIBCMT ref: 00412B53
          • __chdir.LIBCMT ref: 00412C56
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: __chdir$Exception@8H_prolog3_catchThrow__getdcwd_nolock__lock
          • String ID:
          • API String ID: 11999470-0
          • Opcode ID: 958c6469eb277bcb97f09388e58a2cf532ae65dc3ff00154c8d4a52c72c89ebb
          • Instruction ID: 943d9ad838e67a6bcf09ea14dfdab3609c6d8846c2772a43b279d0d54d69e4ad
          • Opcode Fuzzy Hash: 958c6469eb277bcb97f09388e58a2cf532ae65dc3ff00154c8d4a52c72c89ebb
          • Instruction Fuzzy Hash: A041E6B1A00245AFDF15AF55C945BFD7B61AF04314F04405AFA14AB3E2DBBD8EA1C788
          APIs
          • GetShortPathNameW.KERNELBASE(?,?,00000104), ref: 004184FA
          • GetShortPathNameW.KERNEL32(?,?,00000000), ref: 0041853B
          • GetLastError.KERNEL32 ref: 004185FC
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: NamePathShort$ErrorLast
          • String ID:
          • API String ID: 1928201977-0
          • Opcode ID: bacf834ef753a2b15f22f3efdee30cbd29e7bfc72c6b7562124496df5a55f83f
          • Instruction ID: 19b5036c2e85718d93b3f04773cf975d59e2d0596d52e79ef856e1f13a85bc04
          • Opcode Fuzzy Hash: bacf834ef753a2b15f22f3efdee30cbd29e7bfc72c6b7562124496df5a55f83f
          • Instruction Fuzzy Hash: 47319072108344AFC711EF51C8849EFB7E9EF98704F10092FF58693251DE799E898B5A
          APIs
          • __CxxThrowException@8.LIBCMT ref: 0041A4AD
          • ReadFile.KERNELBASE(000000FF,?,?,?,00000000), ref: 0041A4F1
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • GetLastError.KERNEL32 ref: 0041A505
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorException@8FileH_prolog3_catchLastReadThrow
          • String ID:
          • API String ID: 656740654-0
          • Opcode ID: 5d362d325d00b20671f1ba4708242913eb17bcdced3be72a598a50baea4167b5
          • Instruction ID: 98047d25e2c2e2dabcee81b4345894e90f8bac1eab8b908a32007ae4b7402c44
          • Opcode Fuzzy Hash: 5d362d325d00b20671f1ba4708242913eb17bcdced3be72a598a50baea4167b5
          • Instruction Fuzzy Hash: E231F471509301ABC710EF65C8849EB77E8BB94328F400A2FF48192191D778EE98CB5B
          APIs
          • GetFileAttributesW.KERNELBASE(?,?,?), ref: 00418A25
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 004189F9
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • GetFileAttributesA.KERNEL32(?), ref: 00418A54
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: AttributesFile$ExceptionException@8H_prolog3_catchRaiseThrow
          • String ID:
          • API String ID: 4287634551-0
          • Opcode ID: 4bb57909b7254184b756bfa995905a98894d291872315dde0f544ddb4eb7f4ef
          • Instruction ID: a25aea8dbab080c7969770944d8c3d4a1a9a62e37b7fff5326475da43880e2c1
          • Opcode Fuzzy Hash: 4bb57909b7254184b756bfa995905a98894d291872315dde0f544ddb4eb7f4ef
          • Instruction Fuzzy Hash: 4921B571408345EFC710DF14C841A9ABBE4FF55768F004A2EF894532A1DB799948CB9A
          APIs
          • CreateDirectoryW.KERNELBASE(?,00000000,?,?,00000000,?,00418149,?,?,?,004C1E84), ref: 004181B4
          • GetFileAttributesW.KERNEL32(?,?,00000000,?,00418149,?,?,?,004C1E84), ref: 004181C0
          • _wcsrchr.LIBCMT ref: 004181D7
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: AttributesCreateDirectoryFile_wcsrchr
          • String ID:
          • API String ID: 399696544-0
          • Opcode ID: 53be16dad5141dffbae7f302eb0638049b0fe732d234d315afe7e58e22040ae0
          • Instruction ID: f782a97c459d683dc23ab2a7a31aa8f69e2c7ad6b4bf85ca451c9d6403e5a076
          • Opcode Fuzzy Hash: 53be16dad5141dffbae7f302eb0638049b0fe732d234d315afe7e58e22040ae0
          • Instruction Fuzzy Hash: ECF04932182302B9E2251B25AC45FFB739CAF82710F14061FF590672D0DF749842922D
          APIs
          • GetFileAttributesW.KERNELBASE(?,00000001,0046E9AC,?,?,00402F28,00000003,00000000,?), ref: 0046E953
          • GetLastError.KERNEL32 ref: 0046E95E
          • __dosmaperr.LIBCMT ref: 0046E965
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: AttributesErrorFileLast__dosmaperr
          • String ID:
          • API String ID: 1932490781-0
          • Opcode ID: b237afc6b04f3a4a8ff1c04ef640850ee86595bed9698047690a3120a4c8c800
          • Instruction ID: 7dc8b3d29dac383926a124a257b207e6ee6ba645ff5930ba47bab9b880a2563f
          • Opcode Fuzzy Hash: b237afc6b04f3a4a8ff1c04ef640850ee86595bed9698047690a3120a4c8c800
          • Instruction Fuzzy Hash: 0001A270404300CEDAB22BB6A8053EB77A09F82734F01854FF5A8562E6E77C48458B9B
          APIs
          • SetDlgItemTextW.USER32(?,00000402,?), ref: 0040470D
          • GetDlgItem.USER32(?,000003F6), ref: 0040471D
          • SendMessageW.USER32(00000000,00000402,00000000,00000000), ref: 00404746
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Item$MessageSendText
          • String ID:
          • API String ID: 3392263854-0
          • Opcode ID: 5768a14d3bee01b2159072ccdd0782c8dc0692ee2edc7eee15560909a4d4e2f6
          • Instruction ID: c7f80f697d9223a497c6a56c394f647aa94f8fad6dc2d0830a07e7d0db9cd25c
          • Opcode Fuzzy Hash: 5768a14d3bee01b2159072ccdd0782c8dc0692ee2edc7eee15560909a4d4e2f6
          • Instruction Fuzzy Hash: B6111870501A01AFD7649F34DD4ABA7B7E5BB48705F00882EF29BA21A1D7706811DB08
          APIs
          • LoadImageW.USER32(00000080,00000001,00000000,?,?,?,0040323C), ref: 0040E90C
          • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0040E914
          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0040E937
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: MessageSend$ImageLoad
          • String ID:
          • API String ID: 2074947779-0
          • Opcode ID: e03014aa9771f799a0a8d4b5993d75c587954ce357068e3857e9a513740ceaff
          • Instruction ID: 1e20208807c255a55d4fef9e30b93bdc4796badb17ea4da51b3e9164a9714b9f
          • Opcode Fuzzy Hash: e03014aa9771f799a0a8d4b5993d75c587954ce357068e3857e9a513740ceaff
          • Instruction Fuzzy Hash: 20F019716811547BF6211796DC4BF6B3F2DD785F65F010035F704990E0C6E22854CB79
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0041754F
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8H_prolog3_catchRaiseThrow
          • String ID: PK
          • API String ID: 10698533-2811355336
          • Opcode ID: 2e0f8a69ac6e1fa6090477a811d43803611d70f31ae8d063e1a34e1e722a2ff1
          • Instruction ID: ffb067b86a0b2212f06d82e6127039bab16a5430b308f835b19b7287b577a7a0
          • Opcode Fuzzy Hash: 2e0f8a69ac6e1fa6090477a811d43803611d70f31ae8d063e1a34e1e722a2ff1
          • Instruction Fuzzy Hash: B931C0B0E042099BCF14DBA8C8516FEBBB1EF58304F50405FE012E7281E7789A46CB59
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch
          • String ID: PMJ
          • API String ID: 3886170330-1076063844
          • Opcode ID: 61c2bebd7f5d4d17b773d9ffea6322ca9dcce0c582edd0616fac4e4a92e615a2
          • Instruction ID: dbfdd7d263ffff981fd512ad6b87acc54b9be45b106cbed291a37e746d0955fc
          • Opcode Fuzzy Hash: 61c2bebd7f5d4d17b773d9ffea6322ca9dcce0c582edd0616fac4e4a92e615a2
          • Instruction Fuzzy Hash: 7FF0A034A004119BCB15EFA9C255AADB7A1AF04315F21801EE592EB391CB788E409B9E
          APIs
          • __EH_prolog3.LIBCMT ref: 0041A2DE
            • Part of subcall function 0041A78C: FindCloseChangeNotification.KERNELBASE(?), ref: 0041A7B2
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ChangeCloseFindH_prolog3Notification
          • String ID: bJ
          • API String ID: 800261803-636695863
          • Opcode ID: 0c11619ca29bc89cfe7afd088f488acf4230a359b798a33d2368ae84177744bb
          • Instruction ID: e9386a2567e807a7c1d019143b2eea29c1838896c6742d198328058bb268f7d9
          • Opcode Fuzzy Hash: 0c11619ca29bc89cfe7afd088f488acf4230a359b798a33d2368ae84177744bb
          • Instruction Fuzzy Hash: B6E0B6B1405B158AC720FF92C44538DBBE0AB11308BA5C95FE0A95B691DBFC95888B9E
          APIs
          • __CxxThrowException@8.LIBCMT ref: 00421FE7
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
            • Part of subcall function 0043288C: __EH_prolog3_GS.LIBCMT ref: 00432893
            • Part of subcall function 0043288C: __CxxThrowException@8.LIBCMT ref: 004328ED
            • Part of subcall function 0043288C: _memset.LIBCMT ref: 0043299B
          • __EH_prolog3.LIBCMT ref: 00421F91
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$ExceptionH_prolog3H_prolog3_H_prolog3_catchRaise_memset
          • String ID:
          • API String ID: 2620095835-0
          • Opcode ID: ea63ec662c2a09735638e391880718a320e09b2af2d9e1d3158154fa5394eef9
          • Instruction ID: c0ce61d56cc1fbdff1453cf23609231f921b5062471a4bce8e755c1f20f47739
          • Opcode Fuzzy Hash: ea63ec662c2a09735638e391880718a320e09b2af2d9e1d3158154fa5394eef9
          • Instruction Fuzzy Hash: DAF19D30600258EFCF18EF64D995AED7BB1BF04304F9440AEF90697261CBB9AE48CB55
          APIs
          • __EH_prolog3.LIBCMT ref: 00420815
          • __CxxThrowException@8.LIBCMT ref: 0042085A
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
            • Part of subcall function 00421F83: __EH_prolog3.LIBCMT ref: 00421F91
            • Part of subcall function 00421F83: __CxxThrowException@8.LIBCMT ref: 00421FE7
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3
          • String ID:
          • API String ID: 2680013047-0
          • Opcode ID: 9cc28248653f84474046394b51f5714594729ae89a7d2767eb49d59c943749e4
          • Instruction ID: 8b84ead9e399a6b5bd2ece47825663cd0ea88ee0e2a0d2e31627cc727a3e9d58
          • Opcode Fuzzy Hash: 9cc28248653f84474046394b51f5714594729ae89a7d2767eb49d59c943749e4
          • Instruction Fuzzy Hash: D7D18130B00259CFDF14DFA8D488BAEBBF1AF45308F54809AE416AB362C779AD45CB55
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 00420D46
          • __CxxThrowException@8.LIBCMT ref: 00420D9B
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3_catchThrow
          • String ID:
          • API String ID: 1118002619-0
          • Opcode ID: 3daf157df03edefee782decd1a3cdff6d9c9561e22c32cdc5a7041d8f8304361
          • Instruction ID: cc09aae82967f229efb4f4d17df12dff814bccd9121c39190fc7382b92b16a19
          • Opcode Fuzzy Hash: 3daf157df03edefee782decd1a3cdff6d9c9561e22c32cdc5a7041d8f8304361
          • Instruction Fuzzy Hash: FBB15C30701268DFCB24DF69C998AAD7BE1BF48704F55405AF9018B3A2DBB9EC45CB94
          APIs
          • __EH_prolog3_catch_GS.LIBCMT ref: 0042C50C
          • __CxxThrowException@8.LIBCMT ref: 0042C535
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3_catchH_prolog3_catch_Throw
          • String ID:
          • API String ID: 629799809-0
          • Opcode ID: 38f6a3a8a443334dcfd0fc8e595f12cd3a25921b3b217fbcea394292a45bf767
          • Instruction ID: 3f168f874f590c8cf1cfba12062848884aaf22955e119d93706aa23469400c3b
          • Opcode Fuzzy Hash: 38f6a3a8a443334dcfd0fc8e595f12cd3a25921b3b217fbcea394292a45bf767
          • Instruction Fuzzy Hash: 84816B70A00218ABDB14EFA4E8C0FEDB7B5AF48310F60456AF516A7290DB34AD85CF58
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0042BF26
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
          • __CxxThrowException@8.LIBCMT ref: 0042C00D
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3_catch
          • String ID:
          • API String ID: 3079028488-0
          • Opcode ID: 730e00fdb59bda0cd0ea370be8ba2bc17c0091b0684c606fce7cbfbe9f855047
          • Instruction ID: 63ce5696c7e71dbe0d6ca65d92db31f3c51012c7abf241bf558f410658bb8fdc
          • Opcode Fuzzy Hash: 730e00fdb59bda0cd0ea370be8ba2bc17c0091b0684c606fce7cbfbe9f855047
          • Instruction Fuzzy Hash: 0C719970600309DFDB24DFA5C885BAFBBB5BF88304F10845EF416A7291DB78A944CB65
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 004210DF
            • Part of subcall function 0042C48A: __CxxThrowException@8.LIBCMT ref: 0042C4B3
          • __CxxThrowException@8.LIBCMT ref: 0042119B
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3_catch
          • String ID:
          • API String ID: 3079028488-0
          • Opcode ID: 7d363b83de8df479b15af33fe03bfd538125fd7293d99d2461ce91b5845e8551
          • Instruction ID: f591134e972e6411dd43f1d536b8f5381d3b9f92d4ba1a16f63659c7a6069052
          • Opcode Fuzzy Hash: 7d363b83de8df479b15af33fe03bfd538125fd7293d99d2461ce91b5845e8551
          • Instruction Fuzzy Hash: C941DD70700264AFCB14EF65DC81DBE77A8FF29704B50006FF656972A2CB78AC45C6A9
          APIs
          • __EH_prolog3.LIBCMT ref: 00423C08
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 00423C3B
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8H_prolog3H_prolog3_catchRaiseThrow
          • String ID:
          • API String ID: 2149902277-0
          • Opcode ID: da3c351590c0544504d7dc87a091de39e9073b218e9f9aa28b6b9ad8b2195b84
          • Instruction ID: 56e8503fa7af7d7d62bbe2e17babfb86348854fe846e5e0a7c3ae5e282672be2
          • Opcode Fuzzy Hash: da3c351590c0544504d7dc87a091de39e9073b218e9f9aa28b6b9ad8b2195b84
          • Instruction Fuzzy Hash: 27411B71A0023ACFCB15DF56D9814AEBB75BF44B12B95845BF811A7350C7789A40CB98
          APIs
          • __EH_prolog3_catch_GS.LIBCMT ref: 00402C1C
            • Part of subcall function 00413423: __EH_prolog3_catch.LIBCMT ref: 0041342A
          • SHGetFolderPathW.SHELL32(00000000,00000020,00000000,00000000,?), ref: 00402C5D
            • Part of subcall function 00414BA7: __EH_prolog3.LIBCMT ref: 00414BAE
            • Part of subcall function 004233E1: __CxxThrowException@8.LIBCMT ref: 00423406
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8FolderH_prolog3H_prolog3_catchH_prolog3_catch_PathThrow
          • String ID:
          • API String ID: 1587153336-0
          • Opcode ID: e2482dd5cf100e295a5f15607fbd2933340e0dec1d39e069ea60cd3115cc91b7
          • Instruction ID: a5d84b43a8dfd52a88ef7551e7e0a2c87f14fc3ed0c0dada9d046cd692a94ac5
          • Opcode Fuzzy Hash: e2482dd5cf100e295a5f15607fbd2933340e0dec1d39e069ea60cd3115cc91b7
          • Instruction Fuzzy Hash: 0B31A9319041189ADB24EB65DD8DAAEB7B4AF94305F2000EEF009A72D1DB7C9F84CB19
          APIs
          • __EH_prolog3.LIBCMT ref: 004179EA
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 00417A0D
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
            • Part of subcall function 00417881: __EH_prolog3.LIBCMT ref: 00417888
            • Part of subcall function 00417881: __CxxThrowException@8.LIBCMT ref: 004178BF
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw$ExceptionH_prolog3_catchRaise
          • String ID:
          • API String ID: 795541548-0
          • Opcode ID: a4a564cfb586fecd50bd250f400aa7c00a466bc98f5104ce0b313b1e1e3aefe9
          • Instruction ID: a1ed90696a826cd3f8cfde2eb044a2e0fd6f2e67fe07d5432d0ea59ef78840bd
          • Opcode Fuzzy Hash: a4a564cfb586fecd50bd250f400aa7c00a466bc98f5104ce0b313b1e1e3aefe9
          • Instruction Fuzzy Hash: 08418A7090424ADFCF01EFA4C588AEEBBB5BF04308F54809EF9056B251C7799E54CBA2
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0042A1B5
          • __CxxThrowException@8.LIBCMT ref: 0042A1E3
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch$Exception@8Throw
          • String ID:
          • API String ID: 3876760537-0
          • Opcode ID: 1606ac711c2a1e7476dc7c4349cd91976c903e3b114306e002ac0511ddd36462
          • Instruction ID: 8f26fbc08fa0a211d0ab33d77271e97b1538d4d1ec1d94337c0bfbf2edbf0974
          • Opcode Fuzzy Hash: 1606ac711c2a1e7476dc7c4349cd91976c903e3b114306e002ac0511ddd36462
          • Instruction Fuzzy Hash: 133127B0A00219EFDF14EF64C945BEEB7B5AB48304F50445AF915A3290C738AE64CBA6
          APIs
          • __EH_prolog3.LIBCMT ref: 0042C3A0
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0042C3BF
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8H_prolog3H_prolog3_catchRaiseThrow
          • String ID:
          • API String ID: 2149902277-0
          • Opcode ID: b856afc062d4361a3e8bff779cdad3e1be44c520000ac64f3d6ad638465a100e
          • Instruction ID: 005e8f89653f74949a8f3efda301919feee3d22f16df967404fd978835c0f254
          • Opcode Fuzzy Hash: b856afc062d4361a3e8bff779cdad3e1be44c520000ac64f3d6ad638465a100e
          • Instruction Fuzzy Hash: 0D313E70B0011A9FCF14EFA5D8D18BEBBB6AF44314BA0892EE411E7291CB385D458B59
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3__sprintf
          • String ID:
          • API String ID: 1186671347-0
          • Opcode ID: a67aa062ba6c705841afbb9b465d29afe7fd7acacfcdb892caf2c0159fd8df58
          • Instruction ID: 20e45eb758d73c69dc2130fbe7718ba0a30d41f7e57bc634e7084ed86d93275d
          • Opcode Fuzzy Hash: a67aa062ba6c705841afbb9b465d29afe7fd7acacfcdb892caf2c0159fd8df58
          • Instruction Fuzzy Hash: 00218F71A00308AFCB14EFA5C5849DEB7B5BF48304B54492EF446D7252EB38A989CB59
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw
          • String ID:
          • API String ID: 3670251406-0
          • Opcode ID: 4bcd770cf81edb24eaf7abfb78f8d1bb3763ac5753f45da94ee0e0553744d4ee
          • Instruction ID: 0e29c5e2d7dd6592e012710f17f6c182d5bb040da9291e3bc4ee8d19e9c48485
          • Opcode Fuzzy Hash: 4bcd770cf81edb24eaf7abfb78f8d1bb3763ac5753f45da94ee0e0553744d4ee
          • Instruction Fuzzy Hash: 2F21B670A00215ABCF21EF59CC40AEEB7E4EF81320F50862FB826672D1DB789E00CB55
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw
          • String ID:
          • API String ID: 3670251406-0
          • Opcode ID: e5a349900beca6e73132496a8048a6e3c9c389494e1da8bdb5e6f066cd0934e9
          • Instruction ID: c228c06f0a500609c708a8e14c0fa28feaf46d111c2155c451d606f7570d2cf7
          • Opcode Fuzzy Hash: e5a349900beca6e73132496a8048a6e3c9c389494e1da8bdb5e6f066cd0934e9
          • Instruction Fuzzy Hash: 11216FB0904714DFD710EF6BD481A9EFBF4BF08704B90856EE5C997640D738AA05CB99
          APIs
          • __EH_prolog3.LIBCMT ref: 0041B526
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          • __CxxThrowException@8.LIBCMT ref: 0041B588
            • Part of subcall function 004267C2: __EH_prolog3.LIBCMT ref: 004267C9
            • Part of subcall function 004267C2: _memset.LIBCMT ref: 0042684E
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3$Exception@8Throw_malloc_memset
          • String ID:
          • API String ID: 4266494698-0
          • Opcode ID: 076822bc63e951edc5137cfff718b2a6b58cf882896a50130bdd229f0a2c33a3
          • Instruction ID: 6d2983792fc90951365db0d8202271ca61c37deca622b554a124821c120a70ec
          • Opcode Fuzzy Hash: 076822bc63e951edc5137cfff718b2a6b58cf882896a50130bdd229f0a2c33a3
          • Instruction Fuzzy Hash: 6511A170A00219AFCB00FFB689818DEBB71FF04704BA0842EF514A7251C7388E44C799
          APIs
          • __EH_prolog3.LIBCMT ref: 00425FF4
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          • __CxxThrowException@8.LIBCMT ref: 00426056
            • Part of subcall function 00425E86: __EH_prolog3.LIBCMT ref: 00425E8D
            • Part of subcall function 00425E86: _memset.LIBCMT ref: 00425EF0
            • Part of subcall function 00425E86: _memset.LIBCMT ref: 00425EFC
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_memset$Exception@8Throw_malloc
          • String ID:
          • API String ID: 71305810-0
          • Opcode ID: d62b0e5b17cc750cc353af8fe0903c3040f4331c0f70bbe6c8b109fc1b8d0da1
          • Instruction ID: c9d7616007c0b4ea645452564d7665aa198ff26faab3780205df36c03d007bca
          • Opcode Fuzzy Hash: d62b0e5b17cc750cc353af8fe0903c3040f4331c0f70bbe6c8b109fc1b8d0da1
          • Instruction Fuzzy Hash: 87019270A01229DFCB00EFB6D8814AEBB71BF08344BA1846FF545A7251CB789F04D799
          APIs
            • Part of subcall function 0040E726: __EH_prolog3.LIBCMT ref: 0040E72D
            • Part of subcall function 0040E726: RtlEnterCriticalSection.NTDLL(004CBA3C), ref: 0040E73B
            • Part of subcall function 0040E726: RtlLeaveCriticalSection.NTDLL(004CBA3C), ref: 0040E7B8
          • GetTickCount.KERNEL32 ref: 0040CF39
          • PostMessageW.USER32(000000FF,00000404,?,?), ref: 0040CF60
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CriticalSection$CountEnterH_prolog3LeaveMessagePostTick
          • String ID:
          • API String ID: 902659623-0
          • Opcode ID: 17bb4ac220bc16c453bb809503de9b0df2a2c469d52765fd5d9fb3f4092ad272
          • Instruction ID: 1fc15d8dd098f0712301b2cdf5af36504c46272a80d8516582cfbfa6eced7039
          • Opcode Fuzzy Hash: 17bb4ac220bc16c453bb809503de9b0df2a2c469d52765fd5d9fb3f4092ad272
          • Instruction Fuzzy Hash: 3BF04F71904702DFCB309F20A84491B77E2AB08720F104F3FE5D6A26E1C334E8999B5A
          APIs
          • LoadStringW.USER32(?,00000000,00000100,00000010), ref: 0040C8D0
          • MessageBoxW.USER32(?,FFFF0000,?,00000000), ref: 0040C8E9
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: LoadMessageString
          • String ID:
          • API String ID: 2284331267-0
          • Opcode ID: 5ea80c5d67dfd9a457b00ee36eaac2431e43a7066256ae32d18674ad3bde4af9
          • Instruction ID: 92cb40cdd438783a95d38fda28d2d4e3a982d1d89df7fc8964cd4518b3c4e5a0
          • Opcode Fuzzy Hash: 5ea80c5d67dfd9a457b00ee36eaac2431e43a7066256ae32d18674ad3bde4af9
          • Instruction Fuzzy Hash: 6CF08C76900015EBCF216F92EC04CBE7BB5FB44714B10002DF904A3260EB399D11DBA9
          APIs
          • GetDlgItem.USER32(?,000003FC), ref: 00404C46
          • IsWindowVisible.USER32(00000000), ref: 00404C4D
            • Part of subcall function 004054D6: EnableWindow.USER32(00000000,00000001), ref: 004054FB
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$EnableItemVisible
          • String ID:
          • API String ID: 3179577904-0
          • Opcode ID: e5fe5341df8deea63e15f9a418874fffe333d908d86689bf442d5db36648b3c8
          • Instruction ID: 1d380391180e94702158bcdc1dbe5eceb9e43365457af9d35a118de67c146997
          • Opcode Fuzzy Hash: e5fe5341df8deea63e15f9a418874fffe333d908d86689bf442d5db36648b3c8
          • Instruction Fuzzy Hash: CCF0E571409211AFE71277749D08BDB77A8AF91350F11083FF245B21D1D7B95441C769
          APIs
          • ___crtCorExitProcess.LIBCMT ref: 00473419
            • Part of subcall function 004733EF: GetModuleHandleA.KERNEL32(0049FE64,0047341E,?,0046EB98,000000FF,0000001E,00000001,00000000,00000000,?,00476CBD,?,00000001,?,0047559B,00000018), ref: 004733F4
            • Part of subcall function 004733EF: GetProcAddress.KERNEL32(00000000,0049FE54), ref: 00473404
          • ExitProcess.KERNEL32 ref: 00473423
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExitProcess$AddressHandleModuleProc___crt
          • String ID:
          • API String ID: 2427264223-0
          • Opcode ID: 14eb083e35f6364d08b2ac1a1a8d834447263dfa64e1ef2edbd8a1f1fa7a8ee2
          • Instruction ID: 96eb407eff61599f0e6197c5d89557b7fdb8966d636ba0c19b8806f24d474684
          • Opcode Fuzzy Hash: 14eb083e35f6364d08b2ac1a1a8d834447263dfa64e1ef2edbd8a1f1fa7a8ee2
          • Instruction Fuzzy Hash: 87B00231446100AFD6553F21DD4B85D7B71EF80716F51D86DF449440719F769D50FB05
          APIs
            • Part of subcall function 0042D66A: __EH_prolog3.LIBCMT ref: 0042D671
          • __CxxThrowException@8.LIBCMT ref: 0042187F
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3H_prolog3_catchThrow
          • String ID:
          • API String ID: 1377961577-0
          • Opcode ID: 98ce4e8d5d8ce6e9ccf69134d40c44145906b832385dd2dab3b475b358ccd965
          • Instruction ID: c157ddba6125bd2fbb8c4aea638792d81f5cb727ddafb1e582675989179e5d8e
          • Opcode Fuzzy Hash: 98ce4e8d5d8ce6e9ccf69134d40c44145906b832385dd2dab3b475b358ccd965
          • Instruction Fuzzy Hash: 3322BA706083908FC724EF25C494B6FBBE1BFA5314F54095EF4969B2A1CB38E944CB5A
          APIs
            • Part of subcall function 00422440: __EH_prolog3_catch.LIBCMT ref: 0042244A
            • Part of subcall function 00422440: __CxxThrowException@8.LIBCMT ref: 004224B4
          • __CxxThrowException@8.LIBCMT ref: 00421BF2
            • Part of subcall function 00436C6D: __EH_prolog3.LIBCMT ref: 00436C74
            • Part of subcall function 00436C6D: __CxxThrowException@8.LIBCMT ref: 00436C9F
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3H_prolog3_catch
          • String ID:
          • API String ID: 147245295-0
          • Opcode ID: b06723d6c08be06d622efba5370b4e48d55d3a29ea96aa3663499a0a6adb2569
          • Instruction ID: df7943c4d440d36bc6b65e240c01ba4f8feea3c78fb6a9084c06bcfa05047222
          • Opcode Fuzzy Hash: b06723d6c08be06d622efba5370b4e48d55d3a29ea96aa3663499a0a6adb2569
          • Instruction Fuzzy Hash: 40D1AC70B00159DFCF00DF69D5889AEBBB5BF58304FA4409DE442AB3A1DB38AE44CB95
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 00416FB4
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8H_prolog3_catchRaiseThrow
          • String ID:
          • API String ID: 10698533-0
          • Opcode ID: 86cee1c1591adf85e74a12855fff85297003917c4fb68bc08f6928af155b5f4c
          • Instruction ID: 3f0ac09e1fc9e481467947a718130bbaff2a168ff55593c3c4362fe956b0e449
          • Opcode Fuzzy Hash: 86cee1c1591adf85e74a12855fff85297003917c4fb68bc08f6928af155b5f4c
          • Instruction Fuzzy Hash: AE818E7140C302ABC714DF21C8809ABBBF4EF99754F10495FF89597252E738DA89CB9A
          APIs
          • __CxxThrowException@8.LIBCMT ref: 00431455
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3_catchThrow
          • String ID:
          • API String ID: 1118002619-0
          • Opcode ID: 3eb0f081616814b3a255ec83abaa1a23546e4b1d44e52272734cde1c615a14d9
          • Instruction ID: 43bc7df1168460dfa546dc802f3bdd82839f6689be3b6e0291bf76b08113ee2e
          • Opcode Fuzzy Hash: 3eb0f081616814b3a255ec83abaa1a23546e4b1d44e52272734cde1c615a14d9
          • Instruction Fuzzy Hash: 6C4126B06083516BC724EB15C8A2BBB77E0EF95711F54095EF4E2C72D1D65CE908CB26
          APIs
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
          • OleUninitialize.OLE32 ref: 0040EE72
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8ThrowUninitialize
          • String ID:
          • API String ID: 2763929932-0
          • Opcode ID: 423805a3989e8900a989bd0114cb8db1ccbc8f3c75d8de4ef337972d40b873bc
          • Instruction ID: 7c4349e42636df5b76b6454630ac277bdd24cfb33b3762a66c3e650af91542e7
          • Opcode Fuzzy Hash: 423805a3989e8900a989bd0114cb8db1ccbc8f3c75d8de4ef337972d40b873bc
          • Instruction Fuzzy Hash: 88415030A00149DFCB14DFA9C599AADBBF1FF45304F6484BEE006AB6A1CB39AD44CB55
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0042E94F
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
            • Part of subcall function 004233E1: __CxxThrowException@8.LIBCMT ref: 00423406
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$ExceptionH_prolog3_catchRaise
          • String ID:
          • API String ID: 1579435050-0
          • Opcode ID: 3f7a2697ad1b2de9c94b48936b3449c1dba3106993cacb602b28ec74e0cdf029
          • Instruction ID: 1622bd294cd5a1aa970fcacac5e25fd4f5bc09fd0e5c06f3033079bf5ee04675
          • Opcode Fuzzy Hash: 3f7a2697ad1b2de9c94b48936b3449c1dba3106993cacb602b28ec74e0cdf029
          • Instruction Fuzzy Hash: 17313771600B009FD724DF26D484A6BB7E5FF88324B504A2EE88A87B50DB34F945CB59
          APIs
          • __EH_prolog3.LIBCMT ref: 00438210
            • Part of subcall function 004398F9: __EH_prolog3.LIBCMT ref: 00439900
            • Part of subcall function 004398F9: __CxxThrowException@8.LIBCMT ref: 00439968
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3$Exception@8Throw
          • String ID:
          • API String ID: 2489616738-0
          • Opcode ID: c6da8f854f696a60e98cef740e7ea5e0b9baa7ec032b82b4baf69956bca79f4c
          • Instruction ID: b91d7a1731915dfd7e20b9003c0f716b9467842518b016cf237ba2ce0c141435
          • Opcode Fuzzy Hash: c6da8f854f696a60e98cef740e7ea5e0b9baa7ec032b82b4baf69956bca79f4c
          • Instruction Fuzzy Hash: 4F419170A01254DFCB04EFA4D44AAAEBBB1BF08704F24409EF445AB391CF799E45CB99
          APIs
            • Part of subcall function 00413299: __CxxThrowException@8.LIBCMT ref: 004132C8
          • __CxxThrowException@8.LIBCMT ref: 00436DA1
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3_catch
          • String ID:
          • API String ID: 3079028488-0
          • Opcode ID: a39bc56b61647ddd0558c6e4ad0680310257ea97606451a12b4a961b0fdde63a
          • Instruction ID: 60ebe2fe2bdd85122e83344e5b15f2a643190aa7d3f722c3f1bc9f9480d765cd
          • Opcode Fuzzy Hash: a39bc56b61647ddd0558c6e4ad0680310257ea97606451a12b4a961b0fdde63a
          • Instruction Fuzzy Hash: AE214C71700206ABCB28EF19CCD1DAB7794DF84304F11556FF91297281EA34EC88C7A9
          APIs
          • __CxxThrowException@8.LIBCMT ref: 0042119B
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw
          • String ID:
          • API String ID: 2005118841-0
          • Opcode ID: 5031bd4297e21299e38231e9ded398e0e775ed5d66497724478d1d208ae64f37
          • Instruction ID: b1b903bdf5491526673bdfcd4a594faa121901db7dbf9d897150191a60585aaf
          • Opcode Fuzzy Hash: 5031bd4297e21299e38231e9ded398e0e775ed5d66497724478d1d208ae64f37
          • Instruction Fuzzy Hash: 1E214130700224EBCB18EF25CC95EEE7768BF28710F50055AF516A72A1CB79AD05C698
          APIs
          • _wcscpy.LIBCMT ref: 00413622
            • Part of subcall function 00413299: __CxxThrowException@8.LIBCMT ref: 004132C8
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw_wcscpy
          • String ID:
          • API String ID: 615372805-0
          • Opcode ID: a65043e78d02826527e2ae73efecf60425080491347efb6c807070d8cf6898e4
          • Instruction ID: 3bbba3cffa1090fd260cf3a623354248c8b3e17e2b7a121d6d20ab679e733063
          • Opcode Fuzzy Hash: a65043e78d02826527e2ae73efecf60425080491347efb6c807070d8cf6898e4
          • Instruction Fuzzy Hash: 8911A271608340ABC320DF1AD881E5BBBE8FB88B54F100A1FF45493391DB389904CB6A
          APIs
          • __CxxThrowException@8.LIBCMT ref: 004362F7
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
            • Part of subcall function 004233E1: __CxxThrowException@8.LIBCMT ref: 00423406
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3_catch
          • String ID:
          • API String ID: 3079028488-0
          • Opcode ID: c61774dd3c6ce3833f7637fb02329f2ce651c227fa78301ac36a57cdbfb8fb8a
          • Instruction ID: 72e35242c4c991529b85b3908210b785de8b7a1e3218b41c161903e1c0bf0562
          • Opcode Fuzzy Hash: c61774dd3c6ce3833f7637fb02329f2ce651c227fa78301ac36a57cdbfb8fb8a
          • Instruction Fuzzy Hash: 2511B631604305AFC710EE25C88085FB3E5FF88314B518A2FE89687551DB34FD45CA99
          APIs
          • OleUninitialize.OLE32 ref: 0040EE72
            • Part of subcall function 0040C7DE: __EH_prolog3_catch.LIBCMT ref: 0040C7E5
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catchUninitialize
          • String ID:
          • API String ID: 1964057109-0
          • Opcode ID: 8af4b50604ae465e1b773c693c35aeaf9aaa700bf0c4ec6c18ed685f66159f9d
          • Instruction ID: 5dcf38cf1c9a861615dad2de3e8d8acd475e3f51853252acce2a057d3d9df221
          • Opcode Fuzzy Hash: 8af4b50604ae465e1b773c693c35aeaf9aaa700bf0c4ec6c18ed685f66159f9d
          • Instruction Fuzzy Hash: 7E118C71A00208DFCB149FA9D896AADBBF1EF08314F24447EE106A76E1CB396C048B49
          APIs
          • OleUninitialize.OLE32 ref: 0040EE72
            • Part of subcall function 0040C7DE: __EH_prolog3_catch.LIBCMT ref: 0040C7E5
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catchUninitialize
          • String ID:
          • API String ID: 1964057109-0
          • Opcode ID: 62c626df1f7651c8423c1f14d70c1c975590f78bb611ca233df07f6fd43e0b76
          • Instruction ID: f4cce21bd3f2775f668416c2e2ff4a890e338e15d138506d62f7c1401cc69d67
          • Opcode Fuzzy Hash: 62c626df1f7651c8423c1f14d70c1c975590f78bb611ca233df07f6fd43e0b76
          • Instruction Fuzzy Hash: 88117C71A00208DFCB149FA9D896AAD7BF1EF08314F24457EE106A77E1CB396C04CB59
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch
          • String ID:
          • API String ID: 3886170330-0
          • Opcode ID: d73b0af1b0a54a9095c7c31b0f714690d902665fa08f74152b1061aeb950926b
          • Instruction ID: 9666f9794b2e32f220d40e99f08e87b8c4fda535c1307ccadf4d61886444afe4
          • Opcode Fuzzy Hash: d73b0af1b0a54a9095c7c31b0f714690d902665fa08f74152b1061aeb950926b
          • Instruction Fuzzy Hash: 6F11A271E006268BCB20EFAAD94149EB7B0EF40324B51825FE86467292C73CAD41CBD9
          APIs
          • __CxxThrowException@8.LIBCMT ref: 004370C1
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3_catchThrow
          • String ID:
          • API String ID: 1118002619-0
          • Opcode ID: 6534d6601eafc99a31fc58ea76f534ddb62cbe6536ef74379d8b5522d21e9a3c
          • Instruction ID: c1f5f656240cfa2e3c5d373c7eeb2ef4d0f81b65c8d4bcfe5fca001b1621c0c9
          • Opcode Fuzzy Hash: 6534d6601eafc99a31fc58ea76f534ddb62cbe6536ef74379d8b5522d21e9a3c
          • Instruction Fuzzy Hash: 530196706097055BD738EE21C802B9AB3F5AF44320F10862FA896865D1EB78EA48C699
          APIs
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
          • __CxxThrowException@8.LIBCMT ref: 004028AA
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$H_prolog3_catch
          • String ID:
          • API String ID: 3079028488-0
          • Opcode ID: f524ed10fac511200b4b8886e1ba6a2be53eadaefe8a951e07362324d34db654
          • Instruction ID: 3ab37715b6169fdfb8da5162cedeff76e446bfd53bd04e838598e82032ef3e61
          • Opcode Fuzzy Hash: f524ed10fac511200b4b8886e1ba6a2be53eadaefe8a951e07362324d34db654
          • Instruction Fuzzy Hash: 550192326143049FD214EB26C845CA6B3E9EF94320B04CA6FF055976D1EBB9F904CB95
          APIs
          • GetFileType.KERNELBASE(00000001,00000000,?,?,?,?,00000000,00000000,?,0041A3AE,?,00000000,?), ref: 0041AEB6
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: FileType
          • String ID:
          • API String ID: 3081899298-0
          • Opcode ID: 24f9cf09ea1e282c5891b88deed683e072a523d4fa5a75776751b66c2fda45b6
          • Instruction ID: 6554ae7c301d7033a01e3ac451fb057afff33f1846c4be60ff6dca7da4aa5776
          • Opcode Fuzzy Hash: 24f9cf09ea1e282c5891b88deed683e072a523d4fa5a75776751b66c2fda45b6
          • Instruction Fuzzy Hash: DD01D631604B059BCB314F69C888B67F7E9BF19325F500A1EF586829A1D778F8A4CB4D
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0042D832
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8H_prolog3_catchRaiseThrow
          • String ID:
          • API String ID: 10698533-0
          • Opcode ID: 57a3fd43e8a9eb875da5a4e9152977eec1e4d7590e11909682caa80d767f591d
          • Instruction ID: c91e9ca122a0eace671fa54960ec99a1ea19814b649ddc3d61a496d690ec8378
          • Opcode Fuzzy Hash: 57a3fd43e8a9eb875da5a4e9152977eec1e4d7590e11909682caa80d767f591d
          • Instruction Fuzzy Hash: 02F02431B002146BCB11BE61CC46F9AF764EF04360F40826BBC689B290DB34DA04C6D9
          APIs
          • __CxxThrowException@8.LIBCMT ref: 004132C8
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw
          • String ID:
          • API String ID: 2005118841-0
          • Opcode ID: 8c7ad7995e5c132b0c7dd5c5394e3b6922c9fc7270fe216ae44dc82053568bed
          • Instruction ID: 6e34f21a0551632e0e8e4dabe96544958f090a0be38087a1dbd82e486cf895e3
          • Opcode Fuzzy Hash: 8c7ad7995e5c132b0c7dd5c5394e3b6922c9fc7270fe216ae44dc82053568bed
          • Instruction Fuzzy Hash: 76F090706003046ADB10BF698C46FEA77AC9B14709F14846BB845E2190EA7CDA84C769
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch
          • String ID:
          • API String ID: 3886170330-0
          • Opcode ID: 7687d081fd9b88195d0cde50ddb3ae6c54b93962abf71d681aff4c1798934e00
          • Instruction ID: 2192e1bf9266705f84c99f13945725a597744201149cf610c9fc1e76c1700b77
          • Opcode Fuzzy Hash: 7687d081fd9b88195d0cde50ddb3ae6c54b93962abf71d681aff4c1798934e00
          • Instruction Fuzzy Hash: E4018638900B16DFCB21DF65C5022AAF7F0AF88711F21C92FE84167200D33A9A49CB99
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0042CD57
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8H_prolog3_catchRaiseThrow
          • String ID:
          • API String ID: 10698533-0
          • Opcode ID: 87df34f3edceb563161f266ad3e43a3f53861e5ff50f87cb94d9728a0c09e4dc
          • Instruction ID: 5480022eda4e163a5361cabdf7a3b230a80a25ff99cfae8d462d0aba4fe64e74
          • Opcode Fuzzy Hash: 87df34f3edceb563161f266ad3e43a3f53861e5ff50f87cb94d9728a0c09e4dc
          • Instruction Fuzzy Hash: 64F0BE31604208ABCB14EF14DC46EDA3BA9EF48320F10466ABC66971E1DB71EA24CA95
          APIs
          • __EH_prolog3.LIBCMT ref: 00415064
            • Part of subcall function 0041B02F: __EH_prolog3.LIBCMT ref: 0041B036
            • Part of subcall function 0041B02F: __CxxThrowException@8.LIBCMT ref: 0041B0B1
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3$Exception@8Throw
          • String ID:
          • API String ID: 2489616738-0
          • Opcode ID: 28e2c2f5f0ae462868cc308a9180aa06206ca24044676f580f0c37f73472feb5
          • Instruction ID: f8c01e5902bc39a08e1eca52d1ab4341130e1281a4fbd024d0b58ddc78a9c670
          • Opcode Fuzzy Hash: 28e2c2f5f0ae462868cc308a9180aa06206ca24044676f580f0c37f73472feb5
          • Instruction Fuzzy Hash: 39F03A71601605CBEF18EFA5C8457EE7BB0AF84316F24456EE1158B291CB7D89848B49
          APIs
          • __EH_prolog3.LIBCMT ref: 0041B650
            • Part of subcall function 00425FED: __EH_prolog3.LIBCMT ref: 00425FF4
            • Part of subcall function 00425FED: __CxxThrowException@8.LIBCMT ref: 00426056
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3$Exception@8Throw
          • String ID:
          • API String ID: 2489616738-0
          • Opcode ID: 1c0e6686deb9f27b6602a7971467607e4aeeed7acef43f29e98ef7338364a578
          • Instruction ID: 83110dc141c630e96383bb3c6b73da411e3aeae7d8786496fb5bfcbe224a906f
          • Opcode Fuzzy Hash: 1c0e6686deb9f27b6602a7971467607e4aeeed7acef43f29e98ef7338364a578
          • Instruction Fuzzy Hash: 72F01271A00118ABCB08EF95C848BAEBBA0FF54714F01805AF9199B250D7758A14DB99
          APIs
            • Part of subcall function 00414B6E: __CxxThrowException@8.LIBCMT ref: 00414B96
          • FindCloseChangeNotification.KERNELBASE(?), ref: 0041A7B2
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ChangeCloseException@8FindNotificationThrow
          • String ID:
          • API String ID: 232429529-0
          • Opcode ID: 4c605ec3864a69814c29becc33027a1a4d8175bf33afb8a88c02e11be5def074
          • Instruction ID: 451cdefb32f8189353133a9e87c97b8ae50ff43db2ec81161e5c2e3efaacf9fb
          • Opcode Fuzzy Hash: 4c605ec3864a69814c29becc33027a1a4d8175bf33afb8a88c02e11be5def074
          • Instruction Fuzzy Hash: 1AF0E931A09B044BC3306A28C44976AB7F5AF95735F04074ED8A342AE1A778F8D4869D
          APIs
          • KiUserCallbackDispatcher.NTDLL(00000001,00000001), ref: 0040572A
            • Part of subcall function 0040C7DE: __EH_prolog3_catch.LIBCMT ref: 0040C7E5
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CallbackDispatcherH_prolog3_catchUser
          • String ID:
          • API String ID: 3863802795-0
          • Opcode ID: 98ae18fe33376905254b8726dce63c21a499277e19750a2b599032caddb53b1d
          • Instruction ID: 7c81c659ffa54fa47bc721bf4b7a33451fb19cf326e9e52985c76779e4e27455
          • Opcode Fuzzy Hash: 98ae18fe33376905254b8726dce63c21a499277e19750a2b599032caddb53b1d
          • Instruction Fuzzy Hash: 0CF0A0B0941600FADB252F10AC0BF3B77E2EB18B04F10842EF246662E0E7B65850AA59
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 00414C1C
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionException@8H_prolog3_catchRaiseThrow
          • String ID:
          • API String ID: 10698533-0
          • Opcode ID: c110d39d29d070af397ed674a9ca35ab71fb00b1be40822fb8a00e0a9c2bf14b
          • Instruction ID: 6ecc956058c42a226bcb70142e273368549f0aa2bc1aae361d18a44a08edb313
          • Opcode Fuzzy Hash: c110d39d29d070af397ed674a9ca35ab71fb00b1be40822fb8a00e0a9c2bf14b
          • Instruction Fuzzy Hash: 67E0E530504308BBDB00FE24CC46F993398DB40314F00892ABD68960D0EA759B64CB9A
          APIs
            • Part of subcall function 00476816: __amsg_exit.LIBCMT ref: 00476824
          • __endthreadex.LIBCMT ref: 00470A60
            • Part of subcall function 00470A0B: __freeptd.LIBCMT ref: 00470A33
            • Part of subcall function 00470A0B: RtlExitUserThread.NTDLL(?,00470A65,00000000), ref: 00470A3D
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExitThreadUser__amsg_exit__endthreadex__freeptd
          • String ID:
          • API String ID: 2189681956-0
          • Opcode ID: ecd1cdd82a0748d1465db30b5a0917c3a442c6f0c0b52e0d411cc4e5e81cc3bd
          • Instruction ID: f8fd3b2bb74170a00711d5cfb4fba7c6c501b37fd7d81666cca1b8a8c0d9c712
          • Opcode Fuzzy Hash: ecd1cdd82a0748d1465db30b5a0917c3a442c6f0c0b52e0d411cc4e5e81cc3bd
          • Instruction Fuzzy Hash: 3FE08671900B04DFDB18BBA1C906FAD3765DF04705F21804EF0025B2A2CA785840DF25
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch
          • String ID:
          • API String ID: 3886170330-0
          • Opcode ID: e3a816553bf95b76909096924c19bff87c1db4e017f839241c52c2c92c8295a7
          • Instruction ID: 4fc9d95be371b9de0100f721527ea9a6f3d4bc80830673bd7d43aea88af875f1
          • Opcode Fuzzy Hash: e3a816553bf95b76909096924c19bff87c1db4e017f839241c52c2c92c8295a7
          • Instruction Fuzzy Hash: B1E08C709042049ECB01EFA9880079C79E0AB04724F20857FB0ADE7281E7788A4487AA
          APIs
          • FindResourceW.KERNEL32(?,?,?,00000001,00000000), ref: 0043EADB
          • __CxxThrowException@8.LIBCMT ref: 0043EAFD
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • SizeofResource.KERNEL32(?,00000000,00000000), ref: 0043EB05
          • __CxxThrowException@8.LIBCMT ref: 0043EB27
          • LoadResource.KERNEL32(?,00000000), ref: 0043EB2E
          • __CxxThrowException@8.LIBCMT ref: 0043EB4E
          • LockResource.KERNEL32(00000000), ref: 0043EB54
          • __CxxThrowException@8.LIBCMT ref: 0043EB74
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 0043EBA8
          • _wcscat_s.LIBCMT ref: 0043ED1D
          • _wcscat_s.LIBCMT ref: 0043ED32
          • _wcsncpy.LIBCMT ref: 0043EDD0
          • _malloc.LIBCMT ref: 0043EEAD
          • _wcsncpy.LIBCMT ref: 0043EFD0
          • _malloc.LIBCMT ref: 0043F086
          • _wcsrchr.LIBCMT ref: 0043F0B4
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$Resource$_malloc_wcscat_s_wcsncpy$ExceptionFindH_prolog3_catchLoadLockRaiseSizeof_wcsrchr
          • String ID: -RSA$-SECURE$/tmp/..PKText.$RSA$SECURE$en_US
          • API String ID: 1852084083-3042125614
          • Opcode ID: 295ccecc3a6df165448770d3e72cb576c06b743ebeac2d4d86a06d393e304b2a
          • Instruction ID: 995a74277dc8c3dc47ae54e626eb9112986f5c5b317a9b785083c7ec75e95179
          • Opcode Fuzzy Hash: 295ccecc3a6df165448770d3e72cb576c06b743ebeac2d4d86a06d393e304b2a
          • Instruction Fuzzy Hash: 7F0224719012069BCB24EF69CC52AFB73B5EF58314F48452EE906973D0E738AA44CB99
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID:
          • String ID: 1
          • API String ID: 0-2212294583
          • Opcode ID: cd7c9a879657591d89dbb2497890ee273223b6bd46ca5314e8bcf680ba94e73d
          • Instruction ID: 449eec2199e24c0ddde907247afa93b54a42915fd9372da1ad1459d01598c202
          • Opcode Fuzzy Hash: cd7c9a879657591d89dbb2497890ee273223b6bd46ca5314e8bcf680ba94e73d
          • Instruction Fuzzy Hash: AE435A70904389CFDB24CF19C884699B7E1BF89328F15866EF8989B3A1D378D946CF45
          APIs
          • _calloc.LIBCMT ref: 00448E0F
            • Part of subcall function 00448810: SetLastError.KERNEL32(00000000,00448F6E,?,10000001,00000000,00000000,?,?,00000018,00000000), ref: 00448827
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorLast_calloc
          • String ID:
          • API String ID: 112881490-0
          • Opcode ID: e24d9625c2744b0ac7ff0e0bba43e84216c528a6dbf3790d2224e08badbb98d6
          • Instruction ID: 52d882e2011405198b06d63806439dca90e6e2fce18c2a6e905b5480130d151c
          • Opcode Fuzzy Hash: e24d9625c2744b0ac7ff0e0bba43e84216c528a6dbf3790d2224e08badbb98d6
          • Instruction Fuzzy Hash: CAB19170604301ABE720DF55CC85F6FB7E9AF99B04F00481EF54596281EBB8E845CBAA
          APIs
          • GetModuleHandleW.KERNEL32(004A50C8,004C1E84), ref: 00419099
          • GetProcAddress.KERNEL32(00000000,004A50E4), ref: 004190AE
          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?), ref: 004190FB
          • GetProcAddress.KERNEL32(?,004A50F8), ref: 00419145
          • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 00419199
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: AddressDiskFreeProcSpace$HandleModule
          • String ID:
          • API String ID: 3170346035-0
          • Opcode ID: 3830142c5dd7e46fbe217adc478f402e7a394b6e3f11da4a678fd2fb18a09b8f
          • Instruction ID: 5497ab3bbd6eed2e3b7b5c9b9ef4492f351fc30b5dccdcf47b018996dfd2da00
          • Opcode Fuzzy Hash: 3830142c5dd7e46fbe217adc478f402e7a394b6e3f11da4a678fd2fb18a09b8f
          • Instruction Fuzzy Hash: 4B51F6B2508306AFC700CF55C99499BBBE8FB98314F504A2EF5A5D3290DB34EA49CB56
          APIs
          • IsDebuggerPresent.KERNEL32 ref: 004750A1
          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004750B6
          • UnhandledExceptionFilter.KERNEL32(0049FE7C), ref: 004750C1
          • GetCurrentProcess.KERNEL32(C0000409), ref: 004750DD
          • TerminateProcess.KERNEL32(00000000), ref: 004750E4
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
          • String ID:
          • API String ID: 2579439406-0
          • Opcode ID: 99edcdadb9f6060f588b0f0a23a1dda3f86d60f484279f8841b1b7a65418791e
          • Instruction ID: 6c020a528ecf3f614b36576944aeeddcdb90374ce3f56d346728d2633e4ecb94
          • Opcode Fuzzy Hash: 99edcdadb9f6060f588b0f0a23a1dda3f86d60f484279f8841b1b7a65418791e
          • Instruction Fuzzy Hash: E721B2B88193069FE790DF69FD85A483BB4BB18315F10407AE408873B1EBB85981CF0D
          APIs
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • __CxxThrowException@8.LIBCMT ref: 00426F36
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • CryptImportKey.ADVAPI32(00000000,?,?,?,004ADB04,00000067), ref: 00426F95
          • CryptSetKeyParam.ADVAPI32(?,00000013,00000028,00000000,?,00000009,?,00000004,?,?,00000007,?,?), ref: 0042714B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Crypt$ExceptionException@8H_prolog3_catchImportParamRaiseThrow
          • String ID: (
          • API String ID: 2621123518-3887548279
          • Opcode ID: 8cbcfa60ee139175652427f39220e5151c613236db955dfcd770ccce6fcf6e6f
          • Instruction ID: 56ab016f183b750fe7a675bc16c14a4233f4c5ba60cecda8efbe2d51aca430d7
          • Opcode Fuzzy Hash: 8cbcfa60ee139175652427f39220e5151c613236db955dfcd770ccce6fcf6e6f
          • Instruction Fuzzy Hash: 0581E030B04229DFDF10EF51D845AEEBBB1EF44314F61809AF405AB291DB399D46CBA9
          APIs
          • __EH_prolog3.LIBCMT ref: 00427433
          • __CxxThrowException@8.LIBCMT ref: 00427458
          • CryptSetKeyParam.ADVAPI32(?,00000001,00000000,00000000,0000004C,00427B60,00000000,?,?,00000000,?,00000000,?,?,?,?), ref: 0042751A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptException@8H_prolog3ParamThrow
          • String ID: L`{B
          • API String ID: 2108181948-3964171064
          • Opcode ID: b7091b61bfd1a9eb50b001e6717b484a46494e830e892c26abd2feb6b571088e
          • Instruction ID: 5ec3be7f13064ef990f071b7c44de806198eda34ad17e84081d195ea71d01733
          • Opcode Fuzzy Hash: b7091b61bfd1a9eb50b001e6717b484a46494e830e892c26abd2feb6b571088e
          • Instruction Fuzzy Hash: CF31B270B04215ABCF20BF61D881AEE7B35AF50308F50842FF5155A251DB389E85CB99
          APIs
          • __EH_prolog3.LIBCMT ref: 00427225
          • __CxxThrowException@8.LIBCMT ref: 0042724D
          • CryptGetKeyParam.ADVAPI32(?,00000002,00000000,00000000,00000000), ref: 004272C8
          • CryptSetKeyParam.ADVAPI32(?,00000002,00000000,00000000), ref: 0042730C
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptParam$Exception@8H_prolog3Throw
          • String ID:
          • API String ID: 4141549210-0
          • Opcode ID: 95141cd2ebc51d218297c09eb0b6c55d22e66a76079190dfbe03b54b85258cf0
          • Instruction ID: 7415b722127bf9ce7e232593f25978fb88b50e58753557ad6b703dbbb1000724
          • Opcode Fuzzy Hash: 95141cd2ebc51d218297c09eb0b6c55d22e66a76079190dfbe03b54b85258cf0
          • Instruction Fuzzy Hash: F0319270A04215DBDB10EFA1D885AAEB775FF50304F50496FF51196290D7389D84CBA9
          APIs
          • GetThreadLocale.KERNEL32 ref: 004830ED
          • GetLocaleInfoA.KERNEL32(00000000,00001004,?,00000007), ref: 004830FF
          • GetACP.KERNEL32 ref: 00483128
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Locale$InfoThread
          • String ID:
          • API String ID: 4232894706-0
          • Opcode ID: 0b08b179bdd681c75d3c344f20efd59639db1957a1e5803db69788c590e10491
          • Instruction ID: 94abf74e269da27a78635814050ac3395c23e21c68cfbcc7b736e67a2caaf6c2
          • Opcode Fuzzy Hash: 0b08b179bdd681c75d3c344f20efd59639db1957a1e5803db69788c590e10491
          • Instruction Fuzzy Hash: D9F0FC31D012286BDB11DF74D9196EF77F49F05F01B0045ADDC42E7380D664AE0587D9
          APIs
          • CryptImportPublicKeyInfo.CRYPT32()yC,)yC,?,?), ref: 00448D74
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptImportInfoPublic
          • String ID: )yC
          • API String ID: 2874360361-3656742632
          • Opcode ID: 4c709916d8f060749b24e53f2ea473778a700c5a0eef390fb618c313fa072c10
          • Instruction ID: dd111e720e5dbbdfc42d44f7bdea282b660318f252865a61b5e44ede9b32e673
          • Opcode Fuzzy Hash: 4c709916d8f060749b24e53f2ea473778a700c5a0eef390fb618c313fa072c10
          • Instruction Fuzzy Hash: A8C002B9608301BF9A04DF54D988D2BB3E9EBC8710F008D0CB599C3240C630EC45CB32
          APIs
          • CryptVerifyCertificateSignature.CRYPT32(00000000,00000001,00000007,?,?), ref: 004489C0
          • __time64.LIBCMT ref: 00448A0E
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CertificateCryptSignatureVerify__time64
          • String ID:
          • API String ID: 4012319449-0
          • Opcode ID: 4f658cf496740bfed60b8a18405546ac28a2322c522e892baf13deccd6b59b31
          • Instruction ID: 786ec52e64b4b758ddef11d0efa0c19169e62188822d67b1af89d80e0a1272b0
          • Opcode Fuzzy Hash: 4f658cf496740bfed60b8a18405546ac28a2322c522e892baf13deccd6b59b31
          • Instruction Fuzzy Hash: BC5188B56002009FE714DA19CC81F6B73E8EF88714F08851EEC499B352EB78E8058B64
          APIs
          • CryptGetKeyParam.ADVAPI32(?,00000008,?,?,00000000), ref: 004275C1
          • __CxxThrowException@8.LIBCMT ref: 004275E4
            • Part of subcall function 0041B0F2: __CxxThrowException@8.LIBCMT ref: 0041B117
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$CryptParam
          • String ID:
          • API String ID: 3199611575-0
          • Opcode ID: ca3790b6e9f7818aa31613f5e3e7ad641502825d07e872c74aa51b45d5c21f1c
          • Instruction ID: 7ee02b4c02df75ff85f4d6b86539b8d0647ec8713d06b115104b30c3bfc587f6
          • Opcode Fuzzy Hash: ca3790b6e9f7818aa31613f5e3e7ad641502825d07e872c74aa51b45d5c21f1c
          • Instruction Fuzzy Hash: E811B471708612ABC704EF66A88496BB799FB84304F80092EF151C7691DB78ED8586DA
          APIs
          • GetVersionExA.KERNEL32(?), ref: 00483167
          • InterlockedExchange.KERNEL32(004C32C0,Function_000820DA), ref: 0048318F
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ExchangeInterlockedVersion
          • String ID:
          • API String ID: 2700998522-0
          • Opcode ID: c66dbd1ba8659a9332d37dd55daf52ad703295dc1d6eda4524b029a622aeb3f6
          • Instruction ID: a908f7d6ee9de0a4dc6fd4472c7f7fce9f6b7d08c7b8289ac35d811e09623387
          • Opcode Fuzzy Hash: c66dbd1ba8659a9332d37dd55daf52ad703295dc1d6eda4524b029a622aeb3f6
          • Instruction Fuzzy Hash: 29F01234900208DBDB50AF64D949B9DB7B4AB05B06F5084BAD40A92251CF749F899B09
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _memset
          • String ID:
          • API String ID: 2102423945-0
          • Opcode ID: b1e180048686500ded05c80034bc845663e8ebbe3c2713e51d61249f8e561f17
          • Instruction ID: 31e24599129a93c58670bd3ef50ac6ee54e4b3bf211ff1702e1469a3d4b0b59d
          • Opcode Fuzzy Hash: b1e180048686500ded05c80034bc845663e8ebbe3c2713e51d61249f8e561f17
          • Instruction Fuzzy Hash: 8791E071A046028FD318CF28D880796F7E2FF98304F14C67ED8A987795E735A918CB86
          APIs
          • CryptHashPublicKeyInfo.CRYPT32(?,?,?,?,?,00000000,?), ref: 00449173
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptHashInfoPublic
          • String ID:
          • API String ID: 2789653980-0
          • Opcode ID: 8f1d966697275e34ddda3dbfde2cfcea62703256df0cd3ceeb873015d24baced
          • Instruction ID: 000574ad9318d0b7f3f66081656891bc02af9e0a5d323d27bfa701cdbbcd9224
          • Opcode Fuzzy Hash: 8f1d966697275e34ddda3dbfde2cfcea62703256df0cd3ceeb873015d24baced
          • Instruction Fuzzy Hash: ECD067B1608202EF8604CF88C884C5BBBFDFBDC340F00890CB585C3261C630E84ACBA6
          APIs
          • CryptVerifySignatureW.ADVAPI32(?,?,?,?,?,?,00428701,?,?,?,00000005,?,00000000,00000000), ref: 00448D4E
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptSignatureVerify
          • String ID:
          • API String ID: 1015439381-0
          • Opcode ID: 10f458eb7a491af95f2728cb6eb2c534ab195342ad98642c833abe3310bd22dd
          • Instruction ID: 5d87076019a20fa1f806224936221887d2f571cb3ec68574b85bfacaa1d92215
          • Opcode Fuzzy Hash: 10f458eb7a491af95f2728cb6eb2c534ab195342ad98642c833abe3310bd22dd
          • Instruction Fuzzy Hash: 14D0C2B5618202AF9A04CF58EA94D2BB7F9EBCCB10F10890CB585D3254D630EC49DB77
          APIs
          • CryptGetHashParam.ADVAPI32(00000004,00000004,00000004,?,?,004263C6,?,?,00000004,?,?,00000000), ref: 00448B39
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptHashParam
          • String ID:
          • API String ID: 1839025277-0
          • Opcode ID: 0fd56d70436e0ac293aa000b556dd2e3aa6a0e97767fe9d1a05291a944a4ce45
          • Instruction ID: 3ea1d14a431731d2fd0f67f1d6e5fc1599c86b04ff6f1d7e918df93bcaa2f282
          • Opcode Fuzzy Hash: 0fd56d70436e0ac293aa000b556dd2e3aa6a0e97767fe9d1a05291a944a4ce45
          • Instruction Fuzzy Hash: 38D0C5B5A19342AF9B08CF58D994D3BB7E9BBC8710F044D0CB59583250C720E849CB66
          APIs
          • CryptHashData.ADVAPI32(00000000,00000000,?,?,004262AD,?,?,?,?,00000000), ref: 00448B74
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptDataHash
          • String ID:
          • API String ID: 4245837645-0
          • Opcode ID: 1377647b4c373e9a0b997905398301d12f75a4c3ee681afd3fedc345a05ebc6e
          • Instruction ID: 567f83e4737d6d1248e8f435c0de9951d192f3bbea2f7b6a8adea9cd6fac02ac
          • Opcode Fuzzy Hash: 1377647b4c373e9a0b997905398301d12f75a4c3ee681afd3fedc345a05ebc6e
          • Instruction Fuzzy Hash: 78C0EAB9A09301AF9A04CF54D988D2BB3E9ABC8610F10890CB59583240C630E8058B22
          APIs
          • CryptSetHashParam.ADVAPI32(00000002,00000002,?,?,004286A0,?,?,00000002,?,00000000,?,?,004C1E84), ref: 00448B14
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptHashParam
          • String ID:
          • API String ID: 1839025277-0
          • Opcode ID: bf42dc855319f8df7cedf984019026b40a180bb66e1168ab87d6faec8f20b674
          • Instruction ID: f74a242ebea010c38bf6a9144a4d193c81cb18a9423990b1e17cb5ddf2931e78
          • Opcode Fuzzy Hash: bf42dc855319f8df7cedf984019026b40a180bb66e1168ab87d6faec8f20b674
          • Instruction Fuzzy Hash: 0EC002B9A09301AF9A04DF54D988C2BB3E9EBC8710F00CD0CF59583244C630EC05CB36
          APIs
          • CryptGetUserKey.ADVAPI32(?,?,?,00437B13,?,00000000,00000001,?,00000030,00425AC8,?,?,?,00000000), ref: 0044913F
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptUser
          • String ID:
          • API String ID: 2634466780-0
          • Opcode ID: 44715708332843823cdf99dbbaa1d64fa8c293458d3a94428e730a8f8df9770f
          • Instruction ID: cd38d0bacca55b0b150f757869f1c80b0d384a277d7627e60182e0fb6d2e8fd3
          • Opcode Fuzzy Hash: 44715708332843823cdf99dbbaa1d64fa8c293458d3a94428e730a8f8df9770f
          • Instruction Fuzzy Hash: DFC048B8608301AF9A04CF10C888C2BB7A9FBC8200F208D0CB8A583250C630E801DB22
          APIs
          • CryptGenRandom.ADVAPI32(?,00000000,00000068,0041BB87,?,00000000,?,?,00000000,004ADB04,00000068,00000000), ref: 004487FF
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptRandom
          • String ID:
          • API String ID: 2662593985-0
          • Opcode ID: 8391f690961e555caef315ccef4634a1ee3e19ebf3d3f594dc75ca1a5e942aeb
          • Instruction ID: 6fe72d11f8e26a00f3967ea73b019eea79ce8a6e13e8456df54cde2521045598
          • Opcode Fuzzy Hash: 8391f690961e555caef315ccef4634a1ee3e19ebf3d3f594dc75ca1a5e942aeb
          • Instruction Fuzzy Hash: 44C048B8608301AFDA08DB14C888C2BB7B9EBC8240F00CD0CB89582250C630E801CB26
          APIs
          • CryptReleaseContext.ADVAPI32(004A6704,?,0041B507,?,?,00000000,0041AF6E,?,0041AF3E), ref: 0044887A
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ContextCryptRelease
          • String ID:
          • API String ID: 829835001-0
          • Opcode ID: 3a8baaaba969db941432796355c728a12e673a59fd9f4bee2f53c1c8f2864f48
          • Instruction ID: 6c989825a0d476403b511b66bf2186f0dc1944b5e11c182fe1bab489d7645450
          • Opcode Fuzzy Hash: 3a8baaaba969db941432796355c728a12e673a59fd9f4bee2f53c1c8f2864f48
          • Instruction Fuzzy Hash: FAB012B4605200BFCE08CB14C944C2FB7B8EBC4340F008C0CB94986150C630D800CB11
          APIs
          • CertOpenSystemStoreW.CRYPT32(?,?), ref: 004488FA
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CertOpenStoreSystem
          • String ID:
          • API String ID: 4293387918-0
          • Opcode ID: 13323f454ddabd1906e5856c51f17e8016b5d639c0e7ccd9e9cbec913e3b4c2f
          • Instruction ID: 5fc1950f2031c65a586e4fcf2c0a3258ea4d4a4bf9b3fdfc6385a9a9cc70b24e
          • Opcode Fuzzy Hash: 13323f454ddabd1906e5856c51f17e8016b5d639c0e7ccd9e9cbec913e3b4c2f
          • Instruction Fuzzy Hash: 8DB012B4608200BFCE04CB10C944C2FB7A9EFC5304F008C0CB94982150C630D800CB12
          APIs
          • CryptDestroyHash.ADVAPI32(?,0042871C,?,?,?), ref: 00448AF5
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptDestroyHash
          • String ID:
          • API String ID: 174375392-0
          • Opcode ID: c9096b6c78df546fdb07a1b9e3b1919d0b4a692b6e83e8289305274da7af0159
          • Instruction ID: 6a034fceaa275ddad8911de1b03fb0d3643b0f48f816e64688ee5639507e61c9
          • Opcode Fuzzy Hash: c9096b6c78df546fdb07a1b9e3b1919d0b4a692b6e83e8289305274da7af0159
          • Instruction Fuzzy Hash: D7A00275D16201ABCE04DFE8D94CD4E7BB8BB85385F204C58B145C3060C634D441CB15
          APIs
          • CryptDestroyKey.ADVAPI32(0041CA3C,0042849B,?,?,00000000,?,0041CA3C,?,00000000,0041C22A,004C1E84), ref: 00448B85
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptDestroy
          • String ID:
          • API String ID: 1712904745-0
          • Opcode ID: 9a433633f865ab1f78d51061ebf519ba02e09da577a7eedc7a6419de85e53049
          • Instruction ID: 9b55852d3fc15b7710bcb3054011af21b9588c2a2fcfacdbd231fc1e48dd2fb0
          • Opcode Fuzzy Hash: 9a433633f865ab1f78d51061ebf519ba02e09da577a7eedc7a6419de85e53049
          • Instruction Fuzzy Hash: BAA00275D05201EBCE10EFA4D94C84EBBA9AB89345F008C58B145C2160C634D442DB2E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID: 0-3916222277
          • Opcode ID: 5c0c71d5ba31fd5428659d05093c7a16a2f954e173f9f136741ca66b15c64779
          • Instruction ID: 9809bcb2ba52f81bec9b3a67878ec693f4aa428ee989ef16a33ba8426099ed1b
          • Opcode Fuzzy Hash: 5c0c71d5ba31fd5428659d05093c7a16a2f954e173f9f136741ca66b15c64779
          • Instruction Fuzzy Hash: 3161B431B101518BD764CF6EFDC05067BE2A7CE390B18CA39EE44D3279C6B8A561DAD8
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID:
          • String ID: 2NB
          • API String ID: 0-780577499
          • Opcode ID: c240bcb451ea328e1fcd2893349d3bb913c2850b0b9f0b2c2149d20511b957e1
          • Instruction ID: c5d33d0ffda30c75c2d616c73b19e8d36e381478fa310a04d6583db2b2a881fe
          • Opcode Fuzzy Hash: c240bcb451ea328e1fcd2893349d3bb913c2850b0b9f0b2c2149d20511b957e1
          • Instruction Fuzzy Hash: 951104335280B606D740AE29DC003367397DFC6216F1D817AE79082656D57FEA1BE614
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3b76f8d3d959ce82158e74a2a3c35e9490128c568c793866194d94ad790bb565
          • Instruction ID: b026a84a377fa7176136738dfdd2dfab089dd20b8c980ead729dbe9ff9f31768
          • Opcode Fuzzy Hash: 3b76f8d3d959ce82158e74a2a3c35e9490128c568c793866194d94ad790bb565
          • Instruction Fuzzy Hash: 1B128BB1504B408FE324CF1AC490667B7F1FF90716F148A2EE4D687B92D638B949CBA5
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3a81de7e5a40aa19bf7e4aeec4d0038f55b5d51a368278fa6f701c93ae711430
          • Instruction ID: 0c5b515875aff2df521e34fc7e86470525128dfcc257a026ee7409dfc785c2be
          • Opcode Fuzzy Hash: 3a81de7e5a40aa19bf7e4aeec4d0038f55b5d51a368278fa6f701c93ae711430
          • Instruction Fuzzy Hash: D2F158B59043108FD718CF05C0D4A66BBA1FF88725F1A46AED9961B3A2C334EE45CF96
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
          • Instruction ID: c410edb38c2724a3410d0d5d340838a013d3a7e1467055b3590f00ddf13298e7
          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
          • Instruction Fuzzy Hash: 6B1108B720018243D605CA2DD8B47F7A399EAD532572DC36BD0994B754D32A9946F908
          APIs
          • FileTimeToSystemTime.KERNEL32(00000000), ref: 0044081B
          • FileTimeToLocalFileTime.KERNEL32(00000000,?), ref: 00440834
          • FileTimeToSystemTime.KERNEL32(?,?), ref: 0044084C
          • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000028), ref: 0044087D
          • __CxxThrowException@8.LIBCMT ref: 004408A4
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • GetLastError.KERNEL32 ref: 00440887
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • GetDateFormatA.KERNEL32(00000400,00000000,?,00000000,?,00000028), ref: 004408CB
          • GetLastError.KERNEL32 ref: 004408D5
          • __CxxThrowException@8.LIBCMT ref: 004408F2
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Time$File$DateErrorException@8FormatLastSystemThrow$ExceptionH_prolog3_catchLocalRaise
          • String ID: AM$ PM$%1!2lu!$%1!2lu!%2!s!$%1!2lu!:%2!02lu!$%1!2lu!:%2!02lu!%3!s!$%1!2lu!:%2!02lu!:%3!02lu!$%1!2lu!:%2!02lu!:%3!02lu!%4!s!
          • API String ID: 268419-1666400798
          • Opcode ID: 4577f7ac29e9e067e54b0d9665c6fb9ac2ce88c1fe6b77e20bf30f3ff2516ca9
          • Instruction ID: 5466cf82c099800ce1ad84ff48fc5b4ec6f2f5fbc5170893623e439d89129da2
          • Opcode Fuzzy Hash: 4577f7ac29e9e067e54b0d9665c6fb9ac2ce88c1fe6b77e20bf30f3ff2516ca9
          • Instruction Fuzzy Hash: 187193B1605300AAF324EB15CC45FAB73E8EF94714F044A2EFA95922D1E77C9944C7AA
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_InitializeLengthTextUninitializeWindow__freea
          • String ID: `-u
          • API String ID: 2315625283-2606764580
          • Opcode ID: d1f3dd5069a0c72aa9de983a6b3004ede786ff1ed0e27763247f4dea60500bc4
          • Instruction ID: bdcfb97abbdfd0872cb31c5e0707d13120898c846af59684949713203d7ae998
          • Opcode Fuzzy Hash: d1f3dd5069a0c72aa9de983a6b3004ede786ff1ed0e27763247f4dea60500bc4
          • Instruction Fuzzy Hash: 25718E71A01209EFCF01AFA4CC489AE7BB9EF44304F24446AF501F62E1C7799E41DBA9
          APIs
          • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 0040EF70
          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0040EF84
          • GetDlgItem.USER32(?,0000E801), ref: 0040EF96
          • IsWindow.USER32(00000000), ref: 0040EFA0
          • GetClientRect.USER32(?,?), ref: 0040EFF9
          • GetDlgItem.USER32(?,0000E801), ref: 0040F017
          • GetWindowRect.USER32(?,00000000), ref: 0040F07A
          • MapWindowPoints.USER32(00000000,?,00000000,00000002), ref: 0040F08B
          • GetClientRect.USER32(?,?), ref: 0040F0D7
          • GetWindowRect.USER32(?,?), ref: 0040F0EB
          • GetDlgItem.USER32(?,?), ref: 0040F170
          • GetWindowRect.USER32(00000000,00000000), ref: 0040F189
          • MapWindowPoints.USER32(00000000,?,00000000,00000002), ref: 0040F19A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$Rect$Item$ClientMessagePointsSend
          • String ID: <JJ
          • API String ID: 460500065-1320143591
          • Opcode ID: 6ceed0f065abc9ca3c18d420356e2d7e24cda0936ec9d182922c1bfb38d8fe93
          • Instruction ID: edbc47477151b5beffb1d4a6967dbe5d02541fc3cf6a85a0bd0beb682b587da4
          • Opcode Fuzzy Hash: 6ceed0f065abc9ca3c18d420356e2d7e24cda0936ec9d182922c1bfb38d8fe93
          • Instruction Fuzzy Hash: 59B14771900209EFDB10CFA8CD85AAEBBF5EF48314F10897AE525EB2A1D734A905CF55
          APIs
          • LockResource.KERNEL32(00000000), ref: 00406D39
          • LockResource.KERNEL32(00000000), ref: 00406D68
          • GetWindow.USER32(?,00000005), ref: 00406DAE
          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00406E2F
          • GlobalFix.KERNEL32(00000000), ref: 00406E40
          • GlobalUnWire.KERNEL32(00000000), ref: 00406E56
          • MapDialogRect.USER32(?,?), ref: 00406F2A
          • SetWindowContextHelpId.USER32(00000000,00000000), ref: 00406F90
          • SetWindowPos.USER32(00000000,?,00000000,00000000,00000000,00000000,00000013,?,?,00000000,?,004A4314,?,?,00000000,00000000), ref: 00406FCF
          • SysFreeString.OLEAUT32(00000000), ref: 00406FE8
          • GetWindow.USER32(00000000,00000002), ref: 00407010
          • SysFreeString.OLEAUT32(00000000), ref: 00407057
            • Part of subcall function 0040BB9F: GetLastError.KERNEL32(00407077), ref: 0040BB9F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$Global$FreeLockResourceString$AllocContextDialogErrorHelpLastRectWire
          • String ID: `-u
          • API String ID: 4076213876-2606764580
          • Opcode ID: 02886fcc4d003e9a18a331cb69696ecb4119dd3668a631e2b7462330e04eba06
          • Instruction ID: 5dcf519c3656d5c1f15957809b5befcd5b06c81bcd49c84b126c542450426bde
          • Opcode Fuzzy Hash: 02886fcc4d003e9a18a331cb69696ecb4119dd3668a631e2b7462330e04eba06
          • Instruction Fuzzy Hash: 99B1BC719083119BC710DF15C884A2BBBF4FF84711F15092EF886AA2E0D738ED51DBAA
          APIs
          • _strcpy_s.LIBCMT ref: 00476376
          • __invoke_watson.LIBCMT ref: 00476387
          • GetModuleFileNameA.KERNEL32(00000000,004C8031,00000104), ref: 004763A3
          • _strcpy_s.LIBCMT ref: 004763B8
          • __invoke_watson.LIBCMT ref: 004763CB
          • _strlen.LIBCMT ref: 004763D4
          • _strlen.LIBCMT ref: 004763E1
          • __invoke_watson.LIBCMT ref: 0047640E
          • _strcat_s.LIBCMT ref: 00476421
          • __invoke_watson.LIBCMT ref: 00476432
          • _strcat_s.LIBCMT ref: 00476443
          • __invoke_watson.LIBCMT ref: 00476454
          • GetStdHandle.KERNEL32(000000F4,?,?,00000000,0048D288,00000003,004764D6,000000FC,0046EB87,00000001,00000000,00000000,?,00476CBD,?,00000001), ref: 00476473
          • _strlen.LIBCMT ref: 00476494
          • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,00476CBD,?,00000001,?,0047559B,00000018,004AD628,0000000C,0047562A,?), ref: 0047649E
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
          • String ID:
          • API String ID: 1879448924-0
          • Opcode ID: b37ac1ed7c9732053dda87c029f18af61fc9b2577930bfc8fbd2f67129fed16d
          • Instruction ID: 4dcdb55767719c7f89cb6526135c3844c26ec52b958c823b0702a4f345c496c5
          • Opcode Fuzzy Hash: b37ac1ed7c9732053dda87c029f18af61fc9b2577930bfc8fbd2f67129fed16d
          • Instruction Fuzzy Hash: 5A3129A25016117AE62032765C46FFF260D9B16754F16C12FFD0DA12D3FA5EC94181FE
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _wcsrchr
          • String ID: _BIG5$_DE$_ES$_FR$_IT$_JP$_KO$_PO$_US$en_US
          • API String ID: 1752292252-2149996867
          • Opcode ID: 06bcba9adeccfcbf4df3f1cb29f48e2f3b4ce4b86e89e4e223871a1b17d5ed3b
          • Instruction ID: fd1458dc5c20a67c1d338a82697c2bb055d03f71d96dc29bb0ace306cb760a1a
          • Opcode Fuzzy Hash: 06bcba9adeccfcbf4df3f1cb29f48e2f3b4ce4b86e89e4e223871a1b17d5ed3b
          • Instruction Fuzzy Hash: 68C1E321602112CADB246F2AC80277733A2EF7C764F5596A6D916CB3E9F33ADD41C748
          APIs
          • GetDlgItem.USER32(?,00000000), ref: 0040F507
          • GetWindowRect.USER32(00000000,00000000), ref: 0040F515
          • MapWindowPoints.USER32(00000000,?,00000000,00000002), ref: 0040F531
          • InvalidateRect.USER32(00000001,00000000,00000001), ref: 0040F7D7
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: RectWindow$InvalidateItemPoints
          • String ID:
          • API String ID: 1963248746-0
          • Opcode ID: 740d688458b002204211c38e7be27138eec25aac5af91a3bc2e2af9a862a4747
          • Instruction ID: be9ce48ddb9cac475982a234001f4ee51c1ca76db749d328e7aea871952c4d3d
          • Opcode Fuzzy Hash: 740d688458b002204211c38e7be27138eec25aac5af91a3bc2e2af9a862a4747
          • Instruction Fuzzy Hash: F5C14E71A0020AAFDB14CFB8C989A9EBBF5FF08300F148939E915E7694D734E915CB95
          APIs
          • BeginPaint.USER32(?,?), ref: 00408597
          • GetClientRect.USER32(?,?), ref: 004085AF
          • CreateSolidBrush.GDI32(?), ref: 004085BB
          • FillRect.USER32(?,?,00000000), ref: 004085CF
          • DeleteObject.GDI32(?), ref: 004085D6
          • EndPaint.USER32(?,?), ref: 004085E3
          • BeginPaint.USER32(?,?), ref: 00408605
          • GetClientRect.USER32(?,?), ref: 0040861F
          • SelectObject.GDI32(00000000,?), ref: 00408652
          • CreateSolidBrush.GDI32(?), ref: 00408665
          • FillRect.USER32(00000000,?,00000000), ref: 00408678
          • DeleteObject.GDI32(?), ref: 00408681
          • SelectObject.GDI32(00000000,?), ref: 004086BF
          • DeleteDC.GDI32(00000000), ref: 004086C6
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ObjectRect$DeletePaint$BeginBrushClientCreateFillSelectSolid
          • String ID:
          • API String ID: 216606842-0
          • Opcode ID: 38fa92bffd7d5ef07d2bfd0aeeefd0c8b6b157411ec734fbb9923d22944bdbcb
          • Instruction ID: 65d72420b55b39e40cc8a526593d9fe4d7ad338412b7a8e769e56c34a48a8f39
          • Opcode Fuzzy Hash: 38fa92bffd7d5ef07d2bfd0aeeefd0c8b6b157411ec734fbb9923d22944bdbcb
          • Instruction Fuzzy Hash: 1D410671901208AFCB119FE4DD88DAFBBBEFB49704B14492EF556E61A0DB759801CB28
          APIs
          • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00406A44
          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00406A58
          • GetDlgItem.USER32(?,0000E801), ref: 00406A6A
          • IsWindow.USER32(00000000), ref: 00406A74
          • GetClientRect.USER32(?,?), ref: 00406ACD
          • GetDlgItem.USER32(?,0000E801), ref: 00406AEB
          • GetWindowRect.USER32(004032DA,00000000), ref: 00406B4E
          • MapWindowPoints.USER32(00000000,?,00000000,00000002), ref: 00406B5F
          • GetClientRect.USER32(?,000000FF), ref: 00406BAB
          • GetWindowRect.USER32(?,000000FF), ref: 00406BBF
          • GetDlgItem.USER32(?,?), ref: 00406C44
          • GetWindowRect.USER32(00000000,00000000), ref: 00406C5D
          • MapWindowPoints.USER32(00000000,?,00000000,00000002), ref: 00406C6E
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$Rect$Item$ClientMessagePointsSend
          • String ID:
          • API String ID: 460500065-0
          • Opcode ID: ad8bd326f17306fffe741dcf3a9bdbdc17d806794986f503a8a956f2968bd8e6
          • Instruction ID: 7c70ee46a80eef9e9a0cbcf0f9db370b4ae249821450ddcd706c2b54fe48c5a5
          • Opcode Fuzzy Hash: ad8bd326f17306fffe741dcf3a9bdbdc17d806794986f503a8a956f2968bd8e6
          • Instruction Fuzzy Hash: 7CB14A71E00208EFDB10DFA8C985AAEBBF5EF48314F10896AE556F72A0D734A911CF55
          APIs
          • SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 0040204F
          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00402063
          • GetDlgItem.USER32(?,0000E801), ref: 00402075
          • IsWindow.USER32(00000000), ref: 0040207F
          • GetClientRect.USER32(?,?), ref: 004020D8
          • GetDlgItem.USER32(?,0000E801), ref: 004020F6
          • GetWindowRect.USER32(00000000,00000000), ref: 00402159
          • MapWindowPoints.USER32(00000000,?,00000000,00000002), ref: 0040216A
          • GetClientRect.USER32(?,?), ref: 004021B6
          • GetWindowRect.USER32(?,?), ref: 004021CA
          • GetDlgItem.USER32(?,?), ref: 0040224F
          • GetWindowRect.USER32(00000000,00000000), ref: 00402268
          • MapWindowPoints.USER32(00000000,?,00000000,00000002), ref: 00402279
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$Rect$Item$ClientMessagePointsSend
          • String ID:
          • API String ID: 460500065-0
          • Opcode ID: dda19549c3c67d2ba16f85b3906886b1af2c798d955c11c9bd88db2800a58d7e
          • Instruction ID: 68c445f563e12df8f9e5f957ccc53fa54f01e1f96ac6823402a7eb691fb53a7d
          • Opcode Fuzzy Hash: dda19549c3c67d2ba16f85b3906886b1af2c798d955c11c9bd88db2800a58d7e
          • Instruction Fuzzy Hash: 33B12871D00208AFDB10DFA8C989AAEBBF5FF48314F10896AE515E72E0D774A905CF65
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _wcscpy$FocusH_prolog3_catch_ItemTextWindow
          • String ID:
          • API String ID: 2446610563-3916222277
          • Opcode ID: a59c1dc16c2c8931ca5dc34082e1b2743c6e34df09038a90c3a69e1dd44e22ca
          • Instruction ID: 762adf9caf617a478f58e4a35671fcbaa1b59caad470a189e77939213df3d8ac
          • Opcode Fuzzy Hash: a59c1dc16c2c8931ca5dc34082e1b2743c6e34df09038a90c3a69e1dd44e22ca
          • Instruction Fuzzy Hash: 00D184F19012189ADB21AF11DC82FEA7779EB04308F4044AFF649B61A2EB355E94DF1D
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_InitializeLengthTextUninitializeWindow__freea
          • String ID:
          • API String ID: 2315625283-0
          • Opcode ID: 39949fd269ab3bbf0ebd366a40237fc52937ac0c804a1062ca0107c0637c7bba
          • Instruction ID: fa31d1c51260f74ce1b453a14d1db7e5a1e895c2272c71bfb0bd8c99371ec3a0
          • Opcode Fuzzy Hash: 39949fd269ab3bbf0ebd366a40237fc52937ac0c804a1062ca0107c0637c7bba
          • Instruction Fuzzy Hash: C0619E71901105EFCF11AFA4CC889AE7BB9EF45304B24486AF405F72E1C7798D41CBA9
          APIs
          • __EH_prolog3_GS.LIBCMT ref: 00411DF1
          • GetParent.USER32(00000002), ref: 00411E3C
          • SetCapture.USER32(00000000,?,?), ref: 00411E45
          • LoadCursorW.USER32(00000000,00007F02), ref: 00411E51
          • SetCursor.USER32(00000000,?,?), ref: 00411E58
          • SendMessageW.USER32(00000002,00001132,00000000,?), ref: 00411FD8
          • ReleaseCapture.USER32 ref: 0041202B
          • LoadCursorW.USER32(00000000,00007F00), ref: 00412037
          • SetCursor.USER32(00000000,?,?), ref: 0041203E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Cursor$CaptureLoad$H_prolog3_MessageParentReleaseSend
          • String ID: g
          • API String ID: 1438968526-30677878
          • Opcode ID: 7d00f1df952c71a4990ee6c7e79cd7431b0cadf64db684ad84eb41881c152917
          • Instruction ID: b96624654f648c9c81085ea282519aa59d86c6f6fba0ab3f794861fee08e6f1d
          • Opcode Fuzzy Hash: 7d00f1df952c71a4990ee6c7e79cd7431b0cadf64db684ad84eb41881c152917
          • Instruction Fuzzy Hash: FB614A75901229AFDB20DF94DC88B9DBBB4BF48704F1085DAE909EB291C774AE81CF54
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ItemMessageSendWindow
          • String ID: +$,$-$/$9$N
          • API String ID: 799199299-2228603680
          • Opcode ID: ea4c56f6e40d1d59ae5492e14c41e2503e24899145ab07937a21cdebb6128db9
          • Instruction ID: 6ab51ce13942d03a43e0931da9e15c2242913b0c0aa3069aa842584c54ec217e
          • Opcode Fuzzy Hash: ea4c56f6e40d1d59ae5492e14c41e2503e24899145ab07937a21cdebb6128db9
          • Instruction Fuzzy Hash: 67314B30700605EFDB245A14CA84B6B77A4EB04350F14852FE896A6AE0CB39EC91EF99
          APIs
          • GetSystemMetrics.USER32(0000002D), ref: 00413171
            • Part of subcall function 00412F06: GetSystemMetrics.USER32(0000002D), ref: 00412F38
            • Part of subcall function 00412F06: SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00412F50
            • Part of subcall function 00412F06: SelectObject.GDI32(00000000,00000000), ref: 00412F6C
            • Part of subcall function 00412F06: GetDlgItem.USER32(?,?), ref: 00412FB1
            • Part of subcall function 00412F06: GetWindowTextW.USER32(00000000,?,00000104), ref: 00412FD2
            • Part of subcall function 00412F06: DrawTextW.USER32(?,?,000000FF,?,00000400), ref: 0041300B
            • Part of subcall function 00412F06: GetWindowRect.USER32(?,?), ref: 0041303A
            • Part of subcall function 004130AA: GetDlgItem.USER32(00000000,00000000), ref: 004130D0
            • Part of subcall function 00413140: GetClientRect.USER32(00000000,00000000), ref: 0041314D
          • GetDlgItem.USER32(00000000,?), ref: 004131BD
          • GetWindowRect.USER32(00000000), ref: 004131C4
          • ScreenToClient.USER32(00000000,?), ref: 004131E2
          • GetDlgItem.USER32(00000000,?), ref: 0041320F
          • SetWindowPos.USER32(00000000,00000000,ne@,?,00000000,?,00000014), ref: 00413237
          • GetWindowRect.USER32(00000000,?), ref: 00413242
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$ItemRect$ClientMetricsSystemText$DrawMessageObjectScreenSelectSend
          • String ID: ne@$ne@
          • API String ID: 3925786290-1163931223
          • Opcode ID: cca1bf03fd59ef2b81e3847e7ecd5c94451b0a947cec40eed2904262bdeca261
          • Instruction ID: d2dcd41ff8467e63e9be2dfec510964a7c6be246f3b4a848738bc7a95c82abf8
          • Opcode Fuzzy Hash: cca1bf03fd59ef2b81e3847e7ecd5c94451b0a947cec40eed2904262bdeca261
          • Instruction Fuzzy Hash: 8A3106B5D01209BFDF01EFA8D8449EEBBB9FF08315F10846AF911A7250D7389A50CBA4
          APIs
          • GetDlgItem.USER32(?,000003E9), ref: 00404A2C
          • GetWindowTextLengthW.USER32(00000000), ref: 00404A39
          • _malloc.LIBCMT ref: 00404A4A
            • Part of subcall function 0046EB5F: __FF_MSGBANNER.LIBCMT ref: 0046EB82
            • Part of subcall function 0046EB5F: RtlAllocateHeap.NTDLL(00000000,?,00000001,00000000,00000000,?,00476CBD,?,00000001,?,0047559B,00000018,004AD628,0000000C,0047562A,?), ref: 0046EBD7
          • GetWindowTextW.USER32(?,00000000,00000001), ref: 00404A5E
          • _memset.LIBCMT ref: 00404A6F
          • SHBrowseForFolderW.SHELL32(?), ref: 00404AC7
          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00404AD9
          • SetWindowTextW.USER32(?,?), ref: 00404B00
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: TextWindow$AllocateBrowseFolderFromHeapItemLengthListPath_malloc_memset
          • String ID: u
          • API String ID: 3000514250-4067256894
          • Opcode ID: ed4fe9c0dd718e060a53297d42692da1d7f22e0db733bc9461e86d63ff4eebab
          • Instruction ID: f70debdb50084d2f0a9569a2798ad76bd1778b31d15f83575291fb4895c84f26
          • Opcode Fuzzy Hash: ed4fe9c0dd718e060a53297d42692da1d7f22e0db733bc9461e86d63ff4eebab
          • Instruction Fuzzy Hash: ED3134B5D41218ABDB209F65DC8DB9EB7B8FB48704F1005AAE509E2190EB749E84CF58
          APIs
          • MoveFileExW.KERNEL32(?,?,00000000,?,?), ref: 00419E4B
          • GetLastError.KERNEL32(?,?,?), ref: 00419E5E
          • MoveFileW.KERNEL32(?,?), ref: 00419E82
          • SetLastError.KERNEL32(00000011,?,?), ref: 00419E93
          • MoveFileExA.KERNEL32(?,?,00000000), ref: 00419F07
          • GetLastError.KERNEL32(?), ref: 00419F1A
          • MoveFileA.KERNEL32(?,?), ref: 00419F3E
          • SetLastError.KERNEL32(00000011), ref: 00419F4F
            • Part of subcall function 00419D57: __EH_prolog3.LIBCMT ref: 00419D5E
          • GetLastError.KERNEL32 ref: 00419F72
          • __CxxThrowException@8.LIBCMT ref: 00419F9B
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorLast$FileMove$Exception@8H_prolog3Throw
          • String ID:
          • API String ID: 2554593795-0
          • Opcode ID: 0d40c40dcb70d2bea61d3d10af5c5a60233070a8551e310fed72f89b08397fa0
          • Instruction ID: e17f511c7f2f97a75cba9afb91b2a3c588ba70f962a86179bd598286967eb046
          • Opcode Fuzzy Hash: 0d40c40dcb70d2bea61d3d10af5c5a60233070a8551e310fed72f89b08397fa0
          • Instruction Fuzzy Hash: C8519F7150C345AFDB009F25DC45A8EBFE8BF84718F004A2EF498921A1DB35DE899B4B
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _malloc_wcscat_s_wcsncpy$InfoLocale_wcsrchr
          • String ID: -RSA$RSA$SECURE$en_US
          • API String ID: 2423020765-255005049
          • Opcode ID: 14b9f3e0189fa4fafeda4439610c2ebe6d1cede6a45102906d1231cc1cdd2510
          • Instruction ID: 290ca32cb2870313211fb343b20684d56a3e0cfda8b2b46223f38311388f5879
          • Opcode Fuzzy Hash: 14b9f3e0189fa4fafeda4439610c2ebe6d1cede6a45102906d1231cc1cdd2510
          • Instruction Fuzzy Hash: 6781217290124A9ADB34EF59CC41AFF37B5EF28710F88442BD9059B3C0E7399A44CB98
          APIs
          • GetVersionExW.KERNEL32 ref: 00440568
          • __CxxThrowException@8.LIBCMT ref: 004405B3
          • __CxxThrowException@8.LIBCMT ref: 004405E5
          • __CxxThrowException@8.LIBCMT ref: 0044063D
          • __CxxThrowException@8.LIBCMT ref: 00440682
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • __CxxThrowException@8.LIBCMT ref: 004406B4
          • __CxxThrowException@8.LIBCMT ref: 00440707
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw$ExceptionH_prolog3_catchRaiseVersion
          • String ID: 0
          • API String ID: 2419471778-4108050209
          • Opcode ID: 8a2c50e2fe517853e2e6ee847e227250b5585f532abc1506989a006a58ad54a2
          • Instruction ID: 0b65c462272f7319cab2c5eab4fbdaea24944b21242a5cae7b2307713ea178ef
          • Opcode Fuzzy Hash: 8a2c50e2fe517853e2e6ee847e227250b5585f532abc1506989a006a58ad54a2
          • Instruction Fuzzy Hash: B451DAB1208341AFF324DB21CC42FEB73E4AF90B04F41481EF695961D0D7B8A955CBAA
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ColorWindow
          • String ID:
          • API String ID: 4045458706-0
          • Opcode ID: 083c085ce6d4984db9017f1d533f347404641dc0924897450a2d91c5289017d4
          • Instruction ID: 72ce73c0c981400bd4317e341ca59d9c44a467f2cc618a4c888562956d9a0f1e
          • Opcode Fuzzy Hash: 083c085ce6d4984db9017f1d533f347404641dc0924897450a2d91c5289017d4
          • Instruction Fuzzy Hash: EAC19C71508342AFDB10DF65C884A6B77E9EF88314F40492EF885A72D2C739EC45CB5A
          APIs
          • GetDlgItem.USER32(?,00000416), ref: 004017E0
          • GetDlgItem.USER32(?,00000419), ref: 004017FB
          • _wcscpy.LIBCMT ref: 00401829
            • Part of subcall function 0043E620: _malloc.LIBCMT ref: 0043E6CF
            • Part of subcall function 0043E620: __swprintf.LIBCMT ref: 0043E6FC
            • Part of subcall function 0043E620: _malloc.LIBCMT ref: 0043E732
          • _wcscpy.LIBCMT ref: 00401847
          • _wcscpy.LIBCMT ref: 00401865
          • _wcscpy.LIBCMT ref: 00401883
            • Part of subcall function 004011C3: __EH_prolog3_catch_GS.LIBCMT ref: 004011CD
            • Part of subcall function 004011C3: _wcscpy.LIBCMT ref: 00401346
            • Part of subcall function 004011C3: _wcscpy.LIBCMT ref: 0040137E
            • Part of subcall function 004011C3: SetWindowTextW.USER32(00000001,?), ref: 0040138F
            • Part of subcall function 004011C3: _wcscpy.LIBCMT ref: 004013AE
          • MapDialogRect.USER32(?,?), ref: 004018F4
          • GetWindowRect.USER32(?,?), ref: 00401900
            • Part of subcall function 0040197E: SendMessageW.USER32(?,00000031,00000000,00000000), ref: 004019B3
            • Part of subcall function 0040197E: SelectObject.GDI32(00000000,00000000), ref: 004019CC
            • Part of subcall function 0040197E: GetSystemMetrics.USER32(0000002D), ref: 00401A91
            • Part of subcall function 0040197E: GetWindowTextW.USER32(00000000,?,00000104), ref: 00401AD2
          • SetForegroundWindow.USER32(?), ref: 0040196E
            • Part of subcall function 00402621: SetWindowPos.USER32(00401BF7,00000000,?,?,?,?,00401BF7,0048D550,00401BF7,?,00000204), ref: 00402641
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _wcscpy$Window$ItemRectText_malloc$DialogForegroundH_prolog3_catch_MessageMetricsObjectSelectSendSystem__swprintf
          • String ID:
          • API String ID: 162573731-0
          • Opcode ID: 2fd9de70c446c8e59b843f8b728ad4f37a842a14b7769d653cb86e5286cf9499
          • Instruction ID: 5d5bc8ddd2ee55e6cedf02d315d3cb62d53b123e7d18268d17adffbd1f471ac7
          • Opcode Fuzzy Hash: 2fd9de70c446c8e59b843f8b728ad4f37a842a14b7769d653cb86e5286cf9499
          • Instruction Fuzzy Hash: 9C51B6B5601605BFEB05AF65DC46FEEB769FF04308F00052EF604A21E2DB756954CB98
          APIs
          • _strlen.LIBCMT ref: 00412D7D
          • _strlen.LIBCMT ref: 00412D9A
          • IsDialogMessageW.USER32(00412ED5,?), ref: 00412DBA
          • TranslateMessage.USER32(?), ref: 00412DC8
          • DispatchMessageW.USER32(?), ref: 00412DD2
          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00412DE1
          • DdeClientTransaction.USER32(00000001,00000001,00000000,00000001,00004050,00001388,00000000), ref: 00412E01
          • DdeGetLastError.USER32(00000001), ref: 00412E0F
          • _strlen.LIBCMT ref: 00412E46
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Message$_strlen$ClientDialogDispatchErrorLastPeekTransactionTranslate
          • String ID:
          • API String ID: 3755878689-0
          • Opcode ID: 5a0ac031f8cb865b26c113acb448c05818d8f8624f6f80168fa92a5c67164f37
          • Instruction ID: b87cf77f3605f5675e9a281c20427728469610cca946a307ae8d9233a2b892d0
          • Opcode Fuzzy Hash: 5a0ac031f8cb865b26c113acb448c05818d8f8624f6f80168fa92a5c67164f37
          • Instruction Fuzzy Hash: D7218DB1801209BADF219F91DD85DDE7BACEF04349F14402BF600E2191E3B89AD58B68
          APIs
          • GetStdHandle.KERNEL32(000000F4,00453C4B,00495EB8,00495E74,000001E0,00495EF0,0000014B), ref: 00453ADA
          • GetFileType.KERNEL32(00000000), ref: 00453AE5
          • _vfprintf.LIBCMT ref: 00453B08
            • Part of subcall function 004742E6: _vfprintf_helper.LIBCMT ref: 004742F9
          • __vsnprintf.LIBCMT ref: 00453B3F
          • GetVersion.KERNEL32 ref: 00453B4F
          • RegisterEventSourceA.ADVAPI32(00000000,00495EB0), ref: 00453B6D
          • ReportEventA.ADVAPI32(00000000,00000001,00000000,00000000,00000000,00000001,00000000,?,00000000), ref: 00453B91
          • DeregisterEventSource.ADVAPI32(00000000), ref: 00453B98
          • MessageBoxA.USER32(00000000,?,00495EA0,00000010), ref: 00453BC2
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Event$Source$DeregisterFileHandleMessageRegisterReportTypeVersion__vsnprintf_vfprintf_vfprintf_helper
          • String ID:
          • API String ID: 1665902462-0
          • Opcode ID: b0ba3cb9d00c493287e85ddb2f6ce40ec3b7105f4b7e89b541c6885e32f278b8
          • Instruction ID: b0366dc6c26dc34716eb39a9559f4e34c010145fa5819d3deae9b7e3ba73cfac
          • Opcode Fuzzy Hash: b0ba3cb9d00c493287e85ddb2f6ce40ec3b7105f4b7e89b541c6885e32f278b8
          • Instruction Fuzzy Hash: F121B571A043006BE720AB21CC46FEF77D8AF94745F84492EB689861C1EEF99A44875B
          APIs
          • __EH_prolog3_catch_GS.LIBCMT ref: 00412672
            • Part of subcall function 00413423: __EH_prolog3_catch.LIBCMT ref: 0041342A
            • Part of subcall function 0041368B: __EH_prolog3.LIBCMT ref: 00413692
          • RegCreateKeyW.ADVAPI32(80000000,?,?), ref: 00412743
          • RegCreateKeyW.ADVAPI32(?,?,?), ref: 004127B6
          • RegSetValueW.ADVAPI32(?,00000000,00000001,00000000,?), ref: 004127E4
          • RegCreateKeyW.ADVAPI32(?,?,?), ref: 0041282C
          • RegSetValueW.ADVAPI32(?,00000000,00000001,?,?), ref: 0041285C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Create$Value$H_prolog3H_prolog3_catchH_prolog3_catch_
          • String ID: >u
          • API String ID: 333081038-4124531162
          • Opcode ID: 30d8965fcea660d6c405f0932e2395643ee678c143ae29b1eb1fbf7317d13f10
          • Instruction ID: e35806359c35bf33f8406e688deb07ce4fe15fe4c790a931028675c32a2d185f
          • Opcode Fuzzy Hash: 30d8965fcea660d6c405f0932e2395643ee678c143ae29b1eb1fbf7317d13f10
          • Instruction Fuzzy Hash: C051A532D01129ABCB21AB50DD45BEE73B4FF09714F14019AE809E6150D7789ED1CF58
          APIs
          • __EH_prolog3.LIBCMT ref: 0040BBD3
          • SysStringLen.OLEAUT32(00000000), ref: 0040BC4B
          • SysFreeString.OLEAUT32(00000000), ref: 0040BC5B
          • SysAllocStringLen.OLEAUT32(00000000,?), ref: 0040BC6C
          • _memset.LIBCMT ref: 0040BC8F
          • SysFreeString.OLEAUT32(00000000), ref: 0040BCBA
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: String$Free$AllocH_prolog3_memset
          • String ID: `-u
          • API String ID: 940057595-2606764580
          • Opcode ID: 1cb313c091d2c1bfb1119476f3ae24280be130568bda6311e1da58c9fa242929
          • Instruction ID: 37d153cde60fbe64fdfce4bde9ac5843fd1e4c16e10141d7f5d1ad9ee85a11ac
          • Opcode Fuzzy Hash: 1cb313c091d2c1bfb1119476f3ae24280be130568bda6311e1da58c9fa242929
          • Instruction Fuzzy Hash: A2518E7190010A9FEB15DF94CC89EBEB3B8EF14314F50452EE515E7280EB789E05CB99
          APIs
            • Part of subcall function 0040B494: RtlEnterCriticalSection.NTDLL(004C8740), ref: 0040B4AA
            • Part of subcall function 0040B494: GetClassInfoExW.USER32(004A42A4,00000001), ref: 0040B4EB
            • Part of subcall function 0040B494: LoadCursorW.USER32 ref: 0040B526
            • Part of subcall function 0040B494: RegisterClassExW.USER32 ref: 0040B549
            • Part of subcall function 0040B494: _memset.LIBCMT ref: 0040B576
            • Part of subcall function 0040B494: GetClassInfoExW.USER32(004A4314,?), ref: 0040B593
            • Part of subcall function 0040B494: LoadCursorW.USER32 ref: 0040B5D4
            • Part of subcall function 0040B494: RegisterClassExW.USER32 ref: 0040B5F7
          • DialogBoxIndirectParamW.USER32(004C8708,00000000,?,VA,00000000), ref: 0040BE96
          • GetLastError.KERNEL32 ref: 0040BEA9
          • GlobalHandle.KERNEL32(00000000), ref: 0040BEB8
          • GlobalFree.KERNEL32(00000000), ref: 0040BEBF
          • GetLastError.KERNEL32 ref: 0040BEC7
          • SetLastError.KERNEL32(00000000), ref: 0040BEDC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Class$ErrorLast$CursorGlobalInfoLoadRegister$CriticalDialogEnterFreeHandleIndirectParamSection_memset
          • String ID: VA
          • API String ID: 2178949580-1642038470
          • Opcode ID: 3217834449eb634cf41ba65d3a5f2af458a9c0dc5a5f2017745f8f6368e901b3
          • Instruction ID: 9840f43a1941360ee5c1058c7379fce352124f045e18367f36700b91047ed208
          • Opcode Fuzzy Hash: 3217834449eb634cf41ba65d3a5f2af458a9c0dc5a5f2017745f8f6368e901b3
          • Instruction Fuzzy Hash: 80118E71505305AFE611AB35DC88F6F779CEF84325F104A3DF550A22D1DB7898018BAE
          APIs
          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00401CB8
          • SelectObject.GDI32(00000000,00000000), ref: 00401CD1
          • GetSystemMetrics.USER32(0000002D), ref: 00401D74
          • DrawTextW.USER32(?,?,000000FF,00000000,00000400), ref: 00401DB5
          • DrawTextW.USER32(?,?,000000FF,00000000,00000400), ref: 00401DF5
          • DrawTextW.USER32(?,?,000000FF,00000000,00000400), ref: 00401E37
          • DrawTextW.USER32(?,?,000000FF,00000000,00000400), ref: 00401E79
          • GetClientRect.USER32(?,?), ref: 00401F04
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: DrawText$ClientMessageMetricsObjectRectSelectSendSystem
          • String ID:
          • API String ID: 36606085-0
          • Opcode ID: 885f2ee23460ca3c7abb748c6ff297923a0c929aed1baffab00a58ea0c2e3dcb
          • Instruction ID: 7b4a3d9cae3f6679446846cbe1aa30f7292649be873b65f001402955fe349831
          • Opcode Fuzzy Hash: 885f2ee23460ca3c7abb748c6ff297923a0c929aed1baffab00a58ea0c2e3dcb
          • Instruction Fuzzy Hash: 45C1F6B1D01209AFDB10CFE8C985ADEBBF9EF48314F10842AE915F72A1D774AA45CB54
          APIs
          • _memset.LIBCMT ref: 004193CE
          • GetTempPathW.KERNEL32(00000104,?), ref: 004193E0
          • Sleep.KERNEL32(000000C8,00000104,00000000), ref: 00419472
          • _memset.LIBCMT ref: 004194A2
          • GetTempPathA.KERNEL32(00000104,?), ref: 004194B4
          • Sleep.KERNEL32(000000C8), ref: 004194D3
          • GetLastError.KERNEL32 ref: 0041952B
          • __CxxThrowException@8.LIBCMT ref: 00419550
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: PathSleepTemp_memset$ErrorException@8LastThrow
          • String ID:
          • API String ID: 1439999958-0
          • Opcode ID: 8a808d6885ee2bcccf189b034b0968c74ec1010f33aa2038ff8289af3b18731d
          • Instruction ID: a10042c87d764e87b82f5b044183807258073902f3271897d7cbbb00f76e3718
          • Opcode Fuzzy Hash: 8a808d6885ee2bcccf189b034b0968c74ec1010f33aa2038ff8289af3b18731d
          • Instruction Fuzzy Hash: 4661BFB1908341AFD710DF55C88599BBBE8FF84718F00092FF59592291D7749E88CB9B
          APIs
          • GetParent.USER32(?), ref: 004024FE
          • GetWindow.USER32(?,00000004), ref: 0040250A
          • GetWindowRect.USER32(?,?), ref: 00402518
          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0040254A
          • GetWindowRect.USER32(00000000,?), ref: 00402565
          • GetParent.USER32(?), ref: 0040256F
          • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 00402593
          • SetWindowPos.USER32(40000000,00000000,?,?,000000FF,000000FF,00000015), ref: 00402614
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Window$ParentRect$InfoParametersPointsSystem
          • String ID:
          • API String ID: 1942744303-0
          • Opcode ID: c8ca9315839b38fe14f64c8e064d650eef50a42611338bbbcaa55aa98dbb3795
          • Instruction ID: ddcbb1b933a011f3d8f1d7b47b3064f311f2c3575ecce8aa473777e5e0853355
          • Opcode Fuzzy Hash: c8ca9315839b38fe14f64c8e064d650eef50a42611338bbbcaa55aa98dbb3795
          • Instruction Fuzzy Hash: 1B417231A00119AFDB10DFB8DD88AAEBBB9AB48314F150535F501F32D4D674AD058B58
          APIs
          • RtlEnterCriticalSection.NTDLL(004C8740), ref: 0040B4AA
          • GetClassInfoExW.USER32(004A42A4,00000001), ref: 0040B4EB
          • LoadCursorW.USER32 ref: 0040B526
          • RegisterClassExW.USER32 ref: 0040B549
          • _memset.LIBCMT ref: 0040B576
          • GetClassInfoExW.USER32(004A4314,?), ref: 0040B593
          • LoadCursorW.USER32 ref: 0040B5D4
          • RegisterClassExW.USER32 ref: 0040B5F7
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Class$CursorInfoLoadRegister$CriticalEnterSection_memset
          • String ID:
          • API String ID: 1515370940-0
          • Opcode ID: 01d0908fce3a9a10e8c38f2e23fcd58a806e83938dd499cd54d27d8e76ea1cee
          • Instruction ID: c2741b319b3ab99108611d662b00f2aaca944efccb0cb0d64010e22bbe0aa471
          • Opcode Fuzzy Hash: 01d0908fce3a9a10e8c38f2e23fcd58a806e83938dd499cd54d27d8e76ea1cee
          • Instruction Fuzzy Hash: 13412CB580A310AFC340DF59D844A5FBBE8EB88B54F50892FF58492290D77899448F9A
          APIs
            • Part of subcall function 00410E10: lstrcmpiW.KERNEL32(?,?,00410B30,?,?,004C1E84,?,00000000,00000000), ref: 00410E7A
          • lstrlenW.KERNEL32(?,004C1E84,?,00000000,00000000), ref: 00410B8A
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: lstrcmpilstrlen
          • String ID:
          • API String ID: 3649823140-0
          • Opcode ID: 1a76944f2524fd8664a064d1f94d6bbc51914eae7d75264753dddd838a3a91c0
          • Instruction ID: 874660f40bb97b12bd92aae88fe681e3cd47da4552cd5ef132a0fd15508d4650
          • Opcode Fuzzy Hash: 1a76944f2524fd8664a064d1f94d6bbc51914eae7d75264753dddd838a3a91c0
          • Instruction Fuzzy Hash: 08A1B571900149DBCB20EFA4DD85AEE77B8EF04314F10452BEA49D7290E7B8AAC5CB59
          APIs
          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 004019B3
          • SelectObject.GDI32(00000000,00000000), ref: 004019CC
          • GetSystemMetrics.USER32(0000002D), ref: 00401A91
          • GetWindowTextW.USER32(00000000,?,00000104), ref: 00401AD2
          • DrawTextW.USER32(?,?,000000FF,?,00000400), ref: 00401AF9
          • GetWindowTextW.USER32(00000000,?,00000104), ref: 00401B2F
          • DrawTextW.USER32(?,?,000000FF,?,00000400), ref: 00401B56
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Text$DrawWindow$MessageMetricsObjectSelectSendSystem
          • String ID:
          • API String ID: 3426369399-0
          • Opcode ID: b73d99dbd2c32fcbf67a9ad51413a122805548baada65bfeb4ce4dfd8fd87735
          • Instruction ID: 686c93203a91fd3f751c8ee63b0bee1e665ebfe6b0dc4cad534b70c83d8564d6
          • Opcode Fuzzy Hash: b73d99dbd2c32fcbf67a9ad51413a122805548baada65bfeb4ce4dfd8fd87735
          • Instruction Fuzzy Hash: B1811EB1901129AFDB11EFA4DD8DEDDB7B8EF08304F0045FAA109A2191EB756E94CF58
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CharNextlstrlen
          • String ID: \
          • API String ID: 2279410217-2967466578
          • Opcode ID: 6ef370e53a1594b386a492182b18380e8a96b6047c10da5bb3472928e86111ba
          • Instruction ID: 905179f8acba5fbfab78a04d309a7c3534609fc0cb58fba56d98443669b7831f
          • Opcode Fuzzy Hash: 6ef370e53a1594b386a492182b18380e8a96b6047c10da5bb3472928e86111ba
          • Instruction Fuzzy Hash: 6C41F7B0900115BADB206FA58C859BF7BBCEB11745B90083FE841B7381E37D4B419769
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0040D608
          • GetDlgItem.USER32(?,0000040C), ref: 0040D662
          • SetFocus.USER32(00000000), ref: 0040D669
          • IsDlgButtonChecked.USER32(?,00000412), ref: 0040D67F
          • GetWindowTextA.USER32(00000000,?,00000106), ref: 0040D6E2
            • Part of subcall function 0040C7DE: __EH_prolog3_catch.LIBCMT ref: 0040C7E5
          • _strlen.LIBCMT ref: 0040D73C
          • EndDialog.USER32(?,00000002), ref: 0040D76F
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch$ButtonCheckedDialogFocusItemTextWindow_strlen
          • String ID:
          • API String ID: 3754905632-0
          • Opcode ID: 6e58e1f97af74c08203e785dcbd6c0079c21f42399cc9d736db82d69dbcbe209
          • Instruction ID: e4f5632a6b2954952dcd2a285b083b04a8e5511aab076f690a3eab58ad6b02ca
          • Opcode Fuzzy Hash: 6e58e1f97af74c08203e785dcbd6c0079c21f42399cc9d736db82d69dbcbe209
          • Instruction Fuzzy Hash: B641E5B0901204EFDB24AF64DC06BAE7BB5EB04704F10483FF64AAA2D1D77A5944CB59
          APIs
          • __mtinitlocknum.LIBCMT ref: 0047E5FC
            • Part of subcall function 0047554E: __FF_MSGBANNER.LIBCMT ref: 0047556A
          • __lock.LIBCMT ref: 0047E610
          • __lock.LIBCMT ref: 0047E659
          • ___crtInitCritSecAndSpinCount.LIBCMT ref: 0047E674
          • RtlEnterCriticalSection.NTDLL(00000115), ref: 0047E69A
          • RtlLeaveCriticalSection.NTDLL(00000115), ref: 0047E6A7
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CriticalSection__lock$CountCritEnterInitLeaveSpin___crt__mtinitlocknum
          • String ID:
          • API String ID: 2236623020-0
          • Opcode ID: be951a22827a56b269a246950802b1a1e6cde46d0d8213b22f99529a7a8e649e
          • Instruction ID: f0731ecfe263e5ef36ce55c583c9046757c92abd98a7a7e1fad3054aae77e8be
          • Opcode Fuzzy Hash: be951a22827a56b269a246950802b1a1e6cde46d0d8213b22f99529a7a8e649e
          • Instruction Fuzzy Hash: 3441F6309007058ADB249F6AC8457EE77B5AF29328F64C39FE0299B2D1CB7C99418B5D
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0040FE1C
          • LoadLibraryExW.KERNEL32(?,00000000,00000002), ref: 0040FE53
          • FindResourceW.KERNEL32(00000000,?,?,?,00000000,00000002), ref: 0040FE71
          • FreeLibrary.KERNEL32(?,?,?,?,00000000,00000002), ref: 0040FF5F
            • Part of subcall function 0040BB9F: GetLastError.KERNEL32(00407077), ref: 0040BB9F
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Library$ErrorFindFreeH_prolog3_catchLastLoadResource
          • String ID:
          • API String ID: 1376058422-0
          • Opcode ID: e3106c134bd6e30c34021087c98d903b78e634e123e22e0603928d7f878cf484
          • Instruction ID: 334b670e31df6f0e70b485a0a82ce42061a73c2fa3d94837eff320d729fdec90
          • Opcode Fuzzy Hash: e3106c134bd6e30c34021087c98d903b78e634e123e22e0603928d7f878cf484
          • Instruction Fuzzy Hash: 06418D71900249EBCB20EF64C9449EEBBB9FB48714F10843BF505E72A1D7789E49CB99
          APIs
          • SetWindowTextW.USER32(?,00000000), ref: 00403203
            • Part of subcall function 0043E620: _malloc.LIBCMT ref: 0043E6CF
            • Part of subcall function 0043E620: __swprintf.LIBCMT ref: 0043E6FC
            • Part of subcall function 0043E620: _malloc.LIBCMT ref: 0043E732
          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00403220
          • GetDlgItem.USER32(?,00000413), ref: 0040322D
            • Part of subcall function 0040E8E3: LoadImageW.USER32(00000080,00000001,00000000,?,?,?,0040323C), ref: 0040E90C
            • Part of subcall function 0040E8E3: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0040E914
            • Part of subcall function 0040E8E3: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0040E937
          • DestroyCursor.USER32(?), ref: 00403280
          • DestroyCursor.USER32(00000000), ref: 004032AA
          • SendMessageW.USER32(?,00001109,00000000,?), ref: 004032BE
          • GetParent.USER32(?), ref: 004032C6
            • Part of subcall function 004024D4: GetParent.USER32(?), ref: 004024FE
            • Part of subcall function 004024D4: GetWindowRect.USER32(?,?), ref: 00402518
            • Part of subcall function 004024D4: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0040254A
            • Part of subcall function 004024D4: SetWindowPos.USER32(40000000,00000000,?,?,000000FF,000000FF,00000015), ref: 00402614
            • Part of subcall function 004069C6: SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 00406A44
            • Part of subcall function 004069C6: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00406A58
            • Part of subcall function 004069C6: GetDlgItem.USER32(?,0000E801), ref: 00406A6A
            • Part of subcall function 004069C6: IsWindow.USER32(00000000), ref: 00406A74
            • Part of subcall function 004069C6: GetClientRect.USER32(?,?), ref: 00406ACD
            • Part of subcall function 004032EA: __EH_prolog3.LIBCMT ref: 004032F1
            • Part of subcall function 004032EA: GetDlgItem.USER32(?,00000413), ref: 00403394
            • Part of subcall function 004032EA: SendMessageW.USER32(00000000,00001101,00000000,FFFF0000), ref: 004033A6
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: MessageSend$ItemWindow$CursorDestroyParentRectText_malloc$ClientH_prolog3ImageInfoLoadParametersSystem__swprintf
          • String ID:
          • API String ID: 2090155264-0
          • Opcode ID: f9a8183f31455d70666a6ccb25ec908374510adefc6630db41f96a932b4ceaa2
          • Instruction ID: fba445c204d38a42e3cb3af36b91eb05bbe74eacbbbad9f62a21b1ed31f6445c
          • Opcode Fuzzy Hash: f9a8183f31455d70666a6ccb25ec908374510adefc6630db41f96a932b4ceaa2
          • Instruction Fuzzy Hash: 1F21A071641300BBEB212F65EC4BF5E3B79EB49B15F00093DF355A90F2DAB268109B18
          APIs
          • lstrlenW.KERNEL32(?,80000000,?, >u), ref: 004125CF
          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00010008,?), ref: 004125E5
          • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00412608
          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00412636
          • RegCloseKey.ADVAPI32(?), ref: 00412641
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CloseDeleteEnumOpenlstrlen
          • String ID: >u
          • API String ID: 160701936-4124531162
          • Opcode ID: 836ff7478878600e23e2d2bb11e81635d2ac434998d07edbf4e6f903592c658b
          • Instruction ID: f808c3369eb5063c7d2e9eeaa03fb713166c292ff102550507cd4e8c83cf1201
          • Opcode Fuzzy Hash: 836ff7478878600e23e2d2bb11e81635d2ac434998d07edbf4e6f903592c658b
          • Instruction Fuzzy Hash: 8E2190329001589FEB309F65DD84DEEBBB8EB89300F10012EE855E3251DA744D458B64
          APIs
          • GetModuleHandleA.KERNEL32(0049DB1C,004AD668,0000000C,004767F1,00000000,00000000,?,00000000,00474D55,004734BB,00000001,004764FE,?,00000000), ref: 004766F1
          • InterlockedIncrement.KERNEL32(004C2548), ref: 00476757
          • __lock.LIBCMT ref: 0047675F
          • ___addlocaleref.LIBCMT ref: 0047677E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: HandleIncrementInterlockedModule___addlocaleref__lock
          • String ID: H%L$x*L
          • API String ID: 2801583907-1163462079
          • Opcode ID: 9a422cd0c7cb9052f2a059e449ccdd3a64512767ec3cd155349bd4de413b34c9
          • Instruction ID: 1e9727ec866cde342c27babbe2234c29fd87bda87f883ee6d7a9ea6281a3c883
          • Opcode Fuzzy Hash: 9a422cd0c7cb9052f2a059e449ccdd3a64512767ec3cd155349bd4de413b34c9
          • Instruction Fuzzy Hash: 76114270900B059FD7209F76C845B9ABBE0AF04314F50892EE899D7291D7B8E901CF1D
          APIs
          • __EH_prolog3.LIBCMT ref: 00407CA9
            • Part of subcall function 00407FBF: GetSysColor.USER32(00000008), ref: 0040802A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ColorH_prolog3
          • String ID: 4DJ$4EJ$PEJ$dDJ$lEJ
          • API String ID: 647181964-3196544244
          • Opcode ID: 97a05e25a9f4e941d0f4adb325448bf3e95f3f52d74258277fc979c04f1c2707
          • Instruction ID: 48000464bb64bf3f1338033b2e24ee77df612b4d230ae96bda49c0d97c00ac9c
          • Opcode Fuzzy Hash: 97a05e25a9f4e941d0f4adb325448bf3e95f3f52d74258277fc979c04f1c2707
          • Instruction Fuzzy Hash: 6F01AEB0411B409FC760DF55C54824ABBE0BBEA718BA0C91ED29A0BA41C7F9E408CF89
          APIs
          • GetFullPathNameW.KERNEL32(?,00000104,?,?,?,00000000,004C1E84), ref: 00418827
            • Part of subcall function 00417EBE: __EH_prolog3.LIBCMT ref: 00417EC5
          • GetFullPathNameW.KERNEL32(?,00000001,?,?,00000000), ref: 0041886D
          • GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 004188BC
          • GetFullPathNameA.KERNEL32(?,00000001,?,?), ref: 0041890B
          • GetLastError.KERNEL32 ref: 00418940
          • __CxxThrowException@8.LIBCMT ref: 00418965
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: FullNamePath$ErrorException@8H_prolog3LastThrow
          • String ID:
          • API String ID: 1840748137-0
          • Opcode ID: 6cace96fbc35fe8647347ff7a678127190821239a48a6c6aab444bc8753e5c81
          • Instruction ID: d5b430a2f49182e89e43d810ed16e0f672decd8abbfb175b9c5e984bc8ed27b1
          • Opcode Fuzzy Hash: 6cace96fbc35fe8647347ff7a678127190821239a48a6c6aab444bc8753e5c81
          • Instruction Fuzzy Hash: 2A917CB1508340AFC711EF55C881EAFBBE8EF88718F40091EF58993251DB789A85CB5B
          APIs
          • __EH_prolog3_GS.LIBCMT ref: 0041F835
            • Part of subcall function 00413461: __EH_prolog3_catch.LIBCMT ref: 00413468
          • _sprintf.LIBCMT ref: 0041F8AC
          • _sprintf.LIBCMT ref: 0041F8BE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _sprintf$H_prolog3_H_prolog3_catch
          • String ID: c
          • API String ID: 1286158073-112844655
          • Opcode ID: 846d7d9eb0b6557fd5ddf940c8a357a7efbdb32cbaabf05e96a3e14187676adc
          • Instruction ID: 2ae840c9afd43059bc8dec764e726a722c457161aac441be8424b0dac88a16b1
          • Opcode Fuzzy Hash: 846d7d9eb0b6557fd5ddf940c8a357a7efbdb32cbaabf05e96a3e14187676adc
          • Instruction Fuzzy Hash: 07128370A00248DFCF10EFE4C584AEDBBB6BF05308F54806EE546AB255D7785E8ACB59
          APIs
          • EnableWindow.USER32(00000000,00000001), ref: 004054FB
          • EnableWindow.USER32(00000000,00000001), ref: 0040565A
            • Part of subcall function 00411811: __EH_prolog3.LIBCMT ref: 00411830
          • SetDlgItemTextW.USER32(?,000003E9,?), ref: 00405681
          • PostMessageW.USER32(?,00000111,000003EA,00000000), ref: 00405696
          • SetFocus.USER32(00000000), ref: 004056A4
          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 004056D0
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: EnableItemTextWindow$FocusH_prolog3MessagePost
          • String ID:
          • API String ID: 3655392979-0
          • Opcode ID: 4ebb0ff1432de3b3685ec2109b4f4a9658e2afadca82573336cd2dc11c8018fc
          • Instruction ID: 3afb20b26c218187ded281ee60cd3f67e4c33204fbe39fa483316569d3424203
          • Opcode Fuzzy Hash: 4ebb0ff1432de3b3685ec2109b4f4a9658e2afadca82573336cd2dc11c8018fc
          • Instruction Fuzzy Hash: BD515CB058074C7BE9223772DD4BE1F7E5DDF81B89F028824B255654F0CBB6ED109A28
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3Malloc
          • String ID:
          • API String ID: 138677435-0
          • Opcode ID: 6309dcc795e9841a6e919f3215c80a7ec857788630c7c5ae183f0f706aa2f895
          • Instruction ID: 21a8cb39ded925691f2b7eae5e9973e9a3b641d8fc64b64478ef1fac0ca500f4
          • Opcode Fuzzy Hash: 6309dcc795e9841a6e919f3215c80a7ec857788630c7c5ae183f0f706aa2f895
          • Instruction Fuzzy Hash: CE515D71E0024ADFCB14EFA4C8949AEB7B5FF08314F24492EE616E7290D778AE45CB54
          APIs
          • __EH_prolog3_GS.LIBCMT ref: 00410101
          • lstrlenW.KERNEL32(?,00000060,0040FFFD,00000000,00000000,?,?,0040FF5A,?,?,00000000,?,?,?,00000000,00000002), ref: 00410121
          • CharNextW.USER32(00000000,?,00000060,0040FFFD,00000000,00000000,?,?,0040FF5A,?,?,00000000,?,?,?,00000000), ref: 0041018B
          • CharNextW.USER32(?,00000000,?,00000060,0040FFFD,00000000,00000000,?,?,0040FF5A,?,?,00000000,?,?), ref: 004101AF
          • lstrlenW.KERNEL32(00000000,?,?,?,00000000,00000002), ref: 0041022C
          • CharNextW.USER32(?,00000000,?,?,?,00000000,00000002), ref: 00410252
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CharNext$lstrlen$H_prolog3_
          • String ID:
          • API String ID: 1069818642-0
          • Opcode ID: 6c01e1b9253c58b832eeb862fb30e04a91b35388742aa7b57ffa6092e9c49630
          • Instruction ID: 647183be00b101d6b666e80fa8bc49ef3e2289c562b985678fc4af141010fa62
          • Opcode Fuzzy Hash: 6c01e1b9253c58b832eeb862fb30e04a91b35388742aa7b57ffa6092e9c49630
          • Instruction Fuzzy Hash: D5416C71D01219EBDB21AFA4CC4879E7BB4AF04714F20856BE805EB294D7BD8CC58B5D
          APIs
          • SetWindowTextW.USER32(?,00000000), ref: 0040D4E5
            • Part of subcall function 0043E620: _malloc.LIBCMT ref: 0043E6CF
            • Part of subcall function 0043E620: __swprintf.LIBCMT ref: 0043E6FC
            • Part of subcall function 0043E620: _malloc.LIBCMT ref: 0043E732
          • GetDlgItem.USER32(?,0000040C), ref: 0040D587
          • SendMessageW.USER32(00000000,000000C5,00000105,00000000), ref: 0040D59A
          • GetParent.USER32(?), ref: 0040D5B4
            • Part of subcall function 004024D4: GetParent.USER32(?), ref: 004024FE
            • Part of subcall function 004024D4: GetWindowRect.USER32(?,?), ref: 00402518
            • Part of subcall function 004024D4: SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0040254A
            • Part of subcall function 004024D4: SetWindowPos.USER32(40000000,00000000,?,?,000000FF,000000FF,00000015), ref: 00402614
            • Part of subcall function 0040EEF2: SendMessageW.USER32(?,0000007F,00000000,00000000), ref: 0040EF70
            • Part of subcall function 0040EEF2: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0040EF84
            • Part of subcall function 0040EEF2: GetDlgItem.USER32(?,0000E801), ref: 0040EF96
            • Part of subcall function 0040EEF2: IsWindow.USER32(00000000), ref: 0040EFA0
            • Part of subcall function 0040EEF2: GetClientRect.USER32(?,?), ref: 0040EFF9
          • GetDlgItem.USER32(?,0000040C), ref: 0040D5CF
          • SetFocus.USER32(00000000), ref: 0040D5D6
            • Part of subcall function 0040E8E3: LoadImageW.USER32(00000080,00000001,00000000,?,?,?,0040323C), ref: 0040E90C
            • Part of subcall function 0040E8E3: SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0040E914
            • Part of subcall function 0040E8E3: SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0040E937
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: MessageSend$Window$Item$ParentRect_malloc$ClientFocusImageInfoLoadParametersSystemText__swprintf
          • String ID:
          • API String ID: 3980130718-0
          • Opcode ID: 132cae373669715f15d5c8d738359de52b03f3566e283ecc7dafe9538f1a2ede
          • Instruction ID: 68e650414d397323596333c2c178e122ee48f5a6351adbb8d5ae4ebe9dae7e69
          • Opcode Fuzzy Hash: 132cae373669715f15d5c8d738359de52b03f3566e283ecc7dafe9538f1a2ede
          • Instruction Fuzzy Hash: 2F2130B1A41214BBEB113B65EC4BF1B3F29EB05714F004536B704780F3DAB628249B89
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a3bbe792d6f44cbb7c02dee2f180b0b479fd9048a9291aca34b75e7617e0280c
          • Instruction ID: 7ce99e08f9a5d6ba82cc501f0fc9c95f57aaaed071c58271a4e31e9025138942
          • Opcode Fuzzy Hash: a3bbe792d6f44cbb7c02dee2f180b0b479fd9048a9291aca34b75e7617e0280c
          • Instruction Fuzzy Hash: A5213B71A0424BAFDB11DF68DD48B6E7BA8BF04344F14083AE946E22E2D7799C508B58
          APIs
          • BeginPaint.USER32(?,?), ref: 00408597
          • GetClientRect.USER32(?,?), ref: 004085AF
          • CreateSolidBrush.GDI32(?), ref: 004085BB
          • FillRect.USER32(?,?,00000000), ref: 004085CF
          • DeleteObject.GDI32(?), ref: 004085D6
          • EndPaint.USER32(?,?), ref: 004085E3
          • BeginPaint.USER32(?,?), ref: 00408605
          • GetClientRect.USER32(?,?), ref: 0040861F
          • SelectObject.GDI32(00000000,?), ref: 00408652
          • CreateSolidBrush.GDI32(?), ref: 00408665
          • FillRect.USER32(00000000,?,00000000), ref: 00408678
          • DeleteObject.GDI32(?), ref: 00408681
          • SelectObject.GDI32(00000000,?), ref: 004086BF
          • DeleteDC.GDI32(00000000), ref: 004086C6
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ObjectRect$DeletePaint$BeginBrushClientCreateFillSelectSolid
          • String ID:
          • API String ID: 216606842-0
          • Opcode ID: 929a8ec678a41cd8a24d19c213e62a7de725452e97d9ad32991541218255a463
          • Instruction ID: c6711224098611453d39135df24e22262671ffd01ae83f63c64d7b350495ef8c
          • Opcode Fuzzy Hash: 929a8ec678a41cd8a24d19c213e62a7de725452e97d9ad32991541218255a463
          • Instruction Fuzzy Hash: E0112971901208EFCB119FA4DD89CAFBBB9FB49305B10483EE547E65A1DB719805CB28
          APIs
          • RtlEnterCriticalSection.NTDLL(004C8740), ref: 0040C263
            • Part of subcall function 0040AA73: RtlLeaveCriticalSection.NTDLL(00000066), ref: 0040AA7E
          • LoadCursorW.USER32(?,?), ref: 0040C317
          • GetClassInfoExW.USER32(?,00000000,?), ref: 0040C361
          • RegisterClassExW.USER32(?), ref: 0040C371
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ClassCriticalSection$CursorEnterInfoLeaveLoadRegister
          • String ID: 0
          • API String ID: 2383212399-4108050209
          • Opcode ID: c8c2664dad3f88e85d3a00fa94e388bd2367190c4c3e051bce509fa59ee01aa4
          • Instruction ID: a9e4f14c1c1aa49688c2b4b0195fb56dfc87877696b5cdf38115f9497be56f07
          • Opcode Fuzzy Hash: c8c2664dad3f88e85d3a00fa94e388bd2367190c4c3e051bce509fa59ee01aa4
          • Instruction Fuzzy Hash: 5C516875915300DBCB54DF64C8C0A6ABBE4FB48B10F10866EFD459B291EB34EC44CBAA
          APIs
          • __EH_prolog3.LIBCMT ref: 0040CBA8
          • CreatePopupMenu.USER32 ref: 0040CBDE
          • TrackPopupMenu.USER32(?,00000102,000000FB,?,00000000,000000FB,00000000), ref: 0040CC16
          • DestroyMenu.USER32(?), ref: 0040CC56
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Menu$Popup$CreateDestroyH_prolog3Track
          • String ID: $
          • API String ID: 2421160092-3993045852
          • Opcode ID: 3a97377fe910f50c5ff05663caa7aceab3419564134aa39b1c860442209bbba9
          • Instruction ID: aeb14ba48ff06a30253bb47ac3cd2a4db17db9dda034c5750002d53e9380bf95
          • Opcode Fuzzy Hash: 3a97377fe910f50c5ff05663caa7aceab3419564134aa39b1c860442209bbba9
          • Instruction Fuzzy Hash: 7831E770901219EFDF10DF95C8889AEBBB9FF89B10B10851AF519EB290C7758A41DFA4
          APIs
            • Part of subcall function 00476816: __amsg_exit.LIBCMT ref: 00476824
          • __amsg_exit.LIBCMT ref: 00478F06
          • __lock.LIBCMT ref: 00478F16
          • InterlockedDecrement.KERNEL32(?), ref: 00478F33
          • InterlockedIncrement.KERNEL32(004C2970), ref: 00478F5E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Interlocked__amsg_exit$DecrementIncrement__lock
          • String ID: H%L
          • API String ID: 4129207761-374462518
          • Opcode ID: 51925dd63e8a7f616d899ba07040354b15dd2898642096341d48935f38abc5df
          • Instruction ID: 9366ed5bd4eef3bd10d2e0458bc3bc2a64b8d4add10168dac2f8a49c094d8805
          • Opcode Fuzzy Hash: 51925dd63e8a7f616d899ba07040354b15dd2898642096341d48935f38abc5df
          • Instruction Fuzzy Hash: 6601A131E41B10ABC760BF658809BDE7762AB04B21F01811FE80CA7281CFBC6942CBDD
          APIs
          • ___addlocaleref.LIBCMT ref: 00471864
          • ___removelocaleref.LIBCMT ref: 0047186F
          • ___freetlocinfo.LIBCMT ref: 00471883
            • Part of subcall function 00471600: ___free_lconv_mon.LIBCMT ref: 00471643
            • Part of subcall function 00471600: ___free_lconv_num.LIBCMT ref: 00471664
            • Part of subcall function 00471600: ___free_lc_time.LIBCMT ref: 004716E9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
          • String ID: x*L$x*L
          • API String ID: 4212647719-476844600
          • Opcode ID: 979c59f73acd43532b963028e56f35fade1da0dad4e7e895a6b89fb27a73f15f
          • Instruction ID: c125c352a562c86d4336b6be23a076a9a2df391d41ea13cbcb74382bf031f224
          • Opcode Fuzzy Hash: 979c59f73acd43532b963028e56f35fade1da0dad4e7e895a6b89fb27a73f15f
          • Instruction Fuzzy Hash: 48E04F36921520058B3D391D6440AEB929C4FC17D6B2B866FF81CA7370DB6C9C4042DF
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3
          • String ID: $OJ$,NJ$<NJ$`RJ
          • API String ID: 431132790-1426473954
          • Opcode ID: c5f3e81c65837bb060c1064fd913bb1c044bc9afebc6c1c3aa892870d8b28c61
          • Instruction ID: 4a23bbae2aae1b451a93a596b199f30ccbf741f8128be5f2371994872c43803b
          • Opcode Fuzzy Hash: c5f3e81c65837bb060c1064fd913bb1c044bc9afebc6c1c3aa892870d8b28c61
          • Instruction Fuzzy Hash: B801D6B0501B80CEC760DF69C14424BBBE0BBA6718B50D85ED1EA8BE41D3B9A548CB59
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _memset$__filbuf_memcpy_s
          • String ID:
          • API String ID: 2885843685-0
          • Opcode ID: 332679774952cc2b2840c2b63c4b968fdb0d406d7013722e504c3fa6425a820e
          • Instruction ID: b56701194ac086c645d56ab8be7003cfa8c54b8d74b9d26d0ceed2bd0061e70e
          • Opcode Fuzzy Hash: 332679774952cc2b2840c2b63c4b968fdb0d406d7013722e504c3fa6425a820e
          • Instruction Fuzzy Hash: FB5117B1900205EBCB209FAA88445DFBBB5EF41325F10C61BF46D622D0E7789F41EB5A
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: __flsbuf$__flswbuf_wctomb_s
          • String ID:
          • API String ID: 3257920507-0
          • Opcode ID: 18542aaea77e8ec99a2b41c231f5293b5ab5b848949b69ad69a5f5dc75aae5ff
          • Instruction ID: 79472097b3daf3dc509ec7925b24e73f84473b3f48018e101c2488e35481c2f3
          • Opcode Fuzzy Hash: 18542aaea77e8ec99a2b41c231f5293b5ab5b848949b69ad69a5f5dc75aae5ff
          • Instruction Fuzzy Hash: D7510731114515EEC7359B3AD842AEA3BA4DE1A3243248B9FF0ADC72D1EB2CD905C79D
          APIs
          • __EH_prolog3.LIBCMT ref: 0040A89E
          • RtlEnterCriticalSection.NTDLL(004C8784), ref: 0040A8CB
          • GetModuleFileNameW.KERNEL32(004C4426,00000104), ref: 0040A928
          • LoadTypeLib.OLEAUT32(?,?), ref: 0040A94C
          • LoadRegTypeLib.OLEAUT32(004C4420,004C4424,004C4426,?,?), ref: 0040A961
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: LoadType$CriticalEnterFileH_prolog3ModuleNameSection
          • String ID:
          • API String ID: 3289395776-0
          • Opcode ID: e0893c89a82e94f588334a775c9c2e606fb0cf09a7f5d8aa40d63130ecc39e27
          • Instruction ID: 8136287b3794e7bd71a94dbec156d4d84a8d4cb1b3e056579054f2f1adafff73
          • Opcode Fuzzy Hash: e0893c89a82e94f588334a775c9c2e606fb0cf09a7f5d8aa40d63130ecc39e27
          • Instruction Fuzzy Hash: 6851AFB1A003499FCB10DFA8DD84AAE77B5EB88304F24443EE502E7291D7389D55CB6A
          APIs
          • GetNumberFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000028), ref: 00440AE5
          • __CxxThrowException@8.LIBCMT ref: 00440B05
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8FormatNumberThrow
          • String ID:
          • API String ID: 2847879890-0
          • Opcode ID: c1fa97963ba0795aace6b9711f6caa9883a81f8136265a22b952e7d012cd3e68
          • Instruction ID: cafa7f60ba1b07d56b0bbf19d394c44ff336b1125650d3745989df954fb31113
          • Opcode Fuzzy Hash: c1fa97963ba0795aace6b9711f6caa9883a81f8136265a22b952e7d012cd3e68
          • Instruction Fuzzy Hash: 5E31BF706043406AF724EB618C42FBFB3A9AF90714F54491EF655961C1EBB8A908C76A
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _wcsncpy$Exception@8Throw
          • String ID:
          • API String ID: 1648291542-0
          • Opcode ID: 6b3d8ca8c68c819bd32475d6184865d82369eda5f8d853b76b1c0a6ab655bcdf
          • Instruction ID: 55a0bad7bc6786bb0ffe3d2f7993a9632895052c1209a12d338020f062ae18df
          • Opcode Fuzzy Hash: 6b3d8ca8c68c819bd32475d6184865d82369eda5f8d853b76b1c0a6ab655bcdf
          • Instruction Fuzzy Hash: 0421B432900208BBCF20AFA5C841CDE77BDEF44315B10842AFD4997111E739AF81CBA8
          APIs
          • GetDesktopWindow.USER32 ref: 004539FA
          • GetProcessWindowStation.USER32(?,00453B61), ref: 00453A00
          • GetUserObjectInformationW.USER32(00000000,00000002,00000000,00000000,?,?,00453B61), ref: 00453A1B
          • GetLastError.KERNEL32(?,00453B61), ref: 00453A25
          • GetUserObjectInformationW.USER32(00000000,00000002,?,?,?,?,00453B61), ref: 00453A56
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: InformationObjectUserWindow$DesktopErrorLastProcessStation
          • String ID:
          • API String ID: 1078967293-0
          • Opcode ID: 8543481c051dd35678ffaf6717fd4153e2d20fce5f493edd77a1a99f3cdb0ff4
          • Instruction ID: c7a9732a0852c0b3ef0a2679792b0b3204aeeefaa9ff1b23790ea0e76a89222a
          • Opcode Fuzzy Hash: 8543481c051dd35678ffaf6717fd4153e2d20fce5f493edd77a1a99f3cdb0ff4
          • Instruction Fuzzy Hash: 36210732A00509ABDB10DFA9DC46BAEB7B8EF40716F50012AFD09E71D2DB74AE048759
          APIs
          • __CxxThrowException@8.LIBCMT ref: 004182CB
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • SetFileAttributesW.KERNEL32(00000000,00000000,?,?,004C1E84), ref: 004182F3
          • DeleteFileW.KERNEL32(?,?,?,004C1E84), ref: 004182FD
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          • SetFileAttributesA.KERNEL32(?,00000000), ref: 0041832F
          • DeleteFileA.KERNEL32(?), ref: 00418339
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: File$AttributesDelete$ExceptionException@8H_prolog3_catchRaiseThrow
          • String ID:
          • API String ID: 239994385-0
          • Opcode ID: 1207d5d66e18bb98f29070d9dd5feb716c1c72401d3db9d5be83f8425b499743
          • Instruction ID: 1605004fd649a5301e4786177d959da0f90d1aaf5f22e3bf634dff4cdcaad484
          • Opcode Fuzzy Hash: 1207d5d66e18bb98f29070d9dd5feb716c1c72401d3db9d5be83f8425b499743
          • Instruction Fuzzy Hash: ED21D1725083459FC700DF25DC81A8FBBE8FF94754F004A2EF495921B0DB399948CB9A
          APIs
          • IsProcessorFeaturePresent.KERNEL32(0000000C,00000000,0048329E,00402304,0040242D,?,004022E3,?,?,004017F3), ref: 004831D0
          • LoadLibraryA.KERNEL32(004A0EF8,?,00402304), ref: 004831EA
          • RtlAllocateHeap.NTDLL(00000000), ref: 00483246
          • InterlockedCompareExchange.KERNEL32(?,00000000,00000000), ref: 0048325A
          • HeapFree.KERNEL32(00000000), ref: 00483269
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Heap$AllocateCompareExchangeFeatureFreeInterlockedLibraryLoadPresentProcessor
          • String ID:
          • API String ID: 354369530-0
          • Opcode ID: 1420f4dcaf2e8086d469e2375173fe20180e8696df490954f6ee8001b8263c74
          • Instruction ID: e2d00a6ed990fa81d5e3b824908c432cd3b774069f7d371b6789a2cbc6d53789
          • Opcode Fuzzy Hash: 1420f4dcaf2e8086d469e2375173fe20180e8696df490954f6ee8001b8263c74
          • Instruction Fuzzy Hash: 33119672A02259AFC650AFB5AC48E2F7768FB45B52B1148BEE416C3250DB35D800CB5C
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Focus$ChildH_prolog3Window
          • String ID:
          • API String ID: 3907702801-0
          • Opcode ID: 1fd88288ccc867b00189ebb92ac83d81cb5004854d053f1453239cff226f87a0
          • Instruction ID: 084fa251b8f3d6ece27a3bda28c1bf534a3ce952c5fe438fe950279aa7dc16b7
          • Opcode Fuzzy Hash: 1fd88288ccc867b00189ebb92ac83d81cb5004854d053f1453239cff226f87a0
          • Instruction Fuzzy Hash: 5F219070900704AFCB24AF64CD49E6FBBB5BF45B04F10892DF5A6972E1CB34A900CB14
          APIs
          • __lock.LIBCMT ref: 0046E1AB
            • Part of subcall function 00475611: __mtinitlocknum.LIBCMT ref: 00475625
            • Part of subcall function 00475611: __amsg_exit.LIBCMT ref: 00475631
            • Part of subcall function 00475611: RtlEnterCriticalSection.NTDLL(?), ref: 00475639
          • ___sbh_find_block.LIBCMT ref: 0046E1B6
          • ___sbh_free_block.LIBCMT ref: 0046E1C5
          • HeapFree.KERNEL32(00000000,?,004AD298,0000000C,004755F2,00000000,004AD628,0000000C,0047562A,?,?,?,0046EA34,00000004,004AD2D8,0000000C), ref: 0046E1F5
          • GetLastError.KERNEL32(?,0046EA34,00000004,004AD2D8,0000000C,00476D03,?,?,00000000,00000000,00000000,004767C8,00000001,00000214,?,00000000), ref: 0046E206
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
          • String ID:
          • API String ID: 2714421763-0
          • Opcode ID: 6295375addfb81661c60097f9127dee52a17b0b2d213b31b6f98caef2632c43a
          • Instruction ID: aec01e89df9d97a7da8feaaab120638bcd8b1cd08d9b8c05b570a0e9e0c143dc
          • Opcode Fuzzy Hash: 6295375addfb81661c60097f9127dee52a17b0b2d213b31b6f98caef2632c43a
          • Instruction Fuzzy Hash: 2A01A735C41305AADB207BB39C06BDF7BA4AF01729F10415FF508AA191EF7D89419A9E
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0040D923
          • SetLastError.KERNEL32(0000000E,00000000,?,000000FF,?,00000000,00000000,?,?,0000005C), ref: 0040DA9A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorH_prolog3_catchLast
          • String ID: VA
          • API String ID: 3263087082-1642038470
          • Opcode ID: 49ce29932d576e9fa1033b9193b3281163f3e93ec50be934a62b9d2de3267b4f
          • Instruction ID: 342f7239788af2aed94830051151916fb5642c3ad324d89cafbfd0e39198f1f8
          • Opcode Fuzzy Hash: 49ce29932d576e9fa1033b9193b3281163f3e93ec50be934a62b9d2de3267b4f
          • Instruction Fuzzy Hash: 0251AD71904288DBCF14EFA9C982BDD7BA0BF04314F10422EF915A72D1D7B99A48CB59
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3_Throw_memset
          • String ID: $sJ
          • API String ID: 1687654391-1377744277
          • Opcode ID: 8c772706ca49529efaf618128299ea980776c85c8a18ea311e3f72059286609c
          • Instruction ID: ade055a668180c9aa55e7cac48f3fa5530e5cb699a794a5590b423f29fc9fdd6
          • Opcode Fuzzy Hash: 8c772706ca49529efaf618128299ea980776c85c8a18ea311e3f72059286609c
          • Instruction Fuzzy Hash: 70518EB0A00209EFDB24EF99C98099EB7F4BF0C314F50462EF555A7280C778AD45CBA9
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _memset
          • String ID: VUUU
          • API String ID: 2102423945-2040033107
          • Opcode ID: 013968bf22de99eb1b4cac1b54b7fe305d405f08eaf88a3e2599a3076b80ba30
          • Instruction ID: 4379af66f3d4e0263e8c62554abae1483e2c376b94b48db76877a3901187584d
          • Opcode Fuzzy Hash: 013968bf22de99eb1b4cac1b54b7fe305d405f08eaf88a3e2599a3076b80ba30
          • Instruction Fuzzy Hash: 5C21F7B6740210A7DB105A2EAC82B16B7999BC0715F188077FE08DF786F665980891A9
          APIs
          • __EH_prolog3.LIBCMT ref: 00411CE6
          • SendMessageW.USER32(?,?,?,?), ref: 00411D77
          • SendMessageW.USER32(?,00001115,00000000,?), ref: 00411D9E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: MessageSend$H_prolog3
          • String ID: P
          • API String ID: 1885053084-3110715001
          • Opcode ID: e0aa8337514313086312fa08b9bd708b2517b97b590f4e5bbd28bee0ab426d95
          • Instruction ID: 5f6ecf15f3d87088fafef70db28925b435234fec307c347ff068f23d30c59191
          • Opcode Fuzzy Hash: e0aa8337514313086312fa08b9bd708b2517b97b590f4e5bbd28bee0ab426d95
          • Instruction Fuzzy Hash: 19312B71A00609AFCB10DF99C8849EEBBF5FF88314B14851AE615AB760C774AA41CB64
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _memset$H_prolog3
          • String ID: 4mJ
          • API String ID: 2144794740-2591631674
          • Opcode ID: 17b231591c110f6e18ca039f0b14e1cae69e4a6bd40c5a85cdb15a30e9503c21
          • Instruction ID: 206f3e49ebfd1640e50c036722f92717eb44e7b9ac6130db204573f096603ef2
          • Opcode Fuzzy Hash: 17b231591c110f6e18ca039f0b14e1cae69e4a6bd40c5a85cdb15a30e9503c21
          • Instruction Fuzzy Hash: 28113CB0A00240DFCB04EF29C4C5B4ABFE4AF59304F55849EE9599F386E778D904CBA5
          APIs
          • __EH_prolog3.LIBCMT ref: 00404942
            • Part of subcall function 0040241F: GetCurrentProcess.KERNEL32(00000000,0000000D,?,004022E3,?,?,004017F3), ref: 00402453
            • Part of subcall function 0040241F: FlushInstructionCache.KERNEL32(00000000), ref: 0040245A
          • SetLastError.KERNEL32(0000000E,00000000,?,?,?,?,00000020,0040E1E0), ref: 00404979
          • DialogBoxParamW.USER32(00000064,?,VA,00000000,00000000), ref: 0040499D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CacheCurrentDialogErrorFlushH_prolog3InstructionLastParamProcess
          • String ID: VA
          • API String ID: 1868203950-1642038470
          • Opcode ID: c3ddafcf2e3ebc9df420bbaaffe8d22a5e9a4f6447e25d79e2ca9dadc50f622b
          • Instruction ID: 383be8fb53ff1a15e91496cfef524ed82f47d2ebaf1b19c30553d055c12d4fbb
          • Opcode Fuzzy Hash: c3ddafcf2e3ebc9df420bbaaffe8d22a5e9a4f6447e25d79e2ca9dadc50f622b
          • Instruction Fuzzy Hash: 040129B1D00209DBCF10EFAACD869DEBBB0BB48304F50853EE614B7291C7745A459BA9
          APIs
          • EnableWindow.USER32(00000000,00000000), ref: 00405862
          • SetDlgItemTextW.USER32(?,000003FC,?), ref: 004058B5
            • Part of subcall function 0040695C: __CxxThrowException@8.LIBCMT ref: 00406977
          • EnableWindow.USER32(00000000,00000000), ref: 00405A1A
          • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00405A37
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: EnableItemTextWindow$Exception@8Throw
          • String ID:
          • API String ID: 64772302-0
          • Opcode ID: 2df26cb8d458879efe37cba9293533cf1993ac604591bef03262208728a68aa6
          • Instruction ID: efc9df2da6f181069804370d5ddc6876386a11285677a07bfbaab5e8a54c342d
          • Opcode Fuzzy Hash: 2df26cb8d458879efe37cba9293533cf1993ac604591bef03262208728a68aa6
          • Instruction Fuzzy Hash: 9B51207054074CBFEA213B72DD4AE1F7E6DEF81B88F024928F255954E0CA76EC109A28
          APIs
          • std::exception::exception.LIBCMT ref: 004341F0
          • __CxxThrowException@8.LIBCMT ref: 00434205
          • std::_String_base::_Xlen.LIBCPMT ref: 0043423F
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8String_base::_ThrowXlen_mallocstd::_std::exception::exception
          • String ID:
          • API String ID: 1448684856-0
          • Opcode ID: 08303dbb31f02d7f78b91ffb59ec22f82edc9ec75921ccf380081c50e3eeec99
          • Instruction ID: 2da4e12ef89ae6e72916830a7fa297acad81cbdb35a555dd9f925f43826d5383
          • Opcode Fuzzy Hash: 08303dbb31f02d7f78b91ffb59ec22f82edc9ec75921ccf380081c50e3eeec99
          • Instruction Fuzzy Hash: 9751D4717006119B9B14EE79C9815AEB3E5EBDC354B14852EF82BD7780EB38FD018719
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_wcsncpy
          • String ID:
          • API String ID: 3631406028-0
          • Opcode ID: cf002ac7881a8443fe72953b50b18029b965d1b897690571fb6ed95f418c5609
          • Instruction ID: 35b6b2378c3acb2b84884d249eb53533ed8557b6f81bbb9f65af8bc2117128d8
          • Opcode Fuzzy Hash: cf002ac7881a8443fe72953b50b18029b965d1b897690571fb6ed95f418c5609
          • Instruction Fuzzy Hash: CF4199B59002099BDF14EF95C8819EEB7B5EF84315B25801BF914A7391DB38AF818798
          APIs
          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0047EFB0
          • __isleadbyte_l.LIBCMT ref: 0047EFE4
          • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,A045FF98,?,00000000,?,?,?,0047C0D0,?,?,00000002), ref: 0047F015
          • MultiByteToWideChar.KERNEL32(840FFFF8,00000009,?,00000001,?,00000000,?,?,?,0047C0D0,?,?,00000002), ref: 0047F083
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
          • String ID:
          • API String ID: 3058430110-0
          • Opcode ID: 36d4938860b6286b02424e4b8dfc0526069400e9eebaf43141031eb1b6182ac6
          • Instruction ID: ef95beaa7d1727e3fa1f1fc9b992d879c3c5f12e0b5b9718c08f936dc4be3b5b
          • Opcode Fuzzy Hash: 36d4938860b6286b02424e4b8dfc0526069400e9eebaf43141031eb1b6182ac6
          • Instruction Fuzzy Hash: AC31F230900285EFDB20DFA5C8809FE3BA5BF05310F15C6BAF4588B292D334D940DB59
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0040DBA0
          • _memset.LIBCMT ref: 0040DC1B
          • SHBrowseForFolderW.SHELL32(?), ref: 0040DC56
          • SHGetPathFromIDListW.SHELL32(00000000), ref: 0040DC65
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: BrowseFolderFromH_prolog3_catchListPath_memset
          • String ID:
          • API String ID: 2630463573-0
          • Opcode ID: ced486493d1651e5aa0f848fa405b95b4e627b5da99c2f44287b2c7e366d9978
          • Instruction ID: 3755a1695373dfeff28de1e59e6ed9139c6fa7d7fdc8b71aedae7bac033d59ff
          • Opcode Fuzzy Hash: ced486493d1651e5aa0f848fa405b95b4e627b5da99c2f44287b2c7e366d9978
          • Instruction Fuzzy Hash: F4312AB5D01218EFDB10DF95DC85AEEBBB8FF08700F10412AE905A7291E7789A04CF99
          APIs
          • SHGetSpecialFolderLocation.SHELL32(?,00000000,?), ref: 00411A76
          • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004209), ref: 00411A93
          • _memset.LIBCMT ref: 00411AA0
          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00411B0A
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: FileFolderInfoLocationMessageSendSpecial_memset
          • String ID:
          • API String ID: 739237996-0
          • Opcode ID: 15e7ac1d0bf121494d007b64fec5638476bbb541812db91fb3beae743e530ead
          • Instruction ID: 223abd343cd0b6a17f1aaf86b6376c5c115899682f24741b051e750050ca058c
          • Opcode Fuzzy Hash: 15e7ac1d0bf121494d007b64fec5638476bbb541812db91fb3beae743e530ead
          • Instruction Fuzzy Hash: 52214BB1E01208AFDF10DFA5DC88ADEBBB8EF08714F10442AE905AB291E7759945CF64
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
          • String ID:
          • API String ID: 3016257755-0
          • Opcode ID: 7ea3a893bf3bd11cad7cd0372379ff1f7e327c259811a7a92178e9d3a0fb71f7
          • Instruction ID: 3589a40de246327b8b38eab0d075d331fd76a19ef79ec7d470414db1ff8d8e0a
          • Opcode Fuzzy Hash: 7ea3a893bf3bd11cad7cd0372379ff1f7e327c259811a7a92178e9d3a0fb71f7
          • Instruction Fuzzy Hash: B1014532400149BBCF125E95CC45CEE3F27BF1D358B548996FE1C59131D23AD9B1AB89
          APIs
          • GetLastError.KERNEL32(?,00000000,00474D55,004734BB,00000001,004764FE,?,00000000,?,?,?,?,00476610,?,00470A8B), ref: 004767A1
            • Part of subcall function 00476658: TlsGetValue.KERNEL32(?,00470A8B), ref: 0047665F
            • Part of subcall function 00476658: TlsSetValue.KERNEL32(00000000,00470A8B), ref: 00476680
          • __calloc_crt.LIBCMT ref: 004767C3
            • Part of subcall function 00476CF0: __calloc_impl.LIBCMT ref: 00476CFE
            • Part of subcall function 00476CF0: Sleep.KERNEL32(00000000), ref: 00476D15
            • Part of subcall function 004766E0: GetModuleHandleA.KERNEL32(0049DB1C,004AD668,0000000C,004767F1,00000000,00000000,?,00000000,00474D55,004734BB,00000001,004764FE,?,00000000), ref: 004766F1
            • Part of subcall function 004766E0: InterlockedIncrement.KERNEL32(004C2548), ref: 00476757
            • Part of subcall function 004766E0: __lock.LIBCMT ref: 0047675F
            • Part of subcall function 004766E0: ___addlocaleref.LIBCMT ref: 0047677E
          • GetCurrentThreadId.KERNEL32 ref: 004767F3
          • SetLastError.KERNEL32(00000000,?,00000000,00474D55,004734BB,00000001,004764FE,?,00000000,?,?,?,?,00476610,?,00470A8B), ref: 0047680B
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ErrorLastValue$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
          • String ID:
          • API String ID: 3041053630-0
          • Opcode ID: 868f59d04322a0c47a184755dc87f93c3b8aace411aed979733103cb3d619a3c
          • Instruction ID: 640fc63fb16c4eddb338274c11ce1d8878b9ac885501e1b43a66ce08e3b76368
          • Opcode Fuzzy Hash: 868f59d04322a0c47a184755dc87f93c3b8aace411aed979733103cb3d619a3c
          • Instruction Fuzzy Hash: 49F0F932902A2257C63537756C069CF2A52AF107B5723493EF849951E1DE29C40146AE
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Paint$BeginClientDrawIconRect
          • String ID:
          • API String ID: 2317380574-0
          • Opcode ID: 860fcd9affd01deadcbf6b4b2823435128dc2059d1ff3c6e0a6776557443cc05
          • Instruction ID: 786fc2017c8680b4ec13f4c48f45ecf702a639c2aff0a92996e8e53a98ef3fae
          • Opcode Fuzzy Hash: 860fcd9affd01deadcbf6b4b2823435128dc2059d1ff3c6e0a6776557443cc05
          • Instruction Fuzzy Hash: 2701C971902209AFDB109FE9DD44DEFBBB9EF48304F00082AF502D2161DA70A945DB14
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Paint$BeginClientDrawIconRect
          • String ID:
          • API String ID: 2317380574-0
          • Opcode ID: 508a363ca3677548b73b82f4403330ba5cb86bba82526f4e3afe6d08527a22c2
          • Instruction ID: 991ac2a51a3abee54e5a461290b6b9e29acc1dd1effa6d80139f4b85f8907175
          • Opcode Fuzzy Hash: 508a363ca3677548b73b82f4403330ba5cb86bba82526f4e3afe6d08527a22c2
          • Instruction Fuzzy Hash: 7901C971902209AFDB109FE9DD84DAFBBB9FF88304F50082AE506E2161DA75A9059B14
          APIs
          • __CxxThrowException@8.LIBCMT ref: 00414121
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3_catchThrow
          • String ID: $
          • API String ID: 1118002619-227171996
          • Opcode ID: a26cd78281f51ac5f7adad3b18db1148346b4182d2ef86ad0e2bbe994d4d456f
          • Instruction ID: 2dc23a1751ccce63407b9181d50e7509d92104cf5f56dcd4888625cfca52b7fa
          • Opcode Fuzzy Hash: a26cd78281f51ac5f7adad3b18db1148346b4182d2ef86ad0e2bbe994d4d456f
          • Instruction Fuzzy Hash: 9091BF706083428AD724DF15C484BABB7E1FFD5348F14491FF895862A1D7B88ACAC79B
          APIs
          • __EH_prolog3_GS.LIBCMT ref: 0043338C
            • Part of subcall function 00433AE6: __EH_prolog3.LIBCMT ref: 00433AED
          • __CxxThrowException@8.LIBCMT ref: 00433401
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3H_prolog3_Throw
          • String ID: 0
          • API String ID: 3648411918-4108050209
          • Opcode ID: bc35f773780d6a94c80edfe6d1e6d923dc5c449006d13e02a3d5f312cdbfea56
          • Instruction ID: 2dbdecb52633d5ab5c14a76018d32d59c17bb7d3aff43d7961e0d3b0201bd8d3
          • Opcode Fuzzy Hash: bc35f773780d6a94c80edfe6d1e6d923dc5c449006d13e02a3d5f312cdbfea56
          • Instruction Fuzzy Hash: DA916030A00148AFCF15EFE5C895ADDBBB1AF18305F64405EF016AB2A1DB799E45CB08
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 00423749
          • std::_String_base::_Xlen.LIBCPMT ref: 0042379B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catchString_base::_Xlenstd::_
          • String ID: Y4B
          • API String ID: 2420811286-3218349926
          • Opcode ID: 45c9f176eac3cdeba29f5942030d543e4c59c1fed136f3c470672e8f15de222a
          • Instruction ID: b7c2b2bb7140b962cc239912de869457c9498bade08f4cbc1afb4561726467d0
          • Opcode Fuzzy Hash: 45c9f176eac3cdeba29f5942030d543e4c59c1fed136f3c470672e8f15de222a
          • Instruction Fuzzy Hash: 866182B1B0022A9FCF14DF69D5804ADF7B0BF04305B608A2EE916E7640D77CAE85CB94
          APIs
          • __EH_prolog3.LIBCMT ref: 00437841
          • __CxxThrowException@8.LIBCMT ref: 00437865
            • Part of subcall function 00448D60: CryptImportPublicKeyInfo.CRYPT32()yC,)yC,?,?), ref: 00448D74
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CryptException@8H_prolog3ImportInfoPublicThrow
          • String ID: CZB
          • API String ID: 20819536-1427865577
          • Opcode ID: bd9358ad951e51fc5e0d69da13e262fac60b2bb90e3aeac69479e7caa30d9982
          • Instruction ID: 83865830c3d6f8f24134e9bf328192e89739eeb7635a9588e11922eed0c87db7
          • Opcode Fuzzy Hash: bd9358ad951e51fc5e0d69da13e262fac60b2bb90e3aeac69479e7caa30d9982
          • Instruction Fuzzy Hash: 1251BDB190021AEFDF21EF81CC81EEEBB74FF18714F10411AF818AA252D7349A54CBA5
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_memset
          • String ID: xJJ
          • API String ID: 2828583354-960294907
          • Opcode ID: 5e187a4a2ede105c37f323a69bc1fe5259987010ec7bda6afb45ba71d7d387d4
          • Instruction ID: 40e32720dbc7efdcdc637dd38eee10bdfabf71e777f2cf484a312185681509dd
          • Opcode Fuzzy Hash: 5e187a4a2ede105c37f323a69bc1fe5259987010ec7bda6afb45ba71d7d387d4
          • Instruction Fuzzy Hash: DF71D5B0901B41CFC720DF6AC188A9AFBF0BF59304FA4896ED09E9B761C735A944CB45
          APIs
          • std::_String_base::_Xlen.LIBCPMT ref: 00434052
          • _memmove_s.LIBCMT ref: 0043415C
            • Part of subcall function 00434411: _memmove_s.LIBCMT ref: 0043442C
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: _memmove_s$String_base::_Xlenstd::_
          • String ID: 7C
          • API String ID: 515076537-2403488387
          • Opcode ID: c2250a31e29501baeab7648fb0303bd1b43fac1e8513d87072ba16bcbebb2f25
          • Instruction ID: f1de1440acb70f513aed52d6f2595501d9cafa4b31351bf5dda2bc57c465a5fa
          • Opcode Fuzzy Hash: c2250a31e29501baeab7648fb0303bd1b43fac1e8513d87072ba16bcbebb2f25
          • Instruction Fuzzy Hash: 6541B0717006118B8F14EE29C9854AEB7E5ABDC314B14852EE96AD7740EB38FD428B09
          APIs
            • Part of subcall function 00401744: BeginPaint.USER32(?,?), ref: 00401767
            • Part of subcall function 00401744: GetClientRect.USER32(?,?), ref: 0040177D
            • Part of subcall function 00401744: DrawIcon.USER32(00000000,?,?,?), ref: 0040178B
            • Part of subcall function 00401744: EndPaint.USER32(?,?), ref: 0040179B
          • EndDialog.USER32(?,00000002), ref: 00403951
          • SelectObject.GDI32(?,?), ref: 00403977
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Paint$BeginClientDialogDrawIconObjectRectSelect
          • String ID: $
          • API String ID: 2785432872-3993045852
          • Opcode ID: fde9f22c5dc691fcf4b970cd5cd45946b66130b7ba6da8fe9bb645ef16887aae
          • Instruction ID: c84cb775f50ac7e167f993fff0f5a3f46e40b1e05b8f86170e66a7c0e8ea54c6
          • Opcode Fuzzy Hash: fde9f22c5dc691fcf4b970cd5cd45946b66130b7ba6da8fe9bb645ef16887aae
          • Instruction Fuzzy Hash: 5B41B0B160020A9FCF20AF24C84176B3FA8EB11316F50453BF856A63D1D779DE51DB5A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID:
          • String ID: e
          • API String ID: 0-4024072794
          • Opcode ID: e59a4fce4c09f7421d55ebebc88a4dcd6e7ad3b41b04b74a3b1ee95aef8c47f8
          • Instruction ID: 90f5f5c8bc5f9834f2f676af3a4d23133068a21f15780965f71a8ba502ff5fab
          • Opcode Fuzzy Hash: e59a4fce4c09f7421d55ebebc88a4dcd6e7ad3b41b04b74a3b1ee95aef8c47f8
          • Instruction Fuzzy Hash: F54191706003059FDF218F15C881AEB77A5EB543A5F14852AFA618A3E0D779DCC2CFA9
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0040ABFD
          • SysStringLen.OLEAUT32(?), ref: 0040AD10
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catchString_malloc
          • String ID: `-u
          • API String ID: 1174315209-2606764580
          • Opcode ID: 599caf1de7dd9065a09676d2a16d7e00549fdeaac9b50badec1f0821c6dfcc51
          • Instruction ID: 48dd9dc584a7c1661126400373986d2d492beadf1d1bd7d99aebe04e23b3950b
          • Opcode Fuzzy Hash: 599caf1de7dd9065a09676d2a16d7e00549fdeaac9b50badec1f0821c6dfcc51
          • Instruction Fuzzy Hash: 17414975A00209EFDB04CFA4C984AAEBBF4EF08315F21456AE905FB2A1D338D951CF65
          APIs
          • RegOpenKeyExW.ADVAPI32(?,?,00000000,0002001F,?,?,00000000,00000000), ref: 00410FCC
          • RegDeleteKeyW.ADVAPI32(?,?), ref: 0041109B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: DeleteOpen
          • String ID: >u
          • API String ID: 3632437661-4124531162
          • Opcode ID: b8e11e60510ab50ca69d23f04f3eb6c94dafc9ada6b30e2f4555d6f48c151bb9
          • Instruction ID: 85ef5c00cb95659e2b3307e91c65d4eb82d1e36d6484e5d567a4a21994f79b23
          • Opcode Fuzzy Hash: b8e11e60510ab50ca69d23f04f3eb6c94dafc9ada6b30e2f4555d6f48c151bb9
          • Instruction Fuzzy Hash: 76411B71D4112CABCB309B55DC88ADEBBB8FB59750F0005EAE509E2220D7B09EC5CFA5
          APIs
          • __CxxThrowException@8.LIBCMT ref: 0042FACB
            • Part of subcall function 00472749: RaiseException.KERNEL32(?,?,004ADB04,00000065,?,?,004132CD,?,004ADB04,00000065,00000000,?,?,?,0041361B,?), ref: 00472789
          • __EH_prolog3_catch.LIBCMT ref: 0042FA9C
            • Part of subcall function 004143FB: __EH_prolog3_catch.LIBCMT ref: 00414402
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_catch$ExceptionException@8RaiseThrow
          • String ID: @
          • API String ID: 1279188806-2766056989
          • Opcode ID: aa0375ba90ab8c7c4a7eee67b8ce33922ce07e1937c1b681bfcc504a64eb2292
          • Instruction ID: e2baa52e3b427f91199307e59e6d565985f4942427299d0f94d6b50587b96690
          • Opcode Fuzzy Hash: aa0375ba90ab8c7c4a7eee67b8ce33922ce07e1937c1b681bfcc504a64eb2292
          • Instruction Fuzzy Hash: A9316B30A002299FCF01DFA5D885AEF7BB5EF09304F90842AF505AB251DB789D59CB99
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw
          • String ID: |vJ
          • API String ID: 3670251406-1304837848
          • Opcode ID: 4b7e2174a5d56c449b975ee3e24f1adf93b8c8e61e86e639ba4688488e6f4de4
          • Instruction ID: 607adcab112be8cdb784832fade7096590c284dc7dc9f750559bfa36b6317f1a
          • Opcode Fuzzy Hash: 4b7e2174a5d56c449b975ee3e24f1adf93b8c8e61e86e639ba4688488e6f4de4
          • Instruction Fuzzy Hash: C82190B0601222AFCB209F9AC8849AD7BB4FF0DB14F12D06BF1459F351C7B98840CB99
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw
          • String ID: 4pJ
          • API String ID: 3670251406-1695892774
          • Opcode ID: d4878bd06daaac75ddaab5c14fb1aecd4e2fba56f7c8ee44934772a0744db8b9
          • Instruction ID: ed1e61b93bd7ba0a80382eb0767e716639704a827b7a5a6bd1544b02537ea2ad
          • Opcode Fuzzy Hash: d4878bd06daaac75ddaab5c14fb1aecd4e2fba56f7c8ee44934772a0744db8b9
          • Instruction Fuzzy Hash: 72219370B11321EFCB20AFA6D84499E7BA4EF09704B51846BF1059F251E7B98980CB99
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw
          • String ID: <wJ
          • API String ID: 3670251406-608666201
          • Opcode ID: d1c8f9233b935756cf9a663e314a743396ff003301831cbb47d1e8d5187395bf
          • Instruction ID: 54b97233dcd44cbec6641ff787d61b33db6d5b17d3810547d84081dc0ef2b29b
          • Opcode Fuzzy Hash: d1c8f9233b935756cf9a663e314a743396ff003301831cbb47d1e8d5187395bf
          • Instruction Fuzzy Hash: 1E1181B0904714EFCB34AF65C8845AEBBF0BF18704F50982FE0C697A40D778A9448B99
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw
          • String ID: TtJ
          • API String ID: 3670251406-1236159234
          • Opcode ID: b7616204388bd5a8b69b56162b92bfb736196c1dc723b013f16e689360ff5b0f
          • Instruction ID: 242e758b9e4fdd15fb208c68dc9790ed8f06edfe7fcee7d40240d1b9405fba2a
          • Opcode Fuzzy Hash: b7616204388bd5a8b69b56162b92bfb736196c1dc723b013f16e689360ff5b0f
          • Instruction Fuzzy Hash: EB119E70A10621EFCB10AF66C8459AD7FA4FF0DB10F51846BF1049B291CBB88940CB99
          APIs
            • Part of subcall function 0040241F: GetCurrentProcess.KERNEL32(00000000,0000000D,?,004022E3,?,?,004017F3), ref: 00402453
            • Part of subcall function 0040241F: FlushInstructionCache.KERNEL32(00000000), ref: 0040245A
          • SetLastError.KERNEL32(0000000E,00000000,?,?,?,0040C1FE,?,004A41B8,00CF0000,00000000,?,?), ref: 0040C463
          • CreateWindowExW.USER32(004A41B8,0040C1FE,00000000,00CF0000,?,?,?,?,00000000,?,00000000,00000000), ref: 0040C4C5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CacheCreateCurrentErrorFlushInstructionLastProcessWindow
          • String ID: @6L
          • API String ID: 852167079-2041432092
          • Opcode ID: 4315c95f899bf9437bd5831d127894ea97db90b2634a97ca9d1f5476b426bceb
          • Instruction ID: 6bfa25fa0a49e2d67b8ba839042cb74da8e4b87f57a371a318036555407618fb
          • Opcode Fuzzy Hash: 4315c95f899bf9437bd5831d127894ea97db90b2634a97ca9d1f5476b426bceb
          • Instruction Fuzzy Hash: 97117932600115EFCB118F65DC89EAB3BA5EB88750F05863AFD05A72A0D774DC61DBA4
          APIs
          • GetDlgItem.USER32(00000000,00000000), ref: 004130D0
          • GetWindowRect.USER32(00000000,?), ref: 004130EC
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ItemRectWindow
          • String ID: ne@
          • API String ID: 3212065781-3546210634
          • Opcode ID: 3d087ffc15f7993b062a266fa0ac5ae51414e08387dc36101f43aea3d742e938
          • Instruction ID: 1ca461459963dc5bd94aa33a927bed2786e89f70316d48182500dd3e9cd539d0
          • Opcode Fuzzy Hash: 3d087ffc15f7993b062a266fa0ac5ae51414e08387dc36101f43aea3d742e938
          • Instruction Fuzzy Hash: 68010571900219EBCB10EFA9C9459EEBBB8EB08316F10846AE94592280E3749E81DB54
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3_memset
          • String ID: LmJ
          • API String ID: 2828583354-3231387858
          • Opcode ID: 68c2e80a19f8fc707472493696bb2775204221c29abe4238ec756c25efa56879
          • Instruction ID: a504bb576c2fd05ed8fd067c98cb175676faada43e9d58b141d0f6a9f86a6664
          • Opcode Fuzzy Hash: 68c2e80a19f8fc707472493696bb2775204221c29abe4238ec756c25efa56879
          • Instruction Fuzzy Hash: 731106B5A01700CFC320DF6AC194A9AFBF1BF09304F95C86ED19A8B761D778A908CB55
          APIs
          • __EH_prolog3.LIBCMT ref: 004203EE
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          • __CxxThrowException@8.LIBCMT ref: 00420461
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw_malloc
          • String ID: xlJ
          • API String ID: 1631339918-4209143007
          • Opcode ID: 4edd2edab5ef812bfad1aa9d3e3f4b4009671a99ddc49bc3af3d134ed368068c
          • Instruction ID: c0f13f8293575015a4e51e9256168e60f5f6285e3429672feb986e432c466390
          • Opcode Fuzzy Hash: 4edd2edab5ef812bfad1aa9d3e3f4b4009671a99ddc49bc3af3d134ed368068c
          • Instruction Fuzzy Hash: 7A1161B0A41214DFCB00EF66D98489DBBF0FF45304BE5C8AFD1489B252C7788A44CB59
          APIs
          • GetDlgItem.USER32(?,?), ref: 00403560
          • SendMessageW.USER32(00000000,00001132,00000000,?), ref: 00403572
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: ItemMessageSend
          • String ID: g
          • API String ID: 3015471070-30677878
          • Opcode ID: e8a5f7a7e99c7956e7873a18c194a8ae005c58d32b9699203ae21df9a21e4884
          • Instruction ID: 2dc80ed5200b91463cfec6a187398e3e0ca38e866e00323d7d3864de57bff562
          • Opcode Fuzzy Hash: e8a5f7a7e99c7956e7873a18c194a8ae005c58d32b9699203ae21df9a21e4884
          • Instruction Fuzzy Hash: 520108B2D00209EFCF00DFE5D809ADEBFF5EB04314F10842AE515AB285E3B49655CB90
          APIs
          • __EH_prolog3.LIBCMT ref: 00439900
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          • __CxxThrowException@8.LIBCMT ref: 00439968
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8H_prolog3Throw_malloc
          • String ID: zJ
          • API String ID: 1631339918-2228594176
          • Opcode ID: 385cf4502c38c73c44f0c6090f36cb62fba4de33cd117601f8aaca89b8f26a82
          • Instruction ID: bceaf083ca85f7d0676c180118836613ebfe5daa5bab85397b153d8cde14492a
          • Opcode Fuzzy Hash: 385cf4502c38c73c44f0c6090f36cb62fba4de33cd117601f8aaca89b8f26a82
          • Instruction Fuzzy Hash: F80184B0A11225DFCB10EF52C944A9EBBA4BF09710F55C45BF0049B3A1C7F88940CBC9
          APIs
          • __EH_prolog3_catch.LIBCMT ref: 0041151E
          • GetCurrentThreadId.KERNEL32 ref: 00411549
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CurrentH_prolog3_catchThread
          • String ID: QK
          • API String ID: 765742432-2795462801
          • Opcode ID: 11d944e48e9f9d2fe0167292c52bd89465e565096a9c68fa64a17c1e9b4907ac
          • Instruction ID: 28cc6167a4ef19d308a151f2df719ef5a2a2ad93348c0dfd32a2083f744beddc
          • Opcode Fuzzy Hash: 11d944e48e9f9d2fe0167292c52bd89465e565096a9c68fa64a17c1e9b4907ac
          • Instruction Fuzzy Hash: 1901A7B0D05600DFD7809F2A9946B94BBE2FBC4300B61447BD246CB271E779C4818F8E
          APIs
            • Part of subcall function 00476816: __amsg_exit.LIBCMT ref: 00476824
          • __amsg_exit.LIBCMT ref: 004718C1
          • __lock.LIBCMT ref: 004718D1
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: __amsg_exit$__lock
          • String ID: x*L
          • API String ID: 3452092475-3047301481
          • Opcode ID: fb8b45c4536bcca50191475644e11dc8582e9887176ae9e8d0311245dce903b4
          • Instruction ID: d298a74d400104751bd68718b614f5098f5bbc1d7cc4242ac7cb0c3c861d4430
          • Opcode Fuzzy Hash: fb8b45c4536bcca50191475644e11dc8582e9887176ae9e8d0311245dce903b4
          • Instruction Fuzzy Hash: 5BF06D31900B009BD720BF698502BD973A1AB00725F52C15FE459AB2E2CBBC6A498B5F
          APIs
          • std::exception::exception.LIBCMT ref: 004239E4
          • __CxxThrowException@8.LIBCMT ref: 004239F9
            • Part of subcall function 0046E4C8: _malloc.LIBCMT ref: 0046E4E0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: Exception@8Throw_mallocstd::exception::exception
          • String ID: Y4B
          • API String ID: 4063778783-3218349926
          • Opcode ID: 9ea1e6f3d1b12ba4ff8cf8393c8dae36dd6886c9427db544f86923dd2c6252c1
          • Instruction ID: 1fb8ab08a65d611c3882879e13b1034832604306939fdd28bfaf2a1455f0e31a
          • Opcode Fuzzy Hash: 9ea1e6f3d1b12ba4ff8cf8393c8dae36dd6886c9427db544f86923dd2c6252c1
          • Instruction Fuzzy Hash: C3E02BB1A0011C56DB0CE6B9DD01BAE727C6B05715F504A2FE022E20C2EBF8D708416C
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: H_prolog3
          • String ID: <NJ$yJ
          • API String ID: 431132790-616207120
          • Opcode ID: a0381d29217f7a075a9afb4b1eef2e8cc59b68936c819186348fce08d86b0340
          • Instruction ID: c3c64462e948b1802ad965b207e3aef2e35f3db6f7e1dffb8f7e83f6ea85ebbe
          • Opcode Fuzzy Hash: a0381d29217f7a075a9afb4b1eef2e8cc59b68936c819186348fce08d86b0340
          • Instruction Fuzzy Hash: F9F049F0501B00DFCB20EF61C80465ABBE0BF66308B10C85F94DA5B741D3B9A948CB8C
          APIs
            • Part of subcall function 0040241F: GetCurrentProcess.KERNEL32(00000000,0000000D,?,004022E3,?,?,004017F3), ref: 00402453
            • Part of subcall function 0040241F: FlushInstructionCache.KERNEL32(00000000), ref: 0040245A
          • SetLastError.KERNEL32(0000000E,00000000,?,?,?,004ADB04,00000066,00000000), ref: 00406993
          • DialogBoxParamW.USER32(000000D3,?,VA,00000000,00000000), ref: 004069BB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: CacheCurrentDialogErrorFlushInstructionLastParamProcess
          • String ID: VA
          • API String ID: 2229644096-1642038470
          • Opcode ID: dd3e19932c0718e9510397d4bb359f96272169f1f06c88ab384444d32b532ef4
          • Instruction ID: 2ed1c27b95a281d472931602778b9b3f264198f167ba3478a546c9c8460f2fe5
          • Opcode Fuzzy Hash: dd3e19932c0718e9510397d4bb359f96272169f1f06c88ab384444d32b532ef4
          • Instruction Fuzzy Hash: 88E0DF32240210E6D6202B64AD06B8A36919B44B30F110A3BB706B60E1CF748816C26E
          APIs
          • GetDriveTypeA.KERNEL32(?,?,00471FEB,?,00000000,00000007,00000007,?,00472130,00000000,?,?,004AD3E0,0000000C,00412B37,?), ref: 00471FC3
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: DriveType
          • String ID: :$\
          • API String ID: 338552980-1166558509
          • Opcode ID: d918d2c20a329ee8163d1b5e9d759b65d392d9d5fd1e2d65f7ba73f2a9013282
          • Instruction ID: ccb232e9e9f75700f4b595d094cc9d6d24d74b393041ee0fc80d437557cf2d0e
          • Opcode Fuzzy Hash: d918d2c20a329ee8163d1b5e9d759b65d392d9d5fd1e2d65f7ba73f2a9013282
          • Instruction Fuzzy Hash: 81E048307183885DEF118A7998447DB3FDC9B12699F08C067E84CCE241E235D655839A
          APIs
          • SysFreeString.OLEAUT32(?), ref: 0040B3F0
          • SysAllocString.OLEAUT32(00000000), ref: 0040B401
            • Part of subcall function 004024BC: __CxxThrowException@8.LIBCMT ref: 004024CE
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: String$AllocException@8FreeThrow
          • String ID: `-u
          • API String ID: 1688122297-2606764580
          • Opcode ID: a5d71367f228fc6ae404f97f61856b428f6bc4b588f8c2f592f61f9038df6859
          • Instruction ID: ff61bf2f13c673af4d7aeff02cc522d228b6e298d7f673cbf9b1e8601118b739
          • Opcode Fuzzy Hash: a5d71367f228fc6ae404f97f61856b428f6bc4b588f8c2f592f61f9038df6859
          • Instruction Fuzzy Hash: 86E01A31914300EFD710AB35D808B5BB7E4EB44325F40CC3EE499A2292D7789880CF69
          APIs
          • InterlockedIncrement.KERNEL32(?), ref: 004122DB
          • ResetEvent.KERNEL32(?,?,00412474,?,?,?,0040286C), ref: 004122EB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: EventIncrementInterlockedReset
          • String ID: PMJ
          • API String ID: 2582803691-1076063844
          • Opcode ID: 6876ecc2938f380de47b20ce4dba3264e432e10fe25b8f9fc24210632f0f590b
          • Instruction ID: 8b06d99bb3b4e9e598122329d1b07bf14d068142ed80a935b427c8ecb5246a09
          • Opcode Fuzzy Hash: 6876ecc2938f380de47b20ce4dba3264e432e10fe25b8f9fc24210632f0f590b
          • Instruction Fuzzy Hash: A6D0C77AA016105B87101729FD4848E77D996C9531305497AFD16D3610D6709C454754
          APIs
          • InterlockedDecrement.KERNEL32(?), ref: 004122FE
          • SetEvent.KERNEL32(?,?,00412497), ref: 0041230D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1615536038.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00401000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_401000_GB72405.jbxd
          Similarity
          • API ID: DecrementEventInterlocked
          • String ID: PMJ
          • API String ID: 988228665-1076063844
          • Opcode ID: 0871c366d651a92c07b7a95fe2c53122664957be6fdcf871dd7c6ca975e2dfa4
          • Instruction ID: 566f26dbd03874fcf8e00b65623561c6175d86a30fe61314d7bfcfd6e5981bd2
          • Opcode Fuzzy Hash: 0871c366d651a92c07b7a95fe2c53122664957be6fdcf871dd7c6ca975e2dfa4
          • Instruction Fuzzy Hash: A8D0C97B601A119B97215769FD0888A37AAEBC4621305093EAD56D3260DBA8DC458764